Log in

News

<< First  < Prev   1   2   3   4   Next >  Last >> 
  • 5 Jul 2020 9:24 PM | Ricardo Leon (Administrator)

    Three days of inspiration & innovation:

    July 22-July 24, 2020

    MMSA members may attend with 50% discount.

    https://www.oceanusergroup.org/index.php?option=com_mc&view=mc&mcid=72&eventId=557433&orgId=ougsc&recurringId=0


  • 22 Oct 2019 9:34 AM | Michael Daly (Administrator)

    IBM Systems Media Webinars

    SPONSORED CONTENT

    Cloud as a Destination for AIX & IBM i Workloads?
    Tuesday, November 12
    1 ET / Noon CT
    Our AIX and IBM i community didn’t always have a practical and logical solution for cloud-based partitions. The hybrid gap was there; however, a cost-effective and cloud-y opex bridge was not. Now, those who want to expand their Power IT resources and reach by deploying both on-premises and off-premises have a direct route with the raw performance of POWER9 in the IBM Cloud.

    Join us as we discuss the top 3 most requested reference architectures for leveraging AIX and IBM i in the cloud, listen to current client migration stories, and learn more about IBM Power Systems Virtual Servers on IBM Cloud.
    Learn more →
  • 15 Oct 2019 1:48 PM | Michael Daly (Administrator)

    IBM Systems Media Webinars

    Leading the Way With IBM i
    Wednesday, October 30
    1 ET / Noon CT
    REGISTER NOW →

    There is a persistent (and pernicious) perception in the technology world that the IBM i is a green screen system limited to RPG, COBOL and CL coding. It’s a myth. You can build the latest in web and mobile applications for IBM i, create new features and functions using microservices, connect to your customers and partners with REST web services, and even move IBM i workloads into the cloud.

    In this webinar we’ll cover the top 5 tech trends you can leverage with IBM i and show you how to get started.

    Learn more →


  • 8 Oct 2019 12:35 PM | Michael Daly (Administrator)

    Free POWERcast
    Become an API Superhero

     

    Speakers: Donna Westmoreland and Stuart Milligan

    Price: Free courtesy of Midrange Dynamics

    October 10, 2019 at 12:00 p.m. CST

    More Information

     

    Attend this fast-moving session to learn about innovative tools that use your RPG skills to generate REST APIs, enabling data and logic to flow between environments. You’ll discover how you can respond to business requirements and modernize your applications faster than you ever thought possible, keeping IBM i front and center:

    • Extend the reach of applications and data inside and outside of your organization
    • Create a better user experience with mobile apps, etc.
    • Secure data using industry standards and policies

    We’ll show you tools to help you quickly turn your RPG skills and applications into modern digital assets:

    • Automate generation of standard API and consumer RPGLE and SQL code
    • Use our wizard to build and edit OAS3/SWAGGER API specifications
    • Export API documentation to a self-service developer portal and Atlassian Confluence
    • Automate the change process so you can continually meet rapidly evolving business requirements

    Digital transformation and continuous modernization are attainable in the real world. Join us and be inspired.

    Register


  • 8 Oct 2019 9:55 AM | Michael Daly (Administrator)

    IBM Systems Media Webinars

    Robotic Process Automation (RPA) for IBM i
    Thursday, October 24
    1 ET / Noon CT

    Imagine being able to reuse every single part of your existing applications as part of your modernization strategy!

    Robotic Process Automation (RPA) software can record how employees navigate through applications and complete tasks, and then execute those steps in batch. RPA lowers the barrier of application modernization because you can repurpose ALL of the code buried deep inside your RPG/COBOL applications, not just the code exposed as APIs.

    Attend this webinar to:

    • Discover how RPA is like having a team of virtual users accessing your system in the background to locate information and complete transactions.
    • Learn how RPA can strip away all the tedious 5250 navigation screens while your users work with your existing applications.
    • Discover how you can build brand new UI screens that leverage RPA to do all the back-end processing, whether it’s a single transaction in one program or several transactions across multiple programs.

    Learn more →


  • 2 Oct 2019 9:19 AM | Michael Daly (Administrator)

    Invest in Your IBM i Skill Development at IBM TechU

    The upcoming TechU in Las Vegas adds a bit of a new twist—an entire track to introduce you to either AIX or IBM i on the Power Systems platform. The IBM i Fast Start track is a great fit for those new to the platform or wanting to get an understanding of “that server over there that just runs on its own.” Session topics include systems management, performance, application development in traditional or open-source languages, security, and of course, my favorite topic: database! If you work on another platform but have an IBM i box in your environment, these sessions can give you a solid foundation so you can talk the talk with your IBM i colleagues! IBMer Doug Mack explains. 

    Discover what you could learn at TechU  →


  • 2 Oct 2019 9:18 AM | Michael Daly (Administrator)
    It’s time to simplify high availability on IBM i.
    Status quo is not always the right way to go when it comes to high availability. Your current solution might be degrading system performance while costing you a fortune. Kick overly-complex tools to the curb. This guide shows you how simplifying HA on IBM i can be the smarter (and safer) option.
    Get my guide
    There’s a better way to do HA on IBM i.
    Read this guide. Improve your experience.


  • 2 Oct 2019 9:16 AM | Michael Daly (Administrator)

    IBM Systems Media Webinars

    Confidence in the security of your IBM i systems and data requires a solid understanding of potential vulnerabilities, the most effective best practices, and technologies that minimize the possibility of a data breach. We’ve grouped important security best practices and technologies into overlapping layers that provide multiple lines of defense. The ultimate goal is to always have another layer of security to thwart a would-be intruder.

    Whether you are a systems security officer or an IBM i system administrator, you don’t want to miss this opportunity to learn about IBM i security best practices.

    We’ll discuss:

    • Common IBM i security vulnerabilities
    • Configuring the security capabilities of the IBM i OS
    • Implementing network security, access control, cryptography and more
    Join us for a complimentary IBM Systems magazine webinar, with content by Syncsort, to learn how you can develop a multi-layered defense for your systems and data.
    Best Practices in IBM i Security
    Tuesday, October 15
    1 ET / Noon CT
    REGISTER NOW →


  • 26 Sep 2019 9:58 AM | Michael Daly (Administrator)

    IBM Systems Media Webinars

    How to Navigate the HA/DR Landscape for IBM i
    Thursday, October 10
    11 ET / 10 CT

    With the introduction of Db2 Mirror for i alongside IBM i 7.4, the advent of running IBM i in the cloud, plus PowerHA and storage-based replication, the high availability (HA) landscape has changed considerably over the years—and with it the number of alternatives on the market.

    But how do I know which HA option(s) work best for me?

    In this live webinar, our IBM i experts offer their HA/DR insight backed by technical information and years of real-life implementation experiences.

    Whether you’re looking to implement or replace an HA solution or simply want to keep up with current HA/DR technology, this webinar is for you!

    Learn more →


  • 19 Sep 2019 9:49 AM | Michael Daly (Administrator)

    IBM Systems Media Webinars

    Best Practices in IBM i Security
    Tuesday, October 15
    1 ET / Noon CT
    REGISTER NOW →

    Confidence in the security of your IBM i systems and data requires a solid understanding of potential vulnerabilities, the most effective best practices, and technologies that minimize the possibility of a data breach. We’ve grouped important security best practices and technologies into overlapping layers that provide multiple lines of defense. The ultimate goal is to always have another layer of security to thwart a would-be intruder.

    Whether you are a systems security officer or an IBM i system administrator, you don’t want to miss this opportunity to learn about IBM i security best practices.

    We’ll discuss:

    • Common IBM i security vulnerabilities
    • Configuring the security capabilities of the IBM i OS
    • Implementing network security, access control, cryptography and more

    Learn more →


<< First  < Prev   1   2   3   4   Next >  Last >> 
Powered by Wild Apricot Membership Software