Blog
What’s the Future of Your Data?
By Mike Stegeman on Fri, 04/06/2018
Find out why it’s important to plan for the future of your data now.
On-Demand Webinar
3 Skills You DON’T Need to Build Awesome Dashboards
Dashboards are everywhere these days. But when you’re working with data from IBM i, building dashboards seems like an impossible challenge...
Datasheet
Advanced Reporting Suite
Advanced Reporting Suite eliminates the time-consuming, manual processes that are traditionally required to generate performance reports that prove adherence to service-level agreements (SLAs) and also flags any issues so that they can be quickly resolved.
By simply ticking a box, unique SLA tags can be used to produce customized reports that enable managed service providers (MSPs) to quickly and...
Case Study
Fortra and Rg19/Load Make Managed IT Easier for Seco Tools
Based in Fagersta, Sweden, Seco Tools AB is one of the world’s largest providers of comprehensive metal cutting solutions for milling, stationary tools, hole-making, and tooling equipment. Seco partners with nearby Rg19/
Load, a managed service provider (MSP), for advanced server monitoring solutions that enable fast response to issues that could disrupt business.
The Challenge
Fast...
On-Demand Webinar
3 Ways to Get Real-Time Insights Into Your Business
By Heath Kath
Your IT team is charged with delivering the data the business needs. The only problem is that the data means nothing on its own...
Datasheet
Network Server Suite
Network Server Suite provides comprehensive monitoring and automation for Windows, AIX/VIOS, and Linux servers and SNMP devices.
Blog
3 Ways to Share IBM i Data (Without Losing Your Mind) [Webinar Recap]
By Heath Kath on Tue, 01/16/2018
On-Demand Webinar
3 Ways to Share IBM i Data (Without Losing Your Mind)
By Heath Kath
There are so many ways that different functional groups want their information delivered today. And there’s simply not enough time to do it all—until now.
Datasheet
MQ Manager
MQ Manager continuously and automatically monitors the seven key components of IBM MQ in order to ensure the flow of data is not disrupted, prevent costly downtime, free up IT resources and reduce operational cost.
Blog
3 Ways Excel Dashboards Fail at Business Intelligence
By Heath Kath on Thu, 11/30/2017
Excel dashboards aren’t the reliable source of truth your business needs. Here’s what you can do about it.
Datasheet
Sequel Data Access
Sequel Data Access helps your IT department deliver IBM i and remote data to business users and executives fast.
On-Demand Webinar
How to Do Business Intelligence—Without the Big Budget
You've been manually querying data for years, but keeping up with the status quo just isn't cutting it. Find out how to get better BI (at a price you can afford).
On-Demand Webinar
How to Use Sequel from a Browser
Learn how to give your users want they want—fast and easy access to data—without needing a lot of help from IT.
Article
How to Get Your BI Project Approved
Fri, 09/22/2017
Your organization needs business intelligence. But how will you sell upper management on your BI project?
Blog
Using Field Procedures for IBM i Encryption
By Robin Tatam on Fri, 09/15/2017
Robin Tatam has fielded quite a few questions about how to encrypt IBM i data. In this quick video, he outlines your options and explains field procedures (FieldProcs).
On-Demand Webinar
How to Deliver Useful Data Insights (Without Overloading IT)
Learn how to help your users help themselves to data insight.
Article
What Really Matters in IBM i Monitoring?
By Paul Ratchford on Thu, 09/14/2017
Guard against degraded system performance, data loss, and downtime. Make sure you’re monitoring these 15 metrics on the IBM i operating system.
Guide
Download "IBM i Encryption: How to Protect Your Database"
Learn your options for encrypting IBM i data.
Sensitive information needs to be kept secret. That’s an indisputable fact for modern organizations, where sensitive information can include customers’ personally identifiable information, customer lists, and intellectual property.
Encryption is widely recognized as the most effective way to ensure private...