Whether you’re searching for strategies, best practices, or industry news, our seasoned experts have created hundreds of helpful resources, filterable by content type, solution, platform, and author. To stay informed, join our email list to get content that matters to you.
Are there still companies that use AS/400? Of course! IBM i was built on the same foundation. Join this live webinar to hear Steve Will talk about the future of this powerful platform.
As cyber threats become more sophisticated, strong encryption is essential. DB2 Field Procedures (FieldProcs) can greatly simplify encryption on IBM i, yet most organizations are not yet utilizing this powerful...
In today’s threat landscape, upper management is laser-focused on cybersecurity. You need to make progress in securing your systems—and make it fast.
There’s no shortage of actions you could take, but what...
More employees are working remotely than ever before, but research shows home networks are 3.5 times more likely than corporate networks to have at least one malicious program! It’s critical to grasp the impact these...
During this webinar, our IBM i experts demonstrate how you can do a successful role swap every time using Robot HA high availability software. Register today!
During this live webinar, our IBM i experts demonstrate how you can do a successful role swap every time using Robot HA high availability software. Register today!
Go in-depth on the ransomware attack cycle, the need to protect every endpoint, and how to spot signs of infection before data is encrypted by malicious actors.
In 1986, IBM launched AIX®, its open standards-based UNIX operating system. Now, on its 35th Anniversary, this popular platform continues to...
IBM i security expert Sandi Moore outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.
When you apply rules to system events, automation software like Robot Console works like the autopilot on a boat or plane—it steers the system through the night or the weekend while you rest.
Many IT professionals still use the term AS/400. But can a platform that was introduced in 1988 still be relevant today? The answers typically surprise people.
Single sign on is on the rise. Watch this on-demand webinar to learn how it can be implemented on IBM i.
IBM i is highly secure—when you have appropriate system settings in place. Watch this recorded webinar and find out what security vulnerabilities are most common and most dangerous. You'll also learn how to fix them!
A flexible, affordable high availability solution can do more for your organization than provide business continuity after a disaster. Discover the many ways HA can help you avoid downtime and keep your data and applications accessible to end users.
Noted IBM i security expert Sandi Moore explains the facts about viruses on IBM i. Watch and learn how to ensure you're fully protected.
Robot systems management solutions can improve processes and enhance the return on investment for new technologies running in modern IBM i environments. Find out how.
Robot has a reputation for providing high-quality systems management software and backing it up with great support. These additional benefits can help you justify the cost of automation at your company.
Your high availability solution is only as solid as your role swaps. You can’t be certain that your systems are switch-ready unless you test. Follow these steps to start testing your role swaps regularly.
Watch this webinar to learn the different types of data replication available for IBM i and where it makes sense to use more than one method.