An interview with Maximum Availability Senior Vice President Simon O'Sullivan about the company's new browser-based MAXView mobile remote HA monitoring solution. Recorded the week of May 3, 2010, in Orlando. Fla., during COMMON's Annual Conference and Exhibition.
Interviews with Halcyon Software Channel Manager John Dominic and SunGard Public Sector Director of Client Services Peggy Serena on how Halcyon Operations Center and Network Server suites have helped SunGard hold the line on staff costs while increasing data center workloads. Recorded the week of May 3, 2010, in Orlando. Fla., during COMMON's Annual Conference and Exhibition.
Security expert Carol Woodbury, President of SkyView Partners, and application lifecycle management expert Marty Acks, Product Manager for MKS Inc., discuss determining your organization's data security requirements and understanding how these requirements filter throughout your organization's IT processes. In this session, you will learn:
- The reason data classification is key to meeting your organization's security requirements
- Tips for determining and implementing data classification throughout your IT processes
- Key controls for preventing the corruption of production data
- The role of Application Lifecycle Management (ALM) in securing your organization's data
We can learn a lot about passing PCI audits by looking at what others have done. This Webinar shares the top reasons companies fail audits and explains what actions can be taken to make sure your company doesn't fall victim to the same issues. Leading security experts Gary Palgon, VP Product Management for nuBridges, and Carol Woodbury, President of SkyView Partners, discuss the challenges of PCI DSS compliance and provide recommendations on how to successfully pass a PCI audit. In this session, you will learn:
- The top reasons companies fail PCI audits
- The importance of encryption, key management, and logging
- Ways tokenization helps to reduce the scope of PCI audits
- What part a security policy plays in compliance
- Common mistakes in configuring systems to meet PCI requirements
- Policy establishment and ongoing compliance management
Shannon O'Donnell - TechTip
Have you ever had the need for an IBM service technician to come into your shop to perform some type of maintenance on your iSeries? How about a consultant who you hired to work at your shop temporarily to help diagnose problems with your hardware or system software? If you answered yes to either of these questions, then chances are good that at some point those people needed to gain access to some of the low-level functions on your system that are only available through Service Tools. In the past, anyone with enough authority in their user profile could log on to your iSeries and issue the STRSST command and gain access to those functions. With the advent of OS/400 V5R1, IBM has given you the tools to allow you to control who gains access to Service Tools, when they can have that access, and what functions they can perform once they get started with the utility.
Shannon O'Donnell -
TechTips Just as no one except the security officer needs a user profile with *ALLOBJ authority, not everyone needs to have access to all commands available to them via FTP. After all, when was the last time you had the need to run CL commands on the iSeries via FTP? Do your users need the ability to send and receive in FTP, even though all they ever do is download files from your server? Do you really want people to be able to list the contents of your iSeries directories via FTP? The easiest way to control who can do what via FTP is by taking advantage of the ability of Operations Navigator to lock down FTP. In this video tutorial, industry expert Shannon O'Donnell shows you step by step how you can use Operations Navigator to secure FTP for both the individual and the entire system.
Shannon O\'Donnell -
TechTips Traditionally, PTFs were ordered either by calling IBM on the phone or by using the green-screen command Send PTF Order (SNDPTFORD). Since IBM is rapidly integrating all former green-screen/command-line functionality into the iSeries Navigator utility, it was only a matter of time before they allowed you to order PTFs directly from iSeries Navigator. You can now download an iPTF plug-in for iSeries Navigator from IBM and install it into your iSeries Navigator GUI. The steps involved, while by no means rocket science, are a bit involved. If you have never installed an iSeries Navigator plug-in before, it can be difficult to figure out where to begin. To take some of the sting out of the process, industry expert Shannon O\'Donnell shows you step by step in this video tutorial how to install the iPTF plug-in for iSeries Navigator.
Shannon O'Donnell - TechTips If you are still not using your iSeries to serve up Web pages, then you are missing out on one of the most important and useful features of this great system. You do not have to be in the e-commerce business to take advantage of Web serving. There are hundreds of other reasons to use it. For example, you can serve up HTML help manuals for your users, post company news, create an online message forum, and much more. If you are not yet using the iSeries for Web serving because you are not sure how to configure it and get started, then you are in luck. In this video tutorial, industry expert Shannon O'Donnell shows you step by step how to configure your iSeries for Web serving and how to replace the default index HTML page with one of your own.
Joe Pluta - WDSC Basics, Volume 6
Welcome to the sixth and final tutorial in the introductory series "WDSC Basics." You've set up your environment and edited source. You've even compiled it. Finally, it's time to get to the real work: debugging. And while the debugger is an entire topic unto itself, in this last installment, I'm going to let you in on one of the great technological advancements in i5/OS: Service Entry Points, or SEPs. An SEP is simply the fastest and easiest way to debug a program anywhere on the machine, whether it's interactive or batch, in a trigger or in a stored procedure. It's the closest thing to magic that I've seen in a long time, and this tutorial shows you how to take advantage of it.
Joe Pluta - WDSC Basics, Volume 5
Up until this point, you\'ve configured your workbench, connected to the host, opened source, and set up your environment. Now, we\'re getting near the end of the basics, and it\'s time to actually start doing the things that we do as programmers. In this fifth installment, you\'ll learn how to compile a program and how to check for errors. You\'ll see how the compile process affects your environment and how you can check your results.
Joe Pluta - WDSC Basics, Volume 4
In previous tutorials, I showed you how to configure your workbench and connect to your host and, most recently, how to open a source member for editing. Programming is more than just editing source, though. In this fourth tutorial, I\'ll show you how to manage your environment, including creating a library and copying a source file, all from within WDSC. I\'ll even show off the versatility of WDSC by giving you a couple of alternate ways to do the same things.
Joe Pluta - WDSC Basics, Volume 3
The first tutorial showed you how to configure your workbench, the second how to connect to your System i host. This third tutorial will then leap you directly into your source code so that in just three quick steps, you will be editing your programs in WDSC! You\'ll learn how to use one of the System i programmer\'s favorite tools: the Open Member dialog, which you can use to open any source member on the System i by just typing in the library, source file, and member names. You\'ll also learn how to access this powerful feature with a simple key press.