December 4 and 5

Don’t miss this great way to keep your knowledge up-to-date without having to leave the office. Some session information is now available. More sessions to follow. The schedule will be announced at a later date.

Registration is now open for the Virtual Conference. This is a free event. All are welcome to attend.

Note: if you can’t attend live, still register as you will have access to the recordings for 30 days post event.

Tuesday Sessions

9:00 a.m. to 10:00 a.m. Central

Let’s Get This OSS
Speaker: Josh Hall

So you’re finally ready to dive into this Open Source Software stuff everyone keeps screaming about. But where do you begin? How does one install Yum on their system? Wait, I need Yum? Installing and acquiring open source software is a lot simpler than it may seem. This talk will leave you with a basic understanding of how to access open source software on IBM i.

Josh Hall is owner of SoBored, a web development and consultancy company. He’s passionate about Open Source. While his focus is on web development on the IBM i, he likes to dabble in just about everything.

10:00 a.m. to 11:00 a.m. Central

I’ve Got It Downloaded, Now What Do I Do With It?
Speaker: Jack Woehr

Open source has been transforming IBM i administration and development. We’ll cover:

  • The evolution of open source on IBM i up to the present
  • Setting up to download packages and/or build your favorite open source on IBM i
  • Setting up your workstation to interact with the PASE environment
  • Using open source on the IBM i
    • Light: one-liners
    • Medium: scripting
    • Heavy: application development

Jack Woehr is a consulting programmer with over 30 years’ experience in open source. He authors Ublu, an open source remote language for IBM i. Jack specializes in open source powered legacy modernization on IBM i .

11:00 a.m. to 12:00 a.m. Central

APIs and the Integrated Organization
Speakers: Daniel Magid and Charles Jones

Digital transformation is changing how you do business. You’re automating more business processes and extracting more insight from your business data. While your core business applications have run on IBM i for years, you probably have teams building and running web, UNIX, Linux, and Windows applications as well. You may also need to create business-to-business connections with your customers and partners. In this complex, multiplatform ecosystem it can be difficult to securely share data across systems, integrate business workflows, and automate business transactions. The key to taking advantage of these trends is delivering business functions as RESTful APIs that any application can use. In addition, building targeted workflows that capture specific tasks you want to make easier for users as a micro-service can provide the fastest results and greatest productivity gains for your key stakeholders.

This session will cover:

  • Using APIs to support enterprise application integration
  • Orchestrating services from multiple sources to meet complex needs
  • How APIs let you modernize quickly by focusing on just the small percentage of the app users need to access on a daily basis

Brought to you by Rocket Software

Daniel Magid is the Rocket Vice President in charge of Solution Sales. He is responsible for all of Rocket’s IBM i solutions including Rocket’s Modernization, ALM & DevOps, and HA/DR solutions. Daniel has been deeply involved in the IBM midrange market for more than 30 years. Through his many articles, speaking engagements and interviews in leading IT publications, he has become a recognized authority on IBM i, enterprise software change management, DevOps and application modernization. Before becoming Vice President of Solution Sales, Daniel ran all of the IBM i R&D labs at Rocket.

Charles Jones is a Sales Engineer at Rocket Software where he works with customers throughout North America to implement Rockets Digital Transformation solutions.

Charles has 30 years of experience working in the enterprise software solutions space and has spent the last 20 years focused on helping customers implement their enterprise integration and modernization strategies.

12:00 p.m. to 1:00 p.m. Central

What the South Dakota vs. Wayfair Decision Means for IBM i
Speaker: Buk Kapadia

In the SD v. Wayfair case, the Supreme Court ruled in favor of South Dakota, granting the state authority to impose sales tax obligations on out-of-state transactions. Remotes sellers will have a new set of obligations and challenges ahead of them, while states could potentially gain billions in revenue. But what does it mean for your business?

Join our session to gain a better understanding of sales tax compliance and how it may impact your business.

Topics include:

  • The South Dakota v. Wayfair ruling
  • Accuracy of tax calculations
  • Proper exemption certificate management

Brought to you by Avalara

Buk Kapadia is the IBM i Strategic Alliance Manager for Avalara, working with IBM I Partner Community and Customers.  After graduating from the University of Connecticut with a Bachelors in Computer Science and Engineering Buk began her career as a Systems Engineer at IBM.  Over the last 20 years Buk has applied her technical expertise in the area of sales, marketing and consulting in the SMB and Enterprise space, including running her own Website Design and Consulting Business.

1:00 p.m. to 2:00 p.m. Central

Be the Best IBM i Developer You Can Be
Speaker: Stephen Flaherty

Whether you are new to the platform or consider yourself a pro, having the right tools, skills and development approach can help you do things better, faster and smarter, increasing your value to your company.

Join us for this session where you will learn:

  • Useful things for new developers to quickly ramp up on IBM i and applications
  • Tips and tricks to reduce maintenance and enhance development agility with X-Analysis
  • Resources for developers with everything they want to know about IBM i

Brought to you by Fresche Solutions

Stephen Flaherty, with over 25 years in the IBM i market, has led a wide range of RPG coding projects and worked with several ERP and EDI packages. His current role as a Technical Engineer enables him to ensure the best communication between sales and new and existing customers on a variety of products, helping clients transform or update their systems through custom strategies.

2:00 p.m. to 3:00 p.m. Central

Working with JSON in RPG with YAJL
Speaker: Scott Klement

JSON (JavaScript Object Notation) is quickly becoming an important document format for business data interchange, so what’s the best way to process it from RPG? JSON provides the same benefits as XML, but it is smaller (and so transmits over a network more quickly) and is much more efficient than XML to work with in web applications. Naturally, this means that your RPG business applications need to learn how to speak JSON in order to talk to many of the newer web services or exchange data with many tech-savvy business partners.

Scott KlementScott Klement is a Product Developer at Profound Logic Software, and is well known as both an author and speaker in the IBM i community. Scott is a passionate advocate for RPG on the IBM i platform, and enjoys teaching tips and techniques to other developers. His efforts to help programmers have earned him many accolades and awards. In 2012, IBM named Scott an IBM Champion for Power Systems.

3:00 p.m. to 4:00 p.m. Central

Why and How to Use Node.js on IBM i
Speaker: Greg Patterson

Developing modern applications and attracting new developers are key components of many organizations’ IBM i strategy. Node.js, an open-source runtime environment for server-side web applications, can achieve both of these objectives. Attend this session to learn what Node.js is, why it’s a great choice for IBM i web and mobile development and how to get started.

Greg Patterson has been in the IT field for 18 years, the last 10 with Fresche Solutions where he is currently a Modernization Specialist. In addition to business development activities, Greg also coordinates pre-sales technical demonstrations and discussions, performs business analysis, and is sometimes involved at the coding level for specific projects. Greg has a deep knowledge of Fresche products from his time spent in support as a Senior Technical Support Specialist.

4:00 p.m. to 5:00 p.m. Central

Blockchain Is Here! What Does It Mean to Me?
Speaker: Trevor Perry

Blockchain is now part of the vernacular of IT. Yet, it remains a mystery – it is out there, but questions remain. In this session, Trevor will introduce Blockchain and help you understand this incredible technology. He’ll give you insights into the advantages of Blockchain, how it provides security and trust in a trustless environment. To help you see where Blockchain is part of your future, Trevor will also outline practical ways to use this technology with your business and your IBM i applications.

Trevor Perry is a veteran of the IBM i community. He is a consultant to companies on their I.T. modernization efforts and has been engaged in all phases of the IT development cycle. He is a popular speaker at industry events on technical, strategic, modernization, and motivational topics and is a regular keynote at conferences around the world.

Trevor’s day job is FrescheThinker at Fresche Solutions, and he writes regularly at www.freschethinking.com. He guides customers in their modernization efforts, assists with IT strategy and directions, and sets new standards in leveraging IBM i in business for a strong future. His consulting and speaking leverages the collected experience and expertise of Fresche Solutions in the business and IT community.

Wednesday Sessions

10:00 a.m. to 11:00 a.m. Central

System Health Review 
Speaker: Dawn May

Understanding the health of your system is critical whether you have a large environment or a small one. There are many things you should be looking at on a regular basis, from system resource utilization, disk storage consumption, workload trends, and more.  This presentation will review all the important areas for a system health review, as well as how to put a plan in place to understand changes over time to prevent potential issues from becoming real ones.

Dawn May is a leading authority on IBM i performance management, work management, systems management, and general system diagnostics. She has in-depth knowledge of the IBM i operating system developed through her distinguished career with IBM.

A former IBMer, Dawn is now an independent consultant, assisting companies with system performance reviews and recommendations. She also teaches clients on the latest IBM i tools to enable them to get the most out of their IBM i systems.

Dawn is the author of the “i Can” blog published by IBM Systems Magazine and a frequent speaker at local user group meetings and IBM i conferences around the world.

11:00 a.m. to 12:00 p.m. Central

Simplified IBM i Disaster Recovery for a Complex World
Speakers: Dan Magid and Mark Watts

Rocket iCluster high-availability/disaster recovery (HA/DR) solutions help ensure uninterrupted operation for your IBM i applications, providing continuous access by monitoring, identifying and self-correcting replication problems. An intuitive user interface simplifies monitoring and troubleshooting, making it easy for any member of your IT team to run and operate iCluster with confidence.

Join Rocket experts and learn how you can meet users’ increasing demands for system resilience and high availability of critical applications. You’ll learn:

  • How a major retailer leveraged Rocket iCluster to minimize planned and unplanned downtime ($60K/minute)
  • How you can reduce your IBM i total cost of ownership with a more user-friendly solution
  • Why pricing based on a per-server basis, rather than a per-LPAR or CPW rating basis, helps you to maximize your budget
  • How flexible licensing and pricing options can work in your specific environment
  • How iCluster complements IBM PowerHA to extend replication across larger distances

As a 20+ year IBM partner, we know and love IBM i — we know how they work and we know how to help you optimize your investment.

Brought to you by Rocket Software

Daniel Magid is the Rocket Vice President in charge of Solution Sales. He is responsible for all of Rocket’s IBM i solutions including Rocket’s Modernization, ALM & DevOps, and HA/DR solutions. Daniel has been deeply involved in the IBM midrange market for more than 30 years. Through his many articles, speaking engagements and interviews in leading IT publications, he has become a recognized authority on IBM i, enterprise software change management, DevOps and application modernization. Before becoming Vice President of Solution Sales, Daniel ran all of the IBM i R&D labs at Rocket.

Mark Watts is a Software Engineer for Rocket. He works on iCluster and Rocket HA Assist to deliver the best value for HA/DR on IBM Power Systems

 

12:00 p.m. to 1:00 p.m. Central

9 Things You Should Know about POWER9
Speaker: Pete Massiello

In this session, you will learn:

  • How the POWER9 infrastructure is built for the digital age
  • How POWER9 performance compares to previous models
  • The migration process from POWER7 or POWER8
  • Overall benefits of POWER9 and how they can apply to your business

Brought to you by iTech Solutions Group

Pete MassielloPete Massiello has been working with the AS/400, iSeries, IBM i since 1989, focusing on systems management and technical support. He has held numerous technical positions through out his career. Pete is the President of iTech Solutions Group, an IBM Premier Business Partner delivering solutions and services to IBM i shops throughout the world. He is a member of IBM’s certification test writing team, an IBM Certified Systems Expert with certifications in IBM i Design, Administration, LPAR, Virtualization, Implementation, and HMC management. Pete has a BS in Computer Science from Hofstra University, and an MBA from the University of New Haven. He was President of COMMON from 2010 to 2012, and again in 2014. He is a COMMON Hall of Fame speaker and a frequent speaker at user groups all over the world. In 2011, IBM established the Champions award for Power Systems. Pete was one of the first recipients. Recently, Pete was re-nominated as a Power Systems Champion in 2018.

1:00 p.m. to 2:00 p.m. Central

IBM i Security Best Practices
Speaker: Jeff Uehling

Security best practice and regulatory compliance are a constantly moving target. In this webinar, Jeff Uehling, Syncsort’s Product Management Director for security solutions and former architect for the security functions in the IBM i OS, shares what he has learned about best practices in his over 30 years of experience with IBM i security.

You’ll learn:

  • Why you need to run at security level 50 – and the exposures of running at lower levels
  • How to detect and prevent programs that could compromise system security
  • Necessary system value settings
  • How to apply cryptography to protect your data
  • Network security requirements
  • Security considerations for mobile deployments
  • How Syncsort’s security solutions help you achieve best practice

Whether you are a systems security officer or an IBM i system administrator, you don’t want to miss this webinar.

Brought to you by Syncsort

Jeff Uehling is Syncsort’s Product Management Director working directly with the Syncsort security product suite. He has more than 30 years of experience working in security technology for the IBM i, and predecessor systems. Jeff previously worked in the IBM i OS development group, specifically as lead architect of the security development team in Rochester, Minnesota.  His previous responsibilities at IBM included architecture, design and development of IBM i security. He has also served as a council member of the IBM security technical community. Jeff’s primary interests lie in the area of system integrity and now, given the current business environment, cryptography and compliance.

2:00 p.m. to 3:00 p.m. Central

Taking Db2 Web Query To The Next Level
Speaker: Doug Mack

Sure, Db2 Web Query can modernize Query/400 reports, integrate reports with Excel spreadsheets, and provide dashboards and mobile reports. But this session will go a level higher including tips and techniques for advanced reporting challenges, deploying interactive dashboards, and leveraging SQL for even more POWER!

Brought to you by Information Builders

Doug Mack is a Db2 for i Analytics Consultant in IBM’s Power Systems Lab Services organization, employed by IBM in the United States. He currently leads the Analytics team for the Db2 for i Lab Services team delivering Query/400 modernization, Db2 Web Query, Data Warehouse design, skills transfer, and implementation guidance services worldwide. Doug is a regular speaker at customer events including COMMON, IBM Technical Conferences and Executive Briefings, and has written many articles and white papers on the attributes of Db2 for i for analytics. You can follow Doug on Twitter @mckdrmoly or via his blog at db2webqueryi.blogspot.com

3:00 p.m. to 4:00 p.m. Central

The Anatomy of a Security Failure
Speaker: Steve Pitcher

After the dust settles after a security breach, the next logical questions are: “What happened and how can we prevent it from happening again?” We will deconstruct a number of security failures that will provide lessons that you can take home and put to use immediately.

Steve Pitcher is a multi-industry IT professional with experience as a developer, systems administrator and IT Director. Skilled in security and collaborative solutions with a focus on IBM i (AS/400 or iSeries).

4:00 p.m. to 5:00 p.m. Central

Security and Privacy in the IoT
Speaker: Lisa Bock

Every day consumers and businesses purchase home appliances, electronics, sensors, and other Internet of Things (IoT) devices to connect and simplify their lives. Billions of IoT devices are in use around the world. However, many security vulnerabilities exist, and hackers are finding ways to use IoT devices in various types of attacks. In this presentation, learn how something as innocent as a camera or a baby monitor can invade your privacy or be a part of a massive DDoS. We’ll review case studies of how inexpensive IoT devices have minimal security configurations, and when connected, immediately phone home. Participants will gain a better understanding of IoT vulnerabilities so they will conduct research and testing prior to implementation in a home or business.

Lisa Bock is an associate professor in the Information Technology department at Pennsylvania College of Technology, in Williamsport, PA. Courses she has taught during the past 14 years include: networking, security, biometrics, technical support, protocol vulnerabilities (using Wireshark), CCNA Security, and VoIP and Unified Communications. She holds an MS from University of Maryland University College (UMUC) along with numerous other certifications. Lisa has had training in forensics, networking, steganography, and network security. She is involved with various volunteer activities, has evaluated professional journals, and is an award-winning speaker. Lisa is an author at LinkedIn Learning and Lynda.com and has published numerous security and networking courses. Recent work includes an Ethical Hacking series and The Internet of Things. Lisa and her husband Mike enjoy bike riding, watching movies, and traveling.

Sponsors

Thank you to these companies for supporting the Virtual Conference.