HelpSystem resource experts conversing

Resources

Search Resources

Looking for information you can trust? Whether you’re searching for strategies, best practices, or industry news, look no further. Our seasoned experts have created hundreds of helpful articles, guides, trainings, on-demand presentations, and more to help.

Showing 42 of 616
Content types: Article X

The good old green screen is no longer your safety blanket. In fact, it could be the final nail in the coffin for IBM i at your company. Consider this your wakeup call from Donnie MacColl.

Learn how with robotic process automation (RPA), your employees can work with collaborative robots to be more productive, accurate, and get more free time.

Working with Robots
Automated data scraping from websites into Excel

Discover the pros and cons of using Python for website automation, and learn how robotic process automation (RPA) can provide you a better solution for web automation.

Python Website Automation
Article
By Kevin Jackson on August 30, 2019

SNMP is one of the most widely accepted protocols for network monitoring. Here’s a quick summary of what is SNMP, how it works, and why it matters to network professionals.

what is snmp and how it works
Article
August 22, 2019

Learn how website automation using robotic process automation (RPA) software can streamline your web testing processes. Ensure your website is up and running and get peace of mind with web automation.

 Website Automation

Learn why network monitoring software is critical for the Internet of Medical Things (IoMT) and keeping healthcare facilities and hospital networks healthy.

Internet of Medical Things (IoMT)
Article
By Chuck Losinski on August 21, 2019

The web interface for Robot Network is a browser-based tool that uses HelpSystems Insite to help you access system performance data for your network of IBM i systems from any laptop, tablet, or smartphone. You can also work in the Robot Network Status Center to see and respond to messages and other events that have been escalated to the Robot Network host system.

See how you can integrate and prioritize Robot Monitor exceptions into one list using the Insite Watch List feature available through the HelpSystems Insite web interface. Read on.

Get an overview of Sarbanes-Oxley and how to be SOX compliant.

In the world of healthcare, keeping your network healthy is critical to keeping patients healthy. With Intermapper, you can maintain a more secure IT infrastructure that allows you to deliver better care to patients.

Healthcare network monitoring software keeps networks and patients healthy

Robot Console leverages the power of HelpSystems Insite! Mobile-friendly dashboards allow you to combine key message summary and resource status data into a single, intuitive view. Read on to learn more.

Article
July 31, 2019

Learn how web automation can streamline your web browser related tasks using robotic process automation (RPA) software. Download a free trial of Automate to see website automation in action.

Bot performing web automation

Business process automation (BPA) aims to not only automate repetitive tasks but to connect automation from across your enterprise to form workflows that solve business problems. Enterprise-wide you can create processes that trigger other...

Make choosing a document management solution easier with these 3 questions you should ask when determining the best electronic document management system (EDMS) for your business.

How to Choose an EDMS

A complete overview of what PCI-DSS & PA-DSS is and how to become PCI compliant.

Many administrators experience what I call the "audit fire drill" when they hear they're about to undergo a security audit. Follow these strategies to eliminate some of the panic when preparing for an audit.

When it comes to security on IBM Power Servers running IBM i, a common challenge for many organizations is the number of users with too much power. These users can potentially circumvent application controls, override security restrictions for themselves and others, change critical server configuration settings, and even cover their tracks while they do it.

While everyone likes to feel special, we need to be more selective when it comes to data access. As we discussed last month, many users have privileges far beyond their business requirements and simply need to have their access reduced to more reasonable levels.

Article
By Robin Tatam on June 27, 2019

Ask any security professional which area of IBM i security is most often ignored and chances are that the unanimous response is a chorus of “the Integrated File System.” Although it’s been around since V3R1, the Integrated File System, or IFS, remains a shrouded mystery that represents significant risk to many IBM i organizations.

Stay up to date on what matters.