SEQUEL makes Power Systems data access and analysis available to everyone. Easy to install, configure, and use, SEQUEL delivers the data you need, in the format you prefer, quickly and efficiently. Create queries with drill-down data analysis, design powerful executive dashboards, and access databases anywhere. SEQUEL meets all your data access and analysis needs. Click here for more info.
New in 7.1, FieldProc allows column-level encryption without requiring changes to existing applications.
Written by Kent Milligan
With all the scrutiny and legislation associated with protecting personal sensitive data, a good number of IBM i developers have had to investigate the effort it would take to add column-level encryption logic into their application programs. Anyone who has done this analysis quickly discovers that it's not a trivial amount of work.
Learn how the new DB2 Field Procedures in IBM i 7.1 can be used to provide transparent database field encryption. Field Procedures are ideal for IBM i shops that want to automate the encryption and decryption of sensitive fields without having to modify their applications or source code.
Free On-Demand Webinar – Encryption with DB2 Field Procedures
A hard-working System i environment is never more visible (or expensive) to an organization than when it becomes unavailable. The expectation is for optimal performance on a 24/7 basis, and beyond that, any system issues should be the remit of the IT manager—not seen, not heard, and most definitely not felt by the user community. Sadly, the realities of system availability can fall short of these exacting standards—whether the systems are truly available or not. This is because the definition of high availability means different things to different groups within an organization.
Automatic encryption is now possible on IBM V7R1 with AES/400. It is absolutely the easiest, fastest and most secure way to encrypt data on the IBM i. Encrypt fields that contain sensitive information and control how data is decrypted without impacting existing applications. Automatic Encryption on the i – now available!Learn more.
Are the IT needs of your company on a collision course with the dwindling pool of RPG programmers?
Written by Steve Kilner
The question above is in many managers' minds as the pool of RPG programmers continues to shrink due to retirements and other forms of attrition. It is likely that there will be RPG developers available for many years to come, but that doesn't address the real problem. The real problem is what happens when you lose members of your team. A lot of knowledge is walking out the door with them. How can it possibly be replaced?