On-Demand Webinar
AS/400 Report Deployment for Remote Users
Watch this webinar for a unique opportunity to see how to deliver data to business users in way they have never seen before.
Article
Three Advanced Scripting Tips That Help Solve Reporting Challenges
By Heath Kath on Fri, 05/08/2020
See how Sequel scripts make it easy to link together multi-step processes rather than manually running a series of steps to accomplish a complex task.
Datasheet
Anydate
See how easy it is to run your IBM i jobs in the past, present, and future with Anydate.
Datasheet
Esend
Fast email and FTP distribution solution for IBM i data. Schedule a demo of Esend today.
On-Demand Webinar
Ask the Data Warehouse Experts
By Alan Jordan
Watch this webinar for a unique opportunity to hear how a data warehouse can help you further your company's data access.
On-Demand Webinar
20 Hidden Gems of Db2 for i
This webinar shares some of the best-kept secrets in Db2 for i and will help make sure you're using it to its full potential.
Blog
Three Lessons Learned from A Data Breach
By Bob Erdman on Mon, 02/24/2020
Simple lessons learned from the many breaches we’ve observed, like careless employees and unusual attack vectors, and ways they can be avoided.
On-Demand Webinar
Cybersecurity Trends in 2019 and Predictions for 2020
By Bob Erdman
Count down the top cybersecurity trends of 2019 and hear predictions for what’s to come in 2020. 2020 looks to be just as exciting as 2019, with ample opportunities for organizations to improve their cybersecurity stance.
On-Demand Webinar
The Business Intelligence Boom
Business intelligence adoption is on the rise. And it’s time to modernize. Make 2020 the year you finally see your data clearly, quickly, and securely with Sequel webinar.
Blog
Protecting AIX Servers Against Malware Threats
By Bob Erdman on Thu, 11/07/2019
Find out what security challenges AIX servers face, and what can be done to overcome them.
On-Demand Webinar
How to Use BI for Better Invoicing on IBM i
When Meissner Mfg. needed a better way to streamline their accounts receivable, they turned to Sequel and have been thrilled with its impact. Join this webinar to hear our conversation with Meissner Mfg. on how they saved 100+ hours a month with better business intelligence on IBM i with Sequel.
Blog
4 Data Access Strategy Mistakes to Avoid
Fri, 10/11/2019
Find out how you can improve productivity with better data access. Learn what roadblocks you need to avoid in your goal to improve productivity.
On-Demand Webinar
IBM i Data: A Picture Is Worth 1,000 Words
As the IBM i expert at your organization, you know that the data that drives important business decisions is scattered across your IBM i and other platforms. But many IBM i shops struggle to find a way to consolidate this information and allow both IT and business users easy access and fast interpretation for key performance indicators (KPIs).
Decision-makers need to visualize the data before...
Blog
10 Benefits Your Business Intelligence Software Should Deliver
Tue, 09/17/2019
Are you getting everything out of your business intelligence software that you should be? Would you see a productivity boost from an upgrade? Find out with this list of key benefits.
On-Demand Webinar
Accelerating Programmer Productivity with Sequel
Most business intelligence tools are just that: tools, a means to an end but not an accelerator. Yours could even be slowing you down. But what if your BI tool didn't just give you a platform for query-writing but also improved programmer productivity?
Watch the recorded webinar to see how Sequel:
Makes creating complex results simple
Eliminates barriers to data sources
Increases...
Blog
10 Reasons Linux Attacks Happen and How to Avoid Them
By Bob Erdman on Mon, 07/29/2019
Take a look at why Linux attacks are occurring and what you can do to avoid them.
On-Demand Webinar
How to Avoid IFS Security Mistakes
By Sandi Moore
In this webinar, IBM i security expert Sandi Moore teaches you how to correct IFS vulnerabilities that are often overlooked, including one that allows the IFS to spread malware throughout your environment.