Resources

On-Demand Webinar

How to Use BI for Better Invoicing on IBM i

When Meissner Mfg. needed a better way to streamline their accounts receivable, they turned to Sequel and have been thrilled with its impact. Join this webinar to hear our conversation with Meissner Mfg. on how they saved 100+ hours a month with better business intelligence on IBM i with Sequel.
On-Demand Webinar

IBM i Data: A Picture Is Worth 1,000 Words

As the IBM i expert at your organization, you know that the data that drives important business decisions is scattered across your IBM i and other platforms. But many IBM i shops struggle to find a way to consolidate this information and allow both IT and business users easy access and fast interpretation for key performance indicators (KPIs). Decision-makers need to visualize the data before they...
On-Demand Webinar

IBM i Security for Programmers

In the first of this two-part webinar series, Robin Tatam combines his skills as a certified RPG developer with his IBM i security expertise. He’ll cover the security considerations that native application programmers should be keenly aware of as they design their applications.
On-Demand Webinar

Accelerating Programmer Productivity with Sequel

Most business intelligence tools are just that: tools, a means to an end but not an accelerator. Yours could even be slowing you down. But what if your BI tool didn't just give you a platform for query-writing but also improved programmer productivity? Watch the recorded webinar to see how Sequel: Makes creating complex results simple Eliminates barriers to data sources Increases flexibility with...
On-Demand Webinar

How to Avoid IFS Security Mistakes

In this webinar, IBM i security expert Sandi Moore teaches you how to correct IFS vulnerabilities that are often overlooked , including one that allows the IFS to spread malware throughout your environment.
On-Demand Webinar

Capacity Planning for Your Peak Season

Are you confident that your Power Systems servers are set up to handle your busiest season? Watch this webinar to learn tired-and-true methodology from the experts.
On-Demand Webinar

IBM i Work Management 101

Watch this recorded webinar to get a better understanding of why IBM i jobs end up where they do and what you can do to control where they go to optimize system resources.
On-Demand Webinar

Expert Tips for Securing AIX Systems

Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier. One of the most serious mistakes is failing to create a well-defined security policy. A written statement of how your...