Catalog Advanced Search

Search by Category
Search by Format
Sort By
Search by Type
Search by Category
Search in Packages
Search by Format
Search by Type
Search by Date Range
Products are filtered by different dates, depending on the combination of live and on-demand components that they contain, and on whether any live components are over or not.
Start
End
Search by Keyword
Sort By
  • Contains 1 Component(s)

    Do you know what you need to upgrade to IBM i 7.5?

    Planing tips, technology prerequisites, and post-installation requirements from the experts  

    IBM released IBM i 7.5 earlier this year. When upgrading to new versions of IBM i, it’s always a good idea to have a documented plan, so that the process is successful the first time. 

    Do you know what you need to upgrade to IBM i 7.5?  

    During this webinar, Peter Graves joins IBM Power Champion Tom Huntington to share top tips that he has learned in over 30 years of helping customers with operating systems upgrades. You’ll learn about:  

    • New offerings in IBM i 7.5
    • Upgrade planning 
    • Pre-upgrade tasks
    • Upgrade tasks 
    • Common errors and failures 
    • Post-upgrade tasks 
    •  

    This webinar covers planning tips, hardware and software prerequisites, and post-installation requirements—your upgrade isn’t complete until this last step is done! The focus will be on upgrading to 7.5, but there will be tips that apply to release levels 7.3 and 7.4. 

    Join HelpSystem to learn more.

    Tom Huntington

    Executive Vice President of Technical Solutions at HelpSystem

    Tom Huntington is Executive Vice President of Technical Solutions at HelpSystems, and has been with the company for nearly 30 years. He works with business alliances, acquisitions and large customer relationships and ensures that the HelpSystems software works with other major software and hardware vendors worldwide.

    Tom often speaks on enterprise scheduling, security, automation topics, IBM i technology, and the HelpSystems products, and hosts technical presentations on a variety of automation topics. He is the author of the HelpSystems IBM i Marketplace Survey and has written articles on automated operations, security, cloud computing, and business intelligence for leading trade journals and newsletters. He was named an IBM Champion in 2016, 2017, 2018, and 2019 for over three decades of advocation and thought leadership on the IBM i platform.

    Peter Graves

    Converge Technologies

  • Contains 2 Component(s)

    Starting in IBM i 7.4, the operating system added a feature, Authority Collection for Objects. Leveraging this and a few simple SQL statements, you can get a full access log to every user that has touched an IFS directory for any reason.

    The IFS is largely a mystery to many. In this session we will help you unravel a piece of that mystery. The question was presented to us, ‘Can I find out WHO is actually using and accessing directories in IFS?’  The answer of course, YES!!!  Starting in IBM i 7.4, the operating system added a feature,  Authority Collection for Objects.  Leveraging this and a few simple SQL statements, you can get a full access log to every user that has touched an IFS directory for any reason. 

    Tim Rowe

    Business Architect Application Development & Systems Management for IBM i

    Tim Rowe is the Business Architect for IBM i responsible for System Management and Application Development. He has a passion for modernization on IBM i and how we can continue to move IBM i into the world of 'Normal' . In his spare time he is a certified Soccer referee and enjoys refereeing games with his youngest son.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Contains 38 Product(s)

    Short demonstrations of tools to help you in your everyday work. Presented by Scott Forstie and Tim Rowe, IBM

    image



    Short demonstrations of tools, techniques and examples (including working SQL examples!!) to help you solve real problems that are part of your everyday work.  Presented by Scott Forstie and Tim Rowe, IBM

  • Contains 1 Component(s)

    Most IBM i organizations have good basic security in place. But how do you turn good IBM i security into great IBM i security?

    Most IBM i organizations have good basic security in place. But how do you turn good IBM i security into great IBM i security?  

    In this webinar, SEA’s Lloyd Ramdarie discusses advanced techniques to upgrade your IBM i security, audit & compliance systems, including:

    • Using MFA to significantly reduce unauthorized IBM i access 
    • Adding IBM i ransomware protection to go beyond IFS virus scanning
    • Detecting unusual & suspicious behavior/user profile changes
    • Validating exit point security changes using historical log data 
    • Monitoring, analyzing & reporting on sensitive IBM i field level changes
    • More techniques than we can describe here!

    Join SEA as we discuss how to take advantage of these advanced IBM i security techniques and upgrade your IBM i security system, turning good i security into great i security.

  • Contains 1 Component(s)

    It’s not enough to solely rely on your security tools to keep your systems safe. That’s why this session will educate you on exactly what it is that you’re up against and what your best course of action is for prevention.

    No one is totally safe in today’s threat landscape—especially IBM i users. The highly valuable information they protect has made them a top target for ransomware attacks.   

    Don’t give cybercriminals the upper hand—join IBM i security expert Sandi Moore where you’ll learn:

    • How malicious programs can impact IBM i
    • The difference between PC-based malware protection and native IBM i scanning
    • How to craft an effective ransomware prevention strategy

    It’s not enough to solely rely on your security tools to keep your systems safe. That’s why this session will educate you on exactly what it is that you’re up against and what your best course of action is for prevention.

  • Contains 1 Component(s)

    N2i - Getting Started with GIT, presented by Jesse Gorzinski

    Part of N2i's "Getting Started" series, this session will help you get started with GIT and is presented by Jesse Gorzinski from IBM

    Jesse Gorzinski

    Senior Business Architect - Open Source Software on IBM i

    Jesse Gorzinski works for the IBM i development lab in Rochester, MN. He is the Business Architect of open source technologies. Jesse, who was doing RPG programming at the age of 18, is an expert on application development on IBM i, as well as system access and modernization. His hobbies include playing with his dog, replacing complex applications with 5-line Python programs, and advocating for the use of new technologies on IBM i!Prior to his 2006 employment at IBM, Jesse worked with the AS/400 as an I/T administrator for an IBM customer in the finance/mortgage industry, where he specialized in data backup/recovery, process optimization, and information integrity. He has a Bachelor's degree in Computer Science as well as a Master of Business Administration degree

  • Contains 1 Component(s)

    Getting Started with Standards by Marina Schwenk

    Part of N2i's "Getting Started" series, this session provides you with basics on how to get started with Standards, presented by Marina Schwenk

    Marina Schwenk

    Software Developer, Everbrite

    Marina started her career in January 2015 at Everbrite LLC in Greenfield WI after graduating from Gateway Technical College in May of 2014 with an Associate’s degree in IT Software Development. Marina works as a developer in both RPG and Java and she also is one of two junior IBM i admins at Everbrite. Marina earned her bachelor’s degree in Computer Information Systems Software Development from Bellevue University in June of 2017. She is currently working on her Master’s degree program in Computer Information Systems Software development, with the goal of teaching part time, and empowering the younger generation. Marina is also a member of the Wisconsin Midrange Computer Professional Association, Women in IT committee and has recently started speaking on a couple of topics, ranging from RPG to SQL. She has completed one open source project and is currently working on releasing iUnit an open source RPG unit testing framework written in RPGLE.

  • Contains 6 Product(s)

    Sessions presented by industry experts as part of N2i's "Getting Started" series.

    image

  • Contains 2 Component(s)

    you can learn a lot about what is happening on your system by having a understand of what objects are owned and by whom.

    During the PowerUp 2022 event, Scott and Tim recorded some iSee videos. This one covers Object Ownership. Why is this important ?   Well you can learn a lot about what is happening on your system by having a understand of what objects are owned and by whom. We will look at who owns what in both the IFS and the QSYS file systems.

    Tim Rowe

    Business Architect Application Development & Systems Management for IBM i

    Tim Rowe is the Business Architect for IBM i responsible for System Management and Application Development. He has a passion for modernization on IBM i and how we can continue to move IBM i into the world of 'Normal' . In his spare time he is a certified Soccer referee and enjoys refereeing games with his youngest son.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Contains 2 Component(s)

    During the PowerUp 2022 event, Scott and Tim recorded some iSee videos. In this video we take a look at a 4 separate system management items

    During the PowerUp 2022 event, Scott and Tim recorded some iSee videos. In this video we take a look at a 4 separate system management items. We will review who is creating Spool Files and how to easily manage. We will look at Job Management. Have you ever wondered if the data in your database is correct ?  For example, if you have a field that is numeric, are all the values in the DB all actually numbers ?  Do you have character data?  We will show you how to take a look at this. The last items is a way to see who is touching what objects. Not just putting auditing to work, but using auditing in amazing new ways.

    Tim Rowe

    Business Architect Application Development & Systems Management for IBM i

    Tim Rowe is the Business Architect for IBM i responsible for System Management and Application Development. He has a passion for modernization on IBM i and how we can continue to move IBM i into the world of 'Normal' . In his spare time he is a certified Soccer referee and enjoys refereeing games with his youngest son.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.