Catalog Advanced Search

Search by Category
Search by Format
Search by Type
Sort By
Search by Favorites
Search by Category
Search by Format
Search by Type
Search by Speakers
Credits Offered
Search in Packages
Search by Date Range
Products are filtered by different dates, depending on the combination of live and on-demand components that they contain, and on whether any live components are over or not.
Start
End
Search by Favorites
Search by Keyword
Sort By
  • Contains 1 Component(s)

    With the recent change to how the IBM i operating system is licensed, the chance to subscription license. Its is now more important that ever to make sure you know when your license will expire. With subscription license, your system may stop working someday in the future! Guessing it might be useful to know what. This iSee will explore a few ways that is possible. Some magical SQL as well as updates to the Navigator interface to help make it very clear.

    With the recent change to how the IBM i operating system is licensed, the chance to subscription license. Its is now more important that ever to make sure you know when your license will expire. With subscription license, your system may stop working someday in the future!  Guessing it might be useful to know what.  This iSee will explore a few ways that is possible. Some magical SQL as well as updates to the Navigator interface to help make it very clear. 

  • Contains 1 Component(s)

    User Profiles, we all have them, sometimes we have too many! Do you ever have a need to do a mass update of user profiles? The use case for this video was someone that needed to do some sensitive testing and did not want ANYONE to sign in during the test. Easy way to make that happen ? Disable ALL user profiles on the system for a period, and then revert all those changed back. The SQL provided will show you how to build your list of profiles, run the action and then make sure you clean up after. Sure we are showing Disable and Enable, but think of other user cases, you want to force all profiles to reset their password based on new security password rules, this SQL can easily be adopted for that as well.

    User Profiles, we all have them, sometimes we have too many!  Do you ever have a need to do a mass update of user profiles? The use case for this video was someone that needed to do some sensitive testing and did not want ANYONE to sign in during the test. Easy way to make that happen ? Disable ALL user profiles on the system for a period, and then revert all those changed back. The SQL provided will show you how to build your list of profiles, run the action and then make sure you clean up after.  Sure we are showing Disable and Enable, but think of other user cases, you want to force all profiles to reset their password based on new security password rules, this SQL can easily be adopted for that as well. 

    Tim Rowe

    Business Architect Application Development & Systems Management for IBM i

    Tim Rowe is the Business Architect for IBM i responsible for System Management and Application Development. He has a passion for modernization on IBM i and how we can continue to move IBM i into the world of 'Normal' . In his spare time he is a certified Soccer referee and enjoys refereeing games with his youngest son.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Contains 79 Product(s) 2 new product(s) added recently

    Short demonstrations of tools to help you in your everyday work. Presented by Scott Forstie and Tim Rowe, IBM

    image



    Short demonstrations of tools, techniques and examples (including working SQL examples!!) to help you solve real problems that are part of your everyday work.  Presented by Scott Forstie and Tim Rowe, IBM

  • Contains 1 Component(s)

    In this IBM Guided Tour, Scott Forstie will go through the ins and outs of Authority Collection and how to use SQL to make it more effective.

    In this IBM Guided Tour, Scott Forstie will go through the ins and outs of Authority Collection and how to use SQL to make it more effective.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Contains 1 Component(s)

    Modernizing applications is one of the biggest concerns for businesses, with most businesses running in-house code. Tonny Bastiaans, Andrew Ireland, and Alan Ashley work together to show how Merlin can help aide the application modernization process in this guided tour.

    Modernizing applications is one of the biggest concerns for businesses, with most businesses running in-house code. Tonny Bastiaans, Andrew Ireland, and Alan Ashley work together to show how Merlin can help aide the application modernization process in this guided tour.

    Tonny Bastiaans

    WW Offering Manager Power Virtual Server

    IBM

    Tonny has over 18 years of experience working at IBM in a variety of roles. He has an open mind building the bridge between technic and business. Tonny is always interested in a good conversation and human interaction (accompanied with a good cup of coffee)

    Andrew Ireland

    Global Alliances Manager and DevSecOps Business Manager

    ARCAD

    Experienced Business Unit Manager with P&L responsibility who has demonstrated a history of working in the information technology and services industry.

    Alan Ashley

    Presales Consultant for DevOps for IBMi

    Arcad Software

    When it comes to describing someone, even yourself, it can be difficult. This time it's easy. I grew up on the AS400, through iSeries, and into the IBM i world. Started on a model B50 (I know it was a B model) where the disk drive needed two persons to replace and now in the DevSecOps world showing that the IBM i development fits right in with Agile and DevSecOps. Showing that one can move on from green screen and into a modern mode of development. After spending over two decades with IBM, I now help Arcad Software in showing that DevSecOps on IBM i isn't all that scary.

  • Contains 1 Component(s)

    In this guided tour, Steve Finnes and Linda Hirsch will walk you through the latest and greatest in IBM Power HA/DR solutions.

    In this guided tour, Steve Finnes and Linda Hirsch will walk you through the latest and greatest in IBM Power HA/DR solutions.

    Steve Finnes

    IBM Product Manager

    Steve has spent several years in IBM with positions spanning basic research to product development, product offering and marketing. He is the product offering manager for IBM Power Systems with responsibility for PowerHA for AIX, PowerHA for IBM i and the CBU.

    Linda Hirsch

    IBM i Offering Program Manager

    IBM

    Linda is on the worldwide IBM i Product Management team which creates and delivers offerings for the IBM i portfolio.

  • Contains 1 Component(s)

    We have should a few examples about looking at the contents of Journals, but in this video we take a step deeper in to the puzzle, where are the Journal receivers. We talk about the purpose of these receivers as some slick SQL to help make sure that you know where they all live on your system.

    We have should a few examples about looking at the contents of Journals, but in this video we take a step deeper in to the puzzle, where are the Journal receivers. We talk about the purpose of these receivers as some slick SQL to help make sure that you know where they all live on your system. 

    Tim Rowe

    Business Architect Application Development & Systems Management for IBM i

    Tim Rowe is the Business Architect for IBM i responsible for System Management and Application Development. He has a passion for modernization on IBM i and how we can continue to move IBM i into the world of 'Normal' . In his spare time he is a certified Soccer referee and enjoys refereeing games with his youngest son.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Contains 1 Component(s)

    Multi-factor authentication (MFA) systems, while a valuable security measure, are not without vulnerabilities. Phishing attacks, SIM swapping, man-in-the-middle attacks, MFA fatigue, and more can still compromise logins. Join SEA on October 30th to discover how to future-proof your IBM i MFA systems. We’ll delve into strategies and tactics to enhance IBM i login protection and defend against emerging threats. Topics include: • Patching IBM i MFA vulnerabilities: Utilizing encryption to bolster MFA security. • Immunizing logins against phishing: Exploring phishing-resistant MFA and password-less MFA options. • Integrating MFA into other IBM i functions: Enhancing self-service password resets and emergency authorization solutions. • Strengthening authentication security: Leveraging hard-to-break MFA verification factors.

    Multi-factor authentication (MFA) systems, while a valuable security measure, are not without vulnerabilities. Phishing attacks, SIM swapping, man-in-the-middle attacks, MFA fatigue, and more can still compromise logins.

    Join SEA on October 30th to discover how to future-proof your IBM i MFA systems. We’ll delve into strategies and tactics to enhance IBM i login protection and defend against emerging threats. Topics include:

    • Patching IBM i MFA vulnerabilities: Utilizing encryption to bolster MFA security.
    • Immunizing logins against phishing: Exploring phishing-resistant MFA and password-less MFA options.
    • Integrating MFA into other IBM i functions: Enhancing self-service password resets and emergency authorization solutions.
    • Strengthening authentication security: Leveraging hard-to-break MFA verification factors.

    Lloyd Ramdarie

    IBM i Technical Support Team Member, Software Engineering of America

    Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His background includes working in IBM i space for quite a number years with a large extent of his experience coming from heavy involvement with securing the IBM i. He is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end to end security solutions in the IBM i environment.

    Ken McCalister

    Software Engineering of America

    Ken McCalister has spent 35 years working with IBM i technology . Ken has vast experience working in all aspects of digital technology and management, including Administration, Engineering & Security. Ken is part of the IBM i Technical Team at Seasoft, providing support to its many diverse clients.

  • Contains 1 Component(s)

    Join Scott Forstie in exploring the possibilities of the query supervisor feature in Db2 for i.

    Join Scott Forstie in exploring the possibilities of the query supervisor feature in Db2 for i.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Contains 1 Component(s)

    Business intelligence and analytics can transform your organization. But getting actionable information out of the raw data that comes from disconnected and incompatible databases, platforms, and other data sources is a roadblock to BI success. Learn how a data warehouse can be the key overcoming data integration challenges.

    Business intelligence and analytics can transform your organization. But getting actionable information out of the raw data that comes from disconnected and incompatible databases, platforms, and other data sources is a roadblock to BI success. Learn how a data warehouse can be the key overcoming data integration challenges.

    Greg Schmidt

    Senior Technical Solutions Consultant

    Fortra

    Greg Schmidt is a 20+ year veteran in data, document, forms, and process automation. Specializing in document automation and business intelligence, Greg has helped hundreds of companies automate their data and document processes and streamline their cumbersome business processes through strategic technologies and planning. Providing best-practice guidance forimplementation and solution expansion within a company are his top priorities.

    Greg also has over a decade's worth of experience in IBM i report and data distribution and robotic process automation technology.

    Alan Jordan

    Senior Development Manager

    Fortra

    Alan has been involved in System 38/AS400/iSeries/IBM i development for his entire IT career. A native of Australia, he moved to the US in 1998 when Coglin Mill introduced RODIN to the U.S. market. As the lead architect for RODIN (now Sequel Data Warehouse), he oversees product direction and development, and also manages the customer support team. He has extensive knowledge and experience in data warehousing technologies on IBM i and is a regular speaker at COMMON and other user group events.

    Alan has been involved in System 38/AS400/iSeries/IBM i development for his entire IT career. A native of Australia, he moved to the US in 1998 when Coglin Mill introduced RODIN to the U.S. market. As the lead architect for RODIN (now Sequel Data Warehouse), he oversees product direction and development, and also manages the customer support team. He has extensive knowledge and experience in data warehousing technologies on IBM i and is a regular speaker at COMMON and other user group events.