Blog
What is EdTech? A Snapshot of Modern Tech in Schools
By Kevin Jackson on Fri, 08/12/2016
In 2016, technology in schools is on the rise. Read the article for a snapshot of what EdTech is and how it’s growing.
Blog
Lessons Learned from the Telstra Network Outages
By Kevin Jackson on Thu, 08/11/2016
Real-life network outages are a wake-up call to brands who aren’t taking precautionary measures. Here's what happened to Telstra customers, what Telstra did wrong, and how your business can avoid such a devastating, costly situation.
Article
Add Power to SEQUEL Scripts with Logic
Mon, 08/01/2016
SEQUEL Scripting is a process that allows users to run multiple SEQUEL and system commands together. Scripts allow for much of the same capability of Command Language Programs (CLP) without the need for programming knowledge or a compiling of the objects.
Blog
11 Things To Know About IPv6 Transitions
By Kevin Jackson on Mon, 08/01/2016
Benefit from the collective wisdom we’ve complied from IT professionals and learn a thing or two (or 11) about IPv6 transitions.
Case Study
Medical Device Company Ensures Uptime with Intermapper
Here’s how Intermapper’s functionality, price point, and real-time alerts make it easy for this company to prove ROI.
Case Study
DFS Inc. Manufactures Feed 24/7 with Network Monitoring
Find out how one of Iowa’s largest feed suppliers maintains 24/7 operations with real-time network visibility thanks to Intermapper.
Case Study
Georgian College’s Network Infrastructure Group Uses Intermapper to Map, Monitor, and Alert
Using Intermapper, this leading Ontario college keeps 7 remote campuses connected and fixes network issues faster through real-time monitoring.
Article
Easily Accessing Data on Remote Databases with SEQUEL
Mon, 06/27/2016
With SEQUEL you can retrieve information not just from your local IBM i, but also on other IBM i’s, SQL servers, Oracle, MySQL, and other remote databases. Once you have the remote host definition defined you are ready to convert data on other platforms into meaningful information right from your local IBM i. The ability to design views with SEQUEL SQL and translate them on the fly to native SQL...
Article
Get Started with Remote Database Access
By Heath Kath on Mon, 06/27/2016
Many organizations are expanding to use multiple platforms in their IT environments. There are many reasons for this: it can be due to company acquisitions or application vendor platform shifts, or when a department requires a certain software package with features that require a different platform. For example, many Customer Relationship Management (CRM) tools employed by sales teams reside on a...
Article
How-To: Slice and Dice Your Data with Client Tables
Mon, 06/27/2016
In the era of big data users need to view their data in a way that makes sense and lets them dive deeper. SEQUEL’s Client Tables are an interactive solution, much like pivot tables, which allow users to reorganize and summarize columns and rows of data in a spreadsheet-like format both on a PC and on a mobile device or tablet.
With Client Tables on the go, you can access data from your office, in...
Article
Sequel Tips and Tricks: Enhance Your IBM i Queries
By Mike Stegeman on Mon, 06/27/2016
Get more out of your IBM i queries (and help your users help themselves).
Article
The Partitioning Paradox Solved
Mon, 06/27/2016
There is rarely a dull moment for IBM i administrators, as their operating environments continuously absorb and distribute new data. While this trend certainly keeps teams engaged, it also triggers fears that current protocols may not be enough to meet the challenges of tomorrow. First and foremost, there is often some doubt as to whether storage plans will be able to scale to manage the sheer...
Article
Additional ViewPoint Administrator Functions
Mon, 06/27/2016
What does this function do?
SEQUEL Field Level Authorization uses an exclusion/inclusion dictionary function that lets administrators provide authorization to libraries, files, and fields. The dictionary, which can be defined as exclusion or inclusion, is an additional filter applied on top of system object security limits. It does not replace system object authority but supplements it.
...
Article
Getting the Most Out of DB2
By Heath Kath on Mon, 06/27/2016
Used the right way, structured query language (SQL) can be an advantage for any organization's operations. Used the wrong way, it can be a headache for IT professionals.
A majority of computing operations are dependent on the ability to access information from a database. That's where SQL queries come in.
So the efficiency of SQL queries in DB2 can dramatically impact the tasks running on IBM i...
Article
HANDS OFF! Saying Goodbye to Manual Data Access
Mon, 06/27/2016
Organizations today face an ever-expanding volume of information that must be analyzed and delivered to the right people. While the resulting business intelligence offers us insight into processes and customers, many companies still rely on practices and technology that aren’t suited for managing data on a large scale.
As a December 2012 Financial Director article highlighted, 60 percent of those...
Article
How Mobile Data Access Improves Business Operations
Mon, 06/27/2016
It seems nearly everyone in certain parts of the world now has a smartphone, tablet, or both, and these devices aren't just for fun and games. Organizations are putting devices to work in the drive to streamline processes, gain insight into operations, and ensure continuity.