In this talk, we’ll look at everything from development tools, build systems, to deployment methods. Finally there is a complete open source stack from IBM to use git and easily deploy ILE code (RPG, COBOL, you name it!) and this will cover them. We will look at the end-to-end lifecycle for IBM i applications when stored in git - all the way from the developers, to the end users machine automatically.
We will learn and explore how you can go from record level access to embedded sql and from that how can you streamline your programming process by using embedded sql. We will look at how to handle sql exceptions and go through why you should convert to using embedded sql instead of record level access.
Learning Objectives:
Overview of embedding sql in your RPG programs. How to streamline sql procedures with the use of a SQL utility service program. how to modernize your current record level access to use embedded sql.
Marina started her career in January 2015 at Everbrite LLC in Greenfield WI after graduating from Gateway Technical College in May of 2014 with an Associate’s degree in IT Software Development. Marina worked for over nine years as a Senior Programmer Analyst/IBM i admin at Everbrite... Read More →
Tuesday September 24, 2024 08:00 - 09:00 CEST
Solliden
Applying PTFs is only one part keeping your system up to date. In this session we will learn to apply updates to your hardware - the FSP, the HMC, and the SAN. We will go over the access to the FSP through ASMI as well.
VP of Customer Experience, Agile Technology Architects
Sarah Jacob is the Vice President of Customer Experience at Agile Technology Architects. She is a Subject Matter Expert in Power Systems Administration and a volunteer for COMMON. Sarah specializes in Backup and Recovery planning and recovery testing. Additionally, she acts as primary... Read More →
Want to remove *ALLOBJ from a service account but afraid you'll break something? Can't determine where a user's authority to access a production file is coming from? Don't know how much authority is required to access files in the IFS? All of these questions can be answered using Authority Collection - a powerful feature added in V7R3 and enhanced in V7R4. During this session, Carol Woodbury will demo Authority Collection and provide you with practical ways you can use it in your organization.
IBM i Security SME and Senior Advisor, Kisco Systems
With over 30 years' experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate... Read More →
The future of writing ILE languages is with git. Whether you've not heard of git, or you're an expert, we'll cover the basic concepts of git, how to get your ILE source code into git, how to develop and compile code from repositories, and many other concepts.
In this new session, Scott will explore the many ways that “bad actors” can attempt to subvert the security on IBM i. Whether the topic is protecting against SQL Injection, closing doors to acquiring elevated privileges, or attempting to discover unprotected objects, this session will include techniques for evaluation and protection of your IBM i. Attend this session to take a big step towards discovering and eliminating attack vectors within Db2 for i!
Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Architect. He has worked on IBM operating system development since joining IBM in 1989.Scott is a frequently published author, speaker at industry events... Read More →
The audit journal contains so much information but has not been easy to access … until now. During this session Carol Woodbury will discuss the modern ways to access the IBM i audit journal, as well as the most recent audit enhancements. She will also discuss how the information can be used as an early warning signal of an attack on your organization.
IBM i Security SME and Senior Advisor, Kisco Systems
With over 30 years' experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate... Read More →