Article
13 FAQs on Switching from Query/400 to Sequel
By Heath Kath on Wed, 10/20/2021
Find out why you should choose Sequel Data Access for your IBM i queries—and leave Query/400 behind.
On-Demand Webinar
How to Modernize Your Query/400 Queries
Sequel software makes your transition to modern data access and analysis from Query/400 simple. Watch this webinar to see how.
On-Demand Webinar
What’s New with Sequel?
Watch this webinar to learn the latest enhancements to Sequel, business intelligence software for IBM i.
On-Demand Webinar
Fight Cyber Threats with IBM i Encryption
By Sandi Moore
Watch this webinar to learn how to quickly encrypt sensitive data on IBM i—and avert a data breach disaster.
On-Demand Webinar
What Does Digital Transformation Mean for IBM i Data?
Digital transformation is not just a buzzword. It opens the door to deeper insight from your data. Watch this webinar to learn more!
On-Demand Webinar
What Is Your Data Trying to Tell You?
Watch this recorded webinar to learn how to translate and deliver lots of data from IBM i and other sources into clear and actionable stories
Blog
What Is NVMe?
By Randy Watson on Thu, 04/01/2021
NVMe is a communications interface plus high-performance protocol for accessing non-volatile memory. Learn more here.
On-Demand Webinar
For Developers, By Developers at Fortra
During this session, you’ll see live demonstrations of how Fortra developer tools can help you.
On-Demand Webinar
IBM i Access Client Solutions for Data Access
During this recorded webinar, the IBM i experts from Fortra help you get a better understanding of Access Client Solutions (ACS).
On-Demand Webinar
Sequel Client Tables (a.k.a. Pivot Tables on Steroids)
Everything and anything around Client Tables in Sequel is covered in this on-demand webinar.
On-Demand Webinar
5 Myths About Encryption on IBM i
By Sandi Moore
In this live webinar, IBM i security expert Sandi Moore breaks down some of the most common (and persistent!) myths that stop IT pros from implementing encryption on IBM i.
On-Demand Webinar
IBM i Data Encryption: What, Why, and How
By Sandi Moore
In this live webinar, IBM i security expert Sandi Moore breaks down some of the most common (and persistent!) myths that stop IT pros from implementing encryption on IBM i.
On-Demand Webinar
How to Transfer IBM i Data to Microsoft Excel
During this recorded webinar, our data access experts demonstrate how you can simplify the process of getting data from multiple sources—including Db2 for i—into Excel.
Article
Key Management and Strong Encryption For PCI DSS Compliance With Powertech Encryption for IBM i
By Bob Luebbe on Tue, 12/29/2020
PCI DSS now includes requirements for strong encryption of cardholder data. Learn how key management is an essential element of preventing unauthorized data access.
Blog
3 Reasons to Go Beyond Writing Queries in SQL
Sun, 11/29/2020
Still writing queries in SQL? Sure, it’s a powerful way to access IBM i data. But is it enough?
On-Demand Webinar
How to Work with Data from IBM i and Remote Databases
Watch this webinar to get insights from our expert on bringing data all together into one solution and work with it easily.
On-Demand Webinar
Encryption on IBM i Simplified
By Robin Tatam
DB2 Field Procedures (FieldProcs) were introduced in V7R1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i.
Article
FAQ: How Does Sequel Data Access Go Beyond SQL?
Mon, 08/10/2020
Got questions about moving beyond SQL to Sequel Data Access? Get answers, and get the business intelligence your organization needs from your IBM i data.
On-Demand Webinar
5 SQL Tips Everyone Should Know
Watch this webinar and learn 5 SQL tips that you need to know.