Sidebar

FCC Acts to Preserve Internet Freedom and Openness

Standards Organizations
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

The Federal Communications Commission has acted to preserve the Internet as an open network enabling consumer choice, freedom of expression, user control, competition and the freedom to innovate.

Chairman Genachowski voted for the order; Commissioner Copps concurred and Commissioner Clyburn approved in part and concurred in part. Commissioners McDowell and Baker dissented. 

In 2009, the FCC launched a public process to determine whether and what actions might be necessary to preserve the characteristics that have allowed the Internet to grow into an indispensable platform supporting our nation’s economy and civic life, and to foster continued investment in the physical networks that enable the Internet.

This process has made clear that the Internet has thrived because of its freedom and openness--the absence of any gatekeeper blocking lawful uses of the network or picking winners and losers online.  Consumers and innovators do not have to seek permission before they use the Internet to launch new technologies, start businesses, connect with friends, or share their views.

The Internet is a level playing field.  Consumers can make their own choices about what applications and services to use and are free to decide what content they want to access, create, or share with others.  This openness promotes competition.  It also enables a self-reinforcing cycle of investment and innovation in which new uses of the network lead to increased adoption of broadband, which drives investment and improvements in the network itself, which in turn lead to further innovative uses of the network and further investment in content, applications, services, and devices.  A core goal of this Order is to foster and accelerate this cycle of investment and innovation.

The record and the economic analysis demonstrate, however, that the openness of the Internet cannot be taken for granted, and that it faces real threats.  Broadband providers have taken actions that endanger the Internet’s openness by blocking or degrading disfavored content and applications without disclosing their practices to consumers.  Finally, broadband providers may have financial interests in services that may compete with online content and services.  The record also establishes the widespread benefits of providing greater clarity in this area: clarity that the Internet’s openness will continue; that there is a forum and procedure for resolving alleged open Internet violations; and clarity that broadband providers may reasonably manage their networks.  In light of these considerations, the FCC has long recognized that certain basic standards for broadband provider conduct are necessary to ensure the Internet’s continued openness.

The rules ensure that Internet openness will continue, providing greater certainty to consumers, innovators, investors, and broadband providers, including the flexibility providers need to effectively manage their networks. These rules were developed following a public rulemaking process that began in fall 2009 and included input from more than 100,000 individuals and organizations and several public workshops.

The rules require all broadband providers to publicly disclose network management practices, restrict broadband providers from blocking Internet content and applications, and bar fixed broadband providers from engaging in unreasonable discrimination in transmitting lawful network traffic.  The rules ensure much-needed transparency and continued Internet openness, while making clear that broadband providers can effectively manage their networks and respond to market demands.

The order builds on the bipartisan Internet Policy Statement the Commission adopted in 2005.  It concludes that adopting open Internet protections to ensure the continued vitality of the Internet is needed in light of instances of broadband providers interfering with the Internet’s openness and natural incentives they face to exert gatekeeper control over Internet content, applications, and services.

Broadband Internet access services are clearly within the Commission’s jurisdiction.  Congress charged the FCC with “regulating a field of enterprise the dominant characteristic of which was the rapid pace of its unfolding” and therefore intended to give the FCC sufficiently broad authority to address new issues that arise with respect to “fluid and dynamic” communications technologies.  Congress did not limit its instructions to the Commission to one section of the Communications Act.  Rather, it expressed its instructions in multiple sections which, viewed as a whole, provide broad authority to promote competition, investment, transparency, and an open Internet through the rules adopted today.

The provisions of the Communications the FCC relies on in enacting the open Internet rules include: 

  • Section 706 of the Telecommunications Act of 1996: This provision directs the FCC to “encourage the deployment on a reasonable and timely basis” of “advanced telecommunications capability” to all Americans  It directs the Commission to undertake annual inquiries concerning the availability of advanced telecommunications capability to all Americans and requires that, if the Commission finds that such capability is not being deployed in a reasonable and timely fashion, it “shall take immediate action to accelerate deployment of such capability by removing barriers to infrastructure investment and by promoting competition in the telecommunications market,” under Section 706(b). In July 2010, the Commission concluded that broadband deployment to all Americans is not reasonable and timely and noted that as a consequence of that conclusion, Section 706(b) was triggered. Section 706(b) therefore provides express authority for the pro-investment, pro-competition rules adopted today.
  • Title II of the Communications Act protects competition and consumers of telecommunications services.  Over-the-top Internet voice services -- VoIP -- can develop as a competitor to traditional phone services. The FCC likewise safeguards interconnection between telephone customers and VoIP users.
  • Title III of the Act gives the Commission authority to license spectrum used to provide fixed and mobile wireless services.  Licenses must be subject to terms that serve the public interest. The Commission previously has required certain wireless licensees to comply with open Internet principles, as appropriate in the particular situation before it. The open Internet conditions adopted today likewise are necessary to advance the public interest in innovation and investment.
  • Title VI of the Communications Act protects competition in video services.  Internet video distribution is increasingly important to video competition.  A cable or telephone company’s interference with the online transmission of programming by Direct Broadcast Satellite  operators or stand-alone online video programming aggregators that may function as competitive alternatives to traditional Multichannel Video Programming Distributors would frustrate Congress’s stated goals in enacting Section 628 of the Act, which include promoting “competition and diversity in the multichannel video programming market.”

Following are key excerpts from the Report and Order adopted by the Commission to preserve the open Internet:

 

Rule 1: Transparency

 

A person engaged in the provision of broadband Internet access service shall publicly disclose accurate information regarding the network management practices, performance, and commercial terms of its broadband Internet access services sufficient for consumers to make informed choices regarding use of such services and for content, application, service, and device providers to develop, market, and maintain Internet offerings.

 

Rule 2: No Blocking

 

A person engaged in the provision of fixed broadband Internet access service, insofar as such person is so engaged, shall not block lawful content, applications, services, or non-harmful devices, subject to reasonable network management.

 

A person engaged in the provision of mobile broadband Internet access service, insofar as such person is so engaged, shall not block consumers from accessing lawful websites, subject to reasonable network management; nor shall such person block applications that compete with the provider’s voice or video telephony services, subject to reasonable network

 

Rule 3: No Unreasonable Discrimination

 

A person engaged in the provision of fixed broadband Internet access service, insofar as such person is so engaged, shall not unreasonably discriminate in transmitting lawful network traffic over a consumer’s broadband Internet access service.  Reasonable network management shall not constitute unreasonable discrimination.

 

Select Definitions

 

Broadband Internet access service:  A mass-market retail service by wire or radio that provides the capability to transmit data to and receive data from all or substantially all Internet endpoints, including any capabilities that are incidental to and enable the operation of the communications service, but excluding dial-up Internet access service.  This term also encompasses any service that the Commission finds to be providing a functional equivalent of the service described in the previous sentence, or that is used to evade the protections set forth in this Part.

 

Reasonable network management.  A network management practice is reasonable if it is appropriate and tailored to achieving a legitimate network management purpose, taking into account the particular network architecture and technology of the broadband Internet access service. Legitimate network management purposes include: ensuring network security and integrity, including by addressing traffic that is harmful to the network; addressing traffic that is unwanted by users (including by premise operators), such as by providing services or capabilities consistent with a user’s choices regarding parental controls or security capabilities; and by reducing or mitigating the effects of congestion on the network. 

 

Pay for Priority Unlikely to Satisfy “No Unreasonable Discrimination” Rule

 

A commercial arrangement between a broadband provider and a third party to directly or indirectly favor some traffic over other traffic in the connection to a subscriber of the broadband provider (i.e., “pay for priority”) would raise significant cause for concern.  First, pay for priority would represent a significant departure from historical and current practice.  Since the beginning of the Internet, Internet access providers have typically not charged particular content or application providers fees to reach the providers’ consumer retail service subscribers or struck pay-for-priority deals, and the record does not contain evidence that U.S. broadband providers currently engage in such arrangements.  Second this departure from longstanding norms could cause great harm to innovation and investment in and on the Internet.  As discussed above, pay-for-priority arrangements could raise barriers to entry on the Internet by requiring fees from edge providers, as well as transaction costs arising from the need to reach agreements with one or more broadband providers to access a critical mass of potential users.  Fees imposed on edge providers may be excessive because few edge providers have the ability to bargain for lesser fees, and because no broadband provider internalizes the full costs of reduced innovation and the exit of edge providers from the market.  Third, pay-for-priority arrangements may particularly harm non-commercial end users, including individual bloggers, libraries, schools, advocacy organizations, and other speakers, especially those who communicate through video or other content sensitive to network congestion.  Even open Internet skeptics acknowledge that pay for priority may disadvantage non-commercial uses of the network, which are typically less able to pay for priority, and for which the Internet is a uniquely important platform.  Fourth, broadband providers that sought to offer pay-for-priority services would have an incentive to limit the quality of service provided to non-prioritized traffic.  In light of each of these concerns, as a general matter, it is unlikely that pay for priority would satisfy the “no unreasonable discrimination” standard.  The practice of a broadband Internet access service provider prioritizing its own content, applications, or services, or those of its affiliates, would raise the same significant concerns and would be subject to the same standards and considerations in evaluating reasonableness as third-party pay-for-priority arrangements.

 

Measured Steps for Mobile Broadband

 

Mobile broadband presents special considerations that suggest differences in how and when open Internet protections should apply.  Mobile broadband is an earlier-stage platform than fixed broadband, and it is rapidly evolving.  For most of the history of the Internet, access has been predominantly through fixed platforms -- first dial-up, then cable modem and DSL services.  As of a few years ago, most consumers used their mobile phones primarily to make phone calls and send text messages, and most mobile providers offered Internet access only via “walled gardens” or stripped down websites.   Today, however, mobile broadband is an important Internet access platform that is helping drive broadband adoption, and data usage is growing rapidly.   The mobile ecosystem is experiencing very rapid innovation and change, including an expanding array of smartphones, aircard modems, and other devices that allow mobile broadband providers to enable Internet access; the emergence and rapid growth of dedicated-purpose mobile devices like e-readers; the development of mobile application (“app”) stores and hundreds of thousands of mobile apps; and the evolution of new business models for mobile broadband providers, including usage-based pricing.

 

Moreover, most consumers have more choices for mobile broadband than for fixed broadband.   Mobile broadband speeds, capacity, and penetration are typically much lower than for fixed broadband,  though some providers have begun offering 4G service that will enable offerings with higher speeds and capacity and lower latency than previous generations of mobile service.   In addition, existing mobile networks present operational constraints that fixed broadband networks do not typically encounter.   This puts greater pressure on the concept of “reasonable network management” for mobile providers, and creates additional challenges in applying a broader set of rules to mobile at this time.   Further, we recognize that there have been meaningful recent moves toward openness, including the introduction of open operating systems like Android.  In addition, we anticipate soon seeing the effects on the market of the openness conditions we imposed on mobile providers that operate on upper 700 MHz C-Block spectrum, which includes Verizon Wireless, one of the largest mobile wireless carriers in the U.S.  

 

In light of these considerations, we conclude it is appropriate to take measured steps at this time to protect the openness of the Internet when accessed through mobile broadband

 

Specialized Services

 

In the Open Internet NPRM, the Commission recognized that broadband providers offer services that share capacity with broadband Internet access service over providers’ last-mile facilities, and may develop and offer other such services in the future.  These “specialized services,” such as some broadband providers’ existing facilities-based VoIP and Internet Protocol-video offerings, differ from broadband Internet access service and may drive additional private investment in broadband networks and provide consumers valued services, supplementing the benefits of the open Internet.  At the same time, specialized services may raise concerns regarding bypassing open Internet protections, supplanting the open Internet, and enabling anticompetitive conduct.  We note also that our rules define broadband Internet access service to encompass “any service that the Commission finds to be providing a functional equivalent of [broadband Internet access service], or that is used to evade the protections set forth in these rules.”

 

We will closely monitor the robustness and affordability of broadband Internet access services, with a particular focus on any signs that specialized services are in any way retarding the growth of or constricting capacity available for broadband Internet access service.  We fully expect that broadband providers will increase capacity offered for broadband Internet access service if they expand network capacity to accommodate specialized services.  We would be concerned if capacity for broadband Internet access service did not keep pace.  We also expect broadband providers to disclose information about specialized services’ impact, if any, on last-mile capacity available for, and the performance of, broadband Internet access service.  We may consider additional disclosure requirements in this area in our related proceeding regarding consumer transparency and disclosure.  We would also be concerned by any marketing, advertising, or other messaging by broadband providers suggesting that one or more specialized services, taken alone or together, and not provided in accordance with our open Internet rules, is “Internet” service or a substitute for broadband Internet access service.  Finally, we will monitor the potential for anticompetitive or otherwise harmful effects from specialized services, including from any arrangements a broadband provider may seek to enter into with third parties to offer such services.   The Open Internet Advisory Committee will aid us in monitoring these issues.

 

Action by the Commission December 21, 2010, by Report and Order (FCC 10-201).  Chairman Genachowski approving, Commissioner Clyburn approving in part and concurring in part; Commissioner Copps concurring, Commissioners’ McDowell and Baker dissenting.  Separate statements issued by Chairman Genachowski, Commissioners’ Copps, McDowell, Clyburn, and Baker.

The Federal Communications Commission (FCC) is an independent United States government agency. The FCC was established by the Communications Act of 1934 and is charged with regulating interstate and international communications by radio, television, wire, satellite and cable. The FCC's jurisdiction covers the 50 states, the District of Columbia, and U.S. possessions. The FCC is directed by five Commissioners appointed by the President and confirmed by the Senate for five-year terms, except when filling an unexpired term. The President designates one of the Commissioners to serve as Chairperson. Only three Commissioners may be members of the same political party. None of them can have a financial interest in any Commission-related business. As the chief executive officer of the Commission, the Chairman delegates management and administrative responsibility to the Managing Director. The Commissioners supervise all FCC activities, delegating responsibilities to staff units and Bureaus. 

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

RESOURCE CENTER

  • WHITE PAPERS

  • WEBCAST

  • TRIAL SOFTWARE

  • White Paper: Node.js for Enterprise IBM i Modernization

    SB Profound WP 5539

    If your business is thinking about modernizing your legacy IBM i (also known as AS/400 or iSeries) applications, you will want to read this white paper first!

    Download this paper and learn how Node.js can ensure that you:
    - Modernize on-time and budget - no more lengthy, costly, disruptive app rewrites!
    - Retain your IBM i systems of record
    - Find and hire new development talent
    - Integrate new Node.js applications with your existing RPG, Java, .Net, and PHP apps
    - Extend your IBM i capabilties to include Watson API, Cloud, and Internet of Things


    Read Node.js for Enterprise IBM i Modernization Now!

     

  • Profound Logic Solution Guide

    SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation.
    Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects.
    The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the companyare not aligned with the current IT environment.

    Get your copy of this important guide today!

     

  • 2022 IBM i Marketplace Survey Results

    Fortra2022 marks the eighth edition of the IBM i Marketplace Survey Results. Each year, Fortra captures data on how businesses use the IBM i platform and the IT and cybersecurity initiatives it supports.

    Over the years, this survey has become a true industry benchmark, revealing to readers the trends that are shaping and driving the market and providing insight into what the future may bring for this technology.

  • Brunswick bowls a perfect 300 with LANSA!

    FortraBrunswick is the leader in bowling products, services, and industry expertise for the development and renovation of new and existing bowling centers and mixed-use recreation facilities across the entertainment industry. However, the lifeblood of Brunswick’s capital equipment business was running on a 15-year-old software application written in Visual Basic 6 (VB6) with a SQL Server back-end. The application was at the end of its life and needed to be replaced.
    With the help of Visual LANSA, they found an easy-to-use, long-term platform that enabled their team to collaborate, innovate, and integrate with existing systems and databases within a single platform.
    Read the case study to learn how they achieved success and increased the speed of development by 30% with Visual LANSA.

     

  • Progressive Web Apps: Create a Universal Experience Across All Devices

    LANSAProgressive Web Apps allow you to reach anyone, anywhere, and on any device with a single unified codebase. This means that your applications—regardless of browser, device, or platform—instantly become more reliable and consistent. They are the present and future of application development, and more and more businesses are catching on.
    Download this whitepaper and learn:

    • How PWAs support fast application development and streamline DevOps
    • How to give your business a competitive edge using PWAs
    • What makes progressive web apps so versatile, both online and offline

     

     

  • The Power of Coding in a Low-Code Solution

    LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed.
    Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

    • Discover the benefits of Low-code's quick application creation
    • Understand the differences in model-based and language-based Low-Code platforms
    • Explore the strengths of LANSA's Low-Code Solution to Low-Code’s biggest drawbacks

     

     

  • Why Migrate When You Can Modernize?

    LANSABusiness users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.
    In this white paper, you’ll learn how to think of these issues as opportunities rather than problems. We’ll explore motivations to migrate or modernize, their risks and considerations you should be aware of before embarking on a (migration or modernization) project.
    Lastly, we’ll discuss how modernizing IBM i applications with optimized business workflows, integration with other technologies and new mobile and web user interfaces will enable IT – and the business – to experience time-added value and much more.

     

  • UPDATED: Developer Kit: Making a Business Case for Modernization and Beyond

    Profound Logic Software, Inc.Having trouble getting management approval for modernization projects? The problem may be you're not speaking enough "business" to them.

    This Developer Kit provides you study-backed data and a ready-to-use business case template to help get your very next development project approved!

  • What to Do When Your AS/400 Talent Retires

    FortraIT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators is small.

    This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn:

    • Why IBM i skills depletion is a top concern
    • How leading organizations are coping
    • Where automation will make the biggest impact

     

  • Node.js on IBM i Webinar Series Pt. 2: Setting Up Your Development Tools

    Profound Logic Software, Inc.Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. In Part 2, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Attend this webinar to learn:

    • Different tools to develop Node.js applications on IBM i
    • Debugging Node.js
    • The basics of Git and tools to help those new to it
    • Using NodeRun.com as a pre-built development environment

     

     

  • Expert Tips for IBM i Security: Beyond the Basics

    SB PowerTech WC GenericIn this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level. Robin will cover:

    • Reducing the risk posed by special authorities
    • Establishing object-level security
    • Overseeing user actions and data access

    Don't miss this chance to take your knowledge of IBM i security beyond the basics.

     

     

  • 5 IBM i Security Quick Wins

    SB PowerTech WC GenericIn today’s threat landscape, upper management is laser-focused on cybersecurity. You need to make progress in securing your systems—and make it fast.
    There’s no shortage of actions you could take, but what tactics will actually deliver the results you need? And how can you find a security strategy that fits your budget and time constraints?
    Join top IBM i security expert Robin Tatam as he outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.
    Your system didn’t become unsecure overnight and you won’t be able to turn it around overnight either. But quick wins are possible with IBM i security, and Robin Tatam will show you how to achieve them.

  • Security Bulletin: Malware Infection Discovered on IBM i Server!

    SB PowerTech WC GenericMalicious programs can bring entire businesses to their knees—and IBM i shops are not immune. It’s critical to grasp the true impact malware can have on IBM i and the network that connects to it. Attend this webinar to gain a thorough understanding of the relationships between:

    • Viruses, native objects, and the integrated file system (IFS)
    • Power Systems and Windows-based viruses and malware
    • PC-based anti-virus scanning versus native IBM i scanning

    There are a number of ways you can minimize your exposure to viruses. IBM i security expert Sandi Moore explains the facts, including how to ensure you're fully protected and compliant with regulations such as PCI.

     

     

  • Encryption on IBM i Simplified

    SB PowerTech WC GenericDB2 Field Procedures (FieldProcs) were introduced in IBM i 7.1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i including PII, PCI, PHI data in your physical files and tables.
    Watch this webinar to learn how you can quickly implement encryption on the IBM i. During the webinar, security expert Robin Tatam will show you how to:

    • Use Field Procedures to automate encryption and decryption
    • Restrict and mask field level access by user or group
    • Meet compliance requirements with effective key management and audit trails

     

  • Lessons Learned from IBM i Cyber Attacks

    SB PowerTech WC GenericDespite the many options IBM has provided to protect your systems and data, many organizations still struggle to apply appropriate security controls.
    In this webinar, you'll get insight into how the criminals accessed these systems, the fallout from these attacks, and how the incidents could have been avoided by following security best practices.

    • Learn which security gaps cyber criminals love most
    • Find out how other IBM i organizations have fallen victim
    • Get the details on policies and processes you can implement to protect your organization, even when staff works from home

    You will learn the steps you can take to avoid the mistakes made in these examples, as well as other inadequate and misconfigured settings that put businesses at risk.

     

     

  • The Power of Coding in a Low-Code Solution

    SB PowerTech WC GenericWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed.
    Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

    • Discover the benefits of Low-code's quick application creation
    • Understand the differences in model-based and language-based Low-Code platforms
    • Explore the strengths of LANSA's Low-Code Solution to Low-Code’s biggest drawbacks

     

     

  • Node Webinar Series Pt. 1: The World of Node.js on IBM i

    SB Profound WC GenericHave you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.
    Part 1 will teach you what Node.js is, why it's a great option for IBM i shops, and how to take advantage of the ecosystem surrounding Node.
    In addition to background information, our Director of Product Development Scott Klement will demonstrate applications that take advantage of the Node Package Manager (npm).
    Watch Now.

  • The Biggest Mistakes in IBM i Security

    SB Profound WC Generic The Biggest Mistakes in IBM i Security
    Here’s the harsh reality: cybersecurity pros have to get their jobs right every single day, while an attacker only has to succeed once to do incredible damage.
    Whether that’s thousands of exposed records, millions of dollars in fines and legal fees, or diminished share value, it’s easy to judge organizations that fall victim. IBM i enjoys an enviable reputation for security, but no system is impervious to mistakes.
    Join this webinar to learn about the biggest errors made when securing a Power Systems server.
    This knowledge is critical for ensuring integrity of your application data and preventing you from becoming the next Equifax. It’s also essential for complying with all formal regulations, including SOX, PCI, GDPR, and HIPAA
    Watch Now.

  • Comply in 5! Well, actually UNDER 5 minutes!!

    SB CYBRA PPL 5382

    TRY the one package that solves all your document design and printing challenges on all your platforms.

    Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product.

    Request your trial now!

  • Backup and Recovery on IBM i: Your Strategy for the Unexpected

    FortraRobot automates the routine tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:
    - Simplified backup procedures
    - Easy data encryption
    - Save media management
    - Guided restoration
    - Seamless product integration
    Make sure your data survives when catastrophe hits. Try the Robot Backup and Recovery Solution FREE for 30 days.

  • Manage IBM i Messages by Exception with Robot

    SB HelpSystems SC 5413Managing messages on your IBM i can be more than a full-time job if you have to do it manually. How can you be sure you won’t miss important system events?
    Automate your message center with the Robot Message Management Solution. Key features include:
    - Automated message management
    - Tailored notifications and automatic escalation
    - System-wide control of your IBM i partitions
    - Two-way system notifications from your mobile device
    - Seamless product integration
    Try the Robot Message Management Solution FREE for 30 days.

  • Easiest Way to Save Money? Stop Printing IBM i Reports

    FortraRobot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing.
    Manage your reports with the Robot Report Management Solution. Key features include:

    - Automated report distribution
    - View online without delay
    - Browser interface to make notes
    - Custom retention capabilities
    - Seamless product integration
    Rerun another report? Never again. Try the Robot Report Management Solution FREE for 30 days.

  • Hassle-Free IBM i Operations around the Clock

    SB HelpSystems SC 5413For over 30 years, Robot has been a leader in systems management for IBM i.
    Manage your job schedule with the Robot Job Scheduling Solution. Key features include:
    - Automated batch, interactive, and cross-platform scheduling
    - Event-driven dependency processing
    - Centralized monitoring and reporting
    - Audit log and ready-to-use reports
    - Seamless product integration
    Scale your software, not your staff. Try the Robot Job Scheduling Solution FREE for 30 days.