iTech Solutions - for all of your IBM i System needs
On Tuesday, June 23rd, choose from over 45 sessions covering topics such as System Architecture, Application Development, Mobile Applications, RPG, Python, Business Intelligence, Disaster Recovery, Performance Monitoring and more!
This will be a power-packed day of education featuring World Class Presenters. Extraordinary networking opportunities – have fun, learn and share with your peers, renowned speakers, IBM developers, executives, and fellow members. Visit the Vendor Expo. This event will power you into the future.
Rapid Fire Admin
This overflowing session is designed to help ensure every IBM i administrator and operator has at least a backpack full of valuable tips for when they return home. From command line to shell to IBM Navigator for i, Steve will sprint through these tips at a pace of at least two tips per minute, for at least 150 tips! This session is updated every quarter with new and relevant information so that you don’t miss good foundational tips but are keeping up with what updates IBM is releasing on a regular basis.
Anatomy of a Security Failure
After the dust settles after a security breach, the next logical questions are: “What happened and how can we prevent it from happening again?” We will deconstruct a number of security failures that will provide lessons that you can take home and put to use immediately.
Anatomy of a Bad Password
Do you know the differences between IBM i password levels? How about password rules that aren’t used or actually used too much to be effective? What about common patterns from keyboards to mobile devices that make it easy for someone to just guess your password? Steve will talk about how good and bad passwords are constructed as well as how to break them with social engineering, dictionary attacks, brute force attacks and more. Learn why most passwords stink so you can protect yourself and your users.
IBM i and our False Sense of Security
While IBM i is arguably the most “securable” operating system in the world, your environment may have some wide open doors that you can’t ignore. This session will highlight the importance of encrypting data in transit and show you how to do it easily with minimal interruption to the business.
Updating our IBM i Modernization Mindset
Make modernization a strategy baked into your everyday processes. Learn about the upgrade challenges and costs of IT environments that have stagnated for a number of years. Set your self up for success by planning projects with modernization in mind rather than planning a modernization project.