Resources

On-Demand Webinar

Introduction to FlashCopy

Watch this webinar where IBM i expert Chuck Stupca explains how FlashCopy works and discusses the ways that it helps you build a better backup strategy for your IBM i environment.
Article

How-To: Analyze Year-End Data Quickly with Flexible Client Tables

Year-end reporting is coming… Are you ready? Do you know your options? Are you prepared to collect all of the data you need to see how your company fared for the year? You’re in luck, because Sequel Client Tables make year-end reporting a breeze. Drill down into the level of information you need for your reports. Compare data across multiple years to spot trends and add context. And highlight...
Guide

Managing Data and Healthcare Regulations Efficiently

The right Business Intelligence (BI) tool can address the twin challenges of today's healthcare industry and regulations: efficient, secure information retrieval and effective monitoring of day-to-day operations. In February 2009, President Barack Obama signed the American Recovery and Reinvestment Act (ARRA). Title XIII of ARRA, called the Health Information Technology for Economic and Clinical...
Article

4 Reasons to Add VTLs

Backup and recovery processes are among the unsung heroes of data center operations. Though end results may not be readily apparent on an everyday basis, natural and digital disasters have a way of humbling companies that do not take this risk management discipline seriously.
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Article

Database 101: Why You Can Rely on IBM i

IBM i is the perfect environment for data access and reporting. Read this article to learn how you can better utilize your Power Systems databases.
Guide

Dispelling the Myths of IBM i Data Access

Ironically, many IBM Power Systems™ users are sitting on top of a “gold mine” of data that they could use to make their lives easier, their jobs more productive, and their companies more profitable—if they only knew how to harvest it. Yet, they don’t have the first idea about how to do that. They might even be considered “power users” on their computer systems and not know how to transform the...
Guide

Effective Log Management

IBM’s customers are turning to Power VM virtualization to consolidate multiple workloads onto fewer systems increasing server utilization and reducing cost. However a virtualized server landscape on several different IBM platforms (IBM Power Systems™, IBM System x®, and IBM BladeCenter®) may reduce hardware complexity but this puts a strain on supporting the entire lifecycle of analysis,...
Guide

13 Tips to Write Secure Applications and Boost IBM i Security

Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Guide

Two Factor Authentication for IBM i

Organizations facing a more advanced threat landscape and a complex regulatory environment require a solution which addresses the need for securely controlling access to existing systems and applications. In addition, this solution should not increase the workload on support, application providers or the end user.
Article

How Banks Leverage Big Data for Big Value

Technology professionals in the banking industry face a wide range of concerns due to the nature of the data stored within their systems. The potential reward in stealing or compromising financial data makes these organizations a prime target for cybercrime, while stringent industry regulations require security to be extremely tight at all times. Is it possible to strike a balance between defensive, regulatory, and data access needs and still provide access to data for analytics without compromising the security of the entire system? The truth is that many organizations in the financial sector have deployed analytics technology while being able to keep their security tight, and are benefiting from it.