Blog
What’s the Future of Your Data?
By Mike Stegeman on Fri, 04/06/2018
Find out why it’s important to plan for the future of your data now.
On-Demand Webinar
3 Skills You DON’T Need to Build Awesome Dashboards
Dashboards are everywhere these days. But when you’re working with data from IBM i, building dashboards seems like an impossible challenge...
On-Demand Webinar
3 Ways to Get Real-Time Insights Into Your Business
By Heath Kath
Your IT team is charged with delivering the data the business needs. The only problem is that the data means nothing on its own...
Blog
3 Ways to Share IBM i Data (Without Losing Your Mind) [Webinar Recap]
By Heath Kath on Tue, 01/16/2018
On-Demand Webinar
3 Ways to Share IBM i Data (Without Losing Your Mind)
By Heath Kath
There are so many ways that different functional groups want their information delivered today. And there’s simply not enough time to do it all—until now.
Blog
3 Ways Excel Dashboards Fail at Business Intelligence
By Heath Kath on Thu, 11/30/2017
Excel dashboards aren’t the reliable source of truth your business needs. Here’s what you can do about it.
Datasheet
Sequel Data Access
Sequel Data Access helps your IT department deliver IBM i and remote data to business users and executives fast.
On-Demand Webinar
How to Do Business Intelligence—Without the Big Budget
You've been manually querying data for years, but keeping up with the status quo just isn't cutting it. Find out how to get better BI (at a price you can afford).
On-Demand Webinar
How to Use Sequel from a Browser
Learn how to give your users want they want—fast and easy access to data—without needing a lot of help from IT.
Datasheet
Intermapper App for Splunk Enterprise
If you need proactive network monitoring and visual mapping, Intermapper will give you real-time knowledge of your network, affordably and with seamless integration into Splunk.
Datasheet
Intermapper Remote Access
Intermapper Remote Access extends the reach of Intermapper by giving you and your staff access to maps, submaps, and configuration options, regardless of your location.
Article
How to Get Your BI Project Approved
Fri, 09/22/2017
Your organization needs business intelligence. But how will you sell upper management on your BI project?
Blog
Using Field Procedures for IBM i Encryption
By Robin Tatam on Fri, 09/15/2017
Robin Tatam has fielded quite a few questions about how to encrypt IBM i data. In this quick video, he outlines your options and explains field procedures (FieldProcs).
On-Demand Webinar
How to Deliver Useful Data Insights (Without Overloading IT)
Learn how to help your users help themselves to data insight.
Article
What Really Matters in IBM i Monitoring?
By Paul Ratchford on Thu, 09/14/2017
Guard against degraded system performance, data loss, and downtime. Make sure you’re monitoring these 15 metrics on the IBM i operating system.
Case Study
How Peoples Telephone Reboots Equipment Instantly with Network Monitoring & Automation
What if you could reduce an eight-hour outage… to no time at all?
That’s exactly what Peoples Telephone Cooperative did. Faced with sudden equipment failures, they started monitoring their network… then went one step further to automatically fix the outages. Now this savvy telecommunications service provider saves countless man hours, makes sure technicians get a full night’s sleep every night,...
Guide
Download "IBM i Encryption: How to Protect Your Database"
Learn your options for encrypting IBM i data.
Sensitive information needs to be kept secret. That’s an indisputable fact for modern organizations, where sensitive information can include customers’ personally identifiable information, customer lists, and intellectual property.
Encryption is widely recognized as the most effective way to ensure private...
On-Demand Webinar
Be the Data Access Hero—With Minimal Effort
Business users today want fast and easy data access—without waiting. You can be their hero. Watch the webinar to learn how.
On-Demand Webinar
How to Secure Data Access on IBM i
By Robin Tatam
Let Robin Tatam and Heath Kath show you how to provide IBM i data access to everyday users—without compromising security.