December 4 and 5

Don’t miss the Virtual Conference, the best way to keep your knowledge up-to-date without having to leave your office. Better yet, it’s free, so it is training that fits into every budget.

Register today and join us on Wednesday and Thursday this week. Find the full session list and times below.

Please note that all times listed are Central Standard Time.

What’s New in DB2 – Scott Forstie, IBM
9:00 a.m. – 10:00 a.m. 

Scott Forstie, the Db2 for i Business Architect will present the enhancements added to Db2 for i and ACS in 4Q/2019. Join this session to learn all about the new features delivered to IBM i 7.3 and 7.4.

Sponsor: How to Modernize Your Query/400 Queries
Convert Query/400 to SQL the easy way—with Sequel – Mike Stegman and Stacey Jensen, HelpSystems
10:05 a.m. – 10:45 a.m. 

IBM i has become a database server for many organizations over the years. But if you’re still using Query/400 (a.k.a. IBM Query for i) to deliver reports, your end users and decision makers are left scratching their heads as they stare at all that data on a green screen.

And nothing screams “outdated, old technology, or legacy” louder than a green screen.

Experienced IBM i pros may love the green screen, but there’s no reason for the rest of the business to see how the sausage gets made. New IT recruits and non-technical users need visual data in dashboards and easy export options, like to Microsoft Excel.

Luckily, Sequel software makes your transition to modern data access and analysis simple. Don’t miss this live webinar with IBM i business intelligence experts. You’ll learn:

  • Top reasons leading organizations are modernizing now
  • Two ways to quickly convert Query/400 to SQL with Sequel
  • Export tips for taking data from DB2 and other databases into Excel

If modernization is on your IT to-do list for 2020, it’s time to dump Query/400 and convert those old queries into SQL with Sequel.

Is Your Code Testable? — Barbara Morris, IBM
10:50 a.m. – 11:20 a.m.

Being able to test your code in an automated way gives you more freedom to modify and enhance your code. It also allows you to participate in Dev Ops.

This session discusses some of the ways you can write your code to be more testable, and some strategies for making your existing code more testable.

Sponsor: Demystifying the challenges of Database Modernization — Birgitta Hauser, Fresche Solutions
11:30 a.m. – 12:30 p.m.

Database modernization is quite often considered a risky undertaking. Hundreds of programs may access and modify your data with native I/O and SQL. Dependencies between the tables or data is hidden within the program logic, and not directly visible. Most files are still DDS-described, so the enhancements that are available for SQL database objects cannot be used. Technologies that guarantee data consistency such as constraints or referential integrities are rarely used. Since data is the capital of most companies, modifying or even modernizing database objects is widely avoided. Consequently, databases grow over the years based on outdated technologies that require additional (and unnecessary) programming effort to keep the data consistent.

In this session Birgitta will discuss the challenges of database modernization. Covering key questions including : Which steps are necessary? What are the advantages and risks of modernizing the database? A Is it possible to redesign the database for an existing application?

Sponsor: Power Systems Management in the Cloud: Best practices and the “Gotcha’s” around Choosing the Right Infrastructure & Services Models — Dave Wiseman and Amar Patel, Connectria
12:45 p.m. – 1:45 p.m.

With the recent announcements from hyperscale cloud providers entering the IBM Power systems arena, Power Systems users now have several cloud options available to them.  But, which cloud is right for your IBM i workloads? And more importantly, what is the best way to administer and support these environments?.  In this webinar, IBM i & AIX experts from Connectria will provide insights and direction on each of the service model types.  We’ll provide an overview of the technology involved, options for securely migrating into the cloud, and ongoing management options.  You’ll leave this webinar feeling more knowledgeable about the choices you have in front of you, and more confident around the path to making the right decisions.

AI and IBM i — Jesse Gorzinski, IBM
1:50 p.m. – 2:50 p.m.

The emerging realm of AI and Machine Learning can bring seemingly-limitless opportunity for your enterprise (and perhaps even mankind). How can you leverage these new technologies from IBM i?This session will provide an overview of what technologies you can be using from your IBM i today. We will cover various AI/ML packages available to run on the system, as well as the cloud-based capability of IBM Watson. After all, IBM i has always been a data-centric platform. Surely, Db2 for i houses mission-critical and intensely valuable data. Coupling AI and ML with this data can bring an unprecedented amount of innovation.

Sponsor: Expert Tips for IBM i Security: Beyond the Basics – Robin Tatam, HelpSystems
3:00 p.m. – 4:00 p.m.

Cyber attacks often target mission-critical servers, and those attack strategies are constantly changing. To stay on top of these threats, your cybersecurity strategies must evolve, too.

In this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level.

Robin will cover:

  • Reducing the risk posed by special authorities
  • Establishing object-level security
  • Overseeing user actions and data access

If you’re responsible for cybersecurity at your organization or you work on the IBM i platform, you don’t want to miss this chance to take your knowledge of IBM i security beyond the basics.

Please note that all times listed are Central Standard Time.

Authority Collection in 7.3 & 7.4: Locking Down Security for Sensitive Data, Files and Objects – Thom Haze, IBM
9:00 a.m. – 9:55 a.m.

This presentation will introduce a new capability in the 7.3 release called Authority Collection and also cover the exciting changes in the 7.4 release.  Authority collection is new support designed to assist the security administrator and application provider in locking down object level security.  This support will help ensure that object authority is set to the most secure value while still allowing an application to run successfully.  This presentation is a must see for security administrators and application developers.

Stop Over-Crunching Data: Use Powerful SQL Capabilities to Eliminate Use or Work Files and QTEMP – Rob Bestgen, IBM
10:00 a.m. – 11:00 a.m.

There are many times where intermediate steps are required to get data into a shape for usage by some other application or consumption by an end user. Creating summary files to address rolling up data into date “buckets.” Un-tangling data to get it into formats that can be consumable by reporting tools. Even “chained” queries where you need to run a query to generate a temp file, then run another one to get to your end goal creates a process that is overly crunching data due to limitations in the tool. Building one-off extracts can be time consuming and can create issues with productivity, performance, and security of data. Overly using QTEmp in an SQL data access world can also be problematic. In this session, we’ll cover tips and techniques of avoiding over crunching of data to meet data preparation or untangling requirements using the power of SQL (Common table expressions, Cross Lateral Join, OLAP Functions, and ETL) to avoid over crunching!

SPONSOR: IBM i Disaster Recovery, Cloud-based System Monitoring, Security and Scheduling from MaxavaJohn Dominic, Simon O’Sullivan, and Martin Norman, Maxava
11:05 a.m. – 12:00 p.m.

Maxava has a fast-growing user base around the world. Learn how to monitor and manage your IBM i servers from the cloud and hear how the emergence of IBM i Public Cloud services will change the way we look at Disaster Recovery in 2020 and beyond. If you are looking to build or change your Disaster Recovery plan and have an interest in Cloud-based IBM i services. This is a great session to attend.

Intro to Well-Designed REST API’s — Stephanie Rabbani, Seiden Group
12:10 p.m. – 1:02 p.m.

When should I use an API? What are the benefits of writing APIs?

This talk will cover when to use Web APIs to access your data, as well as some tips on how to write a Web API that is flexible and designed to last.

Using code examples in multiple languages, I will share lessons recently learned from working on a large integration project with Salesforce.

SPONSOR: Security Alert! Prevent FTP and ODBC Data Breaches on IBM I – Robin Tatam, HelpSystems
1:10 p.m. – 1:57 p.m.

The latest data shows the vast majority of organizations remain reliant on menu security and command line restrictions to protect their enterprise data. Unfortunately, modern interfaces like FTP and ODBC completely bypass these controls, often allowing end users to view, update, and delete data in the database without the restrictions and auditing supplied by the application.

Learning about the power and openness of these interfaces is critical for ensuring the integrity of the server’s application data. It’s also an essential step in complying with all formal regulations, including SOX, PCI, and HIPAA.

Watch this informative webinar to learn how to close the “back doors” not covered by traditional security schemes. Robin Tatam will explain exit point security and why this little-understood topic is so important to IBM i organizations.

You’ll also see a short demonstration of how to implement policies that restrict access to only those users who need it.

SPONSOR:  Responsive Web Applications on the IBM I — Greg Patterson, Fresche Solutions
2:05 p.m. 

IBM i organizations benefit when users can access web applications from both desktops and mobile devices, all from the same code base. Learn how Bootstrap, the most popular framework for developing responsive web and mobile applications accommodates different device types without spending valuable time developing multiple versions of your applications. You’ll also see case studies of real-world IBM i responsive mobile applications.

Open Source Applied – Justin Reock, OpenLogic by Perforce
3:10 p.m. 

This isn’t your typical case study, this is the reality of open source: One hundred percent of organizations use varying degrees of OSS, yet we still focus on one particular package or layer when it comes to sharing best practices. The reality is, when we get stuck, it’s the configuration and operational interrelationships between packages that matter.

This session takes open source support data across multiple organizations to examine three different scenarios that represent the most common issues we see today (in fact, 80% of the cases we see are due to configuration and package interrelationship issues). Justin Reock covers e-commerce, mobile PaaS, and high performance computing examples to illustrate top problems and solutions for stack selection, infrastructure implementation, and production troubleshooting.

If you use or are planning to use Apache web server, ActiveMQ, CentOS, Docker, Kubernetes, Nginx, OpenSSL, Puppet, or PHP, these stories cover how most organizations use them. Even if you’re not using these specific packages, the information presented here also applies to other technologies.