Education Schedule

January 9:
POWERcast – How to Put PowerVC into Practice

January 16:
MEMBERcast – IBM i Security for Programmers

POWERcast

POWERcasts  are sponsored one-hour sessions addressing a particular topic, taught by a subject-matter expert. Registration is free for everyone and the session recordings are available to everyone for 30 days after the event before being moved to the Member Webcast Library.

How to Put PowerVC into Practice

Speaker: Chuck Losinski and Tom Komadowski
Price: Free courtesy of HelpSystems
Dates and Time: January 9, 2020 10:00 am

The virtualized Power server is well-established, with over 75% of businesses running multiple partitions. But how well do you understand the capabilities of the underlying PowerVC technology that supports this virtualization?

Tom Komadowski is certainly no stranger to virtualization. As DevOps Engineer at HelpSystems, he’s in charge of over 400 IBM i, AIX, and Linux partitions! He knows the advantages (and limitations) of the PowerVC tools—as well as the importance of proactive monitoring.

Don’t miss this live webinar where Tom shares his pro tips for putting PowerVC into practice. You’ll learn how to:

  • Easily create an IBM i partition for QA, development, or testing
  • Assign disk to an existing partition with a couple of mouse clicks
  • Monitor multiple instances of IBM i and VIOS and the workloads running there

Our software experts will also demonstrate how Robot Monitor can give you real-time workload insight on your IBM i, VIOS, and AIX partitions through proactive monitoring and notifications to your mobile device.

We want to help you stay in control of your Power servers, no matter how many partitions you spin up.

Register to join us today!

MEMBERcast

MEMBERcasts are hour-long sessions presented by a field expert that provide pure education. These are always available to COMMON members for free. Nonmembers can register to attend for a registration fee of $99.

IBM i Security for Programmers

Speaker: Robin Tatam
Dates and Time: January 16, 2020 at 11:00 a.m. CST

Although IBM i is one of the most secure-able platforms available, the protection of critical data is often undermined by weak security design at the application level. This session covers the main considerations that a programmer should be aware of as they design and code their applications:

Learning Objectives
Attend this session to learn about:
• Object ownership
• Adopted authority
• Public and private authorities
• Command line permission
• Client-server considerations

About the Speaker

Robin Tatam is HelpSystems’ Global Director of Security Technologies and a COMMON subject matter expert (SME). As an award-winning speaker on security topics, Robin has been interviewed and quoted by industry magazines and has published numerous trade articles. Robin’s extensive Power Server experience has resulted in more than 20 IBM certifications and the highly sought after designation of ISACA-certified Information Security Manager (CISM) and PCI-Professional (PCI-P). He is also co-author of IBM’s Redbook publication on IBM i Data Encryption.