Looking for information you can trust? Whether you’re searching for strategies, best practices, or industry news, look no further. Our seasoned experts have created hundreds of helpful articles, guides, trainings, on-demand presentations, and more to help.
S canning client PCs and doesn't mean a virus can't make it to your server. Effective malware defense requires multiple layers. This infographic highlights the four main reasons security experts give for using anti-virus software that runs natively on your Linux system.
What is PowerHA and what does it have to offer SAP on IBM i users? Find out here.
Here are some reasons you can put forth to show your boss the value of investing in MSS.
Protect your data and your company from internal and external threats by ensuring that your security policies on-premise and in the cloud are aligned with this checklist.
An introduction to Web Services, and how Automate helps you leverage that functionality.
Many devices send status updates using SNMP or simple network management protocol. Make sure you’re getting the message. Read on to see how Robot supports SNMP.
When was the last time you reviewed your Robot Console message automation? If you’re out of practice, let’s take a look at what you can do to maximize your message automation and reports.
As more and more companies and governments make data available online, the demand and need to access and process Internet-based data is growing fast. Problematically, much of the data is available only through a front-end web-app that is designed...
Learn how Automate interacts with stored procedures.
Microsoft SharePoint collaboration software is one of the more powerful tools for companies that need enterprise-scale solutions to mange content, administer business processes, and streamline how people find and share information across the network.
Do these steps look familiar?
Your IBM i source and target systems may not be identical. But don’t panic! Robot HA has a Swap Audit feature that regularly checks your setup and confirms you’re ready to role swap at any time.
Using triggers is key to your event-driven automation strategy. Learn about the triggers available in Automate and Automate Enterprise
BPA and job scheduling aren't mutually exclusive. In fact, an enterprise may use a job scheduler to support its wider BPA strategy.
If IBM i was part of the Equifax data breach, what could that organization have done to protect their data? Security expert Carol Woodbury has some ideas.
Proving that you are meeting service-level agreements shouldn’t be a wasted effort. In fact, it should strengthen your relationship with clients and help your team manage performance in the future. See how.
Are you prepared for GDPR? Automation is a critical tool to ensure compliance by the 2018 deadline.
Many IT pros have been misled about IBM i security or are making assumptions about features of the platform that were once true but aren’t any longer. This article addresses some common misconceptions.
Learn how to create monitors and set thresholds for seven key metrics that are critical to AIX/VIOS performance.