The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from.

>> Review the list of On-demand Webcasts offerings below.
>> Select the items you would like to receive.
>> Provide your email address at the bottom of the page and submit.
>> Your selection(s) will be sent to you without cost or obligation.
>> All information must be submitted in English.

We’re also giving one lucky person the opportunity to win a $100 Gift Card for the MC Press Bookstore

Simply add the $100 MC Press Bookstore Gift Card Drawing offering, along with as many of the other FREE offerings you would like to receive, and you'll be added to our next drawing.

2019 $100 Gift Card Winners:
January '19 - Glenda Bennett April '19 - July '19 - October '19 -
February '19 - David Nelson May '19 - August '19 - November '19 -
March '19 - NEXT DRAWING MARCH 31, 2019
June '19 - September '19 - December '19 -


(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)


New Generation Software, Inc.

 

NGS’ Software Developer Kit (SDK) gives IBM i developers comprehensive query, dynamic mobile reporting, analytics and Web report design features at an affordable cost. Install and create meaningful outputs for managers in one day! Web page and portal integration, email, FTP are included.

The $895* SDK includes a one user license, online training, user manuals, one year of software maintenance; toll-free support and online incident reporting.

  • Want to modernize beyond Query/400 and PC files transfers?
  • Need a Web reporting solution without the learning curve and overhead of DB2 Web Query?
  • Have many reporting needs, but a tight budget and small staff?
View the demo and request a FREE TRIAL of the SDK.

* Limited time offer.


(return to top).

MC Press Online, LLC

 

We’re giving one lucky person the opportunity to choose their own selection of books from the MC Press Bookstore with a $100 MC Press Bookstore Gift Card.

Simply add this offering, along with as many of the FREE offerings you would like to receive and you'll be entered in our next drawing.

Visit the MC Press Bookstore at www.mc-store.com to see our selection of books.

Next Drawing: March 31, 2019.


(USA and CANADA only!)

(return to top).

HelpSystems

 

Protecting your organization from cyberthreats has never been more important—or more difficult.
IT pros have many tactics to choose from, but time (and budgets!) are not unlimited. The key is prioritizing risks and identifying the most effective ways to mitigate the danger.
In 2018, HelpSystems surveyed more than 600 IT and cybersecurity professionals to find out what security exploits loom largest and what strategies they’re turning to for protection.
In this on-demand webinar, our team of cybersecurity security experts analyzes results. You’ll learn about:

  • Security strategies your peers are most interested in implementing
  • How managers and executives prioritize security
  • Who is responsible for cybersecurity at organizations around the world
  • Where IT pros turn for assistance with security
You'll also get practical tips for using this data to drive cybersecurity conversations at your organization.


(return to top).

Halcyon, a HelpSystems Company

 

IBM i is great at managing varied workloads—the OS offers many built-in work management and system utilities to aid administration.
But greater customization is sometimes necessary in the line of duty.
Halcyon has built upon these utilities to deliver a number of advanced functions designed for you to take control of all of your day-to-day IBM i activities.
During this on-demand webinar, our experts will demonstrate some of Halcyon’s capabilities and describe real-life scenarios that highlight how you can:

  • Reduce your alerting footprint by implementing leading-edge monitoring techniques
  • Identify both organic growth and spikes in disk space utilization
  • Automate time-consuming housekeeping tasks
  • Take advantage of the powerful IBM i Services
  • Automate literally anything
Set your sights on having the right monitoring solution, no matter what comes your way. Watch the recording today!


(return to top).

PowerTech Group, Inc.

 

Learn why event auditing is necessary and how to configure it

Experts’ fears surrounding the risks associated with poor configuration were recently confirmed by the 2016 State of IBM i Security Study. Published annually, the results reveal most Power Systems lack adequate security controls and auditing measures.
In this fast-paced webinar series, leading experts Robin Tatam and Carol Woodbury share insight into critical areas of IBM i security.
This second session of the series introduces event auditing, with Robin Tatam covering the basics and more:

  • Why auditing is necessary
  • Determine if IBM i auditing is currently active
  • How to configure auditing with one simple command
  • What audit events are recorded (and which are missed!)
  • How high availability (HA) applications often make critical events disappear
  • Event reporting and real-time alerting


(return to top).

HelpSystems

 

High availability for IBM i has been a hot topic in 2017, jumping 20% from our 2016 survey to take the #2 seat on IT priority lists just behind cybersecurity. And no surprise with these two topics so closely tied to your most valuable asset: your irreplaceable business data.
With major airline outages last year and the recent ransomware attacks, you must be asking yourself: am I doing everything I can to protect my organization’s data?
Tune in as our panel of IBM i high availability experts—Tom Huntington, Matt Staddler, and Cole Ragland—deliver lively discussion around the top high availability issues of today, including:

  • Why companies don’t test role swaps when they know they should
  • Whether high availability in the cloud makes sense for IBM i users
  • Why some organizations don’t have high availability yet
  • How to get high availability up and running at your organization
  • High availability considerations for today’s security concerns
There are no do-overs when it comes to your data. Once it’s gone, it’s gone...unless you have a data replication layer in place to protect it. Learn the value of these strategic solutions and how you can implement them in a hurry—watch now!


(return to top).

PowerTech

 

In today’s threat landscape, upper management is laser-focused on cybersecurity. You need to make progress in securing your systems—and make it fast.
There’s no shortage of actions you could take, but what tactics will actually deliver the results you need? And how can you find a security strategy that fits your budget and time constraints?
Join top IBM i security expert Robin Tatam as he outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.
Your system didn’t become unsecure overnight and you won’t be able to turn it around overnight either. But quick wins are possible with IBM i security, and Robin Tatam will show you how to achieve them.


(return to top).

PowerTech

 

Can you trust all of your users all of the time?
A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six month later.
A staggering amount of damage can occur in that time. Despite these risks, 93 of organizations are leaving their IBM i systems vulnerable to cybercrime.
In this live webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • How phishing attacks are becoming more sophisticated
  • Three little-known ways malicious programs can reach your IFS
  • Why the IFS is IBM i’s “Typhoid Mary”
You’ll also learn why some of the most common malware solutions still leave IBM i systems vulnerable—and what you can do to protect your organization.


(return to top).

HelpSystems

 

Protecting your data from viruses or malicious code is not an unfamiliar concept, but understanding how these threats can affect your Power Systems server may not be as easy to grasp.

There are many myths about viruses and IBM i—including the belief that the system is immune. Many Power Systems managers still don’t see viruses as a risk because they see them as a Windows threat. While this was once true, today’s connected environments operate under different rules.

It’s time to take action and protect IBM i and the network that connects to it. This on-demand webinar will help you gain an understanding of the relationships between:

  • Viruses and the integrated file system (IFS)
  • Power Systems and Windows viruses
  • PC-based anti-virus scanning vs native IBM i scanning
There are a number of ways you can minimize your exposure to viruses. Learn the facts to ensure you're fully-protected.


(return to top).

Halcyon, a HelpSystems Company

 

In this 45-minute recorded webinar, we dissect complex system monitoring by introducing best practices and smart techniques that will help you reduce and simplify your multi-platform monitoring workload.

(return to top).

PowerTech Group, Inc.

 

Protect your system from unauthorized network access through readily available PC tools

Experts’ fears surrounding the risks associated with poor configuration were recently confirmed by the 2016 State of IBM i Security Study. Published annually, the results reveal most Power Systems lack adequate security controls and auditing measures.
In this fast-paced webinar series, leading experts Robin Tatam and Carol Woodbury share insight into critical areas of IBM i security.
This on-demand webinar will show you how well-known services like FTP and ODBC enable users to access sensitive data without oversight or restrictions. Robin Tatam will also explain what exit programs are and how you can use them to protect your organization.


(return to top).

PowerTech

 

Modern interfaces like FTP and ODBC completely bypass menu security, often allowing end users to view, update, and delete data in the database without the restrictions and auditing supplied by the application.
Unfortunately, the vast majority of IBM i organizations still rely on menu security to protect their data. Learning about the power and openness of these interfaces is critical for ensuring the integrity of the server’s application data. It’s also an essential step in complying with all formal regulations, including SOX, PCI, and HIPAA.
Join this informative webinar to learn how to close the “back doors” not covered by traditional security schemes. IBM i security expert Robin Tatam will explain exit point security and why this little-understood topic is so important to IBM i organizations.
You’ll also see a short demonstration of how to implement policies that restrict access to only those users who need it.


(return to top).

HelpSystems

 

Let’s face facts: servers don’t hack other servers. Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
User profiles are often duplicated or restored and are rarely reviewed for the appropriateness of their current configuration. This increases the risk of the profile being able to access data without the intended authority or having privileges that should be reserved for administrators.
Watch noted security expert Robin Tatam as he discusses a new approach for onboarding new users on IBM i and best-practices techniques for managing and monitoring activities after they sign on.


(return to top).

PowerTech Group, Inc.

 

The IFS is one of the most commonly overlooked aspects of IBM i security Experts’ fears surrounding the risks associated with poor configuration were recently confirmed by the 2016 State of IBM i Security Study. Published annually, the results reveal most Power Systems lack adequate security controls and auditing measures.
In this fast-paced webinar series, leading experts Robin Tatam and Carol Woodbury share insight into critical areas of IBM i security.
This recorded session has Robin Tatam introducing IFS security:

  • Defining IFS
  • How the IFS is configured
  • Common IFS security mistakes
  • What a virus can do to IBM i through the IFS
  • Tracking user activity


(return to top).

PowerTech Group, Inc.

 

IBM has provided us with two powerful and very exciting security enhancements in the last two versions of IBM i.
Scott Forstie of IBM joins Carol Woodbury to demonstrate and describe the V7R2 feature called Row and Column Access Control (RCAC), which extends how you define which users have access to specific rows in a database file. RCAC also provides a way to mask data for all or selected users.
The recently released V7R3 adds Authority Collection. Authority Collection provides organizations and vendors with the ability to know exactly what authority is required to perform a task, eliminating the guesswork. Gone is the need to set *PUBLIC authority on database files to *ALL or to automatically grant service accounts *ALLOBJ special authority just because you’re unsure of what authority is required.
Watch Scott and Carol as they discuss these and other new security features delivered in V7R2 and V7R3.


(return to top).

Profound Logic Software, Inc.

 

Modern, web-based applications can make your Enterprise more efficient, connected and engaged. This session will demonstrate how the Profound UI framework is the best and most native way to convert your existing RPG applications and develop new modern applications for your business. Additionally, you will learn how you can address modernization across your Enterprise, including databases and legacy source code, with Profound Logic.

We will demonstrate how Profound UI:
  • Goes beyond simple screen-scraping to truly modernize your RPG applications
  • Uses RPG Open Access and your own RPG code and development talent to modernize
  • Supports rapid development with an easy-to-use, drag-and-drop Designer
  • Integrates with our on-the-fly modernization, mobile development, and Enterprise Modernization solutions

(return to top).

HelpSystems

 

Everyone wants a piece of your business data. But keeping up with data access requests in the era of constantly growing data is a challenge. As a result, your IT department can be overwhelmed, inundated, and constantly needing to play catch-up.
It’s time to develop a strategy that will help you meet your informational challenges head-on. Watch the webinar to learn how to set your IT department up for business intelligence success in 2018.
You’ll learn how the right data access tool will help you:

  • Access IBM i data faster
  • Deliver useful information to executives and business users
  • Empower users with secure data access
Ready to make your game plan and finally keep up with your data access requests?


(return to top).

HelpSystems

 

The new POWER9 servers offer over two times more per-core capacity than POWER7+ servers, but is that what your business needs?
When it’s time for hardware change, it pays to plan ahead.
Within this webinar, you’ll learn why capacity planning on IBM i is more important now than ever before. You’ll also see a live demo of Performance Navigator—the leading tool for capacity planning on IBM i—and learn how combining the software with our capacity planning service engagement can help you:

  • Centralize years of historical performance data
  • Graph out the current performance status for each LPAR
  • Model peak historical workload days based on multiple “what-if” scenarios
  • Develop a cost-justification deliverable to share with decision makers
It’s time to eliminate the guesswork and size your Power Systems servers with confidence.


(return to top).

HelpSystems

 

Before AS/400 fans ever even heard the term “iSeries”, IBM had already rolled out the integrated file system (IFS) to give IBM i users the ability to run applications that don’t follow the traditional library structure.

Today, IBM i shops use the IFS regularly for storage, web servers, applications, and more. Even the Windows IT team needs to access the IFS on IBM i for file exchanges! But with great power comes great responsibility—and many don’t have the knowledge or tools necessary to take full advantage of this technology.
During this recorded webinar, you’ll learn basic tips, helpful tools, and integrated file system commands—including WRKLNK—for managing your IFS directories and Access Client Solutions (ACS). We’ll answer your most pressing IFS questions, including:

  • What is stored inside my IFS directories?
  • How do I monitor the IFS?
  • How do I replicate the IFS or back it up?
  • How do I secure the IFS?
Understanding what the integrated file system is and how to work with it must be a critical part of your systems management plans for IBM i. If you don’t have the time—or the desire—to do it manually, we’ll also show you how HelpSystems tools can make it easy for you.
Watch now!


(return to top).

HelpSystems

 

There’s a better way to run your queries. With an advanced query tool like Sequel Data Access, you can deliver the IBM i data your organization needs quickly and efficiently—without the hang-ups.
In this session, we’ll address common frustrations with Query/400, discuss major data access and distribution trends, and help you understand what to look for in a more advanced query tool.
Plus, you’ll learn how a tool like Sequel lightens IT’s load by:

  • Accessing real-time data, so you can make real-time decisions
  • Providing run-time prompts, so users can help themselves
  • Delivering instant results in Microsoft Excel and PDF, without the wait
  • Automating the query process with on-demand data, dashboards, and scheduled jobs
  • Watch the webinar and learn why you shouldn’t just settle for Query/400.


(return to top).

PowerTech

 

If you’ve done no preparation prior to your organization being breached . . . it’s too late! During this session, security expert Carol Woodbury will guide you through the considerations and preparations you’ll want to make PRIOR to being breached.
No one can ever be 100% prepared for the aftermath of a breach. The goal of this webinar is to help you think through what resources and information you’ll need to be as prepared as possible should the unthinkable occur.


(return to top).

PowerTech Group, Inc.

 

Everyone knows that cybersecurity is important, but getting started on the road to data protection and compliance can be confusing and intimidating. Understanding common vulnerabilities helps you focus your attention and resources on the areas that need the most help.
We all want “best-practice” security, but what are top organizations doing to achieve and maintain it?
Watch this webinar to learn the details about how to develop the seven habits that are part of daily life for secure organizations. You’ll learn how to:

  • Break the Ostrich Syndrome
  • Develop a Security Policy
  • Assess Current Standing
  • Perform Security Event Logging and Review
  • Use “Best of Breed” Technologies
  • Monitor for Ongoing Compliance
  • Plan for the Future
This on-demand webinar examines what each of these habits means to IBM i, and helps you make sure that you don’t become the next security statistic.


(return to top).

Profound Logic Software, Inc.

 

Watch this on-demand webinar and learn how to rapidly and easily deploy mobile apps to your organization – even when working with legacy RPG code! IBM Champion Scott Klement will demonstrate how to:

  • Develop RPG applications without mobile development experience
  • Deploy secure applications for any mobile device
  • Build one application for all platforms, including Apple and Android
  • Extend the life and reach of your IBM i (aka iSeries, AS400) platform
You’ll see examples from customers who have used our products and services to deliver the mobile applications of their dreams, faster and easier than they ever thought possible!
Watch this Webinar Now!

(return to top).

Halcyon, a HelpSystems Company

 

In this 45-minute recorded webinar, virtualization specialist Glenn Robinson joins Ash Giddings to discuss the use of VIOS in today’s demanding Power Systems environments. VIOS can help you realize real business value by reducing IT expenditure and adding the flexibility to grow and shrink resources according to data center demands through virtualization across IBM Power Systems estates.

(return to top).

Profound Logic Software, Inc.

 

In this presentation, Alex Roytman (CEO, Profound Logic) and Liam Allan (2016 COMMON Student Innovation Award winner) will unveil a completely new and unique way to modernize your legacy applications.
Learn how Agile Modernization:

  • Uses the power of Node.js in place of costly system re-writes and migrations
  • Enables you to modernize legacy systems in an iterative, low-risk manner
  • Makes it easier to hire developers for your modernization efforts
  • Integrates with Profound UI (GUI modernization) for a seamless, end-to-end legacy modernization solution


(return to top).

PowerTech

 

Your IBM i holds a massive amount of data. In most organizations, that data constitutes a mission-critical and high-value asset.
How do you adequately protect the data residing on your IBM i, given its value to your organization? IBM has provided us with many options for protecting our data, but it’s now always clear how to select and implement the best options for your circumstances.
This recorded webinar describes IBM i’s different data security options, along with implementation recommendations and tips for getting started. Carol Woodbury, one of the world’s top IBM i security experts, also provides considerations to help you determine how many layers of security are right for your organization.


(return to top).

Halcyon, a HelpSystems Company

 

Make Application Monitoring Easy Across the IBM i, Windows, AIX, and Linux Platforms in Your Environment

IT departments are constantly bombarded by information from a wide variety of operating systems, business applications, and critical processes. At the same time, the department must support a complex array of servers and devices running across their entire network.
With limited resources and the need to keep costs in check, more and more is expected of operational staff to handle this information efficiently.

In this 45-minute recorded webinar, we’ll dissect complex systems monitoring by introducing best practices and smart techniques that will help you:

  • Ensure vital business applications run smoothly and without disruption
  • Respond swiftly and with appropriate actions
  • Confirm that essential data is received at the right time
  • Prove service levels are maintained
  • Keep contingency and high availability strategies fully operational


(return to top).

HelpSystems

 

This 30-minute recording demystifies Linux on Power, AIX, and VIOS and teaches best practice techniques for maintaining and controlling critical processes and applications running on your Linux, AIX, and VIOS environments.

(return to top).

HelpSystems

 

Most business intelligence tools are just that: tools, a means to an end but not an accelerator. Yours could even be slowing you down. But what if your BI tool didn't just give you a platform for query-writing but also improved programmer productivity?
Watch the recorded webinar to see how Sequel:

  • Makes creating complex results simple
  • Eliminates barriers to data sources
  • Increases flexibility with data usage and distribution
Accelerated productivity makes everyone happy, from programmer to business user.


(return to top).

HelpSystems

 

What happens when your company depends on an outdated document management strategy?
Everything is harder.
Capturing documents means scanning and filing—which takes you away from tasks that actually matter to the business. Managing documents means sorting through an endless sea of shared folders or filing cabinets—and sometimes documents can’t be found. Distributing documents means following a frustrating, manual process for routing documents internally and sending them to vendors and customers.
You don’t need to stick with status quo anymore.
Watch the webinar to learn how to put effective document management into practice and:

  • Capture documents faster, instead of wasting everyone’s time
  • Manage documents easily, so you can always find them
  • Distribute documents automatically, and move on to the next task


(return to top).

HelpSystems

 

IBM i is one of technology’s best-kept secrets, with little information available about what IBM i users are doing on this server. Even companies that use this technology struggle to explain to their own teams what IBM i stands for and who else is using it. The IBM i Marketplace Survey—now in its fifth year—was designed to solve this problem. Watch this recorded webinar where we reveal the results of the 2019 survey! You’ll also gain exclusive insights from a panel of IBM i technology experts on year-over-year trends and new data points, including:

  • How did the POWER9 release impact infrastructure decisions?
  • Will security or HADR top the list of most pressing IT concerns?
  • What does the IBM i development scene look like?
  • Are shops expanding their IBM i usage?
  • Does IBM i have a better ROI than other servers?
Watch Now!


(return to top).

HelpSystems

 

IBM’s Steve Will talks AS/400, POWER9, cognitive systems, and everything in between

Are there still companies that use AS400? Of course!

IBM i was built on the same foundation.
Watch this recorded webinar with IBM i Chief Architect Steve Will and IBM Power Champion Tom Huntington to gain a unique perspective on the direction of this platform, including:

  • IBM i development strategies in progress at IBM
  • Ways that Watson will shake hands with IBM i
  • Key takeaways from the AS/400 days


(return to top).

HelpSystems

 

Everyone at your organization is asking for data-driven insights. And that means they’re turning to your IT team.
But there’s so much data to crawl through. It’s difficult to find the right set of data (e.g., on a department or on sales for a particular period). By the time you do, your organization’s needs might have changed. And you’ll have to start the search all over again.
It’s time to give your users the ability to get answers from IBM i data—without asking IT every time. That’s where Sequel Data Access comes in. With Sequel’s drill-down, you can empower users to “request” data at runtime.
See how it works. In just 30 minutes, you'll learn how to:

  • Create queries once and turn them over to the users
  • Set up predefined paths so users get instant insight
  • Give users the flexibility to dynamically drill into the detail
Ready to free up IT time and give your users the answers they need? Watch the webinar now.


(return to top).

PowerTech Group, Inc.

 

"From the world's largest corporations to small Internet stores, compliance with the PCI Data Security Standard (PCI DSS) is vital for all merchants who accept credit cards, online or offline, because nothing is more important than keeping your customer’s payment card data secure.” — PCI Security Standards Council
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms.
The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Watch this webinar to understand:

  • How PCI requirements relate to IBM i systems
  • IBM i-specific barriers to compliance
  • How PowerTech security solutions help you fulfill PCI requirements, meet compliance guidelines, and satisfy auditors
You’ll leave with the knowledge and confidence you need to evaluate PCI compliance requirements and prepare your IBM i system for today’s regulatory challenges.


(return to top).

HelpSystems

 

Your IBM i server performance is under attack from the outside, getting hammered by user-submitted queries and external applications, not to mention batch and interactive jobs.
You need to know when system performance degrades (and why) or your reputation—and potentially your job—could be on the line!
Watch this recorded webinar where our experts show you how proactive job monitoring and notification with Robot Monitor can really save your butt when things go bad. You’ll learn how to:

  • Set up monitoring for database requests: QZDASOINIT, QRWTSRVR, etc.
  • Bring visibility to SQL requests that are hammering your system
  • Watch for long-running jobs and other batch issues that slow throughput
  • Set up notification for jobs consuming too much CPU
  • Report on historical job and subsystem performance
  • Reduce run priority for offending jobs or hold them automatically
Don’t let QZDASOINIT jobs put a stranglehold on system resources while you fly blind. Get to the bottom of job performance issues faster with Robot Monitor.


(return to top).

PowerTech

 

Cyber attacks often target mission-critical servers, and those attack strategies are constantly changing. To stay on top of these threats, your cybersecurity strategies must evolve, too.
In this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level.
Robin will cover:

  • Reducing the risk posed by special authorities
  • Establishing object-level security
  • Overseeing user actions and data access
If you’re responsible for cybersecurity at your organization or you work on the IBM i platform, you don’t want to miss this chance to take your knowledge of IBM i security beyond the basics.


(return to top).

HelpSystems

 

Why AppDev Should Embrace Automation
Your application development team is an expensive resource that works hard to improve business processes, yet more and more IBM i shops are putting AppDev in charge of managing day-to-day system operations.
Instead of taking their attention away from the website, business analytics, mobile, security, SQL data access, and more, streamline operations with automation and build in notifications so your teams have visibility into processing when they need it, and can manage the rest by exception. In just 30 minutes, our experts will show how AppDev teams can take advantage of Robot automated operations on IBM i and beyond so they can:

  • Stop programming for multi-platform job and file event dependencies
  • Stop struggling with incorrect parameter values
  • Stop wondering where to fit a process into daily, weekly, or monthly cycles
  • Stop the on-call headaches, the firefighting, and the lack of progress cycle
Go ahead, give your AppDev team a productivity boost!


(return to top).

PowerTech Group, Inc.

 

IBM i is known for its security, but this OS could be more vulnerable than you think.
Although Power Servers often live inside the safety of the perimeter firewall, the risk of suffering a data leak or data corruption remains high.
Watch noted IBM i security expert Robin Tatam as he discusses common ways that this supposedly “secure” operating system may actually be vulnerable and who the culprits might be.


(return to top).

PowerTech

 

Security expert Carol Woodbury is joined by the newest member of the HelpSystems team: Debbie Saugen.
Debbie is recognized worldwide as an expert on IBM i backup and recovery, disaster recovery, and high availability. For decades, Debbie has helped IBM i shops build and implement effective business continuity plans.
In today’s business climate, business continuity is more important than ever. But 83 percent of organizations are not totally confident in their backup strategy.
During this webinar, Carol and Debbie discuss the importance of a good backup plan, how to ensure you’re backing up your security information, and your options for encrypted back-ups.


(return to top).

HelpSystems

 

Experts' fears surrounding the risks associated with poor configuration were recently confirmed by the 2017 State of IBM i Security Study. Published annually, the results reveal most Power Systems lack adequate security controls and auditing measures.
In this fast-paced webinar series, leading experts Robin Tatam, Carol Woodbury, and Sandi Moore share insight into critical areas of IBM i security.
Carol Woodbury, author of IBM i Security: Administration and Compliance, opens the series with an introduction to security-relevant system values.
System values are one of the fundamental elements of IBM i security. The security system values enable you to “set the tone” of security on your IBM i, enforce password composition rules, and enable auditing. In this on-demand event, watch as she describes these system values and provides guidance on their best practice settings.


(return to top).

Profound Logic Software, Inc.

 

In this Webinar, we'll demonstrate how Profound.js 2.0 enables you to easily adopt Node.js in your business, and to take advantage of the many benefits of Node, including access to a much larger pool of developers for IBM i and access to countless reusable open source code packages on npm (Node Package Manager).
You will see how Profound.js 2.0 allows you to:

  • Provide RPG-like capabilities for server-side JavaScript.
  • Easily create web and mobile application interfaces for Node on IBM i.
  • Let existing RPG programs call Node.js modules directly, and vice versa.
  • Automatically generate code for Node.js.
  • Automatically converts existing RPGLE code into clean, simplified Node.js code.
Fill out the form on the right to watch!


(return to top).

PowerTech Group, Inc.

 

“Security” is definitely on your IT staff’s to-do list, but how often does this item get checked off?

IT doesn’t have enough time for security—the 2016 IBM i Security Study proves it. The trouble is that data security isn’t a set-and-forget project. Data security on your IBM i requires on-going attention and expertise.
In this on-demand webinar, you’ll learn how to save time and work more effectively. We’re cutting to the core of IBM i security by outlining the simple strategy developed by our experts.
You’ll see a straightforward approach to understanding and addressing risk to your IBM i data. We’ll also show you how our world-class security services help people protect business-critical data when they don’t have the time, resources, or knowledge to tackle IBM i security on their own.


(return to top).

 

* Email Address



 
 
 

* Verify Email Address

 
  Note: An email will be sent to this address to confirm your order.
 

 

 


Interested in IBM Power System White Papers, Webcasts or Software solutions?
Then use the buttons below to visit our other centers!

MC White Paper Center
MC Webcast Center
MC Software Center