Catalog Advanced Search

Search by Categories
Search in Packages
Search by Format
Search by Date Range
Products are filtered by different dates, depending on the combination of live and on-demand components that they contain, and on whether any live components are over or not.
Start
End
Search by Keyword
Sort By
  • REST APIs for Direct DB2 Access - Tim Rowe

    Contains 1 Component(s)

    IBM i includes a REST services infrastructure and engine that greatly simplifies the ability to take an existing RPG or COBOL program (or SRVPGM) and create a running REST interface with a few simple clicks.

    Rest APIs are key to the world these days. IBM i includes a REST services infrastructure and engine that greatly simplifies the ability to take an existing RPG or COBOL program (or SRVPGM) and create a running REST interface with a few simple clicks. Applications have been connecting to ILE apps for a while now. The latest support now also lets you directly access Db2 for i with a REST API. We will dive into this New support to help you understand how to build Rest APIs with only SQL. 

    Tim Rowe

    Business Architect Application Development & Systems Management for IBM i

    Tim Rowe is the Business Architect for IBM i responsible for System Management and Application Development. He has a passion for modernization on IBM i and how we can continue to move IBM i into the world of 'Normal' . In his spare time he is a certified Soccer referee and enjoys refereeing games with his youngest son.

  • AI and Watson in the Real-World — Brendan Kay

    Contains 1 Component(s)

    After attending this session, IBM i clients will better understand where and how Watson/AI can be used in their organization.

    This session, which is focused on real-world examples, emphasizes on the business value derived from AI. After attending this session, IBM i clients will better understand where and how Watson/AI can be used in their organization.

    Brendan Kay

    CTO, Fresche Solutions

    In his role as Executive Vice President at Fresche Solutions, Brendan Kay is in charge of driving business development and connecting Fresche and looksoftware solutions to the needs of the IBM i community. Prior to the merger with Fresche, Brendan was a major force in establishing looksoftware’s reputation as a leading IBM i modernization specialist. This success was built upon the belief that the best solutions are simple, effective and sustainable. With over 20 years of experience in application development and computer communications, Brendan held numerous roles at looksoftware. In addition to many years as Director of Development, Brendan has been Customer Support Manager, head of Sales and Marketing, chief architect of Business Strategy and finally CEO. In his current position as Executive VP at Fresche, Brendan uses his broad experience and his deep understanding of the IBM i market to ensure that the entire organization is aligned to provide effective and practical solutions to IBM i customers.

  • What's New and Exciting in RPG - Scott Klement

    Contains 1 Component(s)

    Take a tour of the latest enhancements in RPG.

    Take a tour of the latest enhancements in RPG. 

    Scott Klement

    Director, Product Development and Support

    Scott Klement is the Director of Product Development and Support at Profound Logic Software, and is well known as both an author and speaker in the IBM i community. Scott is a passionate advocate for RPG on the IBM i platform, and enjoys teaching tips and techniques to other developers. His efforts to help programmers have earned him many accolades and awards. In 2012, IBM named Scott an IBM Champion for Power Systems. In 2018, Scott was elected to COMMON's Board of Directors.

  • IBM i in the Cloud - Kris Whitney

    Contains 1 Component(s)

    Get the latest information about Cloud technologies for IBM i.

    Get the latest information about Cloud technologies for IBM i. Both how to have IBM i interact in the world of cloud, as well as our current Public Cloud offerings.  This will include both some use cases and ways you operate IBM i in the Cloud.

    Kris Whitney

    Senior Technical Staff Member, IBM

    Kris Whitney is a Senior Technical Staff Member at IBM Rochester. He has worked at IBM for the last 19+ years and currently is leading the development for Db2 Mirror for i and IBM i Public Cloud enablement.

  • Understanding your High Availability and Disaster Recovery Options - Brian Nordland

    Contains 1 Component(s)

    Everyone has unique needs when it comes to high availability and disaster recovery; there is no one size fits all solution. Learn about all the technologies and solutions including recently announced technologies such as Db2 Mirror.

    Nearly 60% of IBM i shops list High Availability as a top concern for the future, but less than 50% have a high availability solution in place to help recover from a disaster. Everyone has unique needs when it comes to high availability and disaster recovery.; there is no one size fits all solution. Learn about all the technologies and solutions including recently announced technologies such as Db2 Mirror.

     

    Learning Objectives:

    1. A framework for evaluating different solutions against your individual and unique requirements

    2. The different technologies and solutions that are available to protect your critical business data

    3. Which types of solutions may be a good fit to consider for your environment

     

    Brian Nordland

    Software Architect, HelpSystems

    Brian Nordland is the architect for the PowerHA SystemMirror for i product at HelpSystems. Brian has spoken at events, webinars, and users groups—including COMMON—since 2014. He is a co-inventor on multiple patent applications and co-author on technical publications in high availability and distributed computing.

    Prior to joining HelpSystems Brian spent six years with IBM in Rochester, Minnesota. Roles at IBM included being the development architect for PowerHA and working on IBM i virtual I/O and communication I/O device drivers. He earned his master's degree in software engineering from the University of Minnesota in 2017.

  • IBM i Security: The Good, the Bad, and the Downright Ugly - Robin Tatam

    Contains 1 Component(s)

    Don’t miss out on more than a decade’s worth of market research on the security configurations of IBM i servers and the successes and failures of organizations that run critical applications on them.


      Don’t miss out on more than a decade’s worth of market research on the security configurations of IBM i servers and the successes and failures of organizations that run critical applications on them. HelpSystems has audited thousands of IBM i servers around the world, gaining extensive, real-world insight into the deployment state of IBM i security controls. Learning Objectives: Join the author of the wildly popular "State of IBM i Security" study for a recap of eye-opening statistics from the current report. Along with the results, this session provides review and tips in seven configuration categories: • Network-initiated commands & data access • Server-level security controls • Profile and password settings • Administrative capabilities • Public accessibility to corporate data • System event auditing • Virus scanning Learn what steps your own organization must take to address these continually overlooked and dangerous security exposures—including some that are often missed by professional auditors!

    Robin Tatam

    Global Director of Security Technologies - HelpSystems

    Robin Tatam is HelpSystems’ Global Director of Security Technologies and a COMMON subject matter expert (SME). As an award-winning speaker on security topics, Robin has been interviewed and quoted by industry magazines and has published numerous trade articles. Robin’s extensive Power Server experience has resulted in more than 20 IBM certifications and the highly sought after designation of ISACA-certified Information Security Manager (CISM) and PCI-Professional (PCI-P). He is also co-author of IBM’s Redbook publication on IBM i Data Encryption.

  • IBM Power Systems POWER9 Processor/Systems Update - Daniel Sundt

    Contains 1 Component(s)

    2018 was an exciting year for IBM Power Systems from a new processor and server standpoint. Attend this session to learn more about the new POWER9 processor and scale-up and scale-out enterprise servers based on POWER9.

    2018 was an exciting year for IBM Power Systems from a new processor and server standpoint. Attend this session to learn more about the new POWER9 processor and scale-up and scale-out enterprise servers based on POWER9.

    Daniel Sundt

    Technical Sales Specialist, IBM

    Daniel helps customers architect optimal solutions on IBM Power Systems servers running the IBM i, AIX, and Linux operating systems, and has been supporting IBM i customers for over 25 years. He also specializes in working with ISV's or applications on IBM hardware/software

  • Data Breaches: Is IBM i Really at Risk? - Robin Tatam

    Contains 1 Component(s)

    Join noted IBM i security expert and certified auditor, Robin Tatam, as he discusses common ways that this supposedly “secure” operating system may actually be vulnerable and who the culprits might be.​

    Despite an avalanche of regulatory mandates and industry awareness, news headlines remain chock full of stories about data breaches. Although Power Servers often live inside the safety of the perimeter firewall, the risk of suffering a data leak or data corruption remains high. Learning Objectives: Would you know if a data breach happened? How would a breach affect your business? Join noted IBM i security expert and certified auditor, Robin Tatam, as he discusses common ways that this supposedly “secure” operating system may actually be vulnerable and who the culprits might be.

    Robin Tatam

    Global Director of Security Technologies - HelpSystems

    Robin Tatam is HelpSystems’ Global Director of Security Technologies and a COMMON subject matter expert (SME). As an award-winning speaker on security topics, Robin has been interviewed and quoted by industry magazines and has published numerous trade articles. Robin’s extensive Power Server experience has resulted in more than 20 IBM certifications and the highly sought after designation of ISACA-certified Information Security Manager (CISM) and PCI-Professional (PCI-P). He is also co-author of IBM’s Redbook publication on IBM i Data Encryption.

  • Modernization of Staff: The Other Modernization Effort - Floyd Del Muro

    Contains 1 Component(s)

    This session will help to reduce the learning curve while modernizing your company’s IBM i environment and development staff.​​

    All companies face the need to modernize their interface and development processes. To do modernization well, it’s also necessary to modernize the staff making those efforts. This includes training current staff on new skills and toolsets, replacing retiring staff, and expanding development resources. After twenty years of training developers, including bringing 5250 developers into the modern world of RDi and Source Control, I will discuss techniques to help your current developers more easily migrate to modern tools and languages. With modernized software and processes, it’s easier to attract new developers. This session will help to reduce the learning curve while modernizing your company’s IBM i environment and development staff.

    Floyd Del Muro

    Director, Business Development at Seneca Global

    With 31 years of experience on the IBM midrange platform, Floyd is Director, Business Development for the SenecaGlobal group. In his role at SenecaGlobal, Floyd has been extensively involved in the management of DevOps , Enterprise Modernization and refactoring projects on IBM i, from planning stages through to delivery. His expertise in hybrid application development both native and Cloud makes him a trusted advisor for companies in project rollout, managed services and the introduction of agile methods. Floyd is a trusted global speaker on the subjects of DevOps, Release Management, Modernization, Version Control and BI.

  • Integrated File System Security Principles and Practices - Margaret Fenlon

    Contains 1 Component(s)

    Come to this session and learn the principles and best practices of securing your file systems.

    Are you confused about IBM i Integrated File System security? You're not alone! Come to this session and learn the principles and best practices of securing your file systems. This session will cover more than just setting permissions (authority) on your objects. Other topics include virus scanning, controlling remote access, object audit, and more.

    Learning Objectives:

    1. Understand the semantics of integrated file system security
    2. Learn other methods of securing beyond permissions including virus scanning, and more
    3. Learn ways to manage and improve integrated file system security

    Margaret Fenlon

    Software Engineer, IBM

    Margaret started working for IBM in 1983 on the S/36. From 1986-1994 she worked in various areas of what is now the IBM i including Authorization Management support of POSIX and the integrated file system. She worked on the port of SAP R/3 from 1994-1997. In 1998 Margaret joined the integrated file system team. As a member of the integrated file system team she has worked on the file server, QFileSvr.400 file system and the utilities to convert to the new directory format. Margaret is currently the team leader for the integrated file system and servers team.