Resources

Datasheet

Sequel Data Access

Sequel Data Access helps your IT department deliver IBM i and remote data to business users and executives fast.
Guide

Download "IBM i Encryption: How to Protect Your Database"

    Learn your options for encrypting IBM i data. Sensitive information needs to be kept secret. That’s an indisputable fact for modern organizations, where sensitive information can include customers’ personally identifiable information, customer lists, and intellectual property. Encryption is widely recognized as the most effective way to ensure...
Article

Use Conditional Logic in Sequel Data Access to Convert Data into Meaningful Information

Let’s face it, the amount of data that we have is only continuing to grow, which will become harder to manage and understand. Per IDC Research, 90 percent of data in the world today was created in the last two years, and in 2016, we entered the zettabyte era. A huge challenge for everyone is finding the best way to convert all their data into meaningful information. But that...
Blog

Database Transaction Log Management

Don't let database transaction logs weigh you down. Find out how to preserve data integrity and consume less disk space.