Loading…
For the vCEC please register at http://comeur.org/common/vcec2020/

Track 2 - Systems and Security [clear filter]
Tuesday, November 17
 

13:00 CET

Using Modern Tools for System Management Tasks
Speakers
avatar for Rudi van Helvoirt

Rudi van Helvoirt

Technical Director, Easi Nederland
After having started as a System/38 programmer in 1986. In 1989 the switch was made to system programming and systems management.Being passionate about systems management he founded van Helvoirt Automatisering in 1993.Rudi enjoys helping IBM i customers ever since for running their... Read More →


Tuesday November 17, 2020 13:00 - 13:50 CET
Track 2 - Systems and Security

14:00 CET

Introducing IBM i Services - the future of systems management
IBM i Services are perhaps the best-kept secret of managing and monitoring IBM i. Relatively few users of our favourite platform know what they are and even fewer use them regularly. This is a crying shame as they are truly remarkable. IBM i Services can tell you in seconds what it takes a skilled system operator minutes or even hours to discover. In this session, we explain what IBM i Services are, how you use them and why they can give you a better answer than the tools we had available to us before.

Speakers
avatar for steve bradshaw

steve bradshaw

Technical Director, Rowton IT
I've worked in the IBM Business Partner world for over thirty years now and despite IBM's best attempts I still love them ;-)In 2008 I set up my practice (Rowton) and now spend my time supporting clients or designing new IT solutions using a combination of Power servers, Intel and... Read More →


Tuesday November 17, 2020 14:00 - 14:50 CET
Track 2 - Systems and Security

16:00 CET

Determining Whether your IBM i Has Been Breached
Perhaps a setting was accidentally changed in a firewall or router which exposed your entire internal network to the Internet. Or perhaps other parts of your organization is seeing evidence of inappropriate activity. Do you know what you’d need to examine to determine if your IBM i had been breached? Based on a real-life incident, Carol Woodbury will walk you through the steps she took to determine whether an IBM i had been breached.

Speakers
avatar for Carol Woodbury

Carol Woodbury

President, CTO, Co-Founder, DXR Security
With over 25 years experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate... Read More →


Tuesday November 17, 2020 16:00 - 16:50 CET
Track 2 - Systems and Security

17:00 CET

Q&A – System Management/ Security
Speakers
avatar for Carol Woodbury

Carol Woodbury

President, CTO, Co-Founder, DXR Security
With over 25 years experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate... Read More →
avatar for steve bradshaw

steve bradshaw

Technical Director, Rowton IT
I've worked in the IBM Business Partner world for over thirty years now and despite IBM's best attempts I still love them ;-)In 2008 I set up my practice (Rowton) and now spend my time supporting clients or designing new IT solutions using a combination of Power servers, Intel and... Read More →
avatar for Rudi van Helvoirt

Rudi van Helvoirt

Technical Director, Easi Nederland
After having started as a System/38 programmer in 1986. In 1989 the switch was made to system programming and systems management.Being passionate about systems management he founded van Helvoirt Automatisering in 1993.Rudi enjoys helping IBM i customers ever since for running their... Read More →


Tuesday November 17, 2020 17:00 - 17:30 CET
Track 2 - Systems and Security
 
Wednesday, November 18
 

13:40 CET

LPARKit- Tool for quick deployment LPARs and cloning IBM i OS using the HMC/VIOS or Virtual Partition Manager
LPARKit is a green screen interface which isolate VIOS/HMC layer from IBM i administrator. It allows quick deployment of LPAR and clone IBM i operating system from the template partition. It also allow to manage virtual storage adapters, maping/unmaping vSCSI disks or creating virtual adapters reports in the spool or csv file.
For small customers which use IBM i as the hosting LPAR, it provides a new interface for quick LPAR creation rather than use Virtual Partition Manager in SST. It also provide a mechanism to clone the operating system stored as NWSD object. 
 
The tool can be also used in the private cloud as a native green-screen deployment interface or by business partners. A BP can prepare IBM i image with all PTFs, toolset required by a customer, store it as a binary image and deploy on the customer machine.

Speakers
avatar for Bartlomiej  Grabowski

Bartlomiej Grabowski

CEO, Cloud Walkers
Bartlomiej Grabowski known as Bart. IBM Champion and Platinum Redbook author. With over 15 years of experience in various worldwide solutions Bart founded Cloud Walkers company which delivers tools for IBM i. He is a frequent speaker presenting at technical conferences and events... Read More →


Wednesday November 18, 2020 13:40 - 14:10 CET
Track 2 - Systems and Security

15:00 CET

Manage Change, No Sweat
An overview of TD/OMS and Gravity applications, going through the development lifecycle

Speakers
avatar for Wim Jongman

Wim Jongman

CTO, Remain Software
I am the CTO of Remain Software, home of TD/OMS and various other products. I am a committer and project lead for various Open Source projects.In my, not existing, free time, I like to gaze at the stars, shoot some pool, and enjoy my family.Please come and have chat at our booth... Read More →


Wednesday November 18, 2020 15:00 - 15:30 CET
Track 2 - Systems and Security
 
  • Timezone
  • Filter By Date vCEC2020 Common Europe On-line Nov 16 -19, 2020
  • Filter By Venue Online
  • Filter By Type
  • ACS
  • AIX
  • Application Development
  • DB2
  • High Availability
  • Keynote
  • Networking
  • Open Source Languages
  • Open Source Tools
  • RDi
  • Security
  • Storage‎
  • System Management
  • Subject


Filter sessions
Apply filters to sessions.