Catalog Advanced Search

Search by Category
Search by Format
Sort By
Search by Type
Search by Category
Search in Packages
Search by Format
Search by Type
Search by Date Range
Products are filtered by different dates, depending on the combination of live and on-demand components that they contain, and on whether any live components are over or not.
Start
End
Search by Keyword
Sort By
  • Contains 1 Component(s)

    Join us to get your burning IBM i-related questions answered and meet new people!

    Join us to get your burning IBM i-related questions answered and meet new people!

    Dawn May

    Owner, Dawn May Consulting, LLC

    "i Can" blog published by IBM Systems Magazine and a frequent speaker at local user group meetings and IBM i conferences around the world.

    You may contact Dawn by email at DawnMayiCan@outlook.com, find her on twitter at @DawnMayiCan, or connect on LinkedIn at https://www.linkedin.com/in/dawnmay/.">Dawn May is a leading authority on IBM i performance management, work management, systems management, and general system diagnostics. She has in-depth knowledge of the IBM i operating system developed through her distinguished career with IBM.

    A former IBMer, Dawn is now an independent consultant, assisting companies with system performance reviews and recommendations. She also teaches clients on the latest IBM i tools to enable them to get the most out of their IBM i systems.

    Dawn is the author of the "i Can" blog published by IBM Systems Magazine and a frequent speaker at local user group meetings and IBM i conferences around the world.

    You may contact Dawn by email at DawnMayiCan@outlook.com, find her on twitter at @DawnMayiCan, or connect on LinkedIn at https://www.linkedin.com/in/dawnmay/.

  • Contains 1 Component(s)

    Join us to get your burning IBM i-related questions answered and meet new people!

    Join us to get your burning IBM i-related questions answered and meet new people!

    Pete Massiello

    President, iTech Solutions

    Pete Massiello has been working with the AS/400, iSeries, IBM i since 1989, focusing on systems management and technical support. He has held numerous technical positions through out his career. He is the President of iTech Solutions Group, an IBM Premier Business Partner delivering solutions and services to IBM i shops throughout the world. He is a member of IBM’s certification test writing team, an IBM Certified Systems Expert with certifications in IBM i Design, System Administration, LPAR, Virtualization, Implementation, and HMC management. Pete has a BS in Computer Science from Hofstra University, and an MBA from the University of New Haven. He was President of COMMON from 2010 to 2012, and again in 2014. He is a COMMON Hall of Fame speaker, and a frequent speaker at user groups all over the world. In 2011 IBM established the Champions award for Power Systems, Pete was one of the first recipients. In 2016, they revived the program and he was again made an IBM Power Systems Champion. Lightning struck for the third time in 2017, and that is the year he was also made the first Power Systems Lifetime Champion, an honor he continues to hold.

  • Contains 17 Product(s) 2 new product(s) added recently

    Sessions presented by industry experts as part of N2i's "Getting Started" series.

    image

  • Contains 1 Component(s)

    In this session, Scott Forstie will be reviewing the tools available for Db2 for i.

    In this session, Scott Forstie will be reviewing the tools available for Db2 for i.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Contains 12 Product(s) 1 new product(s) added recently

    When first beginning work on IBM i, people always ask the same types of questions. How does it differ from other OS? What are the primary interfaces? What is the organizational structure like? In this bootcamp directed at new graduates and early-career professionals, we answers all of these questions and more.

    When first beginning work on IBM i, people always ask the same types of questions. How does it differ from other OS? What are the primary interfaces? What is the organizational structure like? In this bootcamp directed at new graduates and early-career professionals, we answers all of these questions and more.

    This bootcamp will be released over 13 weeks, from January 25th, 2024 through April 19th, 2024.

    All sessions will appear on the CONTENT tab of this page at 2:00PM CT on Fridays. Register now and return here on the premier dates to access the content.

    The primary subjects of the bootcamp are as follows.

    • Overview of IBM i
    • Acronyms and Terminology
    • Programming Languages
    • Career Pathways
    • Soft Skills
    • Interfaces and Connections
    • Security
    • Database

    This bootcamp is being provided at no charge to COMMON members through a generous sponsorship from Fortra.

    image

  • Contains 1 Component(s)

    In this session, Scott Forstie will be explaining the basics of Db2 for i.

    In this session, Scott Forstie will be explaining the basics of Db2 for i.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Contains 1 Component(s)

    In the 9th installment of the iBegin series, Margaret Fenlon will be going through the security components and object authorization levels of IBM i.

    In the 9th installment of the iBegin series, Margaret Fenlon will be going through the security components and object authorization levels of IBM i.

    Margaret Fenlon

    Software Engineer, IBM

    Margaret started working for IBM in 1983 on the S/36. From 1986-1994 she worked in various areas of what is now the IBM i including Authorization Management support of POSIX and the integrated file system. She worked on the port of SAP R/3 from 1994-1997. In 1998 Margaret joined the integrated file system team. As a member of the integrated file system team she has worked on the file server, QFileSvr.400 file system and the utilities to convert to the new directory format. Margaret is currently the team leader for the integrated file system and servers team.

  • Contains 1 Component(s)

    We’ve long thought of IBM i as being ‘secure-able’ but where does the responsibility lie for making that happen? Carol Woodbury asserts that it’s a dual responsibility between IBM and organizations using IBM i.

    We’ve long thought of IBM i as being ‘secure-able’ but where does the responsibility lie for making that happen? Carol Woodbury asserts that it’s a dual responsibility between IBM and organizations using IBM i.

    Carol Woodbury

    President, CTO, Co-Founder

    DXR Security

    With over 25 years experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate about sharing her knowledge of IBM i Security and helping clients make improvements to their IBM i Security one step at a time. Carol is co-founder and CTO of DXR Security, a firm specializing in performing IBM i penetration tests. Carol has been an IBM Power Champion since 2018.

    Carol is an educator, architect, designer, implementer and an award-winning speaker, specializing in IBM i Security.

    Carol is a Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC) and a member of the ISACA organization.

    Carol has written many books. IBM i Security and Administration, 3rd edition is available at MCPressOnline or amazon.com. Her latest book, Mastering IBM i Security is a ‘how to’ guide for implementing and managing security using SQL Services, New Nav and ACS. It includes all the latest in IBM i 7.5 and can be ordered from MCPressOnline https://www.mc-store.com/products/mastering-ibm-i-security or amazon.

  • Contains 1 Component(s)

    In the 7th installment of the iBegin series, Marina Schwenk will be going through useful soft skills for new professionals.

    In the 7th installment of the iBegin series, Marina Schwenk will be going through useful soft skills for new professionals.

    Marina Schwenk

    Software Developer, Everbrite

    Marina started her career in January 2015 at Everbrite LLC in Greenfield WI after graduating from Gateway Technical College in May of 2014 with an Associate’s degree in IT Software Development. Marina works as a developer in both RPG and Java and she also is one of two junior IBM i admins at Everbrite. Marina earned her bachelor’s degree in Computer Information Systems Software Development from Bellevue University in June of 2017. She is currently working on her Master’s degree program in Computer Information Systems Software development, with the goal of teaching part time, and empowering the younger generation. Marina is also a member of the Wisconsin Midrange Computer Professional Association, Women in IT committee and has recently started speaking on a couple of topics, ranging from RPG to SQL. She has completed one open source project and is currently working on releasing iUnit an open source RPG unit testing framework written in RPGLE.

  • Contains 1 Component(s)

    Join SEA on March 27 to learn five valuable ways to leverage IBM i system monitoring for process improvements, including: • Activating 24/7 IBM i monitoring & automated problem resolution across complex environments, including MSP installations • Enabling real-time IBM i resource status monitoring and notification before problems occur • Integrating IBM i events with Network Operations Centers (NOCs) for processing and tracking alongside enterprise network incidents • Providing IBM i event forensics & auditing, analysis, reporting, and historical trends • Yielding modernization benefits in cost reduction, efficiency, service delivery and production uptime

    Are you leveraging IBM i message & resource monitoring to unlock significant benefits in cost reduction, efficiency and application delivery? 

    Join SEA on March 27 to learn five valuable ways to leverage IBM i system monitoring for process improvements, including:

    • Activating 24/7 IBM i monitoring & automated problem resolution across complex environments, including MSP installations 
    • Enabling real-time IBM i resource status monitoring and notification before problems occur
    • Integrating IBM i events with Network Operations Centers (NOCs) for processing and tracking alongside enterprise network incidents
    • Providing IBM i event forensics & auditing, analysis, reporting, and historical trends
    • Yielding modernization benefits in cost reduction, efficiency, service delivery and production uptime

    IBM i monitoring protects application and service delivery, customer satisfaction and productivity. Learn how to maximize i monitoring system benefits with SEA on March 27 

    Lloyd Ramdarie

    IBM i Technical Support Team Member, Software Engineering of America

    Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His background includes working in IBM i space for quite a number years with a large extent of his experience coming from heavy involvement with securing the IBM i. He is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end to end security solutions in the IBM i environment.