Resources

Case Study

ALD Automotive Takes a Business-Wide Approach to RPA

Based in the Netherlands, ALD Automotive is a global player in mobility financing and management and active in 43 countries. They strive to offer every company the right mobility mix, to make the day-to-day work of fleet- and mobility managers easier, and to take work out of the hands of the lease driver.
On-Demand Webinar

Reducing Risk Through Automated Forecasting and Planning

By aligning the management and planning of your IT resources with the business processes they support, you can provide more reliable and consistent service quality. But to achieve this, you need tools that can reliably give you maximum visibility into your IT assets. With IT performance optimization software from Vityl Capacity Management and network monitoring from Intermapper you can automate...
On-Demand Webinar

Power10 Power Hour

In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux.
On-Demand Webinar

Automate Customer Update

As your trusted partner on the automation journey, we’re excited to share the new ways we’re adding more value to Automate to help you increase your ROI. We’ve been working hard to improve our web automation capabilities so you can more easily and reliably build automation—and in half the time. In this customer exclusive webinar, you’ll get a tour of the newly released Automate 11.6—featuring the...
On-Demand Webinar

Protecting Mission-Critical Systems from Modern Malware Threats

Most organizations are vigilant about scanning their workstation PCs. Unfortunately, malware can just as easily target your servers, both on-premise and in the cloud. As malware and ransomware attacks have grown, so have the number of compliance mandates—and yet many organizations are still getting breached. Join this webinar with Bob Erdman, cybersecurity expert and Associate Director of...
On-Demand Webinar

Survival of the Fittest: Defending IBM i Against a Cyber Attack

Your odds of experiencing a data breach are now one in four, but a much larger number of attacks are unsuccessful. So, how are some organizations able to escape an attack unscathed while others suffer crushing financial losses? The difference is often found in the cybersecurity controls in place to guard mission-critical systems. Of course, the devil is in the details. In this webinar, IBM i...
On-Demand Webinar

Workshop: PowerHA + Robot HA

Watch this hands-on session and learn how to work with PowerHA and journaling software like Robot HA to verify that you’re replicating what you want replicated and that you are ready for the role swap.
On-Demand Webinar

Secure and Automate Your File Transfers for IBM i

Thank you for viewing for this on-demand webinar. If you have questions following the webinar, please contact us . You can also download the presentation slides here . About the Webinar Using IBM’s built-in FTP and Open SSH servers to transfer files to and from your IBM i systems can be time-consuming, if not riddled with meticulous details. From scripting knowledge to running commands, there’s a...
On-Demand Webinar

Expert Tips for IBM i Security: Beyond the Basics

In this session, IBM i security expert Robin Tatam will provide a quick recap of IBM i security basics and guide you through some advanced cybersecurity techniques that can help you take data protection to the next level .
On-Demand Webinar

Intelligent Automation: The Smartest Way to Automate

Robotic process automation ( RPA ) is great for handling repetitive manual tasks, but what about tasks involving data that require more critical thinking? Turn to Intelligent Automation (IA). Discover how IA uses machine learning and other cutting-edge technology to take the pain out of data classification and analysis. Whether your data is structured (from a spreadsheet, database, or portal), or...