Resources

Blog

IT Risk Mitigation

It's a brave new world for IT. And it often seems impossible to predict future demand and guard against performance risks. You have mountains of data, scalable cloud infrastructures, and a complex web of IT environments. It's complicated, to say the least. And it's matched by skyrocketing consumer demand for and reliance on online services. Bottom line: outages are more dangerous to a company’s...
Blog

Big Data? BIG DEAL!

With the dawn of the big data era upon us, what can IBM i systems administrators expect in terms of the demands that will be placed upon them and what kind of resources will be required to cope? Find out what the managed services industry can teach us today about what the future holds for us tomorrow.
Article

Disks Busy vs. ASP Busy in Robot Monitor

Did you know that the Disks Busy monitor reports the average percentage across all your ASPs, not just System ASP? You could be teetering near an I/O overload and not know it! If you have multiple ASPs, use the ASP Busy monitor instead. Here’s why.
Article

High Availability Fail Tales (and How to Avoid Them)

Chasing a high availability state is a common goal for IBM i administrators and one that can be thwarted by a single issue left unattended. By sharing some of the most frequent tales of what went wrong from real-world environments, you’ll be able to avoid these same scenarios.
Article

Monitoring the Demands of Fast Disk

The IT industry is decisively moving away from traditional hard disk drives (“platters”) in favor of Flash-based solid-state drives (SSDs). It’s a welcome change; it makes much more sense to circulate only electrons instead of disks of metal with electrons on them.
Article

Small but MIGHTY: Controlling the *CLS Object Type

While the instinct for administrators and IT managers is to always hunt down a culprit – a rogue job, an inactive journal receiver, or something else – sometimes the very building blocks of a common process, or rather the specifics that define processes, can be where the trouble at hand resides.
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide

Effective Log Management

IBM’s customers are turning to Power VM virtualization to consolidate multiple workloads onto fewer systems increasing server utilization and reducing cost. However a virtualized server landscape on several different IBM platforms (IBM Power Systems™, IBM System x®, and IBM BladeCenter®) may reduce hardware complexity but this puts a strain on supporting the entire lifecycle of analysis...
Guide

13 Tips to Write Secure Applications and Boost IBM i Security

Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Guide

Two Factor Authentication for IBM i

Organizations facing a more advanced threat landscape and a complex regulatory environment require a solution which addresses the need for securely controlling access to existing systems and applications. In addition, this solution should not increase the workload on support, application providers or the end user.
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data. The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a general lack of awareness of the...