The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from.

>> Review the list of On-demand Webcasts offerings below.
>> Select the items you would like to receive.
>> Provide your email address at the bottom of the page and submit.
>> Your selection(s) will be sent to you without cost or obligation.
>> All information must be submitted in English.

We’re also giving one lucky person the opportunity to win a $100 Gift Card for the MC Press Bookstore

Simply add the $100 MC Press Bookstore Gift Card Drawing offering, along with as many of the other FREE offerings you would like to receive, and you'll be added to our next drawing.

2019 $100 Gift Card Winners:
January '19 - Glenda Bennett April '19 - Javeed Ahmed July '19 - Harry Freeman October '19 - NEXT DRAWING OCTOBER 31, 2019
February '19 - David Nelson May '19 - Steve AnIschenko August '19 - Joanna Davidson November '19 -
March '19 - David Hayes June '19 - Dennis Jones September '19 - Victor Manuel December '19 -


(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)


PowerTech

 

While most in the IT world are plenty aware of cybersecurity, staying on top of the latest trends and threats can be tough, especially for IBM i pros. You have a to-do list a mile long and security rarely bubbles to the top—unless and until something catastrophic happens.
While IBM i is one of the most securable platforms, the annual State of IBM i Security Study shows that many organizations are not taking the action necessary to adequately protect themselves from a data breach.
In this webinar, some of the best IBM i security minds in the world join forces for an insightful discussion. This session is geared to help you get from awareness of cybersecurity to active, concrete steps toward strengthening your IBM i security posture.
Security experts Carol Woodbury, Robin Tatam, Pat Botz, and Sandi Moore will cover:

  • IBM i security first steps: from educating yourself to uncovering vulnerabilities
  • Obtaining executive sponsorship for IBM i security projects
  • What to do if you no time for cybersecurity
  • The value of investing in cybersecurity
  • How the latest IT trends relate to IBM i
  • You don’t want to miss this!


    (return to top).

    PowerTech

     

    Although your IBM i server is one of the most securable platforms available, experts know that the protection of critical data is often undermined by weak security design at the application level. Programmers building new applications tend to want to solve a business problem and roll out code quickly—and don’t get me started on all of the legacy code we all have to deal with!
    In the second of this two-part webinar series, Robin Tatam combines his skills as a certified RPG developer with his IBM i security expertise. He covers the security considerations that native application programmers should be keenly aware of as they design their applications, including:

    • Object ownership
    • Adopted authority
    • Public and private authorities
    • Command line permission
    • Client-server considerations

    (return to top).

    HelpSystems

     

    Before AS/400 fans ever even heard the term “iSeries”, IBM had already rolled out the integrated file system (IFS) to give IBM i users the ability to run applications that don’t follow the traditional library structure.

    Today, IBM i shops use the IFS regularly for storage, web servers, applications, and more. Even the Windows IT team needs to access the IFS on IBM i for file exchanges! But with great power comes great responsibility—and many don’t have the knowledge or tools necessary to take full advantage of this technology.
    During this recorded webinar, you’ll learn basic tips, helpful tools, and integrated file system commands—including WRKLNK—for managing your IFS directories and Access Client Solutions (ACS). We’ll answer your most pressing IFS questions, including:

    • What is stored inside my IFS directories?
    • How do I monitor the IFS?
    • How do I replicate the IFS or back it up?
    • How do I secure the IFS?
    Understanding what the integrated file system is and how to work with it must be a critical part of your systems management plans for IBM i. If you don’t have the time—or the desire—to do it manually, we’ll also show you how HelpSystems tools can make it easy for you.
    Watch now!


    (return to top).

    HelpSystems

     

    The new POWER9 servers offer over two times more per-core capacity than POWER7+ servers, but is that what your business needs?
    When it’s time for hardware change, it pays to plan ahead.
    Within this webinar, you’ll learn why capacity planning on IBM i is more important now than ever before. You’ll also see a live demo of Performance Navigator—the leading tool for capacity planning on IBM i—and learn how combining the software with our capacity planning service engagement can help you:

    • Centralize years of historical performance data
    • Graph out the current performance status for each LPAR
    • Model peak historical workload days based on multiple “what-if” scenarios
    • Develop a cost-justification deliverable to share with decision makers
    It’s time to eliminate the guesswork and size your Power Systems servers with confidence.


    (return to top).

    PowerTech

     

    The Integrated File System (IFS) is one of most powerful features of IBM i servers, and yet it’s also among the most neglected areas of IBM i security.
    What makes this security gap so serious is that the IFS is a conduit to many things, including the Operating System and all your application libraries and files. The code for IBM i Access for Windows, IBM i Access for the web, Java, and WebSphere code is stored on the IFS. Most TCP/IP configuration files, as well as mail in POP and SMTP, are also stored in the IFS.
    Because the IFS is so integral to IBM i, failing to secure it could spell disaster for your organization. And there’s one IFS security gap that even experienced IBM i pros often overlook!
    Join this live webinar with IBM i security expert Sandi Moore to learn:

    • How the IFS is configured
    • Common IFS security mistakes—including a little-known vulnerability that allows malware to spread
    • Why malware is so devastating to the IFS
    • How to audit IFS activities
    Don’t miss this opportunity to learn how to start securing the IFS—and help ensure the stability of your IBM i.


    (return to top).

    HelpSystems

     

    High availability for IBM i has been a hot topic in 2017, jumping 20% from our 2016 survey to take the #2 seat on IT priority lists just behind cybersecurity. And no surprise with these two topics so closely tied to your most valuable asset: your irreplaceable business data.
    With major airline outages last year and the recent ransomware attacks, you must be asking yourself: am I doing everything I can to protect my organization’s data?
    Tune in as our panel of IBM i high availability experts—Tom Huntington, Matt Staddler, and Cole Ragland—deliver lively discussion around the top high availability issues of today, including:

    • Why companies don’t test role swaps when they know they should
    • Whether high availability in the cloud makes sense for IBM i users
    • Why some organizations don’t have high availability yet
    • How to get high availability up and running at your organization
    • High availability considerations for today’s security concerns
    There are no do-overs when it comes to your data. Once it’s gone, it’s gone...unless you have a data replication layer in place to protect it. Learn the value of these strategic solutions and how you can implement them in a hurry—watch now!


    (return to top).

    PowerTech

     

    Employees are an organization’s greatest asset—and yet 40 to 50 percent of data breaches are caused by insiders, according to cybersecurity experts.
    For IT teams, this makes user ID and access management a balancing act. Users need access to the files and applications required to do their jobs, but too much access increases the risk of a data breach.
    Walking that fine line can be tedious, time-consuming, and fraught with error—especially on IBM i, where data shows most users have far greater access than they actually need.
    The good news is there are several strategies that can make you and your users more efficient and improve your IBM i security posture at the same time. Join this session where IBM i security experts Robin Tatam and Sandi Moore will discuss:

    • How to require stronger IBM i passwords without adding to the help desk queue
    • Why automating user provisioning is a great career move
    • The security control that isn't on your to-do list yet, but probably should be


    (return to top).

    HelpSystems

     

    Let’s face it: IBM i experts and RPG programmers are retiring from the workforce. These folks have been managing all areas of your business—often manually and behind the scenes—for decades, everything from IT operations to data and documents to cybersecurity.
    Are you prepared to handle their departure?
    During this 30-mintue recorded webinar, our panel of IBM i experts—Chuck Losinski, Robin Tatam, Richard Schoen, and Tom Huntington—will outline strategies that allow your company to cope with IBM i skills depletion by adopting these strategies that allow you to get the job done without deep expertise on the OS:

    • Automate IBM i processes
    • Use managed services to help fill the gaps
    • Secure the system against data loss and viruses
    IBM i skills depletion is a top concern for IBM i shops around the world. The strategies you discover in this webinar will help you ensure that your system of record—your IBM i—continues to deliver a powerful business advantage, even as staff retires.


    (return to top).

    PowerTech

     

    If your manager asked you to determine whether your IBM i had been breached, what would you do?
    Perhaps your firewall failed, leaving your system open to the Internet or you have an external IP address for your IBM i. Regardless of the circumstances surrounding the exposure, do you know what information you have available to prove or disprove that a breach occurred? Or how to go about analyzing it?
    Based on a real scenario, Carol Woodbury will walk you through the information available on IBM i and show you her method for analyzing it.


    (return to top).

    PowerTech

     

    Security expert Carol Woodbury is joined by the newest member of the HelpSystems team: Debbie Saugen.
    Debbie is recognized worldwide as an expert on IBM i backup and recovery, disaster recovery, and high availability. For decades, Debbie has helped IBM i shops build and implement effective business continuity plans.
    In today’s business climate, business continuity is more important than ever. But 83 percent of organizations are not totally confident in their backup strategy.
    During this webinar, Carol and Debbie discuss the importance of a good backup plan, how to ensure you’re backing up your security information, and your options for encrypted back-ups.


    (return to top).

    PowerTech

     

    According to IBM X-Force, misconfiguration is one of the leading causes of data breaches. IBM i settings can also be misconfigured—either by mistake or neglect.
    During this session, IBM i security expert Carol Woodbury describes the top 10 IBM i security configuration errors that will leave your system—and therefore, your data and organization—vulnerable.


    (return to top).

    HelpSystems

     

    Everyone at your organization is asking for data-driven insights. And that means they’re turning to your IT team.
    But there’s so much data to crawl through. It’s difficult to find the right set of data (e.g., on a department or on sales for a particular period). By the time you do, your organization’s needs might have changed. And you’ll have to start the search all over again.
    It’s time to give your users the ability to get answers from IBM i data—without asking IT every time. That’s where Sequel Data Access comes in. With Sequel’s drill-down, you can empower users to “request” data at runtime.
    See how it works. In just 30 minutes, you'll learn how to:

    • Create queries once and turn them over to the users
    • Set up predefined paths so users get instant insight
    • Give users the flexibility to dynamically drill into the detail
    Ready to free up IT time and give your users the answers they need? Watch the webinar now.


    (return to top).

    Profound Logic Software, Inc.

     

    In this presentation, Alex Roytman (CEO, Profound Logic) and Liam Allan (2016 COMMON Student Innovation Award winner) will unveil a completely new and unique way to modernize your legacy applications.
    Learn how Agile Modernization:

    • Uses the power of Node.js in place of costly system re-writes and migrations
    • Enables you to modernize legacy systems in an iterative, low-risk manner
    • Makes it easier to hire developers for your modernization efforts
    • Integrates with Profound UI (GUI modernization) for a seamless, end-to-end legacy modernization solution


    (return to top).

    PowerTech

     

    Your odds of experiencing a data breach are now one in four, but a much larger number of attacks are unsuccessful. So, how are some organizations able to escape an attack unscathed while others suffer crushing financial losses?
    The difference is often found in the cybersecurity controls in place to guard mission-critical systems. Of course, the devil is in the details.
    In this on-demand webinar, IBM i security expert Sandi Moore and Chuck Losinski illustrate specific ways you can improve your security posture and stop an attacker in his tracks. They compare systems that have implemented best-practice security measures with systems that haven’t.
    You’ll learn what can happen when:

    • Users can connect through FTP without restrictions
    • System values are incorrectly set
    • Users carry excessive privileges
    This educational presentation is sure to help you look at IBM i security in a new light—and make changes that improve your odds of surviving a cyber attack.


    (return to top).

    HelpSystems

     

    Let’s face facts: servers don’t hack other servers. Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.
    User profiles are often duplicated or restored and are rarely reviewed for the appropriateness of their current configuration. This increases the risk of the profile being able to access data without the intended authority or having privileges that should be reserved for administrators.
    Watch noted security expert Robin Tatam as he discusses a new approach for onboarding new users on IBM i and best-practices techniques for managing and monitoring activities after they sign on.


    (return to top).

    PowerTech

     

    Here’s the harsh reality: cybersecurity pros have to get their jobs right every single day, while an attacker only has to succeed once to do incredible damage.
    A year after the massive Equifax data breach, Facebook revealed that an attack exposed millions of accounts. And Uber finally got the bill for its 2016 breach: a $148 million settlement with the state of New York—the largest data breach payout in history.
    It’s easy to judge those who fall victim, but these attacks are a chance to learn from others’ mistakes. What underlying vulnerabilities were overlooked and how can your organization avoid making similar mistakes?
    IBM i enjoys an enviable reputation for security, but no system is impervious to mistakes.
    Watch this webinar to learn about the biggest errors made when securing a Power Systems server. This knowledge is critical for ensuring integrity of your application data and preventing you from becoming the next Equifax. It’s also essential for complying with all formal regulations, including SOX, PCI, GDPR, and HIPAA.


    (return to top).

    PowerTech

     

    Get actionable info to avoid becoming the next cyberattack victim.
    In “Data breach digest—Scenarios from the field,” Verizon documented an AS/400 security breach. Whether you call it AS/400, iSeries, or IBM i, you now have proof that the system has been breached.
    Watch IBM i security expert Robin Tatam give an insightful discussion of the issues surrounding this specific scenario.
    Robin will also draw on his extensive cybersecurity experience to discuss policies, processes, and configuration details that you can implement to help reduce the risk of your system being the next victim of an attack.


    (return to top).

    PowerTech

     

    Some administrators struggle to get management’s attention when trying to address security on their IBM i partitions.
    For example, owners refuse to change their password. Other times, administrators know issues need to be resolved but can’t get organizational approval. Finally, we hear this at times: “Our focus has changed and we have no budget for security.” What seems to be missing with this last scenario is the fact that companies end up opening themselves to risk, integrity, and confidentiality issues during the time when other projects are taking priority.
    During this session, IBM i security expert Carol Woodbury will discuss how to address these issues. She will describe technical solutions that will help you overcome some of these management objections and steps you can take to reduce risk that won’t require organizational approval to implement.


    (return to top).

    PowerTech

     

    A growing number of compliance mandates require sensitive data to be encrypted, from the EU’s GDPR to New York’s cybersecurity law. PCI DSS goes a step further by detailing how encryption keys must be stored.
    For many organizations around the world, encryption isn’t just nice to have—it’s a necessity.
    But what kind of encryption solution will satisfy an auditor (they’re not all created equal!) and how can you implement encryption on IBM i?
    Watch this on-demand webinar with renowned security expert Robin Tatam to find out how to meet today’s most common encryption requirements on IBM i. You’ll also learn:

    • Why disk encryption isn’t enough
    • What sets strong encryption apart from other solutions
    • Important considerations before implementing encryption
    You’ll also get a quick peek at our Powertech Encryption for IBM i product that makes IBM i database encryption easier, faster, and more secure than other options on the market.


    (return to top).

    HelpSystems

     

    Still following manual processes for extracting and transferring data across platforms? You’re not alone. Many business still depend on RPG for their daily business processes and report generation. And that leads to a lot of manual effort.
    Wouldn’t it be nice if you could stop re-keying data between IBM i and other applications? Or if you could stop replicating data and start processing orders faster? Or what if you could automatically extract data from existing reports instead of re-keying?
    It’s all possible. Watch this webinar to learn about:

    • The data dilemma
    • 3 ways to stop re-keying data
    • Data automation in practice
    Plus, you’ll see a demonstration of how data automation software from HelpSystems will help you finally stop re-keying data.


    (return to top).

    PowerTech

     

    In today’s threat landscape, upper management is laser-focused on cybersecurity. You need to make progress in securing your systems—and make it fast.
    There’s no shortage of actions you could take, but what tactics will actually deliver the results you need? And how can you find a security strategy that fits your budget and time constraints?
    Join top IBM i security expert Robin Tatam as he outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.
    Your system didn’t become unsecure overnight and you won’t be able to turn it around overnight either. But quick wins are possible with IBM i security, and Robin Tatam will show you how to achieve them.


    (return to top).

    HelpSystems

     

    What happens when your company depends on an outdated document management strategy?
    Everything is harder.
    Capturing documents means scanning and filing—which takes you away from tasks that actually matter to the business. Managing documents means sorting through an endless sea of shared folders or filing cabinets—and sometimes documents can’t be found. Distributing documents means following a frustrating, manual process for routing documents internally and sending them to vendors and customers.
    You don’t need to stick with status quo anymore.
    Watch the webinar to learn how to put effective document management into practice and:

    • Capture documents faster, instead of wasting everyone’s time
    • Manage documents easily, so you can always find them
    • Distribute documents automatically, and move on to the next task


    (return to top).

    HelpSystems

     

    IBM i is one of technology’s best-kept secrets, with little information available about what IBM i users are doing on this server. Even companies that use this technology struggle to explain to their own teams what IBM i stands for and who else is using it. The IBM i Marketplace Survey—now in its fifth year—was designed to solve this problem. Watch this recorded webinar where we reveal the results of the 2019 survey! You’ll also gain exclusive insights from a panel of IBM i technology experts on year-over-year trends and new data points, including:

    • How did the POWER9 release impact infrastructure decisions?
    • Will security or HADR top the list of most pressing IT concerns?
    • What does the IBM i development scene look like?
    • Are shops expanding their IBM i usage?
    • Does IBM i have a better ROI than other servers?
    Watch Now!


    (return to top).

    Profound Logic Software, Inc.

     

    In this Webinar, we'll demonstrate how Profound.js 2.0 enables you to easily adopt Node.js in your business, and to take advantage of the many benefits of Node, including access to a much larger pool of developers for IBM i and access to countless reusable open source code packages on npm (Node Package Manager).
    You will see how Profound.js 2.0 allows you to:

    • Provide RPG-like capabilities for server-side JavaScript.
    • Easily create web and mobile application interfaces for Node on IBM i.
    • Let existing RPG programs call Node.js modules directly, and vice versa.
    • Automatically generate code for Node.js.
    • Automatically converts existing RPGLE code into clean, simplified Node.js code.
    Fill out the form on the right to watch!


    (return to top).

    PowerTech

     

    Protecting servers and data from infection by viruses and malicious software is not an unfamiliar concept to IT personnel but acknowledging how code-based threats can affect Power Systems servers is far less understood. This can have disastrous consequences.
    Myths about viruses and IBM i—including the belief that the system is entirely immune—have been debunked; however, most Power Systems owners still don’t perceive viruses as a risk because they consider them to only be a Windows threat.
    It’s critical to grasp the true impact upon IBM i and the network that connects to it. Attend this webinar to gain a thorough understanding of the relationships between:

    • Viruses, native objects, and the integrated file system (IFS)
    • Power Systems and Windows-based viruses and malware
    • PC-based anti-virus scanning versus native IBM i scanning
    There are several ways you can minimize your exposure to viruses. Join noted IBM i security expert Robin Tatam and native virus specialist Sandi Moore and learn the facts to ensure you are fully protected and compliant with regulations such as PCI.


    (return to top).

    HelpSystems

     

    Everyone wants a piece of your business data. But keeping up with data access requests in the era of constantly growing data is a challenge. As a result, your IT department can be overwhelmed, inundated, and constantly needing to play catch-up.
    It’s time to develop a strategy that will help you meet your informational challenges head-on. Watch the webinar to learn how to set your IT department up for business intelligence success in 2018.
    You’ll learn how the right data access tool will help you:

    • Access IBM i data faster
    • Deliver useful information to executives and business users
    • Empower users with secure data access
    Ready to make your game plan and finally keep up with your data access requests?


    (return to top).

    HelpSystems

     

    Your IBM i server performance is under attack from the outside, getting hammered by user-submitted queries and external applications, not to mention batch and interactive jobs.
    You need to know when system performance degrades (and why) or your reputation—and potentially your job—could be on the line!
    Watch this recorded webinar where our experts show you how proactive job monitoring and notification with Robot Monitor can really save your butt when things go bad. You’ll learn how to:

    • Set up monitoring for database requests: QZDASOINIT, QRWTSRVR, etc.
    • Bring visibility to SQL requests that are hammering your system
    • Watch for long-running jobs and other batch issues that slow throughput
    • Set up notification for jobs consuming too much CPU
    • Report on historical job and subsystem performance
    • Reduce run priority for offending jobs or hold them automatically
    Don’t let QZDASOINIT jobs put a stranglehold on system resources while you fly blind. Get to the bottom of job performance issues faster with Robot Monitor.


    (return to top).

    Profound Logic, Inc.

     

    Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

    Part 1 will teach you what Node.js is, why it's a great option for IBM i shops, and how to take advantage of the ecosystem surrounding Node.

    In addition to background information, our Director of Product Development Scott Klement will demonstrate applications that take advantage of the Node Package Manager (npm).


    (return to top).

    PowerTech

     

    It’s time to set the record straight about encryption on IBM i.
    Strong encryption is more important than ever, with cyberthreats growing in number and sophistication every day. But most IBM i organizations are not encrypting their IBM i database.
    In fact, the latest IBM i Marketplace Survey shows that most IBM i organizations have no plans to implement database encryption. When you consider all the ways strong encryption could avert a data breach disaster, this is quite a surprising result.
    In this live webinar, IBM i security expert Sandi Moore breaks down some of the most common (and persistent!) myths that stop IT pros from implementing encryption on IBM i. She’ll also give you a peek at our Powertech Encryption solution that makes database encryption easier, faster, and more secure than other options on the market.
    If you’re concerned with protecting your IBM i data, you don’t want to miss this event.


    (return to top).

    PowerTech

     

    Cyber attacks often target mission-critical servers, and those attack strategies are constantly changing. To stay on top of these threats, your cybersecurity strategies must evolve, too.
    In this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level.
    Robin will cover:

    • Reducing the risk posed by special authorities
    • Establishing object-level security
    • Overseeing user actions and data access
    If you’re responsible for cybersecurity at your organization or you work on the IBM i platform, you don’t want to miss this chance to take your knowledge of IBM i security beyond the basics.


    (return to top).

    PowerTech

     

    Time is short. As an administrator, you know that you should be looking at the security configuration of your system, reviewing reports on a regular basis, and performing specific tasks, but you don’t have the time to investigate exactly what that means.
    During this webinar, Carol will provide a checklist of tasks that you can follow and actions you can take to ensure that you are following the best practices for security on your IBM i. Examples of what will be discussed include:

    • Which system values should be reviewed for changes
    • The audit journal entries that should be reviewed on a regular basis
    • Best practice settings for user profile configuration (including group profiles and service accounts)
    • Examples of using the security services in QSYS2 to make configuration review easier


    (return to top).

    PowerTech

     

    Unfortunately this is fiction.
    In this webinar, Robin Tatam explores a well-documented IBM i breach. Despite the many options IBM has provided to protect the system and data, many organizations still struggle to apply appropriate security controls. Protecting the system and the data residing on it requires action. Robin describes the steps you can take to avoid the mistakes made in this specific case as well as other configurations that can lead to business disruption due to inadequate or misconfigured security settings.
    One FACT is that IBM i is secure-able.


    (return to top).

    PowerTech

     

    Data breaches like Equifax and Capital One have once again raised the specter of compliance mandates: those abstract rules and confusing regulations that levy eye-popping fines for cybersecurity missteps.
    IT teams are on the front lines, tasked with maintaining system configurations that will pass an audit—but few mandates are written for a technical audience. Laws like HIPAA, SOX, and GDPR give us a general sense of what outcome we need to achieve, but they’re far from an instruction manual or roadmap.
    IBM i raises unique considerations because few auditors know what to look for on this open but highly securable OS, and most admins are unfamiliar with regulations and security best practices.
    In this webinar, IBM Champion Robin Tatam and security expert Sandi Moore team up to help you decode common requirements and build a roadmap to compliance. Watch this session to learn:

    • What all compliance mandates have in common
    • How to translate mandates into actionable items
    • How to speak your auditor’s language
    • Strategies for getting (and staying) compliant on IBM i
    • Why regulations aren’t the only reasons to care about security


    (return to top).

    HelpSystems

     

    Do your users keep paperwork on their desk until it's processed?
    Are people constantly removing documents from filing cabinets?
    What happens when your company depends on an outdated document management strategy?
    Too much paper is wasted—approximately 1,000 pages per month per worker.
    Attempts to locate documents in endless filing cabinets drive your employees crazy.
    And distributing documents to customers, vendors, and business partners is expensive and takes up far too much time.
    These are just three common reasons why it might be time for your company to implement a paperless document management system.
    Watch the webinar to learn more and discover how easy it can be to:

    • Capture
    • Manage
    • And distribute documents digitally
    Plus, our experts will provide a live demonstration of how implementing a document management solution will quickly solve your paper-based problems, so you can be more efficient.


    (return to top).

    PowerTech

     

    Real-world insight into the deployment of IBM i security controls is rare. What people say they’re doing for doing for IBM i security is often wildly different from what they’re actually doing. But each year, Powertech audits the security controls deployed on hundreds of IBM i servers, providing impartial data around seven configuration categories:

    • Network-initiated commands & data access
    • Server-level security controls
    • Profile and password settings
    • Administrative capabilities
    • Public accessibility to corporate data
    • System event auditing
    • Antivirus protection
    The results of these audits are compiled in the annual State of IBM i Security Study. In this live webinar, we’re diving into the top 6 takeaways from the 2019 study and examining what the new data tells us about future of this OS.
    IBM i Champion Tom Huntington joins security experts Robin Tatam and Sandi Moore for an insightful discussion about what organizations around the world are doing to protect IBM i and how this data can help guide your cybersecurity plans.


    (return to top).

    PowerTech Group, Inc.

     

    IBM i is known for its security, but this OS could be more vulnerable than you think.
    Although Power Servers often live inside the safety of the perimeter firewall, the risk of suffering a data leak or data corruption remains high.
    Watch noted IBM i security expert Robin Tatam as he discusses common ways that this supposedly “secure” operating system may actually be vulnerable and who the culprits might be.


    (return to top).

    HelpSystems

     

    When IBM i disk space pulls its notorious disappearing act, you don’t have time to waste figuring out how the trick is done. You need to know when disk space starts to disappear and where it has gone before system performance and productivity start to suffer.
    Looking behind the curtain to keep a close eye on disk space—especially in a multi-partition environment—can have its challenges, but every good admin can have an ace up their sleeve. Our experts will show you how Robot Monitor can help you pinpoint exactly when your auxiliary storage starts to disappear and why, so you can start taking a proactive approach to disk monitoring and analysis. You’ll also get insight into:

    • The main sources of disk consumption
    • How to monitor temporary storage and QTEMP objects in real time
    • How to monitor objects and libraries in real time and near-real time
    • How to track long-term disk trends
    Start seeing through the sleight of hand and get instant visibility into disk usage. Add advance warning of potential threats and—abracadabra!—you’ll reduce the risk of disk space depletion and curb the sudden flurry of activity to clean things up.


    (return to top).

    HelpSystems

     

    Each year, HelpSystems surveys the global IBM i community to understand how they leverage this trusted platform to support their business initiatives and what their plans are. With so many companies relying on IBM i platform to run their operations, we thought you’d be interested in hearing from this community about the role of business intelligence and what it means today.
    During this recorded webinar, Tom Huntington and Mike Stegeman discuss the four main areas of interest when it comes to business intelligence on the IBM i platform:

    • Modernization and mobility
    • Data growth and analytics
    • Depletion of skills
    • ROI
    Watch now!


    (return to top).

    PowerTech

     

    Everyone loves single sign on. When you integrate authentication across applications and environments—Windows, IBM i, UNIX, Linux, Apache, WAS—you virtually eliminate password hassles for everyone in your organization.
    In this webinar, security expert Patrick Botz explains a new way to cut through the technical complexity of single sign on. He offers fresh, practical approach that brings SSO within easy reach of nearly any organization.
    You’ll learn concepts and tips that every IT professional should know about SSO:

    • Two technologies that do the lion’s share of SSO work for most organizations
    • How to identify the best SSO solution for your organization
    • When it makes sense to use new “managed” SSO services


    (return to top).

    HelpSystems

     

    Experts' fears surrounding the risks associated with poor configuration were recently confirmed by the 2017 State of IBM i Security Study. Published annually, the results reveal most Power Systems lack adequate security controls and auditing measures.
    In this fast-paced webinar series, leading experts Robin Tatam, Carol Woodbury, and Sandi Moore share insight into critical areas of IBM i security.
    Carol Woodbury, author of IBM i Security: Administration and Compliance, opens the series with an introduction to security-relevant system values.
    System values are one of the fundamental elements of IBM i security. The security system values enable you to “set the tone” of security on your IBM i, enforce password composition rules, and enable auditing. In this on-demand event, watch as she describes these system values and provides guidance on their best practice settings.


    (return to top).

    Core Security

     

    With so many organizations depending on AIX day to day, ensuring proper security and configuration is critical to ensure the safety of your environment. Don’t let common threats put your critical AIX servers at risk. Avoid simple mistakes and start to build a long-term plan with this AIX Security eCourse. Enroll today to get easy to follow instructions on topics like:

    • Removing extraneous files
    • Patching systems efficiently
    • Setting and validating permissions
    • Managing service considerations
    • Getting overall visibility into your networks


    (return to top).

    PowerTech

     

    If you’ve done no preparation prior to your organization being breached . . . it’s too late! During this session, security expert Carol Woodbury will guide you through the considerations and preparations you’ll want to make PRIOR to being breached.
    No one can ever be 100% prepared for the aftermath of a breach. The goal of this webinar is to help you think through what resources and information you’ll need to be as prepared as possible should the unthinkable occur.


    (return to top).

    HelpSystems

     

    Experts agree that one of the most overlooked areas of IBM i security is the Integrated File System. Available since V3R1, the IFS provides access for users carrying nothing more than a user profile and password, so it better be secure! If you believe nothing important is stored on your server's IFS, think again, because it's a conduit to many things, including the Operating System and all of your application libraries and files.
    Watch this important session to learn about securing the IFS, including:

    • Why do we care about the IFS?
    • Permissions versus Authority
    • Root folder access
    • Auditing IFS activities
    • Read/Write versus *ALLOBJ
    • Anti-Virus Considerations

    (return to top).

    Profound Logic Software, Inc.

     

    When it comes to IBM® Rational® Open Access: RPG Edition (also known as RPG Open Access), there are still many misconceptions - especially where application modernization is concerned!

    In this Webinar, we'll address some of the biggest myths about RPG Open Access, including:

    • Modernizing with RPG OA requires significant changes to the source code
    • The RPG language is outdated and impractical for modernizing applications
    • Modernizing with RPG OA is the equivalent to "screen scraping"
    This Webinar features IBM i expert Alison Butterill, and Profound Logic’s Brian May and Alex Roytman.

    Watch the On-demand Webinar Now!

    (return to top).

    HelpSystems

     

    There’s a better way to run your queries. With an advanced query tool like Sequel Data Access, you can deliver the IBM i data your organization needs quickly and efficiently—without the hang-ups.
    In this session, we’ll address common frustrations with Query/400, discuss major data access and distribution trends, and help you understand what to look for in a more advanced query tool.
    Plus, you’ll learn how a tool like Sequel lightens IT’s load by:

    • Accessing real-time data, so you can make real-time decisions
    • Providing run-time prompts, so users can help themselves
    • Delivering instant results in Microsoft Excel and PDF, without the wait
    • Automating the query process with on-demand data, dashboards, and scheduled jobs
    • Watch the webinar and learn why you shouldn’t just settle for Query/400.


    (return to top).

    PowerTech

     

    As cyber threats become more sophisticated, strong encryption is essential.
    DB2 Field Procedures (FieldProcs) can greatly simplify encryption on IBM i, yet most organizations are not yet utilizing this powerful feature.
    Join this live webinar to learn how to quickly encrypt sensitive data on IBM i--and avert a data breach disaster.
    IBM i security expert Sandi Moore shows you how you can automate encryption and decryption, why disk encryption is no substitute for database encryption, and important factors to consider when looking at an encryption solution.
    If you're concerned with protecting your sensitive IBM i data, you don't want to miss this session!


    (return to top).

    HelpSystems

     

    You’re responsible for looking after Windows, Linux, AIX, and VIOS, but you worry that you don’t understand their complexities well enough to make your job effective—or easy.
    No problem! Simplify the management of multiple operating systems and applications without becoming experts in each area.
    In this 30-minute recorded webinar, our experts demonstrate how you can:

    • Manage multiple platforms from a central location
    • View monitoring results in a single pane of glass on your desktop or mobile device
    • Take advantage of best practice, plug-and-play monitoring templates
    • Create rules to automate daily checks across your entire infrastructure
    • Receive notification if something is wrong or about to go wrong
    This presentation includes a live demo of Network Server Suite and shows how easy monitoring multiple operating systems and applications can be using point-and-click technology.


    (return to top).

    PowerTech

     

    IBM i provides many options for securing the system and/or the data. Some, like working with user profiles, object authorities, and system values are obvious. Others … not so much.
    During this session, IBM i security expert Carol Woodbury explores some of the more obscure features of IBM i security—such as using the audit journal to determine whether sessions are encrypted, securing DDM, using an authorization list to prevent access to /QSYS.LIB, and more.
    You don't want to miss this far-reaching discussion!


    (return to top).

    HelpSystems

     

    IBM’s Steve Will talks AS/400, POWER9, IBM i 7.4, cognitive systems, and everything in between
    The 2019 chapter in our journey from AS/400 to IBM i includes new hardware (POWER9), new software (IBM i 7.4), new customers, and a strong roadmap. How do these additions make the platform more powerful? How does cognitive computing come into play?
    Back by popular demand, IBM i Chief Architect Steve Will joins IBM Power Champion Tom Huntington to share a unique perspective on the direction of this platform, including:

    • IBM i development strategies in progress at IBM
    • Ways that AI will shake hands with IBM i
    • Key takeaways from the AS/400 days
    IBM i stands on the shoulders of giants. Its heritage and strategic innovation point to a bright future for this strategic server that continues to support organizations in every industry around the world.
    Don't miss a moment as the saga unfolds—watch now!


    (return to top).

    Profound Logic, Inc.

     

    Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here.
    In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control.
    Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform.
    Attend this webinar to learn:

    • Different tools to develop Node.js applications on IBM i
    • Debugging Node.js
    • The basics of Git and tools to help those new to it
    • Using NodeRun.com as a pre-built development environment


    (return to top).

    MC Press Online, LLC

     

    We’re giving one lucky person the opportunity to choose their own selection of books from the MC Press Bookstore with a $100 MC Press Bookstore Gift Card.

    Simply add this offering, along with as many of the FREE offerings you would like to receive and you'll be entered in our next drawing.

    Visit the MC Press Bookstore at www.mc-store.com to see our selection of books.

    Next Drawing: October 31, 2019.


    (USA and CANADA only!)

    (return to top).

    PowerTech

     

    All Object (*ALLOBJ) special authority is probably the best-known and most feared authority in the IBM i community. This “root” access is unrestricted authority to every object on the system—and users love it! Who wouldn’t want an all-access pass to the data and applications you need to get your job done?

    But there’s a dark side to *ALLOBJ. A master key to read, change, and delete any object on the system creates a frightening opportunity for abuse. 25 percent of data breaches involve insiders—and many studies suggest that number may be much higher. What many don’t realize is that these breaches are often unintentional.
    That’s right—your users with *ALLOBJ could be perfectly trustworthy and still cause a data breach.
    In this live webinar, security expert and IBM Champion Robin Tatam explores:

    • Best practices for All Object authority (and data around what IBM i orgs are actually doing)
    • Strategies for correcting this vulnerability—without reducing productivity
    • Several other ways IBM i users gain elevated privileges
    You’ll learn simple changes you can make to improve system security and reduce the odds of a breach. Robin will also introduce an automated solution that balances your organization’s need for security and efficiency.


    (return to top).

    PowerTech

     

    Penetration testing is increasingly required by laws and regulations around the world. But what, exactly, is penetration testing? What should organizations expect from a pen test and how should they prepare for one?
    Bobby Kuzma from Core Security, a HelpSystems Company, joins Carol Woodbury and John Vanderwall for a lively panel discussion on penetration testing at the network level as well as for IBM i.
    Watch now to learn more about penetration testing as well as hear some tales from the field!


    (return to top).

    PowerTech

     

    Get the details on new IBM i security features in this on-demand session with Carol Woodbury!
    IBM recently announced a new version of IBM i: V7R4. With it comes several important security enhancements.
    Join this live webinar where IBM i security expert Carol Woodbury will describe the brand-new enhancements as well as the security enhancements introduced in V7R3. Carol also discusses features from previous IBM i releases that you may have missed or forgotten about.
    These powerful features are built into the IBM i OS and will make your security administration easier. Don’t miss this important information!


    (return to top).

    PowerTech

     

    Can you trust all of your users all of the time?
    A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six month later.
    A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime.
    In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

    • How phishing attacks are becoming more sophisticated
    • Three little-known ways malicious programs can reach your IFS
    • Why the IFS is IBM i’s “Typhoid Mary”
    You’ll also learn why some of the most common malware solutions still leave IBM i systems vulnerable—and what you can do to protect your organization.


    (return to top).

    PowerTech

     

    Although your IBM i server is one of the most securable platforms available, experts know that the protection of critical data is often undermined by weak security design at the application level. Programmers building new applications tend to want to solve a business problem and roll out code quickly—and don’t get me started on all of the legacy code we all have to deal with!
    In the first of this two-part webinar series, Robin Tatam combines his skills as a certified RPG developer with his IBM i security expertise. He covers the security considerations that native application programmers should be keenly aware of as they design their applications, including:

    • Object ownership
    • Adopted authority
    • Public and private authorities
    • Command line permission
    • Client-server considerations

    (return to top).

    PowerTech

     

    The use of encrypted sessions is both an effective way to prevent credential theft, as well as a requirement for numerous laws and regulations.
    In this session, security expert Carol Woodbury shows you how to configure the replacement for Client Access—Access Client Solutions—to use an encrypted (TLS) session.
    This webinar will include an example of using your IBM i as a CA (Certificate Authority). You’ll also see an example of creating a request to send to a well-known CA to create the digital certificate you’ll need to assign to the servers to enable encrypted communications.


    (return to top).

    HelpSystems

     

    Most business intelligence tools are just that: tools, a means to an end but not an accelerator. Yours could even be slowing you down. But what if your BI tool didn't just give you a platform for query-writing but also improved programmer productivity?
    Watch the recorded webinar to see how Sequel:

    • Makes creating complex results simple
    • Eliminates barriers to data sources
    • Increases flexibility with data usage and distribution
    Accelerated productivity makes everyone happy, from programmer to business user.


    (return to top).

    PowerTech

     

    Powertech’s annual “State of IBM i Security Study” shows the vast majority of organizations remain reliant on menu security and command line restrictions to protect their enterprise data. Unfortunately, modern interfaces like FTP and ODBC completely bypass these controls, often allowing end users to view, update, and delete data in the database without the restrictions and auditing supplied by the application.
    Learning about the power and openness of these interfaces is critical for ensuring the integrity of the server’s application data. It’s also an essential step in complying with all formal regulations, including SOX, PCI, and HIPAA.
    Watch this informative webinar to learn how to close the “back doors” not covered by traditional security schemes. Robin Tatam will explain exit point security and why this little-understood topic is so important to IBM i organizations.
    You’ll also see a short demonstration of how to implement policies that restrict access to only those users who need it.


    (return to top).

    Profound Logic Software, Inc.

     

    Roses are red, your UIs are green… It’s time to make your apps proud to be seen!
    Whether you have green screens or a drab GUI, your outdated apps can benefit from modern source code, modern GUIs, and modern tools.
    Profound Logic’s Alex Roytman and Liam Allan are here to show you how Free-format RPG and Node.js make it possible to deliver applications your whole business will love.
    In this webinar, you’ll learn how you can use both Profound UI and Profound.js to:

    - Transform legacy RPG code to modern free-format RPG and Node.js
    - Deliver truly modern application interfaces with Profound UI
    - Extend your RPG applications to include Web Services and NPM packages with Node.js


    (return to top).

     

    * Email Address



     
     
     

    * Verify Email Address

     
      Note: An email will be sent to this address to confirm your order.
     

     

     


    Interested in IBM Power System White Papers, Webcasts or Software solutions?
    Then use the buttons below to visit our other centers!

    MC White Paper Center
    MC Webcast Center
    MC Software Center