Resources

Article

Use Conditional Logic in Sequel Data Access to Convert Data into Meaningful Information

Let’s face it, the amount of data that we have is only continuing to grow, which will become harder to manage and understand. Per IDC Research, 90 percent of data in the world today was created in the last two years, and in 2016, we entered the zettabyte era. A huge challenge for everyone is finding the best way to convert all their data into meaningful information. But that can be tricky.  If...
Blog

How “Smash and Grab” Compromises IBM i

During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Article

The Modern Alternative to Authority Adoption

There are several considerations with authority adoption. Each is important but can usually be accommodated. But what is the effect if the program owner has the same or less privileges than the user that called the program?
Blog

Database Transaction Log Management

Don't let database transaction logs weigh you down. Find out how to preserve data integrity and consume less disk space.
Guide

Enterprise Monitoring Success

Thinner profit margins and higher customer expectations mean IT needs to up their game. Learn how enterprise monitoring can help and how to deploy a quality enterprise monitoring system successfully.