Catalog Advanced Search

Search by Categories
Search in Packages
Search by Format
Search by Type
Search by Date Range
Products are filtered by different dates, depending on the combination of live and on-demand components that they contain, and on whether any live components are over or not.
Start
End
Search by Keyword
Sort By
  • SQL Being Used by Navigator

    Contains 2 Component(s)

    Scott and Tim show you some great SQL using IBM i Services, and how these are the backbone for the new Navigator.

     Scott and Tim show you some great SQL using IBM i Services, and how these are the backbone for the new Navigator. We will have fun with talking a new look at how SQL can be used by both IBM and how we continue to make it even easier for you to use in your own activities.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

    Tim Rowe

    Business Architect Application Development & Systems Management for IBM i

    Tim Rowe is the Business Architect for IBM i responsible for System Management and Application Development. He has a passion for modernization on IBM i and how we can continue to move IBM i into the world of 'Normal' . In his spare time he is a certified Soccer referee and enjoys refereeing games with his youngest son.

  • IBM iSee Video Blog

    Contains 25 Product(s)

    Short demonstrations of tools to help you in your everyday work. Presented by Scott Forstie and Tim Rowe, IBM

    image



    Short demonstrations of tools, techniques and examples (including working SQL examples!!) to help you solve real problems that are part of your everyday work.  Presented by Scott Forstie and Tim Rowe, IBM

  • Power HA + Robot HA - Tom Huntington & Brian Nordland

    Contains 1 Component(s)

    We often hear that IT teams are either afraid do a planned switchover or aren’t sure how to tell when they’re ready for a role swap. It’s time to build a little confidence into your business continuity!

    We often hear that IT teams are either afraid do a planned switchover or aren’t sure how to tell when they’re ready for a role swap. It’s time to build a little confidence into your business continuity!  

    During this webinar, two IBM i high availability experts demonstrate how to verify your data replication products are doing what you need them to do. We’ll show you what to look at on your system in order to verify that you’re replicating what you want replicated and that you are ready for the role swap. You’ll learn about:

      

    • High availability options on IBM i

    • How to verify/navigate PowerHA

    • How to verify/navigate journaling software like Robot HA

    • Monitoring options for high availability tools

    Tom Huntington

    Executive Vice President of Technical Solutions at HelpSystem

    Tom Huntington is Executive Vice President of Technical Solutions at HelpSystems, and has been with the company for nearly 30 years. He works with business alliances, acquisitions and large customer relationships and ensures that the HelpSystems software works with other major software and hardware vendors worldwide.

    Tom often speaks on enterprise scheduling, security, automation topics, IBM i technology, and the HelpSystems products, and hosts technical presentations on a variety of automation topics. He is the author of the HelpSystems IBM i Marketplace Survey and has written articles on automated operations, security, cloud computing, and business intelligence for leading trade journals and newsletters. He was named an IBM Champion in 2016, 2017, 2018, and 2019 for over three decades of advocation and thought leadership on the IBM i platform.

    Brian Nordland

    Software Architect, HelpSystems

    Brian Nordland is the architect for the PowerHA SystemMirror for i product at HelpSystems. Brian has spoken at events, webinars, and users groups—including COMMON—since 2014. He is a co-inventor on multiple patent applications and co-author on technical publications in high availability and distributed computing.

    Prior to joining HelpSystems Brian spent six years with IBM in Rochester, Minnesota. Roles at IBM included being the development architect for PowerHA and working on IBM i virtual I/O and communication I/O device drivers. He earned his master's degree in software engineering from the University of Minnesota in 2017.

  • Power E1080 IBM i Technology Refresh Announcement — September 8, 2021

    Contains 1 Component(s)

    Join COMMON and the IBM i team starting Wednesday, September 8, for the latest announcements from IBM

    Join COMMON and the IBM i team starting today, Wednesday, September 8th, for the Power E1080 announcement and latest IBM i Technology Refresh. Steve Will, IBM i Chief Architect, will cover what all is included in the Technology Refresh, including an update to Rational Developer for i and Access Client Solutions. Dan Sundt, IBM i Product Manager, will overview the Power E1080 and what it does for IBM i. Tim Rowe, Business Architect of Application Development for IBM i, will showcase the new version of Navigator for i, including a live demo. 

     

  • 3 Ways to Protect the IBM i from Ransomware Attacks — Joe Hertvik & Mel Zucker

    Contains 1 Component(s)

    Join this webinar where we’ll discuss how ransomware attacks the IBM i IFS, steps you can take to protect against ransomware and how to respond when you’re attacked.

    Although ransomware doesn’t attack the IBM i operating system or native DB2 libraries, it can encrypt and rename Integrated File System (IFS) stream files that support native IBM i applications and store user documents.   

    Ransomware attacks can disable critical IBM i processing by damaging IFS-based configuration settings and data files. Ransomware disables business processing, breaches security, and wastes money and time in recovering from an attack.   

    Recent ransomware events have increased the probability your IFS will be attacked, as ransomware attacks have become more prevalent. Corporations, governments, auditors and regulators are increasingly requiring stronger protection against ransomware attacks.

    Join this webinar where we’ll discuss how ransomware attacks the IBM i IFS, steps you can take to protect against ransomware and how to respond when you’re attacked. You’ll learn:  

    • How ransomware attacks IFS stream files

    • Critical IBM i security settings that protect your IFS from ransomware

    • Recovery techniques and best practices to consider when an attack occurs

    • Preventing, stopping, and isolating IBM i ransomware activity in real-time

    Mel Zucker

    Senior IBM i Solutions Engineer, Software Engineering of America

    Mel Zucker has been a Senior IBM i Solutions Engineer with Software Engineering of America for the past 9 years. Prior to joining SEA, Mel was a member of the IBM team supporting their line of midrange products for over 30 years. While at IBM, Mel was the recipient of multiple IBM Means Service and System Engineering Achievement awards.

  • How to Modernize Your Query/400 Queries - Greg Schmidt

    Contains 1 Component(s)

    During this video, the IBM i experts from HelpSystems demonstrate how the modern interfaces and advanced functionality in Sequel Data Access software can easily replace and enhance your current process for accessing data.

    Modernization is a top IT concern for 50% of IBM i shops in 2021. For many, that means replacing outdated technology like Query/400 and other manual and labor-intensive ways of getting data to business users.   

    During this live webinar, the IBM i experts from HelpSystems demonstrate how the modern interfaces and advanced functionality in Sequel Data Access software can easily replace and enhance your current process for accessing data. You’ll also learn how to:  

    • Quit writing expensive code or using Query/400 queries to access valuable business data

    • Convert those old queries into SQL with Sequel

    • Build dashboards to compile and track KPIs

    • Deploy insightful, actionable dashboards through a browser 

    • Quickly export your data to Excel

      

    See how Sequel makes it possible for your IT team to deliver the valuable data and insight that users have been asking for without taking focus away from your other crucial functions.

    Greg Schmidt

    Senior Technical Solutions Consultant

    HelpSystems

    Greg Schmidt is a 20+ year veteran in data, document, forms, and process automation. Specializing in document automation and business intelligence, Greg has helped hundreds of companies automate their data and document processes and streamline their cumbersome business processes through strategic technologies and planning. Providing best-practice guidance forimplementation and solution expansion within a company are his top priorities.

    Greg also has over a decade's worth of experience in IBM i report and data distribution and robotic process automation technology.

  • Reimagine IBM i Development with Profound.js - Alex Roytman

    Contains 1 Component(s)

    Profound.js.is a low-code, JavaScript/Node.js solution that runs on all platforms and is built specifically for developers. It is the first true, low-code platform to run natively on IBM i, with full RPG/DB2 integration, helping companies on IBM i move into the future, without losing years of IT investment.

    The application development landscape is changing rapidly, and IBM i shops are being asked to create double the applications in half the time. For companies running IBM i, this demand is compounded by the continuously shrinking RPG developer pool, severely limiting your business’ ability to deliver in today’s challenging marketplace.

    Profound.js.is a low-code, JavaScript/Node.js solution that runs on all platforms and is built specifically for developers. It is the first true, low-code platform to run natively on IBM i, with full RPG/DB2 integration, helping companies on IBM i move into the future, without losing years of IT investment.

    Alex Roytman

    CEO

    Profound Logic Software

    Alex Roytman is the founder and CEO of Profound Logic. He is a Node.js and RPG educator who shares his knowledge at user groups and events around the world. His decades of experience and passion in the field of Web and Mobile development have led his company to create many popular modernization tools, win multiple awards for innovation, earn a patent for modernization technology, and gain over a thousand loyal customers in more than 50 countries.

  • Simple Strategies for Malware Defense on IBM i - Robin Tatam & Sandi Moore

    Contains 1 Component(s)

    Join this webinar to learn about advanced malware threats and simple strategies for protecting your systems.

    With today's advanced malware and ransomware threats, malicious programs can cause a massive business disruption. Not all organizations can recover from attack.  To avoid corrupted data and downtime, you need to consider a comprehensive approach to malware defense for Power Systems servers running IBM i, AIX, and Linux.   

    Join this webinar to learn about advanced malware threats and simple strategies for protecting your systems. IBM i security experts Robin Tatam and Sandi Moore will show you:   

    • The current state of malware and the latest trends around malware protection
    • What we’re hearing from the IBM i community about the impact of malware attacks
    • The controls an in-depth malware defense should include

    This session will arm you with the information you need to secure your systems against today’s most pressing threats.

    Sandi Moore

    Security Consultant, HelpSystems

    Sandi has been working with HelpSystems customers for over 15 years supporting systems monitoring and security software. With experience on IBM i, AIX, and Linux, she has been involved in product demonstrations, implementation, support, training, research, and product testing.

    In her time at HelpSystems, Sandi has helped customers understand how to effectively address the threats they face. Her goal is to help people achieve the best solution to their IT problems, no matter how many servers are in their environment or where in the world they’re located.

    Organizations throughout the public and private sectors have relied on Sandi’s expertise, whether they’re seeking to proactively protect their systems or improve security controls after a malware attack. Sandi has shared her knowledge at multiple user group conferences, including COMMON.

    Robin Tatam

    Global Director of Security Technologies - HelpSystems

    Robin Tatam is HelpSystems’ Global Director of Security Technologies and a COMMON subject matter expert (SME). As an award-winning speaker on security topics, Robin has been interviewed and quoted by industry magazines and has published numerous trade articles. Robin’s extensive Power Server experience has resulted in more than 20 IBM certifications and the highly sought after designation of ISACA-certified Information Security Manager (CISM) and PCI-Professional (PCI-P). He is also co-author of IBM’s Redbook publication on IBM i Data Encryption.

  • 20 Things other Platforms Just Dream About - Torbjorn Appehl

    Contains 1 Component(s)

    In this presentation I will go through 20 different unique things to IBM i and Power systems that other platforms just dreams about. Object security with connection to the hardware for example..

    In this presentation I will go through 20 different unique things to IBM i and Power systems that other platforms just dreams about. Object security with connection to the hardware for example..

    Torbjorn Appehl

    CEO

    Built on Power

    I've been working with IBM i and It's predecessors since 1997. Today I have my own company focusing on helping IBM and their Independent Software Vendors (ISV) to fully take advantage of all technologies available on the platform.I was member of the board for Common Sweden for 10+ years, member of the Executive Committee for Common Europe for several years and I am an IBM Champion for Power systems since 2016

  • Application Monitoring from Every Angle - Chuck Losinski & Terri Preston

    Contains 1 Component(s)

    When your application is in distress, do you know which way to look?

    Today’s organizations mix legacy IBM i applications with Java- or web-based solutions and use Db2 on IBM i as the back-end database. These modern applications are sending signals to your system from all sides. Many pop up in your message queue while others appear as log files in the IFS. Some are more subtle, like a slowdown in remote communications, a spike in disk growth, or a batch job gone bad.  

    When your application is in distress, do you know which way to look?  

    Watch this replay to see how Robot has application monitoring covered from every angle. With dashboard views, automated recovery actions, escalation options, and mobile alerts, you can easily keep an eye out for those telling application messages, system resources, and performance values. Our experts will demonstrate how Robot allows you to:  

    • Establish baseline activity

    • Escalate ODBC/JDBC activity abnormalities

    • Allow focused monitoring of critical objects, jobs, and storage

    • Create customized, SQL-based monitors  

    When your core application could be going down, don’t be the last to know.

    Chuck Losinski

    Director of Technical Solutions, HelpSystems

    Chuck Losinski, Director of Technical Solutions for the Robot product line, has been with HelpSystems for nearly 20 years. He has over 30 years of experience in IT, including 25+ years on the IBM i platform.

    Chuck's background covers a wide variety of technical responsibilities, involving system implementation, programming, operations, and support. He is certified as an IBM System Administrator and as a HelpSystems Robot Certified Specialist.

    Chuck has helped numerous customers automate business applications from Infor, Oracle JD Edwards, HBOC, RxClaim, Infinium, Fiserv, Jack Henry, and more. Currently he is the co-president of the local IBM i user group, QUSER.