iTech Solutions - for all of your IBM i System needs

Upcoming Webinars

Posted on December 29, 2020

iBasics: Basics of Security
Wednesday, January 27th, 11 AM ET

Let’s get back to the basics. These sessions are designed for anyone starting out as an IBM i sys admin, looking to refresh their knowledge, or looking to learn more.

[ Register Now]

(more…)

Posted on

Sips & Tricks: Coffee with iTech
Managing NetServer from a Command Line Interface

Friday, January 29th
11 AM EST

We’re continuing to provide bite-sized technical sessions to help make your workday easier. Join Marc Vadeboncoeur as he presents Managing NetServer from a Command Line Interface.

[ Register Now]

(more…)

Posted on December 22, 2020

Sips & Tricks: Coffee with iTech
Understanding Display Firmware Status

Friday, January 22nd
11 AM EST

We’re continuing to provide bite sized technical sessions to help make your workday easier. Join Pete Massiello as he presents Understanding Display Firmware Status

[ Register Now]

(more…)

Posted on

iBasics: Basics of Access Client Solutions
Wednesday, January 20th, 11 AM ET

Let’s get back to the basics. These sessions are designed for anyone starting out as an IBM i sys admin, looking to refresh their knowledge, or looking to learn more.

[ Register Now]

(more…)

Posted on March 7, 2019

Rapid Fire Admin

This overflowing session is designed to help ensure every IBM i administrator and operator has at least a backpack full of valuable tips for when they return home. From command line to shell to IBM Navigator for i, Steve will sprint through these tips at a pace of at least two tips per minute, for at least 150 tips! This session is updated every quarter with new and relevant information so that you don’t miss good foundational tips but are keeping up with what updates IBM is releasing on a regular basis.

Anatomy of a Security Failure

After the dust settles after a security breach, the next logical questions are: “What happened and how can we prevent it from happening again?” We will deconstruct a number of security failures that will provide lessons that you can take home and put to use immediately.

Anatomy of a Bad Password

Do you know the differences between IBM i password levels? How about password rules that aren’t used or actually used too much to be effective? What about common patterns from keyboards to mobile devices that make it easy for someone to just guess your password? Steve will talk about how good and bad passwords are constructed as well as how to break them with social engineering, dictionary attacks, brute force attacks and more. Learn why most passwords stink so you can protect yourself and your users.

IBM i and our False Sense of Security

While IBM i is arguably the most “securable” operating system in the world, your environment may have some wide open doors that you can’t ignore. This session will highlight the importance of encrypting data in transit and show you how to do it easily with minimal interruption to the business.

Updating our IBM i Modernization Mindset

Make modernization a strategy baked into your everyday processes. Learn about the upgrade challenges and costs of IT environments that have stagnated for a number of years. Set your self up for success by planning projects with modernization in mind rather than planning a modernization project.

Newsletters