Catalog Advanced Search

Search by Categories
Search in Packages
Search by Format
Search by Date Range
Products are filtered by different dates, depending on the combination of live and on-demand components that they contain, and on whether any live components are over or not.
Start
End
Search by Keyword
Sort By
  • I've Got it Downloaded, Now What Do I Do with It? - Jack Woehr

    Contains 1 Component(s)

    Setting up to download packages and/or build your favorite open source on IBM i

    Open source has been transforming IBM i administration and development.

    We’ll cover:
    The evolution of open source on IBM i up to the present
    Setting up to download packages and/or build your favorite open source on IBM i
    Setting up your workstation to interact with the PASE environment
    Using open source on the IBM i

    Jack Woehr

    Senior Engineer, Absolute Performance, Inc.

    Jack is a consulting programmer with over 30 years' experience in open source. He authors Ublu, an open source remote language for IBM i. He specializes in open source modernization on IBM i. He is currently experimenting with connecting IBM i to IBM Q quantum computing via the open source Qiskit.

  • Security and Privacy in the IoT - Lisa Bock

    Contains 1 Component(s)

    We’ll review case studies of how inexpensive IoT devices have minimal security configurations, and, when connected, immediately phone home. Participants will have a better understanding of IoT vulnerabilities and will conduct research and testing prior to implementation in a home or business.​

    Every day consumers and businesses purchase home appliances, electronics, sensors and other Internet of Things (IoT), to connect and simplify their lives. Billions of IoT devices are in use around the world, however, many security vulnerabilities exist, and hackers are finding ways to use IoT devices in various types of attacks. In this presentation, learn how something as innocent as a camera or a baby monitor can invade your privacy or be a part of a massive DDoS.  We’ll review case studies of how inexpensive IoT devices have minimal security configurations, and, when connected, immediately phone home. Participants will have a better understanding of IoT vulnerabilities and will conduct research and testing prior to implementation in a home or business.

    Lisa Bock

    Assistant Professor, Pennsylvania College of Technology

    Lisa Bock is an assistant professor in the Information Technology department at Pennsylvania College of Technology, in Williamsport, Pennsylvania. Courses Lisa has taught since 2003 include networking, security, biometrics, cryptography, technical support, protocol vulnerabilities (using Wireshark), CCNA security, requirements analysis, web and organizational security, and digital video production. She holds a MS from University of Maryland University College (UMUC) along with numerous other certifications. She has had training in forensics, networking, steganography, and network security. Lisa has presented at several national IT conferences. Lisa is an author for Lynda.com and is involved with various volunteer activities and has evaluated professional journals and manuscripts. Lisa and her husband, Mike, enjoy bike riding, watching movies, and traveling.

  • What the South Dakota vs. Wayfair Decision means for IBM i Users - Buk Kapadia-Jackson

    Contains 1 Component(s)

    Join our session to gain a better understanding of sales tax compliance and how it may impact your business

    In the SD v. Wayfair case, the Supreme Court ruled in favor of South Dakota, granting the state authority to impose sales tax obligations on out-of-state transactions. Remotes sellers will have a new set of obligations and challenges ahead of them, while states could potentially gain billions in revenue. But what does it mean for your business?   Join our session to gain a better understanding of sales tax compliance and how it may impact your business. Topics include: • The South Dakota v. Wayfair ruling • Accuracy of tax calculations • Proper exemption certificate management

    Buk Kapadia-Jackson

    IBM i Sr. Strategic Alliance Manager, Avalara

    Buk is the IBM i Sr. Strategic Alliance Manager for Avalara, working with IBM I Partner Community and Customers. After graduating from the University of Connecticut with a Bachelors in Computer Science and Engineering Buk began her career as a Systems Engineer at IBM. Over the last 20 years Buk has applied her technical expertise in the area of sales, marketing and consulting in the SMB and Enterprise space, including running her own Website Design and Consulting Business.

  • 9 Things You Should Know About POWER9 - Pete Massiello

    Contains 1 Component(s)

    In this session you will learn the overall benefits of POWER9 and how they can apply to your business.

    In this session, you will learn:

    • How the POWER9 infrastructure is built for the digital age

    • How POWER9 performance compares to previous models

    • About the migration process from POWER7 or POWER8

    • The overall benefits of POWER9 and how they can apply to your business

    Pete Massiello

    President, iTech Solutions

    Pete Massiello has been working with the AS/400, iSeries, IBM i since 1989, focusing on systems management and technical support. He has held numerous technical positions through out his career. He is the President of iTech Solutions Group, an IBM Premier Business Partner delivering solutions and services to IBM i shops throughout the world. He is a member of IBM’s certification test writing team, an IBM Certified Systems Expert with certifications in IBM i Design, System Administration, LPAR, Virtualization, Implementation, and HMC management. Pete has a BS in Computer Science from Hofstra University, and an MBA from the University of New Haven. He was President of COMMON from 2010 to 2012, and again in 2014. He is a COMMON Hall of Fame speaker, and a frequent speaker at user groups all over the world. In 2011 IBM established the Champions award for Power Systems, Pete was one of the first recipients. In 2016, they revived the program and he was again made an IBM Power Systems Champion. Lightning struck for the third time in 2017, and that is the year he was also made the first Power Systems Lifetime Champion, an honor he continues to hold.

  • Anatomy of a Security Failure - Steve Pitcher

    Contains 1 Component(s)

    We will deconstruct a number of security failures that will provide lessons that you can take home and put to use immediately.

    After the dust settles after a security breach, the next logical questions are: “What happened and how can we prevent it from happening again?” We will deconstruct a number of security failures that will provide lessons that you can take home and put to use immediately.

    Steve Pitcher

    IBM i Administration at iTech Solutions

    Multi-industry IT professional with experience as a developer, systems administrator and IT Director. Skilled in security and collaborative solutions with a focus on IBM i (AS/400 or iSeries). 

  • What's New with Navigator and Performance Data Investigator - Lora Powell

    Contains 1 Component(s)

    You will learn about the new Subsystem, Job Description, Message queues support as well as new metrics in Collection Services for historical data as well as function in Performance Data Investigator for Graph History charting.

    Listen in to hear the latest on Navigator for i enhancements.  You will learn about the new Subsystem, Job Description, Message queues support as well as new metrics in Collection Services for historical data as well as function in Performance Data Investigator for Graph History charting.  Also covered will be the latest metrics added to System Monitors and the enhanced dashboard charts displaying all metrics for a monitor in real time.

    Lora Powell

    Advisory Software Engineer at IBM

    Lora Powell is an Advisory Software Engineer at IBM. She is the team leader of the Performance Data Investigator team and has been part of IBM i development for 10 years. Before that she worked on compiler development, also at IBM.

  • RDi and the Sleeping Giants - Tom Huntington

    Contains 1 Component(s)

    Don’t miss this live webinar where RDi evangelists and educators demonstrate some of the top features that convince RPG coders to turn to RDi

    In order to modernize your old RPG code and bring applications into the 21st century, you need to mobilize a sleeping giant: the RPG developers! Rational Developer for i (RDi) is the only editor from IBM that fully supports all that today’s RPG can do. But that’s not the only reason to move from the green screen PDM/SEU editor to RDi. Don’t miss this live webinar where RDi evangelists and educators Jim Buck, Susan Gantner, and Charlie Guarino demonstrate some of the top features that convince RPG coders to turn to RDi, including: • Program outline • Hover information • Easy location of compiler errors • Monitoring variables in debug HelpSystems will also share a sneak preview of the roadmap for future RDi features. The future is integrated development environment (IDE) tools like RDi. It’s time to move away from green screen tools and deliver truly modern applications faster than ever. 

    Tom Huntington

    Executive Vice President of Technical Solutions at HelpSystem

    Tom Huntington is Executive Vice President of Technical Solutions at HelpSystems, and has been with the company for nearly 30 years. He works with business alliances, acquisitions and large customer relationships and ensures that the HelpSystems software works with other major software and hardware vendors worldwide.

    Tom often speaks on enterprise scheduling, security, automation topics, IBM i technology, and the HelpSystems products, and hosts technical presentations on a variety of automation topics. He is the author of the HelpSystems IBM i Marketplace Survey and has written articles on automated operations, security, cloud computing, and business intelligence for leading trade journals and newsletters. He was named an IBM Champion in 2016, 2017, 2018, and 2019 for over three decades of advocation and thought leadership on the IBM i platform.

  • 3 Steps to Zero-Risk Modernization Part 3 - Floyd Del Muro and Scott Forstie

    Contains 1 Component(s)

    Future-proof your IBM i application by converting to modern standards for source code, database and UI.

    • Step 3: Transform – Automating the conversion from RPGLE or CA 2E (Synon) to Free Form RPG and DDL/SQL

    A well-run modernization project can save up to 30% in ongoing maintenance costs (*).  Future-proof your IBM i application by converting to modern standards for source code, database and UI. (*) Example:  Dutel save 30% in application maintenance by converting to RPG Free

    Floyd Del Muro

    Director, Business Development at Seneca Global

    With 31 years of experience on the IBM midrange platform, Floyd is Director, Business Development for the SenecaGlobal group. In his role at SenecaGlobal, Floyd has been extensively involved in the management of DevOps , Enterprise Modernization and refactoring projects on IBM i, from planning stages through to delivery. His expertise in hybrid application development both native and Cloud makes him a trusted advisor for companies in project rollout, managed services and the introduction of agile methods. Floyd is a trusted global speaker on the subjects of DevOps, Release Management, Modernization, Version Control and BI.

    Scott Forstie

    Db2 for i Business Architect

    Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

    Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

  • 3 Steps to Zero-Risk Modernization Part 2 - Floyd Del Muro and Barbara Morris

    Contains 1 Component(s)

    Laying a secure foundation with a structured DevOps process

    • Step 2: Structure – Laying a secure foundation with a structured DevOps process To avoid slowing the business, any modernization project must be carried out in parallel with daily development work.  Corrections and enhancements must be carried forward on each development branch.   Concurrent versioning and automated code merge will keep complexity under control right along the project. Securing a modernization budget?  A tight feedback loop is key to maintaining stakeholder buy-in for the project.  Whatever your modernization goals, having a structured DevOps process with test automation in place will ensure regular deliveries and the non-regression of your system.  

    Floyd Del Muro

    Director, Business Development at Seneca Global

    With 31 years of experience on the IBM midrange platform, Floyd is Director, Business Development for the SenecaGlobal group. In his role at SenecaGlobal, Floyd has been extensively involved in the management of DevOps , Enterprise Modernization and refactoring projects on IBM i, from planning stages through to delivery. His expertise in hybrid application development both native and Cloud makes him a trusted advisor for companies in project rollout, managed services and the introduction of agile methods. Floyd is a trusted global speaker on the subjects of DevOps, Release Management, Modernization, Version Control and BI.

    Barbara Morris

    Lead Developer for the RPG Compilers, IBM

    Barbara Morris is the lead developer for the RPG compilers in the IBM Toronto Lab. She has been working on the RPG compilers since she started at IBM in 1989 after receiving a Computing Science degree from the University of Alberta. The first enhancement she developed was the ENDIF/ENDDO opcodes for RPG/400 in V2R1. Some of her most recent enhancements were the ON-EXIT and DATA-INTO opcodes and varying-dimension arrays. A few of the other notable enhancements that she developed for RPG include subprocedures, qualified data structures, call-interaction with Java, Open Access: RPG Edition, and fully-free-form RPG.

  • 3 Steps to Zero-Risk Modernization Part 1 - Floyd Del Muro and Tim Rowe

    Contains 1 Component(s)

    Where do I start to modernize? What are my choices?

    • Step 1:  Analyze – Where do I start to modernize?  What are my choices?   DIY or “as a Service”? Making the right technology choices and preparing a successful business case for modernization all depend on a precise understanding of your existing system.  Using real-life examples from customer applications, we will demonstrate how to graphically navigate the underlying structure, dependencies and hot spots within your application.  You will learn how to assess the feasibility of each new technology option and accelerate both the planning and execution of your modernization project.

    Floyd Del Muro

    Director, Business Development at Seneca Global

    With 31 years of experience on the IBM midrange platform, Floyd is Director, Business Development for the SenecaGlobal group. In his role at SenecaGlobal, Floyd has been extensively involved in the management of DevOps , Enterprise Modernization and refactoring projects on IBM i, from planning stages through to delivery. His expertise in hybrid application development both native and Cloud makes him a trusted advisor for companies in project rollout, managed services and the introduction of agile methods. Floyd is a trusted global speaker on the subjects of DevOps, Release Management, Modernization, Version Control and BI.

    Tim Rowe

    Business Architect Application Development & Systems Management for IBM i

    Tim Rowe is the Business Architect for IBM i responsible for System Management and Application Development. He has a passion for modernization on IBM i and how we can continue to move IBM i into the world of 'Normal' . In his spare time he is a certified Soccer referee and enjoys refereeing games with his youngest son.