Common Europe Webinars
Common Europe Webinars are short, online, educational or vendor sponsored content delivered to our members through an online learning platform. These webinars offer a unique learning experience for those members who cannot attend an in-person event or who simply want to supplement their education or information received from Common Europe and its vendor community. Webinar education is delivered by industry experts, IBM developers, and like-minded peers.
Improve IBM i Developer Productivity by 50%
Tuesday, 2 July 2019
Do you ever find yourself thinking, "There has to be a better way to do this?”
With automated analysis and modernization tools, you can reduce the time spent managing IBM i applications and onboarding new developers, move projects forward faster, and reduce the risks involved in making changes to your code.
In this webinar, Fresche’s Stephen Flaherty demonstrates the business value derived from application documentation, analysis and better understanding of your IBM i applications.
About the presenters
- Automated graphical documentation that makes it easy for IT to visualize and understand application design and flow
- Powerful impact analysis that tracks “where used” information so you can make code changes with confidence
- How IBM i organizations have used X-Analysis to save significant developer time and better understand their applications
Following 25 plus years of work in the IBM arena, starting with the System 38, with exposure to AS/400, iSeries and now the IBMi, Stephen Flaherty has added numerous projects to his portfolio, all specializing in RPG coding. The opportunity he has had to be a part of multiple ERP packages such as JD Edwards, Mapics, PRISM, HFA, and MacPac, in addition to several EDI (Electronic Data Interchange) packages such as Trusted Link, Inovis, and GXS, make him a great asset to the pre-sales team at Fresche for the American market. His current role as a Technical Engineer enables him to ensure the best communication between sales and new and existing customers on a variety of products, helping clients transform or update their systems through individual strategies.
Eliminate Blind Spots in Your ServiceNow Discovery Environment
Original broadcast -Tuesday, 4 June 2019
ServiceNow Discovery locates applications and devices on your network, and then updates the Configuration Management Database (CMDB) with the information it finds. However, it does not address the traditional IBM mainframe or IBM i systems, leaving your organization with a critical blind spot.
Join us on Tuesday 4th of June at 13.00 to learn how Syncsort’s Ironstream for ServiceNow extends the ServiceNow discovery process to include mainframe and IBM i data, helping companies to have a complete view of their environment enabling them to deliver consistent, reliable, and efficient service to their users.
We'll also be explaining how to::
About the presenters
- Drive smarter IT decisions by establishing a single view of your IT infrastructure
- Improve service management quality for change, incident management and compliance – including traditional IBM environments – through effective service modelling
- Leverage your investment into ServiceNow to automate tasks and expand your capabilities, unlocking insights previously not possible
Trent has over 25 years in the software industry with a key focus on the IT Operations Management (ITOM) marketplace and today’s leading modern enterprise platforms. Now part of the Syncsort team, Mr. Gregory was formerly President and Chief Corporate Evangelist at EView Technology and has held various key roles in both private and global public organizations including: IBM, the PGATour, NetTech, and Nortel Networks.
6 RDi Tutorials in 60 Minutes
Original broadcast -Tuesday, 30 April 2019
See how the experts use Rational Developer for i for modern RPG development
In order to modernize your RPG code and bring IBM i applications development into the 21st century, you also need to modernize your application development environment and move away from PDM/SEU.
Rational Developer for i (RDi) is the only editor from IBM that fully supports all that today’s RPG can do. But that’s not the only reason to move from the green screen PDM/SEU editor to RDi.
Don’t miss this live webinar where RDi evangelists and educators Susan Gantner and Charlie Guarino provide a quick, hands-on tutorial for six of their favourite features in RDi, including:
- RDi overview
- Basic LPEX
- Advanced Editor tools
- Code navigation
HelpSystems will also share a sneak preview of the roadmap for upcoming RDi features.
The future is integrated development environment (IDE) tools like RDi. It’s time to move away from green screen tools and deliver truly modern applications faster than ever.
We look forward to having you join us on 30th April!
About the presenters
President, Central Park Data Systems
Charles Guarino believes in the power of IBM Power Systems. His career reflects his interest in bringing the platform and its solutions to others. Charles started his professional journey as a department of one. Today, he is serving individuals on a worldwide basis though his consulting work and award-winning speaking engagements. Charles is a true people person and can often be found at conferences sharing his expertise in RDi and other IBM i topics.
Susan Gantner is an IBM i evangelist, developer, educator, and author. She specializes in modern development techniques and tools, primarily with RPG and Rational Developer for i (RDi).
As part of Partner400, she delivers customized education offerings for IBM i shops and local user groups. She is also part of System i Developer, co-hosting the semi-annual RPG & DB2 Summit events.
Susan co-authored of two IBM redbooks on modern RPG coding and you can find online a wide variety of her articles and blog posts about RPG, RDi, and Db2 for i written for IBM Systems Magazine, IT Jungle, and others. She has been honored as an IBM Champion for Power Systems for many years.
Webinar: IBM i Security Best Practices
Original broadcast -Tuesday, 2 April 2019
Security best practice and regulatory compliance are a constantly moving target. In this webinar, Jeff Uehling, Syncsort’s Product Management Director for security solutions and former architect for the security functions in the IBM i OS, shares what he has learned in his over 30 years of experience about best practices necessary to secure your IBM i server.
- Why you need to run at security level 50 – and the exposures of running at lower levels
- How to detect and prevent programs that could compromise system security
- Necessary system value settings
- How to apply cryptography to protect your data
- Network security requirements
- Security considerations for mobile deployments
- How Syncsort’s security solutions help you achieve best practice
Whether you are a systems security officer or an IBM i system administrator, you don’t want to miss this webinar.
About the presenters
Product Management Director, Syncsort Security
Jeff Uehling is Syncsort’s Product Management Director working directly with the Syncsort security product suite. He has more than 30 years of experience working in security technology for the IBM i, and predecessor systems. Jeff previously worked in the IBM i OS development group, specifically as lead architect of the security development team in Rochester, Minnesota. His previous responsibilities at IBM included architecture, design and development of IBM i security. He has also served as a council member of the IBM security technical community. Jeff’s primary interests lie in the area of system integrity and now, given the current business environment, cryptography and compliance.
Webinar: Securely Deploying IBM’s Access Client Solutions (ACS)
Original broadcast - Thursday, 31 January 2019
As the deadline looms for Client Access to go out of service (April 2019) and organizations move to using Access Client Solutions (ACS), many IT professionals are asking questions about ACS deployment.
Can features be limited? Can we customize the deployment so that administrators receive all features and everyone else receives limited features? How can ACS be deployed so users can’t change the configuration?
IBM i pro Steve Sisk joins Carol Woodbury to demonstrate the ACS deployment process and answer these and other questions about securely deploying ACS.
About the presenters
Vice President of Global Security Services at HelpSystems
Carol is a Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC), and has her PCIP certification. She is also a member of the ISACA organization and has been named IBM Champion for her thought leadership on the IBM i platform.
With over 25 years of experience in IT security, Carol is known worldwide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small- and medium-sized organizations. Carol is passionate about making sure the solutions implemented meet the customers' needs—a passion that first started with her business, SkyView Partners, and is now part of her position as VP of Global Security Services at HelpSystems.
Carol is an architect, designer, implementer, educator, and an award-winning speaker and author with specialties in IBM i, i5/OS, OS/400, AS/400, iSeries, AIX, and Linux security and compliance. She is known worldwide as an author and speaker on security technology, specializing in IBM i security issues.
Senior Security Strategy Consultant at HelpSystems
Prior to joining HelpSystems in 2016, Steve has held a variety of positions including lead architect for an IBM Global Services Strategy team, solution architect and lead engineer designing and implementing solutions for compliance requirements of general controls, PCI DSS and HIPAA in large IBM i installations of numerous organizations. Steve's experience spans supply chain, finance, health care, insurance, ecommerce, retail, utilities and manufacturing. Steve holds the PCI Professional certification.
Webinar: 10 Hidden Gems of BRMS for IBM i
Original broadcast - Wednesday, 7 November 2018
Get insider tech tips on the most helpful features of Backup, Recovery and Media Services for i (BRMS)!
What if your IBM i came equipped with a tool that could help you automate and manage backup/recovery across your enterprise IBM i environment?
What’s that, you say? It’s called BRMS for i? That’s right!
BRMS is already available as a licensed program product (LPP), yet many IBM i shops are not taking full advantage of its best features, which can speed their backups and recoveries and ease day-to-day backup management.
Register to attend this webinar where Debbie Saugen, former IBMer and leading BRMS technology expert, highlights its most helpful features, such as:
About the presenters
- BRMS and FlashCopy for 24/7 operations
- Virtual tape libraries (VTLs) and BRMS parallel saves
- Managing enterprise IBM i backup and recovery
Director of Business Continuity Services
Debbie Saugen is Director of Business Continuity Services at HelpSystems. Debbie is recognized worldwide as an expert on IBM i backup and recovery, disaster recovery, and high availability.
A COMMON Gold Medal Speaker, she enjoys sharing her knowledge speaking at conferences and user groups, along with publishing articles. Debbie is passionate about solving business continuity issues and providing the best solution for customers.
Today, Debbie Saugen leads the business continutiy services team at HelpSystems. Whether you’re just getting started with business continuity for IBM i or you already have software solutions in place, Debbie and the rest of our team can provide the attention and expertise your system needs so you don’t have to.
Director of EMEA Technical Services
Donnie MacColl is Director of EMEA Technical Services at HelpSystems. He has worked for more than 25 years in the IT industry, initially specializing in the management of IBM systems in manufacturing and logistics companies, and later in his career developing expertise in network and enterprise management.