Resources

Article

Staying on IBM i Sounds Like Money in the Bank

As the end of 2013 draws near, many businesses have budgets on their minds. Most companies will run year-end numbers to determine the full scope of their investments, and analyze what sort of changes can be made to cut costs and increase profit margins. As the number crunching begins, it’s time to consider numerous variables, including those that fall under the IT department. Decisions made within...
Article

SEQUEL Works with your Growing (BIG) Data

As you collect more information, your relational database files continue to grow and you’re faced with a challenging issue: how to handle all of that information efficiently and accurately, and how to overcome the obstacle of mining and delivering useful information without bogging down the system. Partition files are the solution to BIG DATA on IBM i because of: Improved manageability for large...
Article

Separate Signal From Noise in Big Data

You don’t need a reminder of the strain big data will place on your IBM i storage environments in the coming months and years, but server workloads won’t be the only thing expanding. As CIOs navigate the transition from megabytes and gigabytes to terabytes and petabytes, their colleagues' business intelligence plans continue to grow more complex and ambitious as well. In the age of data-driven...
Article

Additional ViewPoint Administrator Functions

What does this function do? SEQUEL Field Level Authorization uses an exclusion/inclusion dictionary function that lets administrators provide authorization to libraries, files, and fields. The dictionary, which can be defined as exclusion or inclusion, is an additional filter applied on top of system object security limits. It does not replace system object authority but supplements it. Exclusion...
Article

How Mobile Data Access Improves Business Operations

It seems nearly everyone in certain parts of the world now has a smartphone, tablet, or both, and these devices aren't just for fun and games. Organizations are putting devices to work in the drive to streamline processes, gain insight into operations, and ensure continuity.
Article

SEQUEL Users Go Mobile

SEQUEL Users Go Mobile Mobile devices (iPad, iPhone, PC Tablets) are now in the hands of over 89% of corporate professionals. Whether companies are buying them for their employees or the employee has decided to invest in one on their own, the fact remains that mobile data access is no longer a luxury; it’s becoming a requirement. The right data access solution for a mobile device allows the user...
Article

How to Quickly and Dynamically Summarize Your Data with Client Tables

A SEQUEL Client Table is an interactive solution for dynamic Desktop Online Analytical Processing (Desktop OLAP or DOLAP) and cube analysis. With a Client Table, it’s possible for you to build client/server views that allow end users to explore, summarize, and pivot large quantities of data quickly from IBM i and other databases. Once a Client Table is displayed, users can perform interactive...
Article

Getting the Most Out of DB2

Used the right way, structured query language (SQL) can be an advantage for any organization's operations. Used the wrong way, it can be a headache for IT professionals. A majority of computing operations are dependent on the ability to access information from a database. That's where SQL queries come in. So the efficiency of SQL queries in DB2 can dramatically impact the tasks running on IBM i...
Article

The IBM i Partitioning Paradox: Defined

Managing big data requires making some big decisions: how to store, query, and report on the constantly increasing stream of data. Although the practice of ‘data at scale’ or table partitioning is popular on IBM i, it creates a partitioning paradox that often adds complications to efficiently querying data.
Article

SECURITY DASHBOARDS: How IT Can Use Data to Lower Risk

Data security has been a prominent feature in recent technology headlines as the costs associated with data breaches continue to escalate. Business and IT leaders alike have become all too aware of the need to protect valuable information, but questions of how - and to what extent protection is needed- are common sticking points. The rule of least privilege has been a long-held strategy that...