Catalog Advanced Search
-
Contains 1 Component(s)
Modernizing applications is one of the biggest concerns for businesses, with most businesses running in-house code. Tonny Bastiaans, Andrew Ireland, and Alan Ashley work together to show how Merlin can help aide the application modernization process in this guided tour.
Modernizing applications is one of the biggest concerns for businesses, with most businesses running in-house code. Tonny Bastiaans, Andrew Ireland, and Alan Ashley work together to show how Merlin can help aide the application modernization process in this guided tour.
Tonny Bastiaans
WW Offering Manager Power Virtual Server
IBM
Tonny has over 18 years of experience working at IBM in a variety of roles. He has an open mind building the bridge between technic and business. Tonny is always interested in a good conversation and human interaction (accompanied with a good cup of coffee)
Andrew Ireland
Global Alliances Manager and DevSecOps Business Manager
ARCAD
Experienced Business Unit Manager with P&L responsibility who has demonstrated a history of working in the information technology and services industry.
Alan Ashley
Presales Consultant for DevOps for IBMi
Arcad Software
When it comes to describing someone, even yourself, it can be difficult. This time it's easy. I grew up on the AS400, through iSeries, and into the IBM i world. Started on a model B50 (I know it was a B model) where the disk drive needed two persons to replace and now in the DevSecOps world showing that the IBM i development fits right in with Agile and DevSecOps. Showing that one can move on from green screen and into a modern mode of development. After spending over two decades with IBM, I now help Arcad Software in showing that DevSecOps on IBM i isn't all that scary.
-
Register
- Member - Free!
- Non-member - Free!
- More Information
-
Register
-
Contains 1 Component(s)
In this guided tour, Steve Finnes and Linda Hirsch will walk you through the latest and greatest in IBM Power HA/DR solutions.
In this guided tour, Steve Finnes and Linda Hirsch will walk you through the latest and greatest in IBM Power HA/DR solutions.
Steve Finnes
IBM Product Manager
Steve has spent several years in IBM with positions spanning basic research to product development, product offering and marketing. He is the product offering manager for IBM Power Systems with responsibility for PowerHA for AIX, PowerHA for IBM i and the CBU.
Linda Hirsch
IBM i Offering Program Manager
IBM
Linda is on the worldwide IBM i Product Management team which creates and delivers offerings for the IBM i portfolio.
-
Register
- Member - Free!
- Non-member - Free!
- More Information
-
Register
-
Contains 1 Component(s)
We have should a few examples about looking at the contents of Journals, but in this video we take a step deeper in to the puzzle, where are the Journal receivers. We talk about the purpose of these receivers as some slick SQL to help make sure that you know where they all live on your system.
We have should a few examples about looking at the contents of Journals, but in this video we take a step deeper in to the puzzle, where are the Journal receivers. We talk about the purpose of these receivers as some slick SQL to help make sure that you know where they all live on your system.
Tim Rowe
Business Architect Application Development & Systems Management for IBM i
Tim Rowe is the Business Architect for IBM i responsible for System Management and Application Development. He has a passion for modernization on IBM i and how we can continue to move IBM i into the world of 'Normal' . In his spare time he is a certified Soccer referee and enjoys refereeing games with his youngest son.
Scott Forstie
Db2 for i Business Architect
Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.
Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.
-
Register
- Member - Free!
- Non-member - Free!
- More Information
-
Register
-
Contains 76 Product(s)
Short demonstrations of tools to help you in your everyday work. Presented by Scott Forstie and Tim Rowe, IBM
Short demonstrations of tools, techniques and examples (including working SQL examples!!) to help you solve real problems that are part of your everyday work. Presented by Scott Forstie and Tim Rowe, IBM-
Register
- Member - Free!
- Non-member - Free!
- More Information
-
Register
-
Contains 1 Component(s)
Multi-factor authentication (MFA) systems, while a valuable security measure, are not without vulnerabilities. Phishing attacks, SIM swapping, man-in-the-middle attacks, MFA fatigue, and more can still compromise logins. Join SEA on October 30th to discover how to future-proof your IBM i MFA systems. We’ll delve into strategies and tactics to enhance IBM i login protection and defend against emerging threats. Topics include: • Patching IBM i MFA vulnerabilities: Utilizing encryption to bolster MFA security. • Immunizing logins against phishing: Exploring phishing-resistant MFA and password-less MFA options. • Integrating MFA into other IBM i functions: Enhancing self-service password resets and emergency authorization solutions. • Strengthening authentication security: Leveraging hard-to-break MFA verification factors.
Multi-factor authentication (MFA) systems, while a valuable security measure, are not without vulnerabilities. Phishing attacks, SIM swapping, man-in-the-middle attacks, MFA fatigue, and more can still compromise logins.
Join SEA on October 30th to discover how to future-proof your IBM i MFA systems. We’ll delve into strategies and tactics to enhance IBM i login protection and defend against emerging threats. Topics include:
- Patching IBM i MFA vulnerabilities: Utilizing encryption to bolster MFA security.
- Immunizing logins against phishing: Exploring phishing-resistant MFA and password-less MFA options.
- Integrating MFA into other IBM i functions: Enhancing self-service password resets and emergency authorization solutions.
- Strengthening authentication security: Leveraging hard-to-break MFA verification factors.
Lloyd Ramdarie
IBM i Technical Support Team Member, Software Engineering of America
Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His background includes working in IBM i space for quite a number years with a large extent of his experience coming from heavy involvement with securing the IBM i. He is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end to end security solutions in the IBM i environment.
Ken McCalister
Software Engineering of America
Ken McCalister has spent 35 years working with IBM i technology . Ken has vast experience working in all aspects of digital technology and management, including Administration, Engineering & Security. Ken is part of the IBM i Technical Team at Seasoft, providing support to its many diverse clients.
-
Register
- Member - Free!
- More Information
-
Contains 1 Component(s)
Join Scott Forstie in exploring the possibilities of the query supervisor feature in Db2 for i.
Join Scott Forstie in exploring the possibilities of the query supervisor feature in Db2 for i.
Scott Forstie
Db2 for i Business Architect
Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.
Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.
-
Register
- Member - Free!
- Non-member - Free!
- More Information
-
Register
-
Contains 1 Component(s)
Business intelligence and analytics can transform your organization. But getting actionable information out of the raw data that comes from disconnected and incompatible databases, platforms, and other data sources is a roadblock to BI success. Learn how a data warehouse can be the key overcoming data integration challenges.
Business intelligence and analytics can transform your organization. But getting actionable information out of the raw data that comes from disconnected and incompatible databases, platforms, and other data sources is a roadblock to BI success. Learn how a data warehouse can be the key overcoming data integration challenges.
Greg Schmidt
Senior Technical Solutions Consultant
Fortra
Greg Schmidt is a 20+ year veteran in data, document, forms, and process automation. Specializing in document automation and business intelligence, Greg has helped hundreds of companies automate their data and document processes and streamline their cumbersome business processes through strategic technologies and planning. Providing best-practice guidance forimplementation and solution expansion within a company are his top priorities.
Greg also has over a decade's worth of experience in IBM i report and data distribution and robotic process automation technology.
Alan Jordan
Senior Development Manager
Fortra
Alan has been involved in System 38/AS400/iSeries/IBM i development for his entire IT career. A native of Australia, he moved to the US in 1998 when Coglin Mill introduced RODIN to the U.S. market. As the lead architect for RODIN (now Sequel Data Warehouse), he oversees product direction and development, and also manages the customer support team. He has extensive knowledge and experience in data warehousing technologies on IBM i and is a regular speaker at COMMON and other user group events.
Alan has been involved in System 38/AS400/iSeries/IBM i development for his entire IT career. A native of Australia, he moved to the US in 1998 when Coglin Mill introduced RODIN to the U.S. market. As the lead architect for RODIN (now Sequel Data Warehouse), he oversees product direction and development, and also manages the customer support team. He has extensive knowledge and experience in data warehousing technologies on IBM i and is a regular speaker at COMMON and other user group events.
-
Register
- Member - Free!
- More Information
-
Register
-
Contains 1 Component(s)
Cybersecurity efforts often focus on data and IT systems, but don’t forget that documents—like W2s, invoices, and other common business documents—often contain highly sensitive information. Learn how a document lifecycle strategy can enhance security along with business efficiency.
Cybersecurity efforts often focus on data and IT systems, but don’t forget that documents—like W2s, invoices, and other common business documents—often contain highly sensitive information. Learn how a document lifecycle strategy can enhance security along with business efficiency.
Greg Schmidt
Senior Technical Solutions Consultant
Fortra
Greg Schmidt is a 20+ year veteran in data, document, forms, and process automation. Specializing in document automation and business intelligence, Greg has helped hundreds of companies automate their data and document processes and streamline their cumbersome business processes through strategic technologies and planning. Providing best-practice guidance forimplementation and solution expansion within a company are his top priorities.
Greg also has over a decade's worth of experience in IBM i report and data distribution and robotic process automation technology.
-
Register
- Member - Free!
- More Information
-
Register
-
Contains 1 Component(s)
The IBM i OS provides valuable data about operations and security—but exactly what data and where can you find it? This session will cover QSYSMSG, QSYSOPR, MSGQ, journals, and compare the QHST log to the QAUDJRN.
The IBM i OS provides valuable data about operations and security—but exactly what data and where can you find it? This session will cover QSYSMSG, QSYSOPR, MSGQ, journals, and compare the QHST log to the QAUDJRN.
Amy Williams
HelpSystems
Amy Williams is a Senior Security Services Consultant who joined HelpSystems in 2015. She holds CISSP, CISA, and PCI-P certifications. Amy has worked on the IBM i platform since 1994 and her experience includes application testing, system installation, system administration, and architecture. She has worked in the warehousing distribution, travel, and gaming industries.
Amyhasperformedsuccessfulroleswapsandcompletedasuccessfulobjectlevelremediationof5 disparate applications on the same IBM i LPAR. She has been responsible for consolidating over 60 LPARs to less than 30 while keeping the business moving forward. She has implemented exit point security when working towards a PCI ROCfiling.
Since joining HelpSystems, Amy has worked with clients on system migrations and ensuring their application architecture was maintained. She has remediated all of the special authorities from users accommodating specific operational and security needs. Amy has implemented Authority Broker for a multi-system implementation, and has completed three specific remediations to remove *ALLOBJ authority.
Amy served in the Air National Guard for 10 years in the communications flight (IT).
Tom Huntington
Executive Vice President of Technical Solutions at HelpSystem
Tom Huntington is Executive Vice President of Technical Solutions at HelpSystems, and has been with the company for nearly 30 years. He works with business alliances, acquisitions and large customer relationships and ensures that the HelpSystems software works with other major software and hardware vendors worldwide.
Tom often speaks on enterprise scheduling, security, automation topics, IBM i technology, and the HelpSystems products, and hosts technical presentations on a variety of automation topics. He is the author of the HelpSystems IBM i Marketplace Survey and has written articles on automated operations, security, cloud computing, and business intelligence for leading trade journals and newsletters. He was named an IBM Champion in 2016, 2017, 2018, and 2019 for over three decades of advocation and thought leadership on the IBM i platform.
Sandi Moore
Security Consultant, Fortra
Sandi has been working with Fortra customers for over 15 years supporting systems monitoring and security software. With experience on IBM i, AIX, and Linux, she has been involved in product demonstrations, implementation, support, training, research, and product testing.
In her time at Fortra, Sandi has helped customers understand how to effectively address the threats they face. Her goal is to help people achieve the best solution to their IT problems, no matter how many servers are in their environment or where in the world they’re located.
Organizations throughout the public and private sectors have relied on Sandi’s expertise, whether they’re seeking to proactively protect their systems or improve security controls after a malware attack. Sandi has shared her knowledge at multiple user group conferences, including COMMON.
-
Register
- Member - Free!
- More Information
-
Register
-
Contains 1 Component(s)
This lively roundtable discussion includes cybersecurity pros with expertise in email security, penetration testing, vulnerability scanning, XDR, EDR, NDR, MDR, and threat detection.
This lively roundtable discussion includes cybersecurity pros with expertise in email security, penetration testing, vulnerability scanning, XDR, EDR, NDR, MDR, and threat detection.
Tom Huntington
Executive Vice President of Technical Solutions at HelpSystem
Tom Huntington is Executive Vice President of Technical Solutions at HelpSystems, and has been with the company for nearly 30 years. He works with business alliances, acquisitions and large customer relationships and ensures that the HelpSystems software works with other major software and hardware vendors worldwide.
Tom often speaks on enterprise scheduling, security, automation topics, IBM i technology, and the HelpSystems products, and hosts technical presentations on a variety of automation topics. He is the author of the HelpSystems IBM i Marketplace Survey and has written articles on automated operations, security, cloud computing, and business intelligence for leading trade journals and newsletters. He was named an IBM Champion in 2016, 2017, 2018, and 2019 for over three decades of advocation and thought leadership on the IBM i platform.
Max Shannon
Associate Solutions Engineer
Fortra
Max Shannon is an Associate Solutions Engineer at Fortra.
John Stahmann
Director, Sales Engineering - Offensive Security and Infrastructure Protection
Fortra
I've been in the technology field for over 20 years with roles including Business Development, Pre Sales Systems Engineer, Partner Technical Account Manager, Partner Architect, and Product Specialist. I have worked with some of the largest Systems Integrator and Service Provider partners in the industry in both a Sell-Through/Sell-With and Sell-To capacity including Dell, Deloitte, PwC, Accenture, Fujitsu, IBM, HP, AT&T, Verizon, and others. I have consistently achieved or over-achieved for the last 10+ years with aggressive quotas.
-
Register
- Member - Free!
- More Information
-
Register