Catalog Advanced Search

Search by Categories
Search in Packages
Search by Format
Search by Date Range
Products are filtered by different dates, depending on the combination of live and on-demand components that they contain, and on whether any live components are over or not.
Start
End
Search by Keyword
Sort By
  • Is Your Code Testable - Barbara Morris

    Contains 1 Component(s)

    This session discusses some of the ways you can write your code to be more testable, and some strategies for making your existing code more testable.

    Being able to test your code in an automated way gives you more freedom to modify and enhance your code. It also allows you to participate in Dev Ops.

    This session discusses some of the ways you can write your code to be more testable, and some strategies for making your existing code more testable.

    Barbara Morris

    Lead Developer for the RPG Compilers, IBM

    Barbara Morris is the lead developer for the RPG compilers in the IBM Toronto Lab. She has been working on the RPG compilers since she started at IBM in 1989 after receiving a Computing Science degree from the University of Alberta. The first enhancement she developed was the ENDIF/ENDDO opcodes for RPG/400 in V2R1. Some of her most recent enhancements were the ON-EXIT and DATA-INTO opcodes and varying-dimension arrays. A few of the other notable enhancements that she developed for RPG include subprocedures, qualified data structures, call-interaction with Java, Open Access: RPG Edition, and fully-free-form RPG.

  • Demystifying the challenges of Database Modernization - Birgitta Hauser

    Contains 1 Component(s)

    In this session Birgitta will discuss the challenges of database modernization. Covering key questions including : Which steps are necessary? What are the advantages and risks of modernizing the database? A Is it possible to redesign the database for an existing application?

    Database modernization is quite often considered a risky undertaking. Hundreds of programs may access and modify your data with native I/O and SQL. Dependencies between the tables or data is hidden within the program logic, and not directly visible. Most files are still DDS-described, so the enhancements that are available for SQL database objects cannot be used. Technologies that guarantee data consistency such as constraints or referential integrities are rarely used. Since data is the capital of most companies, modifying or even modernizing database objects is widely avoided. Consequently, databases grow over the years based on outdated technologies that require additional (and unnecessary) programming effort to keep the data consistent.

    In this session Birgitta will discuss the challenges of database modernization. Covering key questions including : Which steps are necessary? What are the advantages and risks of modernizing the database? A Is it possible to redesign the database for an existing application?

    Birgitta Hauser

    Database and Software Architect - Fresche Solutions, Inc.

    Birgitta is a database and software architect at Fresche Solutions.

  • AI and IBM i - Jesse Gorzinski

    Contains 1 Component(s)

    The emerging realm of AI and Machine Learning can bring seemingly-limitless opportunity for your enterprise (and perhaps even mankind). How can you leverage these new technologies from IBM i? This session will provide an overview of what technologies you can be using from your IBM i today.

    The emerging realm of AI and Machine Learning can bring seemingly-limitless opportunity for your enterprise (and perhaps even mankind). How can you leverage these new technologies from IBM i? This session will provide an overview of what technologies you can be using from your IBM i today. We will cover various AI/ML packages available to run on the system, as well as the cloud-based capability of IBM Watson. After all, IBM i has always been a data-centric platform. Surely, Db2 for i houses mission-critical and intensely valuable data. Coupling AI and ML with this data can bring an unprecedented amount of innovation.

    Jesse Gorzinski

    Senior Business Architect - Open Source Software on IBM i

    Jesse Gorzinski works for the IBM i development lab in Rochester, MN. He is the Business Architect of open source technologies. Jesse, who was doing RPG programming at the age of 18, is an expert on application development on IBM i, as well as system access and modernization. His hobbies include playing with his dog, replacing complex applications with 5-line Python programs, and advocating for the use of new technologies on IBM i!Prior to his 2006 employment at IBM, Jesse worked with the AS/400 as an I/T administrator for an IBM customer in the finance/mortgage industry, where he specialized in data backup/recovery, process optimization, and information integrity. He has a Bachelor's degree in Computer Science as well as a Master of Business Administration degree

  • Expert Tips for IBM i Security: Beyond the Basics - Robin Tatam

    Contains 1 Component(s)

    In this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level.

    Cyber attacks often target mission-critical servers, and those attack strategies are constantly changing. To stay on top of these threats, your cybersecurity strategies must evolve, too.

    In this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level.

    Robin will cover:

    • Reducing the risk posed by special authorities
    • Establishing object-level security
    • Overseeing user actions and data access

    If you’re responsible for cybersecurity at your organization or you work on the IBM i platform, you don’t want to miss this chance to take your knowledge of IBM i security beyond the basics.

    Robin Tatam

    Global Director of Security Technologies - HelpSystems

    Robin Tatam is HelpSystems’ Global Director of Security Technologies and a COMMON subject matter expert (SME). As an award-winning speaker on security topics, Robin has been interviewed and quoted by industry magazines and has published numerous trade articles. Robin’s extensive Power Server experience has resulted in more than 20 IBM certifications and the highly sought after designation of ISACA-certified Information Security Manager (CISM) and PCI-Professional (PCI-P). He is also co-author of IBM’s Redbook publication on IBM i Data Encryption.

  • Authority Collection in 7.3 & 7.4: Locking Down Security for Sensitive Data, Files and Objects - Thom Haze

    Contains 1 Component(s)

    This presentation will introduce a new capability in the 7.3 release called Authority Collection and also cover the exciting changes in the 7.4 release.

    This presentation will introduce a new capability in the 7.3 release called Authority Collection and also cover the exciting changes in the 7.4 release.  Authority collection is new support designed to assist the security administrator and application provider in locking down object level security.  This support will help ensure that object authority is set to the most secure value while still allowing an application to run successfully.  This presentation is a must see for security administrators and application developers.

    Thom Haze

    IBM i Operating System Security Development, IBM

    Thom is the lead software developer for Digital Certificate Manager (DCM) and provides cryptography related enhancements to IBM i. He has been working on IBM i and earlier named platforms since 1989 on various projects such as Integrated Windows, Linux, and VMware Servers, Integrated File Server, IBM i Installation, and most recently on the IBM i Security team. Thom is a Certified Information Systems Security Professional (CISSP) focused on providing system availability,

  • Stop Over-Crunching Data: Use Powerful SQL Capabilities to Eliminate Use or Work Files and QTEMP - Rob Bestgen

    Contains 1 Component(s)

    In this session, we’ll cover tips and techniques of avoiding over crunching of data to meet data preparation or untangling requirements using the power of SQL (Common table expressions, Cross Lateral Join, OLAP Functions, and ETL) to avoid over crunching!​

    There are many times where intermediate steps are required to get data into a shape for usage by some other application or consumption by an end user. Creating summary files to address rolling up data into date “buckets.” Un-tangling data to get it into formats that can be consumable by reporting tools. Even “chained” queries where you need to run a query to generate a temp file, then run another one to get to your end goal creates a process that is overly crunching data due to limitations in the tool. Building one-off extracts can be time consuming and can create issues with productivity, performance, and security of data. Overly using QTEmp in an SQL data access world can also be problematic. In this session, we’ll cover tips and techniques of avoiding over crunching of data to meet data preparation or untangling requirements using the power of SQL (Common table expressions, Cross Lateral Join, OLAP Functions, and ETL) to avoid over crunching!

    Rob Bestgen

    Business Architect for IBM i, IBM

    Rob Bestgen is a Business Architect for IBM i, responsible for development strategy for systems management and external interfaces. He is also chief architect of the DB2 SQL Query Engine for DB2 i. Rob is also a member of the DB2 for i Center of Excellence team in lab services and does consulting and education in that role.

  • Intro to Well-Designed REST API’s - Stephanie Rabbani

    Contains 1 Component(s)

    This talk will cover when to use Web APIs to access your data, as well as some tips on how to write a Web API that is flexible and designed to last.

    When should I use an API? What are the benefits of writing APIs?

    This talk will cover when to use Web APIs to access your data, as well as some tips on how to write a Web API that is flexible and designed to last.

    Using code examples in multiple languages, I will share lessons recently learned from working on a large integration project with Salesforce.

    Stephanie Rabbani

    Consultant, Seiden Group

    Stephanie has 17 years of experience developing web applications on the IBM i.

  • Security Alert! Prevent FTP and ODBC Data Breaches on IBM i - Robin Tatam

    Contains 1 Component(s)

    Watch this informative webinar to learn how to close the “back doors” not covered by traditional security schemes. Robin Tatam will explain exit point security and why this little-understood topic is so important to IBM i organizations.

    The latest data shows the vast majority of organizations remain reliant on menu security and command line restrictions to protect their enterprise data. Unfortunately, modern interfaces like FTP and ODBC completely bypass these controls, often allowing end users to view, update, and delete data in the database without the restrictions and auditing supplied by the application.

    Learning about the power and openness of these interfaces is critical for ensuring the integrity of the server’s application data. It’s also an essential step in complying with all formal regulations, including SOX, PCI, and HIPAA.

    Watch this informative webinar to learn how to close the “back doors” not covered by traditional security schemes. Robin Tatam will explain exit point security and why this little-understood topic is so important to IBM i organizations.

    You’ll also see a short demonstration of how to implement policies that restrict access to only those users who need it.

    Robin Tatam

    Global Director of Security Technologies - HelpSystems

    Robin Tatam is HelpSystems’ Global Director of Security Technologies and a COMMON subject matter expert (SME). As an award-winning speaker on security topics, Robin has been interviewed and quoted by industry magazines and has published numerous trade articles. Robin’s extensive Power Server experience has resulted in more than 20 IBM certifications and the highly sought after designation of ISACA-certified Information Security Manager (CISM) and PCI-Professional (PCI-P). He is also co-author of IBM’s Redbook publication on IBM i Data Encryption.

  • Best Practices for Moving from RPG IV to RPG Free - Ray Everhart

    Contains 1 Component(s)

    There are still millions of lines of RPG IV code in use every day that are critical to business operations. This session will explore the options available in order to help you make the best choices possible as you protect your investment in the IBM i.

    There are still millions of lines of RPG IV code in use every day that are critical to business operations. This session will explore the options available in order to help you make the best choices possible as you protect your investment in the IBM i. A sample program will be Converted from RPG IV to RPG Free in order to show the conversion process.

    Learning Objectives

    - Mapping the gap between the current state and the selected reference architecture

    - Business Justification for converting from RPG IV to RPG Free

    - Best Practices for converting from RPG IV to RPG Free

    Ray Everhart

    Product Manager, X-Analysis, Fresche Solutions

    Product Manager, X-Analysis, Fresche Solutions

  • Introduction to BRMS for IBM i - Tom Huntington and Mervyn Venter

    Contains 1 Component(s)

    BRMS is available as a licensed program product (LPP) on IBM i, but you need to know how to set it up correctly. Otherwise you risk not having your irreplaceable IBM i data backed up properly.

    You know IBM’s Backup, Recovery and Media Services (BRMS) for i can help you track your media volumes, provide history about your backups, automate your backups, and guide you through a restore. But did you know that there’s a different way to set up BRMS if you’re using tape backups versus virtual tape libraries (VTLs)?

    BRMS is available as a licensed program product (LPP) on IBM i, but you need to know how to set it up correctly. Otherwise you risk not having your irreplaceable IBM i data backed up properly.

    Tom Huntington

    Executive Vice President of Technical Solutions at HelpSystem

    Tom Huntington is Executive Vice President of Technical Solutions at HelpSystems, and has been with the company for nearly 30 years. He works with business alliances, acquisitions and large customer relationships and ensures that the HelpSystems software works with other major software and hardware vendors worldwide.

    Tom often speaks on enterprise scheduling, security, automation topics, IBM i technology, and the HelpSystems products, and hosts technical presentations on a variety of automation topics. He is the author of the HelpSystems IBM i Marketplace Survey and has written articles on automated operations, security, cloud computing, and business intelligence for leading trade journals and newsletters. He was named an IBM Champion in 2016, 2017, 2018, and 2019 for over three decades of advocation and thought leadership on the IBM i platform.

    Mervyn Venter

    IBM i IT Managing Consultant, IBM

    Mervyn Venter has been with IBM for nearly 40 years. He got his start working at IBM in South Africa and moved to IBM's IBM i Support Center in Rochester, Minnesota in 1997, where he worked primarily with BRMS. In 2012, Mervyn moved to IBM Lab Services to provide BRMS, SKLM, and HA services to IBM i customers. From 2013 to 2016, he went to Singapore on an assignment. Over the years, Mervyn has become a worldwide subject matter expert on BRMS for IBM i.