Sidebar

Understanding the WRKSYSSTS Screen

IT Infrastructure - Other
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

In mathematics, a perfect number is one in which the sum of its divisors (excluding the number itself) exactly measures itself. An example is 6, in which 1+2+3 = 6. Perfect numbers are very scarce. There are only five of them between 1 and 40 million: 6; 28; 496; 8,128; and 33,550,336.

In OS/400, system performance is evaluated by using numbers that are not quite so perfect, specifically the numbers found on the Work with System Status (WRK-SYSSTS) screen. When performance tuning is needed on an AS/400?and it is always needed?these numbers are the driving force behind any manual or automatic adjustments made to the system.

The purpose of this article is to examine that most mysterious and least understood element of AS/400 performance reporting, the WRKSYSSTS screen. I'll examine the numbers on the screen, discuss where they are derived from, and talk about their strengths and limitations in helping you understand how to balance AS/400 system performance. My goal is to explain what you see on this screen and to help you understand how it affects your shop.

Paint by Numbers

In "Storage Pool Management on the AS/400" (MC, April 1995), I explained how the heart of the AS/400's work management scheme lies in its storage pools. WRKSYSSTS supplements that scheme and serves a special purpose in OS/400. It provides an instant report card for how well your work management scheme is running. It also allows you to make storage pool changes on the fly.

This information is raw material for evaluating your AS/400's performance. WRKSYSSTS tells you which storage pools are experiencing problems. It can show that information instantly, or it can average it out over a set period of time.

1 shows a typical view of the WRKSYSSTS screen. OS/400 gives you the option to display system status information in several different assistance levels. This particular screen shows the information in the advanced format. The advanced format shows the maximum amount of data, but eliminates showing you other information, like the function keys. Although you can retrieve information in formats other than what is shown here, for space reasons, this is the only WRKSYSSTS screen that will be covered in this article. For your convenience, we've labeled each field with a number.

Figure 1 shows a typical view of the WRKSYSSTS screen. OS/400 gives you the option to display system status information in several different assistance levels. This particular screen shows the information in the advanced format. The advanced format shows the maximum amount of data, but eliminates showing you other information, like the function keys. Although you can retrieve information in formats other than what is shown here, for space reasons, this is the only WRKSYSSTS screen that will be covered in this article. For your convenience, we've labeled each field with a number.

To bring up an advanced assistance level WRKSYSSTS screen on your system similar to what is shown in 1, type in the following command:

To bring up an advanced assistance level WRKSYSSTS screen on your system similar to what is shown in Figure 1, type in the following command:

WRKSYSSTS ASTLVL(*ADVANCED)

A Book of Numbers

There are two sets of numbers to examine when viewing the WRKSYSSTS screen. The first is a relatively static set of numbers that reside in the header of the screen. These numbers give you basic information about your system and what is happening at the moment.

The second set is more dynamic in nature. They are the constantly changing body of the screen that describes your machine's storage pools and what is happening in them.

Before we can talk about what WRKSYSSTS tells you, we have to define the time periods over which it can be run. The most important number to look at on this screen is the Elapsed time field (Label 1) in the header. This field shows you the amount of time over which the statistics were gathered.

When you first start WRKSYSSTS, all the numbers on the screen reflect what is going on in the system from the moment you typed in the command. After the first time, however, the command stores data in a hidden system object until you sign off.

Every time you run the command thereafter, it gets the current information from the system and compares it to the data stored in the hidden system object. That is how it determines the averages when you run the command a number of times.

For example, if you sign on, run the command, exit, and then run the command five minutes later, the statistics it shows will be for what has happened in the elapsed time since you first ran WRKSYSSTS. The first time the command is run, the Elapsed Time field will read zero seconds. The second time, Elapsed Time will read five minutes. This means that the CPU utilization, the database and non-database faults, and almost everything else will be averaged out to reflect what happened during that five minute interval.

This has some serious implications. If you are looking at average numbers to determine performance problems, you may miss some very short, very intensive programs that are sucking up your CPU and memory. Trends in your performance may disappear because of the averaging. It's the same problem that occurs when you average the heights of a 5-foot and a 6-foot woman. The average is a 5.5-foot woman. It's true, but....

So what's the best time period over which to view WRKSYSSTS statistics? A good period to analyze data over is two minutes. Two minutes is long enough to get a feel for how the system is running, but short enough that significant trends will not be missed. However, don't rely on the data from running the command just one or two times. Because of the changing workloads, this data should be viewed several times a day, so one interval doesn't cloud your entire view. You always need to sample your system's performance over several different time periods to get a true picture.

Lucky Numbers

What do the numbers on WRKSYSSTS mean, anyway? We've already covered elapsed time, so let's review the other numbers in the header part of the screen. Keep in mind that these numbers may be averaged over different time periods depending on the elapsed time.

* % CPU used (Label 2) is self-explanatory and refers to the percentage of CPU resources used to process jobs currently running on the system. If you see that your average CPU utilization is at 99 percent?or if this field reads '+++'?it's telling you your CPU cannot handle the current workload. If you see this every time you run the command, it may mean that your processor is undersized for the workload and you either need to adjust the workload or to get a larger processor.

* Jobs in system (Label 3) seems like another self-explanatory number, but it is more complex than that. The number of jobs in the system includes more than just active jobs. It also includes queued jobs that are waiting to run and completed jobs. Completed jobs remain in the system if there are any spooled files on an AS/400 output queue. These jobs can affect performance.

Too many jobs in the system can cause delays in signing on or in job initiation. They can also cause commands that work with job and output queues to run more slowly. In general, to achieve better performance, clear out job logs on a regular basis (or better yet, don't generate them if there are no errors), clear out your output queues by saving only those spooled files that absolutely need to be saved, and don't queue up too many jobs to run.

* % perm addresses (Label 4) and % temp addresses (Label 5) refer to the percentage of the possible system addresses that have been created for permanent and temporary objects on your AS/400. If you see a rapid increase in the percentage of addresses used, it may imply that your system or applications are creating and destroying objects at a rapid pace. This may be affecting performance.

* System ASP (Label 6) refers to the amount of hard disk capacity available in your system Auxiliary Storage Pool (ASP). This can be a deceiving number if you have more than one ASP defined on your system, because this number only reflects the System ASP. If you want to get a full picture of disk utilization, especially if you are using checksum, use the Work with Disk Status (WRKDSKSTS) command.

* % system ASP used (Label 7) refers to the percentage of disk storage in your System ASP that is currently used. Performance is generally affected when your disk storage usage exceeds 80 percent, and system failures can occur after it exceeds 90 percent. You should watch this figure even when your storage is running below 80 percent. In situations when your disk usage jumps significantly in one day?by five percent, for example?there could be a problem with an application that is affecting system performance. It is always a good idea to monitor this number from day to day for unexpected changes.

* Total aux stg (Label 8) refers to the total amount of auxiliary storage available on the system.

* Current unprotect used (Label 9) and Maximum unprotect (Label 10) refer to the current amount of storage in use for temporary objects and machine data that is stored in unprotected storage when checksum protection is turned on. Since checksum protection is an issue in itself, we will not cover these fields in this article.

Storage Pool Numbers

In the bottom half of the WRKSYSSTS screen is a subfile of numbers. This subfile describes the current storage pool setup and gives you a thumbnail sketch of how that setup is working. There will be from 1 to 16 entries in this section, one for each possible storage pool on the AS/400. There are four predefined storage pools?*MACHINE, *BASE, *INTER, and *SPOOL?and up to 12 user-definable storage pools.

For each storage pool, the following information is listed:

* Sys Pool (Label 11) refers to the identification number the AS/400 assigns to the storage pool. This number will always be from 1 to 16, and OS/400 determines the number to assign. Pool 1 is *MACHINE and pool 2 is *BASE; generally, pool 3 is *SPOOL, pool 4 is *INTER, and pools 5 through 16 are the user-defined storage pools. This number has no effect on system performance.

* Pool Size K (Label 12) is the amount of working system memory assigned to the pool. Similar to RAM on a personal computer, this is the memory that OS/400 jobs use for program execution and database access. This value can be changed in WRKSYSSTS, or it can be changed on the Work with Shared Pools (WRKSHRPOOL) screen or with the Change Subsystem Description (CHGSBSD) command. Along with storage pool activity levels, this is the most significant component of AS/400 performance tuning. Well thought out adjustments to a storage pool will help system performance; poorly thought out ones will damage it.

By default, all unused working memory will reside in the *BASE (System Pool id 2) storage pool. An increase in another pool's size will take memory from *BASE. A decrease will add memory to it. You cannot change the pool size for *BASE directly.

* Rsrv Size K (Label 13) refers to storage pool memory that is used by the system and is not available for job use. The *MACHINE pool (Pool ID 1) always uses some reserved memory for AS/400 system overhead, such as storage management I/0 routines or page fault handlers. In pools 2-16, memory is usually reserved during backup and restore operations.

Reserved size can affect system performance. If you don't give enough memory to the *MACHINE pool, most of its memory may be used for reserved processing, which can cause across the board system performance degradation. The danger is, if you run backup and restore programs in an undersized pool, this may cause other jobs to thrash trying to get enough memory to complete. (Thrashing is a situation where the system spends more CPU time swapping the programs and data from disk to memory and back than actually processing the program.) Two simple but basic ways to improve performance are to size your *MACHINE pool memory correctly and to run backup/restore operations in their own adequately sized storage pools.

* Max Act (Label 14) specifies the total number of jobs that can have a status of running (RUN on the WRKACTJOB screen) in a particular storage pool at one time. Activity levels are the second most significant component of system performance tuning. When a problem develops, you can adjust the activity level of a storage pool to allow more or fewer jobs to execute at the same time, which affects how many jobs can compete for the limited memory.

In the world of AS/400 work management, more can be less. Performance problems develop when too many jobs try to compete for system resources at one time. These jobs compete for available memory and thrash as program instructions and data are swapped in and out of memory. On the opposite side, if there is too much memory for the number of jobs running in a pool, system memory that can be better used elsewhere may be wasted.

Numbers and Faults

DB and Non-DB Faults and Pages (Labels 15 and 16) refer to how program instructions and database information enter and leave the pool's memory. Operating Systems 101 tells us that programs and data reside on your hard disk. To execute a program, instructions must be read from the disk to your pool's main memory, and data must also be brought into memory to be read and modified.

Every time program or database information is needed but is not present in main memory, OS/400 declares a fault for that storage pool. A database (DB) fault occurs when file information or an access path is needed. A non-database (NDB) fault occurs whenever something other than database information is needed. NDB faults can involve programs, data queues, and configuration objects.

Faults affect system performance because an executing job must stop and wait for information to be transferred from the disk to main storage. When two or more jobs are competing for working memory, information may be rapidly swapped back and forth between system memory and hard disk and the system is said to be thrashing.

Faults are measured in terms of faults per second. When fault rates go up, AS/400 system performance goes down. IBM's AS/400 Performance Management redbook and AS/400 Work Management guides give guidelines for acceptable and unacceptable faulting rates. These guidelines vary for different machines, so it is necessary to consult the manuals for your particular installation.

High faulting rates can be repaired by adjusting your pool sizes and activity levels. If the problem is memory, giving the storage pool more memory may solve it. If competition is the problem, the activity level can be adjusted downward. These adjustments alone may not solve your problems. High fault rates can also result from faulty hardware or poor application design and coding. Pool adjustment is a delicate process that involves scarce resources (e.g., working memory) that must be shared by several pools.

Faults in the *MACHINE pool can only be controlled by changing the size of the pool, not by changing the maximum number of jobs running in the pool. Because the *MACHINE pool handles system functions, activity levels are irrelevant and are not even listed on the WRKSYSSTS screen.

Waiting for My Number to

Come Up

Act-Wait (Label 17), Wait-Inel (Label 18), and Act-Inel (Label 19) are transition rates that describe how jobs share activity levels and how well OS/400 processes work in a storage pool. These fields are a bit more complicated and deserve an article of their own but, in a nutshell, here's how they work.

Jobs running on an AS/400 exist in either the active, wait, or ineligible state.

An active job is the ideal state. It exists in main storage and is able to process its work. Jobs in the active state sometimes go into a short wait, which can last up to two seconds. The job retains its activity level while waiting for an action, such as a database write, to occur.

A job in the wait state needs a system resource or a response from the user to keep processing. Jobs in this state lose their activity level so other jobs can process. IBM actually defines four different types of wait states?short wait, short wait extended, long wait, and key/think wait?but to keep things simple we will use the definition of a job that is waiting for a resource or response.

Jobs in the ineligible state have work to do but the system cannot accommodate its demands at the moment. Jobs enter the ineligible queue when there are no activity levels available for them to use. They can also enter the queue from a wait state when they are waiting for a record or object lock and the lock is released but there are no activity levels available.

A job in the ineligible queue is reactivated in one of two ways. If the job became ineligible because it was waiting for a lock, it is placed ahead of other jobs of equal or lesser priority. It becomes active again when that object becomes available and an activity level opens up.

Jobs that become ineligible solely because there are no activity levels are placed behind all other jobs of equal priority already on the job queue. This type of queuing is called first-in, first-out processing. It provides a round-robin approach to processing. Jobs are processed for a specific amount of time, go ineligible, and then become active again after each job has had a turn.

The transition rates shown on the WRKSYSSTS screen detail the rate at which the three transitions occur in transitions per second. Active to Wait (A-W) shows the rate at which jobs are moving from an active state to a wait state. It shows how often jobs are interrupted due to waiting on resources.

The Wait to Ineligible (W-I) rate shows how often jobs are moving from a wait state to the ineligible queue. This rate should be examined in conjunction with the A-W rate. IBM specifies that, if the W-I ratio is zero all the time, then your activity levels may be set too high and your pool is not using all of its activity levels. The other rule of thumb is that your W-I rate should be no more than 20 percent of your A-W rate.

If this ratio is greater than 20 percent, jobs are moving into the ineligible state too often, and you may want to examine how your applications use locks. At 20 percent, performance is slowed by having too many jobs paging in and out of memory looking for object locks. This rate can be improved by ensuring that your applications holding record or object locks release them as soon as they are finished.

The Active to Ineligible (A-I) rate shows how often jobs are moved into the ineligible queue due to lack of an activity level. In general, this number should be as low as possible without reaching zero. If A-I is zero, there is always an activity level available for every job that wants one, and the pool's activity level may be set too high. It is desirable to have some A-I activity, but not so much that it slows down the system. Also, watch this rate in your interactive pools. If there is an excessive amount of interactive A-I activity, batch work may be occurring in an interactive pool.

The Numbers Game

As you can see, WRKSYSSTS is much more complicated than it looks. It contains an incredible amount of information about how your system behaves, but it can also deceive you about that behavior. The numbers are not perfect, but if you understand what they mean, you'll be better equipped to balance your system.

Joe Hertvik is a freelance writer and a system administrator for a manufacturing company outside of Chicago.

References

AS/400 Performance Management (GG24-3723, CD-ROM GG243723).

AS/400: Work Management (SC41-3306, CD-ROM QBKALG00).

Understanding the WRKSYSSTS Screen

Figure 1: The WRKSYSSTS Screen


BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

RESOURCE CENTER

  • WHITE PAPERS

  • WEBCAST

  • TRIAL SOFTWARE

  • Mobile Computing and the IBM i

    SB ASNA PPL 5450Mobile computing is rapidly maturing into a solid platform for delivering enterprise applications. Many IBM i shops today are realizing that integrating their IBM i with mobile applications is the fast path to improved business workflows, better customer relations, and more responsive business reporting.

    This ASNA whitepaper takes a look at mobile computing for the IBM i. It discusses the different ways mobile applications may be used within the enterprise and how ASNA products solve the challenges mobile presents. It also presents the case that you already have the mobile programming team your projects need: that team is your existing RPG development team!

    Get your copy today!

  • Automate IBM i Operations using Wireless Devices

    DDL SystemsDownload the technical whitepaper on MANAGING YOUR IBM i WIRELESSLY and (optionally) register to download an absolutely FREE software trail. This whitepaper provides an in-depth review of the native IBM i technology and ACO MONITOR's advanced two-way messaging features to remotely manage your IBM i while in or away from the office. Notify on-duty personnel of system events and remotely respond to complex problems (via your Smartphone) before they become critical-24/7. Problem solved!

    Order your copy here.

  • DR Strategy Guide from Maxava: Brand New Edition - now fully updated to include Cloud!

    SB Maxava PPL 5476PRACTICAL TOOLS TO IMPLEMENT DISASTER RECOVERY IN YOUR IBM i ENVIRONMENT

    CLOUD VS. ON-PREMISE?
    - COMPREHENSIVE CHECKLISTS
    - RISK COST CALCULATIONS
    - BUSINESS CASE FRAMEWORK
    - DR SOLUTIONS OVERVIEW
    - RFP BUILDER
    Download your free copy of DR Strategy Guide for IBM i from Maxava today.

     

  • White Paper: Node.js for Enterprise IBM i Modernization

    SB Profound WP 5539

    If your business is thinking about modernizing your legacy IBM i (also known as AS/400 or iSeries) applications, you will want to read this white paper first!

    Download this paper and learn how Node.js can ensure that you:
    - Modernize on-time and budget - no more lengthy, costly, disruptive app rewrites!
    - Retain your IBM i systems of record
    - Find and hire new development talent
    - Integrate new Node.js applications with your existing RPG, Java, .Net, and PHP apps
    - Extend your IBM i capabilties to include Watson API, Cloud, and Internet of Things


    Read Node.js for Enterprise IBM i Modernization Now!

     

  • 2020 IBM i Marketplace Survey Results

    HelpSystems

    This year marks the sixth edition of the popular IBM i Marketplace Survey Results. Each year, HelpSystems sets out to gather data about how businesses use the IBM i platform and the IT initiatives it supports. Year over year, the survey has begun to reveal long-term trends that give insight into the future of this trusted technology.

    More than 500 IBM i users from around the globe participated in this year’s survey, and we’re so happy to share the results with you. We hope you’ll find the information interesting and useful as you evaluate your own IT projects.

  • AIX Security Basics eCourse

    Core Security

    With so many organizations depending on AIX day to day, ensuring proper security and configuration is critical to ensure the safety of your environment. Don’t let common threats put your critical AIX servers at risk. Avoid simple mistakes and start to build a long-term plan with this AIX Security eCourse. Enroll today to get easy to follow instructions on topics like:

    • Removing extraneous files
    • Patching systems efficiently
    • Setting and validating permissions
    • Managing service considerations
    • Getting overall visibility into your networks

     

  • Developer Kit: Making a Business Case for Modernization and Beyond

    Profound Logic Software, Inc.

    Having trouble getting management approval for modernization projects? The problem may be you're not speaking enough "business" to them.

    This Developer Kit provides you study-backed data and a ready-to-use business case template to help get your very next development project approved!

  • What to Do When Your AS/400 Talent Retires

    HelpSystemsIT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators is small.

    This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn:

    • Why IBM i skills depletion is a top concern
    • How leading organizations are coping
    • Where automation will make the biggest impact

     

  • IBM i Resources Retiring?

    SB HelpSystems WC GenericLet’s face it: IBM i experts and RPG programmers are retiring from the workforce. Are you prepared to handle their departure?
    Our panel of IBM i experts—Chuck Losinski, Robin Tatam, Richard Schoen, and Tom Huntington—will outline strategies that allow your company to cope with IBM i skills depletion by adopting these strategies that allow you to get the job done without deep expertise on the OS:
    - Automate IBM i processes
    - Use managed services to help fill the gaps
    - Secure the system against data loss and viruses
    The strategies you discover in this webinar will help you ensure that your system of record—your IBM i—continues to deliver a powerful business advantage, even as staff retires.

     

  • Backup and Recovery Considerations for Security Data and Encrypted Backups

    SB PowerTech WC GenericSecurity expert Carol Woodbury is joined by Debbie Saugen. Debbie is an expert on IBM i backup and recovery, disaster recovery, and high availability, helping IBM i shops build and implement effective business continuity plans.
    In today’s business climate, business continuity is more important than ever. But 83 percent of organizations are not totally confident in their backup strategy.
    During this webinar, Carol and Debbie discuss the importance of a good backup plan, how to ensure you’re backing up your security information, and your options for encrypted back-ups.

  • Profound.js: The Agile Approach to Legacy Modernization

    SB Profound WC GenericIn this presentation, Alex Roytman and Liam Allan will unveil a completely new and unique way to modernize your legacy applications. Learn how Agile Modernization:
    - Uses the power of Node.js in place of costly system re-writes and migrations
    - Enables you to modernize legacy systems in an iterative, low-risk manner
    - Makes it easier to hire developers for your modernization efforts
    - Integrates with Profound UI (GUI modernization) for a seamless, end-to-end legacy modernization solution

     

  • Data Breaches: Is IBM i Really at Risk?

    SB PowerTech WC GenericIBM i is known for its security, but this OS could be more vulnerable than you think.
    Although Power Servers often live inside the safety of the perimeter firewall, the risk of suffering a data leak or data corruption remains high.
    Watch noted IBM i security expert Robin Tatam as he discusses common ways that this supposedly “secure” operating system may actually be vulnerable and who the culprits might be.

    Watch the webinar today!

     

  • Easy Mobile Development

    SB Profound WC GenericWatch this on-demand webinar and learn how to rapidly and easily deploy mobile apps to your organization – even when working with legacy RPG code! IBM Champion Scott Klement will demonstrate how to:
    - Develop RPG applications without mobile development experience
    - Deploy secure applications for any mobile device
    - Build one application for all platforms, including Apple and Android
    - Extend the life and reach of your IBM i (aka iSeries, AS400) platform
    You’ll see examples from customers who have used our products and services to deliver the mobile applications of their dreams, faster and easier than they ever thought possible!

     

  • Profound UI: Unlock True Modernization from your IBM i Enterprise

    SB Profound PPL 5491Modern, web-based applications can make your Enterprise more efficient, connected and engaged. This session will demonstrate how the Profound UI framework is the best and most native way to convert your existing RPG applications and develop new modern applications for your business. Additionally, you will learn how you can address modernization across your Enterprise, including databases and legacy source code, with Profound Logic.

  • Node Webinar Series Pt. 1: The World of Node.js on IBM i

    Profound Logic Software, Inc.Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

    Part 1 will teach you what Node.js is, why it's a great option for IBM i shops, and how to take advantage of the ecosystem surrounding Node.

    In addition to background information, our Director of Product Development Scott Klement will demonstrate applications that take advantage of the Node Package Manager (npm).

  • 5 New and Unique Ways to Use the IBM i Audit Journal

    SB HelpSystems ROBOT GenericYou must be asking yourself: am I doing everything I can to protect my organization’s data? Tune in as our panel of IBM i high availability experts discuss:


    - Why companies don’t test role swaps when they know they should
    - Whether high availability in the cloud makes sense for IBM i users
    - Why some organizations don’t have high availability yet
    - How to get high availability up and running at your organization
    - High availability considerations for today’s security concerns

  • Profound.js 2.0: Extend the Power of Node to your IBM i Applications

    SB Profound WC 5541In this Webinar, we'll demonstrate how Profound.js 2.0 enables you to easily adopt Node.js in your business, and to take advantage of the many benefits of Node, including access to a much larger pool of developers for IBM i and access to countless reusable open source code packages on npm (Node Package Manager).
    You will see how Profound.js 2.0 allows you to:

    • Provide RPG-like capabilities for server-side JavaScript.
    • Easily create web and mobile application interfaces for Node on IBM i.
    • Let existing RPG programs call Node.js modules directly, and vice versa.
    • Automatically generate code for Node.js.
    • Automatically converts existing RPGLE code into clean, simplified Node.js code.

    Download and watch today!

     

  • Make Modern Apps You'll Love with Profound UI & Profound.js

    SB Profound WC 5541Whether you have green screens or a drab GUI, your outdated apps can benefit from modern source code, modern GUIs, and modern tools.
    Profound Logic's Alex Roytman and Liam Allan are here to show you how Free-format RPG and Node.js make it possible to deliver applications your whole business will love:

    • Transform legacy RPG code to modern free-format RPG and Node.js
    • Deliver truly modern application interfaces with Profound UI
    • Extend your RPG applications to include Web Services and NPM packages with Node.js

     

  • Accelerating Programmer Productivity with Sequel

    SB_HelpSystems_WC_Generic

    Most business intelligence tools are just that: tools, a means to an end but not an accelerator. Yours could even be slowing you down. But what if your BI tool didn't just give you a platform for query-writing but also improved programmer productivity?
    Watch the recorded webinar to see how Sequel:

    • Makes creating complex results simple
    • Eliminates barriers to data sources
    • Increases flexibility with data usage and distribution

    Accelerated productivity makes everyone happy, from programmer to business user.

  • Business Intelligence is Changing: Make Your Game Plan

    SB_HelpSystems_WC_GenericIt’s time to develop a strategy that will help you meet your informational challenges head-on. Watch the webinar to learn how to set your IT department up for business intelligence success. You’ll learn how the right data access tool will help you:

    • Access IBM i data faster
    • Deliver useful information to executives and business users
    • Empower users with secure data access

    Ready to make your game plan and finally keep up with your data access requests?

     

  • Controlling Insider Threats on IBM i

    SB_HelpSystems_WC_GenericLet’s face facts: servers don’t hack other servers. Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
    User profiles are often duplicated or restored and are rarely reviewed for the appropriateness of their current configuration. This increases the risk of the profile being able to access data without the intended authority or having privileges that should be reserved for administrators.
    Watch security expert Robin Tatam as he discusses a new approach for onboarding new users on IBM i and best-practices techniques for managing and monitoring activities after they sign on.

  • Don't Just Settle for Query/400...

    SB_HelpSystems_WC_GenericWhile introducing Sequel Data Access, we’ll address common frustrations with Query/400, discuss major data access, distribution trends, and more advanced query tools. Plus, you’ll learn how a tool like Sequel lightens IT’s load by:

    - Accessing real-time data, so you can make real-time decisions
    - Providing run-time prompts, so users can help themselves
    - Delivering instant results in Microsoft Excel and PDF, without the wait
    - Automating the query process with on-demand data, dashboards, and scheduled jobs

  • How to Manage Documents the Easy Way

    SB_HelpSystems_WC_GenericWhat happens when your company depends on an outdated document management strategy?
    Everything is harder.
    You don’t need to stick with status quo anymore.
    Watch the webinar to learn how to put effective document management into practice and:

    • Capture documents faster, instead of wasting everyone’s time
    • Manage documents easily, so you can always find them
    • Distribute documents automatically, and move on to the next task

     

  • Lessons Learned from the AS/400 Breach

    SB_PowerTech_WC_GenericGet actionable info to avoid becoming the next cyberattack victim.
    In “Data breach digest—Scenarios from the field,” Verizon documented an AS/400 security breach. Whether you call it AS/400, iSeries, or IBM i, you now have proof that the system has been breached.
    Watch IBM i security expert Robin Tatam give an insightful discussion of the issues surrounding this specific scenario.
    Robin will also draw on his extensive cybersecurity experience to discuss policies, processes, and configuration details that you can implement to help reduce the risk of your system being the next victim of an attack.

  • Overwhelmed by Operating Systems?

    SB_HelpSystems_WC_GenericIn this 30-minute recorded webinar, our experts demonstrate how you can:

    • Manage multiple platforms from a central location
    • View monitoring results in a single pane of glass on your desktop or mobile device
    • Take advantage of best practice, plug-and-play monitoring templates
    • Create rules to automate daily checks across your entire infrastructure
    • Receive notification if something is wrong or about to go wrong

    This presentation includes a live demo of Network Server Suite.

     

  • Real-Time Disk Monitoring with Robot Monitor

    SB_HelpSystems_WC_GenericYou need to know when IBM i disk space starts to disappear and where it has gone before system performance and productivity start to suffer. Our experts will show you how Robot Monitor can help you pinpoint exactly when your auxiliary storage starts to disappear and why, so you can start taking a proactive approach to disk monitoring and analysis. You’ll also get insight into:

    • The main sources of disk consumption
    • How to monitor temporary storage and QTEMP objects in real time
    • How to monitor objects and libraries in real time and near-real time
    • How to track long-term disk trends

     

     

  • Stop Re-keying Data Between IBM I and Other Applications

    SB_HelpSystems_WC_GenericMany business still depend on RPG for their daily business processes and report generation.Wouldn’t it be nice if you could stop re-keying data between IBM i and other applications? Or if you could stop replicating data and start processing orders faster? Or what if you could automatically extract data from existing reports instead of re-keying? It’s all possible. Watch this webinar to learn about:

    • The data dilemma
    • 3 ways to stop re-keying data
    • Data automation in practice

    Plus, see how HelpSystems data automation software will help you stop re-keying data.

     

  • The Top Five RPG Open Access Myths....BUSTED!

    SB_Profound_WC_GenericWhen it comes to IBM Rational Open Access: RPG Edition, there are still many misconceptions - especially where application modernization is concerned!

    In this Webinar, we'll address some of the biggest myths about RPG Open Access, including:

    • Modernizing with RPG OA requires significant changes to the source code
    • The RPG language is outdated and impractical for modernizing applications
    • Modernizing with RPG OA is the equivalent to "screen scraping"

     

  • Time to Remove the Paper from Your Desk and Become More Efficient

    SB_HelpSystems_WC_GenericToo much paper is wasted. Attempts to locate documents in endless filing cabinets.And distributing documents is expensive and takes up far too much time.
    These are just three common reasons why it might be time for your company to implement a paperless document management system.
    Watch the webinar to learn more and discover how easy it can be to:

    • Capture
    • Manage
    • And distribute documents digitally

     

  • IBM i: It’s Not Just AS/400

    SB_HelpSystems_WC_Generic

    IBM’s Steve Will talks AS/400, POWER9, cognitive systems, and everything in between

    Are there still companies that use AS400? Of course!

    IBM i was built on the same foundation.
    Watch this recorded webinar with IBM i Chief Architect Steve Will and IBM Power Champion Tom Huntington to gain a unique perspective on the direction of this platform, including:

    • IBM i development strategies in progress at IBM
    • Ways that Watson will shake hands with IBM i
    • Key takeaways from the AS/400 days

     

  • Ask the RDi Experts

    SB_HelpSystems_WC_GenericWatch this recording where Jim Buck, Susan Gantner, and Charlie Guarino answered your questions, including:

    • What are the “hidden gems” in RDi that can make me more productive?
    • What makes RDi Debug better than the STRDBG green screen debugger?
    • How can RDi help me find out if I’ve tested all lines of a program?
    • What’s the best way to transition from PDM to RDi?
    • How do I convince my long-term developers to use RDi?

    This is a unique, online opportunity to hear how you can get more out of RDi.

     

  • Node.js on IBM i Webinar Series Pt. 2: Setting Up Your Development Tools

    Profound Logic Software, Inc.Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. In Part 2, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Attend this webinar to learn:

    • Different tools to develop Node.js applications on IBM i
    • Debugging Node.js
    • The basics of Git and tools to help those new to it
    • Using NodeRun.com as a pre-built development environment

     

     

  • Inside the Integrated File System (IFS)

    SB_HelpSystems_WC_GenericDuring this webinar, you’ll learn basic tips, helpful tools, and integrated file system commands—including WRKLNK—for managing your IFS directories and Access Client Solutions (ACS). We’ll answer your most pressing IFS questions, including:

    • What is stored inside my IFS directories?
    • How do I monitor the IFS?
    • How do I replicate the IFS or back it up?
    • How do I secure the IFS?

    Understanding what the integrated file system is and how to work with it must be a critical part of your systems management plans for IBM i.

     

  • Expert Tips for IBM i Security: Beyond the Basics

    SB PowerTech WC GenericIn this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level. Robin will cover:

    • Reducing the risk posed by special authorities
    • Establishing object-level security
    • Overseeing user actions and data access

    Don't miss this chance to take your knowledge of IBM i security beyond the basics.

     

     

  • 5 IBM i Security Quick Wins

    SB PowerTech WC GenericIn today’s threat landscape, upper management is laser-focused on cybersecurity. You need to make progress in securing your systems—and make it fast.
    There’s no shortage of actions you could take, but what tactics will actually deliver the results you need? And how can you find a security strategy that fits your budget and time constraints?
    Join top IBM i security expert Robin Tatam as he outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.
    Your system didn’t become unsecure overnight and you won’t be able to turn it around overnight either. But quick wins are possible with IBM i security, and Robin Tatam will show you how to achieve them.

  • How to Meet the Newest Encryption Requirements on IBM i

    SB PowerTech WC GenericA growing number of compliance mandates require sensitive data to be encrypted. But what kind of encryption solution will satisfy an auditor and how can you implement encryption on IBM i? Watch this on-demand webinar to find out how to meet today’s most common encryption requirements on IBM i. You’ll also learn:

    • Why disk encryption isn’t enough
    • What sets strong encryption apart from other solutions
    • Important considerations before implementing encryption

     

     

  • Security Bulletin: Malware Infection Discovered on IBM i Server!

    SB PowerTech WC GenericMalicious programs can bring entire businesses to their knees—and IBM i shops are not immune. It’s critical to grasp the true impact malware can have on IBM i and the network that connects to it. Attend this webinar to gain a thorough understanding of the relationships between:

    • Viruses, native objects, and the integrated file system (IFS)
    • Power Systems and Windows-based viruses and malware
    • PC-based anti-virus scanning versus native IBM i scanning

    There are a number of ways you can minimize your exposure to viruses. IBM i security expert Sandi Moore explains the facts, including how to ensure you're fully protected and compliant with regulations such as PCI.

     

     

  • Fight Cyber Threats with IBM i Encryption

    SB PowerTech WC GenericCyber attacks often target mission-critical servers, and those attack strategies are constantly changing. To stay on top of these threats, your cybersecurity strategies must evolve, too. In this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level. Robin will cover:

    • Reducing the risk posed by special authorities
    • Establishing object-level security
    • Overseeing user actions and data access

     

     

     

  • 10 Practical IBM i Security Tips for Surviving Covid-19 and Working From Home

    SB PowerTech WC GenericNow that many organizations have moved to a work from home model, security concerns have risen.

    During this session Carol Woodbury will discuss the issues that the world is currently seeing such as increased malware attacks and then provide practical actions you can take to both monitor and protect your IBM i during this challenging time.

     

  • How to Transfer IBM i Data to Microsoft Excel

    SB_HelpSystems_WC_Generic3 easy ways to get IBM i data into Excel every time
    There’s an easy, more reliable way to import your IBM i data to Excel? It’s called Sequel. During this webinar, our data access experts demonstrate how you can simplify the process of getting data from multiple sources—including Db2 for i—into Excel. Watch to learn how to:

    • Download your IBM i data to Excel in a single step
    • Deliver data to business users in Excel via email or a scheduled job
    • Access IBM i data directly using the Excel add-in in Sequel

    Make 2020 the year you finally see your data clearly, quickly, and securely. Start by giving business users the ability to access crucial business data from IBM i the way they want it—in Microsoft Excel.

     

     

  • HA Alternatives: MIMIX Is Not Your Only Option on IBM i

    SB_HelpSystems_WC_GenericIn this recorded webinar, our experts introduce you to the new HA transition technology available with our Robot HA software. You’ll learn how to:

    • Transition your rules from MIMIX (if you’re happy with them)
    • Simplify your day-to-day activities around high availability
    • Gain back time in your work week
    • Make your CEO happy about reducing IT costs

    Don’t stick with a legacy high availability solution that makes you uncomfortable when transitioning to something better can be simple, safe, and cost-effective.

     

     

  • Comply in 5! Well, actually UNDER 5 minutes!!

    SB CYBRA PPL 5382

    TRY the one package that solves all your document design and printing challenges on all your platforms.

    Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product.

    Request your trial now!

  • Backup and Recovery on IBM i: Your Strategy for the Unexpected

    SB HelpSystems SC 5413Robot automates the routine tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:
    - Simplified backup procedures
    - Easy data encryption
    - Save media management
    - Guided restoration
    - Seamless product integration
    Make sure your data survives when catastrophe hits. Try the Robot Backup and Recovery Solution FREE for 30 days.

  • Manage IBM i Messages by Exception with Robot

    SB HelpSystems SC 5413Managing messages on your IBM i can be more than a full-time job if you have to do it manually. How can you be sure you won’t miss important system events?
    Automate your message center with the Robot Message Management Solution. Key features include:
    - Automated message management
    - Tailored notifications and automatic escalation
    - System-wide control of your IBM i partitions
    - Two-way system notifications from your mobile device
    - Seamless product integration
    Try the Robot Message Management Solution FREE for 30 days.

  • Easiest Way to Save Money? Stop Printing IBM i Reports

    SB HelpSystems SC 5413Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing.
    Manage your reports with the Robot Report Management Solution. Key features include:

    - Automated report distribution
    - View online without delay
    - Browser interface to make notes
    - Custom retention capabilities
    - Seamless product integration
    Rerun another report? Never again. Try the Robot Report Management Solution FREE for 30 days.

  • Hassle-Free IBM i Operations around the Clock

    SB HelpSystems SC 5413For over 30 years, Robot has been a leader in systems management for IBM i.
    Manage your job schedule with the Robot Job Scheduling Solution. Key features include:
    - Automated batch, interactive, and cross-platform scheduling
    - Event-driven dependency processing
    - Centralized monitoring and reporting
    - Audit log and ready-to-use reports
    - Seamless product integration
    Scale your software, not your staff. Try the Robot Job Scheduling Solution FREE for 30 days.

  • ACO MONITOR Manages your IBM i 24/7 and Notifies You When Your IBM i Needs Assistance!

    SB DDL Systems 5429More than a paging system - ACO MONITOR is a complete systems management solution for your Power Systems running IBM i. ACO MONITOR manages your Power System 24/7, uses advanced technology (like two-way messaging) to notify on-duty support personnel, and responds to complex problems before they reach critical status.

    ACO MONITOR is proven technology and is capable of processing thousands of mission-critical events daily. The software is pre-configured, easy to install, scalable, and greatly improves data center efficiency.