Blog
4 Data Access Strategy Mistakes to Avoid
Fri, 10/11/2019
Find out how you can improve productivity with better data access. Learn what roadblocks you need to avoid in your goal to improve productivity.
On-Demand Webinar
IBM i Data: A Picture Is Worth 1,000 Words
As the IBM i expert at your organization, you know that the data that drives important business decisions is scattered across your IBM i and other platforms. But many IBM i shops struggle to find a way to consolidate this information and allow both IT and business users easy access and fast interpretation for key performance indicators (KPIs). Decision-makers need to visualize the data before they...
Blog
10 Benefits Your Business Intelligence Software Should Deliver
Tue, 09/17/2019
Are you getting everything out of your business intelligence software that you should be? Would you see a productivity boost from an upgrade? Find out with this list of key benefits.
On-Demand Webinar
Accelerating Programmer Productivity with Sequel
Most business intelligence tools are just that: tools, a means to an end but not an accelerator. Yours could even be slowing you down. But what if your BI tool didn't just give you a platform for query-writing but also improved programmer productivity? Watch the recorded webinar to see how Sequel: Makes creating complex results simple Eliminates barriers to data sources Increases flexibility with...
On-Demand Webinar
Top 10 Configuration Mistakes that Leave Your System Vulnerable
Tue, 07/30/2019
Learn about the top 10 IBM i security configuration errors that will leave your system—and therefore, your data and organization—vulnerable.
On-Demand Webinar
Expert Tips for Securing AIX Systems
By Bob Erdman
Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier. One of the most serious mistakes is failing to create a well-defined security policy. A written statement of how your...
On-Demand Webinar
What’s the IBM i Community Saying About Business Intelligence?
Hear how the IBM i community achieve their business intelligence goals.
On-Demand Webinar
IBM i Data Access in Less Than 60 Minutes
Accessing, analyzing, and reporting on your IBM i and remote databases like Excel can be quicker or easier than with Sequel.
Blog
Multinational Healthcare Organization Implements Fast, Easy, and Secure Data Reporting
Wed, 05/15/2019
Making data accessible and ensuring data privacy are essential in today’s healthcare market. One multinational healthcare organization faced inefficient processes that slowed them down. Employees around the organization were left waiting for reports with vital information like admissions, discharges, bills, and collections. So, they turned to Sequel Data Access. Sequel provided instant data access...
Article
How to Close the AS/400 Skills Gap
By Tom Huntington on Wed, 05/01/2019
Read this article to learn how organizations are handling the AS/400 (iSeries, IBM i) skills shortage in 2019.
Blog
Linux Security: Be Afraid. Be Very Afraid.
By Bob Erdman on Thu, 04/18/2019
Cybersecurity expert, Bob Erdman, sits down with Linux Journal to discuss security threats Linux users face on a daily basis.
On-Demand Webinar
Spring your IBM i Data into Excel with Sequel
Accessing, analyzing, and reporting on your IBM i and remote databases like Excel can be easy with Sequel.
Blog
Key Functionality of a Great Cybersecurity Software Solution
Mon, 04/08/2019
Evaluating and implementing cybersecurity software requires diligence. And if your InfoSec team is short staffed, choosing the right tools is more important than ever.
On-Demand Webinar
How to Move to POWER9 the Right Way
If you have a Power Systems hardware upgrade in your future, watch this webinar for expert tips on how to size, secure, and manage your new investment.
On-Demand Webinar
Responding to Ransomware: Steps to Take to Reduce Your Risk
By Bob Erdman
Join cybersecurity experts Bob Erdman, Security Product Manager at Fortra, and Holger Schulze, CEO and Founder of Cybersecurity Insiders, as they discuss the continuing challenge of ransomware.
On-Demand Webinar
We’ve Been Breached! Now What?!
Thu, 01/31/2019
What resources or information will you need in the event of a data breach? Join this on-demand webinar to find out.
On-Demand Webinar
How to Access Meaningful Information with Data Visualization
It's not news that everyone needs accurate business data these days—and they needed it 5 minutes ago. Real-time, actionable information needs to be simple to access and shouldn't require IT to translate it into something a business user will understand. In this webinar you'll see: How Sequel makes your KPIs accessible in powerful dashboards How many ways users can analyze their data in client...