Catalog Advanced Search

Search by Category
Search by Format
Search by Type
Sort By
Search by Favorites
Search by Category
Search by Format
Search by Type
Search by Speakers
Credits Offered
Search in Packages
Search by Date Range
Products are filtered by different dates, depending on the combination of live and on-demand components that they contain, and on whether any live components are over or not.
Start
End
Search by Favorites
Search by Keyword
Sort By
  • Contains 1 Component(s)

    Modernizing applications is one of the biggest concerns for businesses, with most businesses running in-house code. Tonny Bastiaans, Andrew Ireland, and Alan Ashley work together to show how Merlin can help aide the application modernization process in this guided tour.

    Modernizing applications is one of the biggest concerns for businesses, with most businesses running in-house code. Tonny Bastiaans, Andrew Ireland, and Alan Ashley work together to show how Merlin can help aide the application modernization process in this guided tour.

    Tonny Bastiaans

    WW Offering Manager Power Virtual Server

    IBM

    Tonny has over 18 years of experience working at IBM in a variety of roles. He has an open mind building the bridge between technic and business. Tonny is always interested in a good conversation and human interaction (accompanied with a good cup of coffee)

    Andrew Ireland

    Global Alliances Manager and DevSecOps Business Manager

    ARCAD

    Experienced Business Unit Manager with P&L responsibility who has demonstrated a history of working in the information technology and services industry.

    Alan Ashley

    Presales Consultant for DevOps for IBMi

    Arcad Software

    When it comes to describing someone, even yourself, it can be difficult. This time it's easy. I grew up on the AS400, through iSeries, and into the IBM i world. Started on a model B50 (I know it was a B model) where the disk drive needed two persons to replace and now in the DevSecOps world showing that the IBM i development fits right in with Agile and DevSecOps. Showing that one can move on from green screen and into a modern mode of development. After spending over two decades with IBM, I now help Arcad Software in showing that DevSecOps on IBM i isn't all that scary.

  • Contains 1 Component(s)

    In this guided tour, Steve Finnes and Linda Hirsch will walk you through the latest and greatest in IBM Power HA/DR solutions.

    In this guided tour, Steve Finnes and Linda Hirsch will walk you through the latest and greatest in IBM Power HA/DR solutions.

    Steve Finnes

    IBM Product Manager

    Steve has spent several years in IBM with positions spanning basic research to product development, product offering and marketing. He is the product offering manager for IBM Power Systems with responsibility for PowerHA for AIX, PowerHA for IBM i and the CBU.

    Linda Hirsch

    IBM i Offering Program Manager

    IBM

    Linda is on the worldwide IBM i Product Management team which creates and delivers offerings for the IBM i portfolio.

  • Contains 1 Component(s)

    We have should a few examples about looking at the contents of Journals, but in this video we take a step deeper in to the puzzle, where are the Journal receivers. We talk about the purpose of these receivers as some slick SQL to help make sure that you know where they all live on your system.

    We have should a few examples about looking at the contents of Journals, but in this video we take a step deeper in to the puzzle, where are the Journal receivers. We talk about the purpose of these receivers as some slick SQL to help make sure that you know where they all live on your system. 

    Tim Rowe

    Business Architect Application Development & Systems Management for IBM i

    Tim Rowe is the Business Architect for IBM i responsible for System Management and Application Development. He has a passion for modernization on IBM i and how we can continue to move IBM i into the world of 'Normal' . In his spare time he is a certified Soccer referee and enjoys refereeing games with his youngest son.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Contains 76 Product(s)

    Short demonstrations of tools to help you in your everyday work. Presented by Scott Forstie and Tim Rowe, IBM

    image



    Short demonstrations of tools, techniques and examples (including working SQL examples!!) to help you solve real problems that are part of your everyday work.  Presented by Scott Forstie and Tim Rowe, IBM

  • Contains 1 Component(s)

    Multi-factor authentication (MFA) systems, while a valuable security measure, are not without vulnerabilities. Phishing attacks, SIM swapping, man-in-the-middle attacks, MFA fatigue, and more can still compromise logins. Join SEA on October 30th to discover how to future-proof your IBM i MFA systems. We’ll delve into strategies and tactics to enhance IBM i login protection and defend against emerging threats. Topics include: • Patching IBM i MFA vulnerabilities: Utilizing encryption to bolster MFA security. • Immunizing logins against phishing: Exploring phishing-resistant MFA and password-less MFA options. • Integrating MFA into other IBM i functions: Enhancing self-service password resets and emergency authorization solutions. • Strengthening authentication security: Leveraging hard-to-break MFA verification factors.

    Multi-factor authentication (MFA) systems, while a valuable security measure, are not without vulnerabilities. Phishing attacks, SIM swapping, man-in-the-middle attacks, MFA fatigue, and more can still compromise logins.

    Join SEA on October 30th to discover how to future-proof your IBM i MFA systems. We’ll delve into strategies and tactics to enhance IBM i login protection and defend against emerging threats. Topics include:

    • Patching IBM i MFA vulnerabilities: Utilizing encryption to bolster MFA security.
    • Immunizing logins against phishing: Exploring phishing-resistant MFA and password-less MFA options.
    • Integrating MFA into other IBM i functions: Enhancing self-service password resets and emergency authorization solutions.
    • Strengthening authentication security: Leveraging hard-to-break MFA verification factors.

    Lloyd Ramdarie

    IBM i Technical Support Team Member, Software Engineering of America

    Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His background includes working in IBM i space for quite a number years with a large extent of his experience coming from heavy involvement with securing the IBM i. He is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end to end security solutions in the IBM i environment.

    Ken McCalister

    Software Engineering of America

    Ken McCalister has spent 35 years working with IBM i technology . Ken has vast experience working in all aspects of digital technology and management, including Administration, Engineering & Security. Ken is part of the IBM i Technical Team at Seasoft, providing support to its many diverse clients.

  • Contains 1 Component(s)

    Join Scott Forstie in exploring the possibilities of the query supervisor feature in Db2 for i.

    Join Scott Forstie in exploring the possibilities of the query supervisor feature in Db2 for i.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • Contains 1 Component(s)

    Business intelligence and analytics can transform your organization. But getting actionable information out of the raw data that comes from disconnected and incompatible databases, platforms, and other data sources is a roadblock to BI success. Learn how a data warehouse can be the key overcoming data integration challenges.

    Business intelligence and analytics can transform your organization. But getting actionable information out of the raw data that comes from disconnected and incompatible databases, platforms, and other data sources is a roadblock to BI success. Learn how a data warehouse can be the key overcoming data integration challenges.

    Greg Schmidt

    Senior Technical Solutions Consultant

    Fortra

    Greg Schmidt is a 20+ year veteran in data, document, forms, and process automation. Specializing in document automation and business intelligence, Greg has helped hundreds of companies automate their data and document processes and streamline their cumbersome business processes through strategic technologies and planning. Providing best-practice guidance forimplementation and solution expansion within a company are his top priorities.

    Greg also has over a decade's worth of experience in IBM i report and data distribution and robotic process automation technology.

    Alan Jordan

    Senior Development Manager

    Fortra

    Alan has been involved in System 38/AS400/iSeries/IBM i development for his entire IT career. A native of Australia, he moved to the US in 1998 when Coglin Mill introduced RODIN to the U.S. market. As the lead architect for RODIN (now Sequel Data Warehouse), he oversees product direction and development, and also manages the customer support team. He has extensive knowledge and experience in data warehousing technologies on IBM i and is a regular speaker at COMMON and other user group events.

    Alan has been involved in System 38/AS400/iSeries/IBM i development for his entire IT career. A native of Australia, he moved to the US in 1998 when Coglin Mill introduced RODIN to the U.S. market. As the lead architect for RODIN (now Sequel Data Warehouse), he oversees product direction and development, and also manages the customer support team. He has extensive knowledge and experience in data warehousing technologies on IBM i and is a regular speaker at COMMON and other user group events.

  • Contains 1 Component(s)

    Cybersecurity efforts often focus on data and IT systems, but don’t forget that documents—like W2s, invoices, and other common business documents—often contain highly sensitive information. Learn how a document lifecycle strategy can enhance security along with business efficiency.

    Cybersecurity efforts often focus on data and IT systems, but don’t forget that documents—like W2s, invoices, and other common business documents—often contain highly sensitive information. Learn how a document lifecycle strategy can enhance security along with business efficiency.

    Greg Schmidt

    Senior Technical Solutions Consultant

    Fortra

    Greg Schmidt is a 20+ year veteran in data, document, forms, and process automation. Specializing in document automation and business intelligence, Greg has helped hundreds of companies automate their data and document processes and streamline their cumbersome business processes through strategic technologies and planning. Providing best-practice guidance forimplementation and solution expansion within a company are his top priorities.

    Greg also has over a decade's worth of experience in IBM i report and data distribution and robotic process automation technology.

  • Contains 1 Component(s)

    The IBM i OS provides valuable data about operations and security—but exactly what data and where can you find it? This session will cover QSYSMSG, QSYSOPR, MSGQ, journals, and compare the QHST log to the QAUDJRN.

    The IBM i OS provides valuable data about operations and security—but exactly what data and where can you find it? This session will cover QSYSMSG, QSYSOPR, MSGQ, journals, and compare the QHST log to the QAUDJRN. 

    Amy Williams

    HelpSystems

    Amy Williams is a Senior Security Services Consultant who joined HelpSystems in 2015. She holds CISSP, CISA, and PCI-P certifications. Amy has worked on the IBM i platform since 1994 and her experience includes application testing, system installation, system administration, and architecture. She has worked in the warehousing distribution, travel, and gaming industries.

    Amyhasperformedsuccessfulroleswapsandcompletedasuccessfulobjectlevelremediationof5 disparate applications on the same IBM i LPAR. She has been responsible for consolidating over 60 LPARs to less than 30 while keeping the business moving forward. She has implemented exit point security when working towards a PCI ROCfiling.

    Since joining HelpSystems, Amy has worked with clients on system migrations and ensuring their application architecture was maintained. She has remediated all of the special authorities from users accommodating specific operational and security needs. Amy has implemented Authority Broker for a multi-system implementation, and has completed three specific remediations to remove *ALLOBJ authority.

    Amy served in the Air National Guard for 10 years in the communications flight (IT).

    Tom Huntington

    Executive Vice President of Technical Solutions at HelpSystem

    Tom Huntington is Executive Vice President of Technical Solutions at HelpSystems, and has been with the company for nearly 30 years. He works with business alliances, acquisitions and large customer relationships and ensures that the HelpSystems software works with other major software and hardware vendors worldwide.

    Tom often speaks on enterprise scheduling, security, automation topics, IBM i technology, and the HelpSystems products, and hosts technical presentations on a variety of automation topics. He is the author of the HelpSystems IBM i Marketplace Survey and has written articles on automated operations, security, cloud computing, and business intelligence for leading trade journals and newsletters. He was named an IBM Champion in 2016, 2017, 2018, and 2019 for over three decades of advocation and thought leadership on the IBM i platform.

    Sandi Moore

    Security Consultant, Fortra

    Sandi has been working with Fortra customers for over 15 years supporting systems monitoring and security software. With experience on IBM i, AIX, and Linux, she has been involved in product demonstrations, implementation, support, training, research, and product testing.

    In her time at Fortra, Sandi has helped customers understand how to effectively address the threats they face. Her goal is to help people achieve the best solution to their IT problems, no matter how many servers are in their environment or where in the world they’re located.

    Organizations throughout the public and private sectors have relied on Sandi’s expertise, whether they’re seeking to proactively protect their systems or improve security controls after a malware attack. Sandi has shared her knowledge at multiple user group conferences, including COMMON.

  • Contains 1 Component(s)

    This lively roundtable discussion includes cybersecurity pros with expertise in email security, penetration testing, vulnerability scanning, XDR, EDR, NDR, MDR, and threat detection.

    This lively roundtable discussion includes cybersecurity pros with expertise in email security, penetration testing, vulnerability scanning, XDR, EDR, NDR, MDR, and threat detection.

    Tom Huntington

    Executive Vice President of Technical Solutions at HelpSystem

    Tom Huntington is Executive Vice President of Technical Solutions at HelpSystems, and has been with the company for nearly 30 years. He works with business alliances, acquisitions and large customer relationships and ensures that the HelpSystems software works with other major software and hardware vendors worldwide.

    Tom often speaks on enterprise scheduling, security, automation topics, IBM i technology, and the HelpSystems products, and hosts technical presentations on a variety of automation topics. He is the author of the HelpSystems IBM i Marketplace Survey and has written articles on automated operations, security, cloud computing, and business intelligence for leading trade journals and newsletters. He was named an IBM Champion in 2016, 2017, 2018, and 2019 for over three decades of advocation and thought leadership on the IBM i platform.

    Max Shannon

    Associate Solutions Engineer

    Fortra

    Max Shannon is an Associate Solutions Engineer at Fortra.

    John Stahmann

    Director, Sales Engineering - Offensive Security and Infrastructure Protection

    Fortra

    I've been in the technology field for over 20 years with roles including Business Development, Pre Sales Systems Engineer, Partner Technical Account Manager, Partner Architect, and Product Specialist. I have worked with some of the largest Systems Integrator and Service Provider partners in the industry in both a Sell-Through/Sell-With and Sell-To capacity including Dell, Deloitte, PwC, Accenture, Fujitsu, IBM, HP, AT&T, Verizon, and others. I have consistently achieved or over-achieved for the last 10+ years with aggressive quotas.