Catalog Advanced Search

Search by Category
Search by Format
Search by Type
Sort By
Search by Favorites
Search by Category
Search by Format
Search by Type
Search by Speakers
Credits Offered
Search in Packages
Search by Date Range
Products are filtered by different dates, depending on the combination of live and on-demand components that they contain, and on whether any live components are over or not.
Start
End
Search by Favorites
Search by Keyword
Sort By
  • Contains 1 Component(s)

    PowerVS has simplified and automated the IBM i landing zone experience, but the time to migrate depends on the amount of data, data change, users and transfer rates. In this guided tour, Douglas Gibbs and Scott Forstie go through an outline of how to migrate while active.

    PowerVS has simplified and automated the IBM i landing zone experience, but the time to migrate depends on the amount of data, data change, users and transfer rates. In this guided tour, Douglas Gibbs and Scott Forstie go through an outline of how to migrate while active.

    Douglas Gibbs

    IBM i Product Manager, Program Director

    IBM

    Douglas Gibbs is the offering manager for IBM Power Systems I/O and works closely with the overall Offering Management, Sales and Development teams regarding all manners of I/O. Douglas has worked in the IT Industry for more than 25 years and has been in a variety of positions at IBM, primarily working with IBM servers and software.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Contains 1 Component(s)

    With the recent change to how the IBM i operating system is licensed, the chance to subscription license. Its is now more important that ever to make sure you know when your license will expire. With subscription license, your system may stop working someday in the future! Guessing it might be useful to know what. This iSee will explore a few ways that is possible. Some magical SQL as well as updates to the Navigator interface to help make it very clear.

    With the recent change to how the IBM i operating system is licensed, the chance to subscription license. Its is now more important that ever to make sure you know when your license will expire. With subscription license, your system may stop working someday in the future!  Guessing it might be useful to know what.  This iSee will explore a few ways that is possible. Some magical SQL as well as updates to the Navigator interface to help make it very clear. 

    Tim Rowe

    Business Architect Application Development & Systems Management for IBM i

    Tim Rowe is the Business Architect for IBM i responsible for System Management and Application Development. He has a passion for modernization on IBM i and how we can continue to move IBM i into the world of 'Normal' . In his spare time he is a certified Soccer referee and enjoys refereeing games with his youngest son.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Contains 1 Component(s)

    User Profiles, we all have them, sometimes we have too many! Do you ever have a need to do a mass update of user profiles? The use case for this video was someone that needed to do some sensitive testing and did not want ANYONE to sign in during the test. Easy way to make that happen ? Disable ALL user profiles on the system for a period, and then revert all those changed back. The SQL provided will show you how to build your list of profiles, run the action and then make sure you clean up after. Sure we are showing Disable and Enable, but think of other user cases, you want to force all profiles to reset their password based on new security password rules, this SQL can easily be adopted for that as well.

    User Profiles, we all have them, sometimes we have too many!  Do you ever have a need to do a mass update of user profiles? The use case for this video was someone that needed to do some sensitive testing and did not want ANYONE to sign in during the test. Easy way to make that happen ? Disable ALL user profiles on the system for a period, and then revert all those changed back. The SQL provided will show you how to build your list of profiles, run the action and then make sure you clean up after.  Sure we are showing Disable and Enable, but think of other user cases, you want to force all profiles to reset their password based on new security password rules, this SQL can easily be adopted for that as well. 

    Tim Rowe

    Business Architect Application Development & Systems Management for IBM i

    Tim Rowe is the Business Architect for IBM i responsible for System Management and Application Development. He has a passion for modernization on IBM i and how we can continue to move IBM i into the world of 'Normal' . In his spare time he is a certified Soccer referee and enjoys refereeing games with his youngest son.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Contains 79 Product(s)

    Short demonstrations of tools to help you in your everyday work. Presented by Scott Forstie and Tim Rowe, IBM

    image



    Short demonstrations of tools, techniques and examples (including working SQL examples!!) to help you solve real problems that are part of your everyday work.  Presented by Scott Forstie and Tim Rowe, IBM

  • Contains 1 Component(s)

    In this IBM Guided Tour, Scott Forstie will go through the ins and outs of Authority Collection and how to use SQL to make it more effective.

    In this IBM Guided Tour, Scott Forstie will go through the ins and outs of Authority Collection and how to use SQL to make it more effective.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Contains 1 Component(s)

    Modernizing applications is one of the biggest concerns for businesses, with most businesses running in-house code. Tonny Bastiaans, Andrew Ireland, and Alan Ashley work together to show how Merlin can help aide the application modernization process in this guided tour.

    Modernizing applications is one of the biggest concerns for businesses, with most businesses running in-house code. Tonny Bastiaans, Andrew Ireland, and Alan Ashley work together to show how Merlin can help aide the application modernization process in this guided tour.

    Tonny Bastiaans

    WW Offering Manager Power Virtual Server

    IBM

    Tonny has over 18 years of experience working at IBM in a variety of roles. He has an open mind building the bridge between technic and business. Tonny is always interested in a good conversation and human interaction (accompanied with a good cup of coffee)

    Andrew Ireland

    Global Alliances Manager and DevSecOps Business Manager

    ARCAD

    Experienced Business Unit Manager with P&L responsibility who has demonstrated a history of working in the information technology and services industry.

    Alan Ashley

    Presales Consultant for DevOps for IBMi

    Arcad Software

    When it comes to describing someone, even yourself, it can be difficult. This time it's easy. I grew up on the AS400, through iSeries, and into the IBM i world. Started on a model B50 (I know it was a B model) where the disk drive needed two persons to replace and now in the DevSecOps world showing that the IBM i development fits right in with Agile and DevSecOps. Showing that one can move on from green screen and into a modern mode of development. After spending over two decades with IBM, I now help Arcad Software in showing that DevSecOps on IBM i isn't all that scary.

  • Contains 1 Component(s)

    In this guided tour, Steve Finnes and Linda Hirsch will walk you through the latest and greatest in IBM Power HA/DR solutions.

    In this guided tour, Steve Finnes and Linda Hirsch will walk you through the latest and greatest in IBM Power HA/DR solutions.

    Steve Finnes

    IBM Product Manager

    Steve has spent several years in IBM with positions spanning basic research to product development, product offering and marketing. He is the product offering manager for IBM Power Systems with responsibility for PowerHA for AIX, PowerHA for IBM i and the CBU.

    Linda Hirsch

    IBM i Offering Program Manager

    IBM

    Linda is on the worldwide IBM i Product Management team which creates and delivers offerings for the IBM i portfolio.

  • Contains 1 Component(s)

    We have should a few examples about looking at the contents of Journals, but in this video we take a step deeper in to the puzzle, where are the Journal receivers. We talk about the purpose of these receivers as some slick SQL to help make sure that you know where they all live on your system.

    We have should a few examples about looking at the contents of Journals, but in this video we take a step deeper in to the puzzle, where are the Journal receivers. We talk about the purpose of these receivers as some slick SQL to help make sure that you know where they all live on your system. 

    Tim Rowe

    Business Architect Application Development & Systems Management for IBM i

    Tim Rowe is the Business Architect for IBM i responsible for System Management and Application Development. He has a passion for modernization on IBM i and how we can continue to move IBM i into the world of 'Normal' . In his spare time he is a certified Soccer referee and enjoys refereeing games with his youngest son.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Contains 1 Component(s)

    Multi-factor authentication (MFA) systems, while a valuable security measure, are not without vulnerabilities. Phishing attacks, SIM swapping, man-in-the-middle attacks, MFA fatigue, and more can still compromise logins. Join SEA on October 30th to discover how to future-proof your IBM i MFA systems. We’ll delve into strategies and tactics to enhance IBM i login protection and defend against emerging threats. Topics include: • Patching IBM i MFA vulnerabilities: Utilizing encryption to bolster MFA security. • Immunizing logins against phishing: Exploring phishing-resistant MFA and password-less MFA options. • Integrating MFA into other IBM i functions: Enhancing self-service password resets and emergency authorization solutions. • Strengthening authentication security: Leveraging hard-to-break MFA verification factors.

    Multi-factor authentication (MFA) systems, while a valuable security measure, are not without vulnerabilities. Phishing attacks, SIM swapping, man-in-the-middle attacks, MFA fatigue, and more can still compromise logins.

    Join SEA on October 30th to discover how to future-proof your IBM i MFA systems. We’ll delve into strategies and tactics to enhance IBM i login protection and defend against emerging threats. Topics include:

    • Patching IBM i MFA vulnerabilities: Utilizing encryption to bolster MFA security.
    • Immunizing logins against phishing: Exploring phishing-resistant MFA and password-less MFA options.
    • Integrating MFA into other IBM i functions: Enhancing self-service password resets and emergency authorization solutions.
    • Strengthening authentication security: Leveraging hard-to-break MFA verification factors.

    Lloyd Ramdarie

    IBM i Technical Support Team Member, Software Engineering of America

    Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His background includes working in IBM i space for quite a number years with a large extent of his experience coming from heavy involvement with securing the IBM i. He is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end to end security solutions in the IBM i environment.

    Ken McCalister

    Software Engineering of America

    Ken McCalister has spent 35 years working with IBM i technology . Ken has vast experience working in all aspects of digital technology and management, including Administration, Engineering & Security. Ken is part of the IBM i Technical Team at Seasoft, providing support to its many diverse clients.

  • Contains 1 Component(s)

    Join Scott Forstie in exploring the possibilities of the query supervisor feature in Db2 for i.

    Join Scott Forstie in exploring the possibilities of the query supervisor feature in Db2 for i.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.