Catalog Advanced Search

Search by Categories
Search in Packages
Search by Format
Search by Date Range
Products are filtered by different dates, depending on the combination of live and on-demand components that they contain, and on whether any live components are over or not.
Start
End
Search by Keyword
Sort By
  • IBM i Systems Administration Bootcamp Site License

    Contains 14 Product(s) 14 new product(s) added recently

    Site License for IBM i Systems Administration

    This product gives you site license access to individual components in Systems Administration Bootcamp

  • IBM i Systems Administration Bootcamp

    Contains 14 Product(s) 14 new product(s) added recently

    IBM i Systems Administration Bootcamp

    If you are looking to train your talent in IBM i System Administration, this is your solution. The IBM i Systems Administration Boot Camp provides a convenient way to train new talent in your organization. This series consists of 14 video lessons.

  • RPG Bootcamp Site License

    Contains 11 Product(s) 10 new product(s) added recently

    Site License for RPG Bootcamp

    This product gives you site license access to individual components in RPG Bootcamp

  • RPG Bootcamp

    Contains 11 Product(s) 11 new product(s) added recently

    The ILE RPG Boot Camp provides a convenient way to train new talent in your organization in this programming language. This series consists of 10 video lessons, a workbook, and a save file for the exercises.

    The ILE RPG Boot Camp provides a convenient way to train new talent in your organization in this programming language. This series consists of 10 video lessons, a workbook, and a save file for the exercises.

  • IBM i Security for Programmers - Robin Tatam

    Contains 1 Component(s)

    This session covers the main security considerations that a programmer should be aware of as they design and code their applications:

    Although IBM i is one of the most secure-able platforms available, the protection of critical data is often undermined by weak security design at the application level. This session covers the main considerations that a programmer should be aware of as they design and code their applications: 

    Attend this session to learn about:

    • Object ownership
    • Adopted authority
    • Public and private authorities
    • Command line permission
    • Client-server considerations

    Robin Tatam

    Global Director of Security Technologies - HelpSystems

    Robin Tatam is HelpSystems’ Global Director of Security Technologies and a COMMON subject matter expert (SME). As an award-winning speaker on security topics, Robin has been interviewed and quoted by industry magazines and has published numerous trade articles. Robin’s extensive Power Server experience has resulted in more than 20 IBM certifications and the highly sought after designation of ISACA-certified Information Security Manager (CISM) and PCI-Professional (PCI-P). He is also co-author of IBM’s Redbook publication on IBM i Data Encryption.

  • How to put PowerVC into Practice - Chuck Losinski & Tom Komadowski

    Contains 2 Component(s)

    Please note: This recorded session will be free to non-members of COMMON only until February 9, 2020. After this date, you will need to be a COMMON member to access.

    The virtualized Power server is well-established, with over 75% of businesses running multiple partitions. But how well do you understand the capabilities of the underlying PowerVC technology that supports this virtualization?

    Tom Komadowski is certainly no stranger to virtualization. As DevOps Engineer at HelpSystems, he’s in charge of over 400 IBM i, AIX, and Linux partitions! He knows the advantages (and limitations) of the PowerVC tools—as well as the importance of proactive monitoring.

    Don’t miss this live webinar where Tom shares his pro tips for putting PowerVC into practice. You’ll learn how to:

    • Easily create an IBM i partition for QA, development, or testing
    • Assign disk to an existing partition with a couple of mouse clicks
    • Monitor multiple instances of IBM i and VIOS and the workloads running there

    Our software experts will also demonstrate how Robot Monitor can give you real-time workload insight on your IBM i, VIOS, and AIX partitions through proactive monitoring and notifications to your mobile device.

    We want to help you stay in control of your Power servers, no matter how many partitions you spin up.

    Chuck Losinski

    Director of Technical Solutions, HelpSystems

    Chuck Losinski, Director of Technical Solutions for the Robot product line, has been with HelpSystems for nearly 20 years. He has over 30 years of experience in IT, including 25+ years on the IBM i platform.

    Chuck's background covers a wide variety of technical responsibilities, involving system implementation, programming, operations, and support. He is certified as an IBM System Administrator and as a HelpSystems Robot Certified Specialist.

    Chuck has helped numerous customers automate business applications from Infor, Oracle JD Edwards, HBOC, RxClaim, Infinium, Fiserv, Jack Henry, and more. Currently he is the co-president of the local IBM i user group, QUSER.

    Tom Komadowski

    DevOps Engineer

    Tom Komadowski has over 30 years of experience in IT, including 25+ years on the IBM i platform. His background covers a wide variety of technical responsibilities, involving network administration, programming, operations, and support. He is certified as an IBM Certified System Administrator.

  • Open Source Applied – Justin Reock

    Contains 1 Component(s)

    This session takes open source support data across multiple organizations to examine three different scenarios that represent the most common issues we see today

    This isn’t your typical case study, this is the reality of open source: One hundred percent of organizations use varying degrees of OSS, yet we still focus on one particular package or layer when it comes to sharing best practices. The reality is, when we get stuck, it’s the configuration and operational interrelationships between packages that matter.

    This session takes open source support data across multiple organizations to examine three different scenarios that represent the most common issues we see today (in fact, 80% of the cases we see are due to configuration and package interrelationship issues). Justin Reock covers e-commerce, mobile PaaS, and high performance computing examples to illustrate top problems and solutions for stack selection, infrastructure implementation, and production troubleshooting.

    If you use or are planning to use Apache web server, ActiveMQ, CentOS, Docker, Kubernetes, Nginx, OpenSSL, Puppet, or PHP, these stories cover how most organizations use them. Even if you’re not using these specific packages, the information presented here also applies to other technologies.

    Justin Reock

    Chief Architect, OpenLogic by Perforce

    Justin has over 20 years’ experience working in various software roles and is an outspoken free software evangelist, delivering enterprise solutions and community education on databases, integration work, architecture, and technical leadership. He is currently the Chief Architect at OpenLogic by Perforce.

  • What's New in DB2 for 7.3 and 7.4 - Scott Forstie

    Contains 1 Component(s)

    Scott Forstie, the Db2 for i Business Architect will present the enhancements added to Db2 for i and ACS in 4Q/2019. Join this session to learn all about the new features delivered to IBM i 7.3 and 7.4.

    Scott Forstie, the Db2 for i Business Architect will present the enhancements added to Db2 for i and ACS in 4Q/2019. Join this session to learn all about the new features delivered to IBM i 7.3 and 7.4.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Is Your Code Testable - Barbara Morris

    Contains 1 Component(s)

    This session discusses some of the ways you can write your code to be more testable, and some strategies for making your existing code more testable.

    Being able to test your code in an automated way gives you more freedom to modify and enhance your code. It also allows you to participate in Dev Ops.

    This session discusses some of the ways you can write your code to be more testable, and some strategies for making your existing code more testable.

    Barbara Morris

    Lead Developer for the RPG Compilers, IBM

    Barbara Morris is the lead developer for the RPG compilers in the IBM Toronto Lab. She has been working on the RPG compilers since she started at IBM in 1989 after receiving a Computing Science degree from the University of Alberta. The first enhancement she developed was the ENDIF/ENDDO opcodes for RPG/400 in V2R1. Some of her most recent enhancements were the ON-EXIT and DATA-INTO opcodes and varying-dimension arrays. A few of the other notable enhancements that she developed for RPG include subprocedures, qualified data structures, call-interaction with Java, Open Access: RPG Edition, and fully-free-form RPG.

  • Demystifying the challenges of Database Modernization - Birgitta Hauser

    Contains 1 Component(s)

    In this session Birgitta will discuss the challenges of database modernization. Covering key questions including : Which steps are necessary? What are the advantages and risks of modernizing the database? A Is it possible to redesign the database for an existing application?

    Database modernization is quite often considered a risky undertaking. Hundreds of programs may access and modify your data with native I/O and SQL. Dependencies between the tables or data is hidden within the program logic, and not directly visible. Most files are still DDS-described, so the enhancements that are available for SQL database objects cannot be used. Technologies that guarantee data consistency such as constraints or referential integrities are rarely used. Since data is the capital of most companies, modifying or even modernizing database objects is widely avoided. Consequently, databases grow over the years based on outdated technologies that require additional (and unnecessary) programming effort to keep the data consistent.

    In this session Birgitta will discuss the challenges of database modernization. Covering key questions including : Which steps are necessary? What are the advantages and risks of modernizing the database? A Is it possible to redesign the database for an existing application?

    Birgitta Hauser

    Database and Software Architect - Fresche Solutions, Inc.

    Birgitta is a database and software architect at Fresche Solutions.