Resources

Guide

Effective Log Management

IBM’s customers are turning to Power VM virtualization to consolidate multiple workloads onto fewer systems increasing server utilization and reducing cost. However a virtualized server landscape on several different IBM platforms (IBM Power Systems™, IBM System x®, and IBM BladeCenter®) may reduce hardware complexity but this puts a strain on supporting the entire lifecycle of analysis,...
Guide

13 Tips to Write Secure Applications and Boost IBM i Security

Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Guide

Two Factor Authentication for IBM i

Organizations facing a more advanced threat landscape and a complex regulatory environment require a solution which addresses the need for securely controlling access to existing systems and applications. In addition, this solution should not increase the workload on support, application providers or the end user.
Article

How Banks Leverage Big Data for Big Value

Technology professionals in the banking industry face a wide range of concerns due to the nature of the data stored within their systems. The potential reward in stealing or compromising financial data makes these organizations a prime target for cybercrime, while stringent industry regulations require security to be extremely tight at all times. Is it possible to strike a balance between defensive, regulatory, and data access needs and still provide access to data for analytics without compromising the security of the entire system? The truth is that many organizations in the financial sector have deployed analytics technology while being able to keep their security tight, and are benefiting from it.
Article

Top 10 Ways Sequel Makes Your Life Easier

Text No matter what industry you’re in, accessing and presenting your data is incredibly important. Your business users’ ability to make informed decisions shouldn’t be limited by your data access tool or their...
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data. The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and...
Article

Add Power to SEQUEL Scripts with Logic

SEQUEL Scripting is a process that allows users to run multiple SEQUEL and system commands together. Scripts allow for much of the same capability of Command Language Programs (CLP) without the need for programming knowledge or a compiling of the objects.
Guide

Self-Audit: Checking Assumptions at the Door

Sysadmins, devops engineers, and cybersecurity personnel are often kept awake by a number of questions. How should I monitor my monitoring to be sure it will alert me when there is a security issue that needs my intervention? How can I be sure that the servers and processes in the environment haven’t been rooted already? In the quest to get better sleep, it is a good idea to self-audit your...
Guide

The Query Decision-Making Kit

Is Query/400 still cutting it? Probably not. You’ve most likely heard that there are other data access tools out there, but you might not be sure which one is right for you—or even if it’s the right time to upgrade. The Query Decision-Making Kit can help. For starters, you want data access to be simple, no matter your skill level. You want the option to view visual data in real-time, access data...
Article

The Partitioning Paradox Solved

There is rarely a dull moment for IBM i administrators, as their operating environments continuously absorb and distribute new data. While this trend certainly keeps teams engaged, it also triggers fears that current protocols may not be enough to meet the challenges of tomorrow. First and foremost, there is often some doubt as to whether storage plans will be able to scale to manage the sheer...
Article

Easily Accessing Data on Remote Databases with SEQUEL

With SEQUEL you can retrieve information not just from your local IBM i, but also on other IBM i’s, SQL servers, Oracle, MySQL, and other remote databases. Once you have the remote host definition defined you are ready to convert data on other platforms into meaningful information right from your local IBM i. The ability to design views with SEQUEL SQL and translate them on the fly to native SQL...