Catalog Advanced Search

Search by Category
Search by Format
Sort By
Search by Type
Search by Category
Search in Packages
Search by Format
Search by Type
Search by Date Range
Products are filtered by different dates, depending on the combination of live and on-demand components that they contain, and on whether any live components are over or not.
Start
End
Search by Keyword
Sort By
  • Contains 1 Component(s)

    We give you a practical look at what DevOps is and how you can put this strategy to work in your organization.

    Embracing agile development is essential to keep pace with evolving business requirements and your company’s expectations for your IT team. Join us to learn about techniques and tools that we and our customers use to innovate in a rapidly evolving technology landscape.

    By utilizing CI/CD pipelines you can integrate your efforts with development across your enterprise, while drawing attention to the value of the IBM i platform. DevOps empowers modern development teams to deal with constant change, while improving quality and reducing downtime. We give you a practical look at what DevOps is and how you can put this strategy to work in your organization.

    Donna Westmoreland

    CTO, Midrange Dynamics North America

    Donna Westmoreland, who is CTO for Midrange Dynamics North America, has over 25 years’ experience with IBM midrange systems and supporting consistent software change methodologies. Experience gained from leading major projects, including application modernization, at hundreds of corporations has given her a well-rounded view of development needs, audit requirements, and testing principles.

  • Contains 2 Component(s)

    In this iSee, we are going to keep it simple, start with Active Job Info, and then combine it with 1 additional service to perform from useful regular task that we have been asked about.

    Work active job is for sure a key CL command and its SQL counterpart Active Job Info we have made the basis of many examples along the way. In this iSee, we are going to keep it simple, start with Active Job Info, and then combine it with one additional service to perform from useful regular task that we have been asked about.  The idea is to not only give you useful scripts, but to help you with some basic combining of services to really help you unleash the power of these services.

    Tim Rowe

    Business Architect Application Development & Systems Management for IBM i

    Tim Rowe is the Business Architect for IBM i responsible for System Management and Application Development. He has a passion for modernization on IBM i and how we can continue to move IBM i into the world of 'Normal' . In his spare time he is a certified Soccer referee and enjoys refereeing games with his youngest son.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Contains 39 Product(s)

    Short demonstrations of tools to help you in your everyday work. Presented by Scott Forstie and Tim Rowe, IBM

    image



    Short demonstrations of tools, techniques and examples (including working SQL examples!!) to help you solve real problems that are part of your everyday work.  Presented by Scott Forstie and Tim Rowe, IBM

  • Contains 1 Component(s)

    Part of N2i's Getting Started Series, this session is on Getting Started with SQL, presented by Sven Jansson.

    Part of N2i's Getting Started Series, this session is on Getting Started with SQL, presented by Sven Jansson.

    Sven Jansson

  • Contains 7 Product(s)

    Sessions presented by industry experts as part of N2i's "Getting Started" series.

    image

  • Contains 1 Component(s)

    Do you know what you need to upgrade to IBM i 7.5?

    Planing tips, technology prerequisites, and post-installation requirements from the experts  

    IBM released IBM i 7.5 earlier this year. When upgrading to new versions of IBM i, it’s always a good idea to have a documented plan, so that the process is successful the first time. 

    Do you know what you need to upgrade to IBM i 7.5?  

    During this webinar, Peter Graves joins IBM Power Champion Tom Huntington to share top tips that he has learned in over 30 years of helping customers with operating systems upgrades. You’ll learn about:  

    • New offerings in IBM i 7.5
    • Upgrade planning 
    • Pre-upgrade tasks
    • Upgrade tasks 
    • Common errors and failures 
    • Post-upgrade tasks 
    •  

    This webinar covers planning tips, hardware and software prerequisites, and post-installation requirements—your upgrade isn’t complete until this last step is done! The focus will be on upgrading to 7.5, but there will be tips that apply to release levels 7.3 and 7.4. 

    Join HelpSystem to learn more.

    Tom Huntington

    Executive Vice President of Technical Solutions at HelpSystem

    Tom Huntington is Executive Vice President of Technical Solutions at HelpSystems, and has been with the company for nearly 30 years. He works with business alliances, acquisitions and large customer relationships and ensures that the HelpSystems software works with other major software and hardware vendors worldwide.

    Tom often speaks on enterprise scheduling, security, automation topics, IBM i technology, and the HelpSystems products, and hosts technical presentations on a variety of automation topics. He is the author of the HelpSystems IBM i Marketplace Survey and has written articles on automated operations, security, cloud computing, and business intelligence for leading trade journals and newsletters. He was named an IBM Champion in 2016, 2017, 2018, and 2019 for over three decades of advocation and thought leadership on the IBM i platform.

    Peter Graves

    Converge Technologies

  • Contains 2 Component(s)

    Starting in IBM i 7.4, the operating system added a feature, Authority Collection for Objects. Leveraging this and a few simple SQL statements, you can get a full access log to every user that has touched an IFS directory for any reason.

    The IFS is largely a mystery to many. In this session we will help you unravel a piece of that mystery. The question was presented to us, ‘Can I find out WHO is actually using and accessing directories in IFS?’  The answer of course, YES!!!  Starting in IBM i 7.4, the operating system added a feature,  Authority Collection for Objects.  Leveraging this and a few simple SQL statements, you can get a full access log to every user that has touched an IFS directory for any reason. 

    Tim Rowe

    Business Architect Application Development & Systems Management for IBM i

    Tim Rowe is the Business Architect for IBM i responsible for System Management and Application Development. He has a passion for modernization on IBM i and how we can continue to move IBM i into the world of 'Normal' . In his spare time he is a certified Soccer referee and enjoys refereeing games with his youngest son.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Contains 1 Component(s)

    Most IBM i organizations have good basic security in place. But how do you turn good IBM i security into great IBM i security?

    Most IBM i organizations have good basic security in place. But how do you turn good IBM i security into great IBM i security?  

    In this webinar, SEA’s Lloyd Ramdarie discusses advanced techniques to upgrade your IBM i security, audit & compliance systems, including:

    • Using MFA to significantly reduce unauthorized IBM i access 
    • Adding IBM i ransomware protection to go beyond IFS virus scanning
    • Detecting unusual & suspicious behavior/user profile changes
    • Validating exit point security changes using historical log data 
    • Monitoring, analyzing & reporting on sensitive IBM i field level changes
    • More techniques than we can describe here!

    Join SEA as we discuss how to take advantage of these advanced IBM i security techniques and upgrade your IBM i security system, turning good i security into great i security.

  • Contains 1 Component(s)

    It’s not enough to solely rely on your security tools to keep your systems safe. That’s why this session will educate you on exactly what it is that you’re up against and what your best course of action is for prevention.

    No one is totally safe in today’s threat landscape—especially IBM i users. The highly valuable information they protect has made them a top target for ransomware attacks.   

    Don’t give cybercriminals the upper hand—join IBM i security expert Sandi Moore where you’ll learn:

    • How malicious programs can impact IBM i
    • The difference between PC-based malware protection and native IBM i scanning
    • How to craft an effective ransomware prevention strategy

    It’s not enough to solely rely on your security tools to keep your systems safe. That’s why this session will educate you on exactly what it is that you’re up against and what your best course of action is for prevention.

  • Contains 1 Component(s)

    N2i - Getting Started with GIT, presented by Jesse Gorzinski

    Part of N2i's "Getting Started" series, this session will help you get started with GIT and is presented by Jesse Gorzinski from IBM

    Jesse Gorzinski

    Senior Business Architect - Open Source Software on IBM i

    Jesse Gorzinski works for the IBM i development lab in Rochester, MN. He is the Business Architect of open source technologies. Jesse, who was doing RPG programming at the age of 18, is an expert on application development on IBM i, as well as system access and modernization. His hobbies include playing with his dog, replacing complex applications with 5-line Python programs, and advocating for the use of new technologies on IBM i!Prior to his 2006 employment at IBM, Jesse worked with the AS/400 as an I/T administrator for an IBM customer in the finance/mortgage industry, where he specialized in data backup/recovery, process optimization, and information integrity. He has a Bachelor's degree in Computer Science as well as a Master of Business Administration degree