Resources

Blog

Database Transaction Log Management

Don't let database transaction logs weigh you down. Find out how to preserve data integrity and consume less disk space.
Guide

Download “Identity & Access Management for IBM i”

Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs. So, how do you ensure users have only the access they need without overburdening IT with manual processes that distract from other critical projects? We...
Article

Enhance Your Reporting with Sequel Date Functions

Sequel makes it easy to work with your date fields, from converting the numeric or character field into a true date data type field to performing date calculations. Continue reading to learn how to convert non-date data type fields.
On-Demand Webinar

Top Reporting Tips for Banking and Beyond

Generating relevant data analysis for any company can be a huge task, not to mention all the extra challenges that arise when you’re doing it for a regulated industry such as banking . Securing data, creating reports, and distributing information is difficult to balance while maintaining compliance, security, and privacy. That’s where Sequel Data Access can help. During this session we will look...
On-Demand Webinar

Top 10 Ways Sequel Makes Developers More Productive

The beauty of investing in Sequel as your data access and analysis solution is that developers and programmers (like you) become more productive rather than spending time babysitting another software package. In this action-packed webinar, we demonstrate 10 ways to make you more productive while you deliver what your end users need. We'll cover backlogged requests reduction, template development...