Catalog Advanced Search

Search by Categories
Search in Packages
Search by Format
Search by Date Range
Products are filtered by different dates, depending on the combination of live and on-demand components that they contain, and on whether any live components are over or not.
Start
End
Search by Keyword
Sort By
  • Clean up your IBM i Disk - Larry Bolhuis

    Contains 1 Component(s)

    How much disk storage do you have on your system? The most common answer is 'not enough!' Attend this session and find out where all that space went, what you can clean up, and what should be left alone.

    How much disk storage do you have on your system? The most common answer is 'not enough!' Attend this session and find out where all that space went, what you can clean up, and what should be left alone. Learn about reporting, automating, and managing your disk space in IBM i. Develop a deeper understanding of the tools IBM has built into IBM i and how to leverage them to help keep your system clean. Especially learn how to leverage SQL to find consumers of disk QUICKLY! Walk away with a solid understanding of how to clean up your disk space both QSYS and the IFS.

    Learning Objectives:

    • How to determine where all your disk space has gone.
    • How to clean up unused space in physical files.
    • How to search for object filling up the IFS
    • How to use *nix and PASE tools to work in the iFS.
    • How to use SQL to find disk users and usage.

    Larry Bolhuis

    Chief i-entist - Frankeni Technology Consulting, LLC

    Larry has grown up with computers since his father became a CE in 1967. He obtained a bachelor's degree in Computer Science from Calvin College in 1982 and soon after began working on IBM midrange equipment with the S/34 and S/36. Larry began working on the As/400 at its introduction In 1988.After spending many years as a developer Larry began working on communications, networking, and systems management tasks. Years of working with SNA, SDLC, SNADS, APPC, APPN followed by Token Ring, Ethernet, and TCP/IP taught strong communications troubleshooting skills. In addition to networking on the IBM side Larry learned the infrastructure components of the network including switches routers and firewalls, working chiefly with Cisco equipment.In 15 years as an IBM Business partner Larry worked with IBMs systems from design through implementation and migration. He has worked on the smallest and largest and everything in between. He has been involved in many Beta and other early release programs with IBM. Larry has held more than 30 IBM certifications on the AS/400, iSeries, System i and Power Systems, including IBM Certified Advanced Technical Expert and is a contributing author to many IBM Certification tests.Larry is a frequent and award winning speaker at users groups around North America covering Systems design and management, networking and connectivity, work management, PTF, and Hardware Management Console topics. He has been a long time volunteer and speaker with COMMON and has been awarded Gold, Silver and Bronze medals and also its highest Honor the Distinguished Service Award.">Larry has grown up with computers since his father became a CE in 1967. He obtained a bachelor's degree in Computer Science from Calvin College in 1982 and soon after began working on IBM midrange equipment with the S/34 and S/36. Larry began working on the As/400 at its introduction In 1988.After spending many years as a developer Larry began working on communications, networking, and systems management tasks. Years of working with SNA, SDLC, SNADS, APPC, APPN followed by Token Ring, Ethernet, and TCP/IP taught strong communications troubleshooting skills. In addition to networking on the IBM side Larry learned the infrastructure components of the network including switches routers and firewalls, working chiefly with Cisco equipment.In 15 years as an IBM Business partner Larry worked with IBMs systems from design through implementation and migration. He has worked on the smallest and largest and everything in between. He has been involved in many Beta and other early release programs with IBM. Larry has held more than 30 IBM certifications on the AS/400, iSeries, System i and Power Systems, including IBM Certified Advanced Technical Expert and is a contributing author to many IBM Certification tests.Larry is a frequent and award winning speaker at users groups around North America covering Systems design and management, networking and connectivity, work management, PTF, and Hardware Management Console topics. He has been a long time volunteer and speaker with COMMON and has been awarded Gold, Silver and Bronze medals and also its highest Honor the Distinguished Service Award.">COMMON and has been awarded Gold, Silver and Bronze medals and also its highest Honor the Distinguished Service Award.">Larry has grown up with computers since his father became a CE in 1967. He obtained a bachelor's degree in Computer Science from Calvin College in 1982 and soon after began working on IBM midrange equipment with the S/34 and S/36. Larry began working on the As/400 at its introduction In 1988.After spending many years as a developer Larry began working on communications, networking, and systems management tasks. Years of working with SNA, SDLC, SNADS, APPC, APPN followed by Token Ring, Ethernet, and TCP/IP taught strong communications troubleshooting skills.

  • What's the Fuss? Using Procedures and Service Programs - Jim Buck

    Contains 1 Component(s)

    This session discusses the advantages of using modern techniques in your RPG programs. After a short introduction to modularity in programming; we go step-by-step through the process of replacing called programs with sub-procedure modules and then converting these modules to procedures in a called service program.

    This session discusses the advantages of using modern techniques in your RPG programs. After a short introduction to modularity in programming; we go step-by-step through the process of replacing called programs with sub-procedure modules and then converting these modules to procedures in a called service program.

    Learning Objectives:

    1 Internalize the benefits of using modular coding practices.
    3 Understand the steps in coding modular subprocedures and service programs.
    2 Develop reusable subprocedures and service programs.

    Jim Buck

    imPower Technologies

    Jim Buck’s career in IT has spanned more than 35 years, primarily in college education, manufacturing, and healthcare industries. Past president (13 years) of the Wisconsin Midrange Computer Professional Association (www.wmcpa.org) and has served on several teams developing IBM and COMMON certification tests. Jim has co-authored several IBM i books with Bryan Meyers that are used by many companies and in colleges worldwide, "Programming in ILE RPG" 5th Edition being the latest in 2015.Other accomplishments include; recipient of the 2007 IBM System i Innovation – Education Excellence Award, 2014 COMMON Presidents Award and named 2013/2016/2017 IBM Champion - Power Systems.Jim is the president and founder of imPower Technologies where he provides professional IBM I training and consulting services (www.imPowerTechnologies.com) . He is active in the IBM i community working to help companies train their employees in the latest IBM technologies and helps companies develop the next generation of IBM i professionals.

  • IBM i Security Best Practices - Jeff Uehling

    Contains 1 Component(s)

    Security best practice and regulatory compliance are a constantly moving target. In this webinar, Jeff Uehling, Syncsort’s Product Management Director for security solutions and former architect for the security functions in the IBM i OS, shares what he has learned about best practices in his over 30 years of experience with IBM i security

    Security best practice and regulatory compliance are a constantly moving target. In this webinar, Jeff Uehling, Syncsort’s Product Management Director for security solutions and former architect for the security functions in the IBM i OS, shares what he has learned about best practices in his over 30 years of experience with IBM i security. You’ll learn: • Why you need to run at security level 50 – and the exposures of running at lower levels • How to detect and prevent programs that could compromise system security • Necessary system value settings • How to apply cryptography to protect your data • Network security requirements • Security considerations for mobile deployments • How Syncsort’s security solutions help you achieve best practice Whether you are a systems security officer or an IBM i system administrator, you don’t want to miss this webinar.

    Jeff Uehling

    Syncsort Security Expert

    Jeff Uehling has over 30 years of experience working in security technology for the IBM i, and its predecessor systems, and is an expert in the Syncsort’s security offerings. Jeff’s IBM experience includes working in the IBM i OS development group, specifically as lead architect of the security development team, where his responsibilities included architecture, design and development of IBM i security. He has also served as a council member of the IBM security technical community.

  • Automating DB2 for i Data Distribution/Replication with IBM's DataMigrator ETL - Doug Mack

    Contains 1 Component(s)

    IBM’s DataMigrator is an IBM i integrated, SQL based, ETL tool that simplifies not only data movement, but complex data transformations as well.​​

    Moving or consolidating data in a multiple IBM i server environment, or an environment involving different databases and server platforms, can be complex and expensive. Even consolidating data from multiple libraries on a single server can be challenging. Building one-off customized data extracts can consume an I/T shop’s programming staff. In this session you’ll learn about how to leverage an Extract, Transformation and Load (ETL) tool to automate moving and transforming data involving Db2 for i databases. DataMigrator is a little known tool to do: near real time data replication, consolidate data from multiple (heterogeneous) databases into an enterprise data repository, or even migrate data from non-Db2 databases into Db2 for i. IBM’s DataMigrator is an IBM i integrated, SQL based, ETL tool that simplifies not only data movement, but complex data transformations as well.

    Doug Mack

    DB2 for i Analytics Consultant at IBM

    Doug Mack is a DB2 for i Analytics Consultant in IBM’s Power Systems Lab Services organization, employed by IBM in the United States. Doug currently leads the Analytics team for the DB2 for i Lab Services team delivering Query/400 modernization, DB2 Web Query, Data Warehouse design, skills transfer, and implementation guidance services worldwide.

    Doug is a regular speaker at customer events including COMMON, IBM Technical Conferences and Executive Briefings, and has written many articles and white papers on the attributes of DB2 for i for analytics.

    You can follow Doug on Twitter @mckdrmoly or via his blog at db2webqueryi.blogspot.com

  • What You Need to Know to Successfully Upgrade to IBM i 7.4 - Pete Massiello

    Contains 1 Component(s)

    When doing an upgrade to IBM i, there is more work involved in the planning of the upgrade than in the actual upgrade itself.

    When doing an upgrade to IBM i, there is more work involved in the planning of the upgrade than in the actual upgrade itself. When you have done the planning, the actual upgrade is simple. We will cover planning tips, pre-requisites, and then post-installation requirements. Your upgrade isn’t complete until this last step is done.

    Pete Massiello

    President, iTech Solutions

    Pete Massiello has been working with the AS/400, iSeries, IBM i since 1989, focusing on systems management and technical support. He has held numerous technical positions through out his career. He is the President of iTech Solutions Group, an IBM Premier Business Partner delivering solutions and services to IBM i shops throughout the world. He is a member of IBM’s certification test writing team, an IBM Certified Systems Expert with certifications in IBM i Design, System Administration, LPAR, Virtualization, Implementation, and HMC management. Pete has a BS in Computer Science from Hofstra University, and an MBA from the University of New Haven. He was President of COMMON from 2010 to 2012, and again in 2014. He is a COMMON Hall of Fame speaker, and a frequent speaker at user groups all over the world. In 2011 IBM established the Champions award for Power Systems, Pete was one of the first recipients. In 2016, they revived the program and he was again made an IBM Power Systems Champion. Lightning struck for the third time in 2017, and that is the year he was also made the first Power Systems Lifetime Champion, an honor he continues to hold.

  • SQL for the System Administrator - Scott Forstie

    Contains 1 Component(s)

    Come to this session to learn about the SQL capabilities that exist for systems management purposes.

    SQL on IBM i can be used to accomplish many tasks that are unrelated to traditional uses of SQL. Come to this session to learn about the SQL capabilities that exist for systems management purposes. This session will include working SQL examples and compelling reasons for adding SQL to your set of skills. Relevant materials.. https://ibm.biz/Db2foriService... http://iprodeveloper.com/sql/s... http://www.ibmsystemsmag.com/i...

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Blockchain: Encrypt, Store, and Share Data in Distributed Environments - Patrick Townsend

    Contains 1 Component(s)

    This session will cover blockchain technology at the executive level and demonstrate how enterprises can leverage blockchains to create innovative and secure applications.

    Blockchain is an emerging technology with the potential to disrupt almost every business endeavor. It can’t solve every problem, but it has the ability to transform your business. While blockchain is open and transparent, not everything should be available for everyone to see.  Cryptography, key management and secure data storage are critically important to keeping information safe and trustworthy in blockchain, just as it has been in the history of information security. This session will cover blockchain technology at the executive level and demonstrate how enterprises can leverage blockchains to create innovative and secure applications.

    Patrick Townsend

    Founder and CEO of Townsend Security

    Patrick Townsend is Founder and CEO of Townsend Security, a leading provider of data encryption, key management and web services solutions for the IBM i, and many other Enterprise operating platforms. Founded in 1989, Mr. Townsend's company specializes in helping customers bring their data security into compliance with PCI DSS, HIPAA/HITECH, GLBA/FFEC, Sarbanes-Oxley, and other State and Federal data security regulations. Patrick has been active in the IBM i community and speaks frequently on the topic of the IBM i and data security.

  • How to Avoid IFS Security Mistakes - Sandi Moore

    Contains 1 Component(s)

    In this webinar, IBM i security expert Sandi Moore will teach you how to correct IFS vulnerabilities that are often overlooked, including one that allows the IFS to spread malware throughout your environment.

    One of the most neglected areas of IBM i security is the Integrated File System (IFS). This powerful feature of the operating system integrates IBM i with other servers and encompasses all other file structures, including \QSYS.LIB. If you’re using IBM i, you’re using the IFS.

    What many people don’t realize is that the IFS is not pre-configured in a secure state—and there’s no way to disable the IFS.

    In this webinar, IBM i security expert Sandi Moore will teach you how to correct IFS vulnerabilities that are often overlooked, including one that allows the IFS to spread malware throughout your environment.

     

    You’ll learn:

    • How the IFS is configured
    • Why malware is so devastating to the IFS
    • How to avoid the top 3 IFS security mistakes

    If the IBM i operating system is important to your organization, you don’t want to miss this session!

    Sandi Moore

    Security Consultant, HelpSystems

    Sandi has been working with HelpSystems customers for over 15 years supporting systems monitoring and security software. With experience on IBM i, AIX, and Linux, she has been involved in product demonstrations, implementation, support, training, research, and product testing.

    In her time at HelpSystems, Sandi has helped customers understand how to effectively address the threats they face. Her goal is to help people achieve the best solution to their IT problems, no matter how many servers are in their environment or where in the world they’re located.

    Organizations throughout the public and private sectors have relied on Sandi’s expertise, whether they’re seeking to proactively protect their systems or improve security controls after a malware attack. Sandi has shared her knowledge at multiple user group conferences, including COMMON.

  • DB2 Mirror Revealed - Kris Whitney

    Contains 1 Component(s)

    In this session, Kris will dive into the latest new technology for IBM i – Db2 Mirror. He will discuss the value of Continuous Availability and how this is accomplished on IBM i.

    In this session, Kris will dive into the latest new technology for IBM i – Db2 Mirror. He will discuss the value of Continuous Availability and how this is accomplished on IBM i.

    Kris Whitney

    Senior Technical Staff Member, IBM

    Kris Whitney is a Senior Technical Staff Member at IBM Rochester. He has worked at IBM for the last 19+ years and currently is leading the development for Db2 Mirror for i and IBM i Public Cloud enablement.

  • Exploring Open Source on IBM i - Erwin Earley

    Contains 1 Component(s)

    Open Source is exploding on the IBM i platform. This workshop provides us a unique opportunity get up close and personal with open source on the world's best platform!

    Open Source is exploding on the IBM i platform. This workshop provides us a unique opportunity get up close and personal with open source on the world's best platform! We will start out by talking about what open source means to the platform and take a look at setting up the initial open source ecosystem. From there we will take a look at the containerization capability provided by the chroot utility and how it can be used to build file-system containers so that different developers can have different software/package collections. Once our containers are setup we will then explore the various open source programming languages including python, node.js, and php and take a look at how to integrate those languages with Db2 and ILE. Finally we will take a look at how open source productivity solutions such as WordPress, Magento, and Drupal can be implemented on the platform. Time has never been better to take a dive into the Open Source end of the pool.

    Erwin Earley

    Sr Solutions Consultant, Zend by Perforce

    With over 20 years working in the IBM i community previously at IBM and now with Zend by Perforce I have worked with a number of technologies on the POWER platform including cloud (PowerVC), Dev/Ops solutions (Docker, Chef), Open Source technologies (Linux, MySQL/MariaDB, PHP). I have expertise in a variety of technologies including virtualization, storage, networking, and operating systems including AIX, IBM i, and Linux. I am a frequent speaker at various user groups and technical conferences and have authored numerous articles on Linux, PHP, virtualization, and systems management.