Resources

Guide

13 Tips to Write Secure Applications and Boost IBM i Security

Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Guide

Two Factor Authentication for IBM i

Organizations facing a more advanced threat landscape and a complex regulatory environment require a solution which addresses the need for securely controlling access to existing systems and applications. In addition, this solution should not increase the workload on support, application providers or the end user.
Article

How Banks Leverage Big Data for Big Value

Technology professionals in the banking industry face a wide range of concerns due to the nature of the data stored within their systems. The potential reward in stealing or compromising financial data makes these organizations a prime target for cybercrime, while stringent industry regulations require security to be extremely tight at all times. Is it possible to strike a balance between defensive, regulatory, and data access needs and still provide access to data for analytics without compromising the security of the entire system? The truth is that many organizations in the financial sector have deployed analytics technology while being able to keep their security tight, and are benefiting from it.
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Article

Add Power to SEQUEL Scripts with Logic

SEQUEL Scripting is a process that allows users to run multiple SEQUEL and system commands together. Scripts allow for much of the same capability of Command Language Programs (CLP) without the need for programming knowledge or a compiling of the objects.
Article

How-To: Slice and Dice Your Data with Client Tables

In the era of big data users need to view their data in a way that makes sense and lets them dive deeper. SEQUEL’s Client Tables are an interactive solution, much like pivot tables, which allow users to reorganize and summarize columns and rows of data in a spreadsheet-like format both on a PC and on a mobile device or tablet. With Client Tables on the go, you can access data from your office, in...
Article

Get Started with Remote Database Access

Many organizations are expanding to use multiple platforms in their IT environments. There are many reasons for this: it can be due to company acquisitions or application vendor platform shifts, or when a department requires a certain software package with features that require a different platform. For example, many Customer Relationship Management (CRM) tools employed by sales teams reside on a...
Article

The Partitioning Paradox Solved

There is rarely a dull moment for IBM i administrators, as their operating environments continuously absorb and distribute new data. While this trend certainly keeps teams engaged, it also triggers fears that current protocols may not be enough to meet the challenges of tomorrow. First and foremost, there is often some doubt as to whether storage plans will be able to scale to manage the sheer...
Article

Easily Accessing Data on Remote Databases with SEQUEL

With SEQUEL you can retrieve information not just from your local IBM i, but also on other IBM i’s, SQL servers, Oracle, MySQL, and other remote databases. Once you have the remote host definition defined you are ready to convert data on other platforms into meaningful information right from your local IBM i. The ability to design views with SEQUEL SQL and translate them on the fly to native SQL...
Article

Working with Variables Part II: Taking SEQUEL Runtime Prompts to the Next Level

In an earlier article, we introduced prompted views as a way to enable end users by allowing them to retrieve data without the need for code. We discussed how this approach meets the needs of users while freeing time that database administrators might otherwise spend running countless similar queries. Finally, we showed you how to configure default values for your prompts and explained how to use ...
Article

How Mobile Data Access Improves Business Operations

It seems nearly everyone in certain parts of the world now has a smartphone, tablet, or both, and these devices aren't just for fun and games. Organizations are putting devices to work in the drive to streamline processes, gain insight into operations, and ensure continuity.
Article

SEQUEL Users Go Mobile

SEQUEL Users Go Mobile Mobile devices (iPad, iPhone, PC Tablets) are now in the hands of over 89% of corporate professionals. Whether companies are buying them for their employees or the employee has decided to invest in one on their own, the fact remains that mobile data access is no longer a luxury; it’s becoming a requirement. The right data access solution for a mobile device allows the user...
Article

How to Quickly and Dynamically Summarize Your Data with Client Tables

A SEQUEL Client Table is an interactive solution for dynamic Desktop Online Analytical Processing (Desktop OLAP or DOLAP) and cube analysis. With a Client Table, it’s possible for you to build client/server views that allow end users to explore, summarize, and pivot large quantities of data quickly from IBM i and other databases. Once a Client Table is displayed, users can perform interactive...
Article

The IBM i Partitioning Paradox: Defined

Managing big data requires making some big decisions: how to store, query, and report on the constantly increasing stream of data. Although the practice of ‘data at scale’ or table partitioning is popular on IBM i, it creates a partitioning paradox that often adds complications to efficiently querying data.