iTech Solutions - for all of your IBM i System needs

Upcoming Webinars

Posted on April 3, 2020

Sips & Tricks: Coffee with iTech
Understanding Save and Restore

Monday, April 13th, 2:00 – 2:30 PM ET

[ Register Now ]


Posted on March 26, 2020

Sips & Tricks: Coffee with iTech
Issues with Saving your Environment when the Company is Closed

Monday April 6th, 10:30 – 11:00 AM ET

[ Register Now ]


Posted on March 19, 2020

Join us Tuesday, April 14th at 2PM ET.

Whether embarking on a  digital transformation, looking for rapid app development or focusing on innovative Software solutions, learn how IBM can assist in maximizing your Open Source investment around Community Open Source Software agnostically.

[ Register Here ]


Posted on March 16, 2020

Join us for two days of completely virtual complimentary IBM i education.

Wednesday, April 8th – Thursday, April 9th
10:00 AM – 3:30 PM ET

[ Register Here ]


Posted on January 14, 2020

Northeast IBM i User Group Conference

June 1-3, 2020

Sheraton Framingham Hotel
1657 Worcester Road
Framingham, MA


Posted on March 7, 2019

Rapid Fire Admin

This overflowing session is designed to help ensure every IBM i administrator and operator has at least a backpack full of valuable tips for when they return home. From command line to shell to IBM Navigator for i, Steve will sprint through these tips at a pace of at least two tips per minute, for at least 150 tips! This session is updated every quarter with new and relevant information so that you don’t miss good foundational tips but are keeping up with what updates IBM is releasing on a regular basis.

Anatomy of a Security Failure

After the dust settles after a security breach, the next logical questions are: “What happened and how can we prevent it from happening again?” We will deconstruct a number of security failures that will provide lessons that you can take home and put to use immediately.

Anatomy of a Bad Password

Do you know the differences between IBM i password levels? How about password rules that aren’t used or actually used too much to be effective? What about common patterns from keyboards to mobile devices that make it easy for someone to just guess your password? Steve will talk about how good and bad passwords are constructed as well as how to break them with social engineering, dictionary attacks, brute force attacks and more. Learn why most passwords stink so you can protect yourself and your users.

IBM i and our False Sense of Security

While IBM i is arguably the most “securable” operating system in the world, your environment may have some wide open doors that you can’t ignore. This session will highlight the importance of encrypting data in transit and show you how to do it easily with minimal interruption to the business.

Updating our IBM i Modernization Mindset

Make modernization a strategy baked into your everyday processes. Learn about the upgrade challenges and costs of IT environments that have stagnated for a number of years. Set your self up for success by planning projects with modernization in mind rather than planning a modernization project.