Robin Tatam presents security topics to NHMUG user group!

Thursday March 23rd

Encrypting Data on IBM iRobin Tatam

With news headlines populated with a constant flow of data breaches, many organizations are looking to encryption as a possible “silver bullet.”

This session will answer pressing questions around the topic of encryption and teach some of the main considerations when embarking on this type of project, including:

  • Why encrypt
  • Can I just encrypt the entire disk?
  • What changed in IBM i v7.1
  • Considerations that influence an encryption project
  • Field procedures and Triggers

IBM i Security for Programmers

Although your IBM i server is one of the most securable platforms available, the protection of critical data is often undermined by weak security design at the application level.

This session will cover the main considerations that a programmer should be aware of as they design their applications:

  • Object ownership
  • Adopted authority
  • Public and private authorities
  • Command line permission
  • Client-server considerations

Configuring and using IBM i Auditing Features

Did you know that IBM i includes powerful auditing features? This session is designed to teach how to correctly activate and utilize IBM i’s built-in forensic capabilities.

Learn about:

  • Security audit journal
  • Audit data management
  • Configuring the ‘Audit’ system values
  • A user profile’s *AUDIT special authority
  • Object auditing
  • User auditing
  • Data reporting options

Equally important, you will also learn about what system auditing does not capture, and how to prevent that from causing you to fail an audit.

Evaluating YOUR OWN State of Security

For many in the IBM i community, security is a journey that is considered and discussed but never embarked upon. This often stems from the fact that many people are under the impression that IBM i is inherently secure and have never had theirs professionally reviewed for risk.

Before the conference, registrants will be provided with a link to download a [free] proprietary tool to quickly and non-invasively scan the IBM i partition of choice. The session, led by a certified auditor and expert in IBM i security, will consist of an interactive discussion regarding how to interpret the findings.

Topics will include the following:

  • Administrative Privileges
  • Public Authority
  • Network-based Access
  • FTP
  • System-level security settings
  • User-based security risks
  • Auditing

Bio

Robin Tatam

Robin Tatam is HelpSystems’ Global Director of Security Technologies and a COMMON subject matter expert (SME). As an award-winning speaker on security topics, Robin has been interviewed and quoted by industry magazines and has published numerous trade articles. Robin’s extensive Power Server experience has resulted in more than 20 IBM certifications and the highly sought after designation of ISACA-certified Information Security Manager (CISM) and PCI-Professional (PCI-P). He is also co-author of IBM’s Redbook publication on IBM i Data Encryption.


Look who came to New Hampshire!

Wednesday February 1st

 

Meeting users needs with free software on IBM iJon

Are you tired of constantly exporting and importing data for "foreign" applications running on Windows or Unix/Linux servers? Do you wish there was an easy way to keep more applications on IBM i?

This session shows you some approaches that will help you to ensure that modern applications can be deployed on IBM i easily and without breaking the budget.

Exploit the huge world of open source applications and tools that you can easily implement on your IBM i. And what's more, you can easily integrate these applications into your DB2/RPG universe.

Jon will also show you how you can create powerful browser-based database applications in minutes using readily available application frameworks - writing almost no code yourself. And all the data can be stored in DB2 so you can easily integrate these applications into your existing inventory.

Can it all really be that cheap and easy to do? Jon believes so and on this session will discuss and demonstrate a number of open source applications to show just how quickly and easily new web-based applications can be deployed.

Keep your IBM i alive and vibrant and be a hero to your end users by responding quickly to requests for new web based applications.

From subroutines to Procedures & Service Programs - part 1

Susan doesn’t code subroutines any more. She believes that procedures (aka, subprocedures) make great subroutine replacements. They can make your code more obvious, making maintenance easier, faster and more reliable. Take the extra step to package your commonly used procedures into ILE Service Programs and you can share them easily and efficiently among many programs.

SusanIn this 2 part session, Susan will explain the advantages of modularizing your code using procedures and she'll cover how to do it.

Part 1 covers the details of coding procedures - both the syntax and the best practices. We'll look at how prototypes are used with procedures and cover some valuable prototype keywords to make your coding life easier.

From subroutines to Procedures & Service Programs - part 2

Part 2 assumes you have either attended Part 1 or already have experience coding internal procedures, defining and using local data and prototypes. In this second session, we'll cover the details of ILE Service Programs - what they are, when and why you should use them, how to package your procedures in them, and shortcuts for using them from your other programs.

These two sessions can form a foundation for writing better modular applications.

The latest and greatest in RPG IV

The V7 releases of RPG have radically changed the language. Among other new features, you can now code RPG in completely free format - and with no 80 columns restrictions!

The latest updates have also extended RPG's error handling model, making it much simpler to ensure that things are "tidied up" in the even of an exception.

In addition to these latest enhancements, Jon will also cover other V7 features including:

  • Sorting and Searching of Data Structure Arrays
  • Support For Alias Names
  • New and Updated BIFs - Including Scan and Replace
  • Changes in Prototyping rules
  • And last but not least how performance improvements for large return values can make your subprocedures easier to deploy as web services.

Bio's

Susan

Susan's career has spanned over 30 years in the field of application development. She began as a programmer developing applications for corporations in Atlanta, Georgia, working with a variety of hardware and software platforms. She joined IBM in 1985 and quickly developed a close association with the Rochester laboratory during the development of the AS/400 system.

Susan worked in Rochester, Minnesota for 5 years in the AS/400 Technical Support Center. She later moved to the IBM Toronto Software Laboratory to provide technical support for programming languages and AD tools on IBM i.

Susan left IBM in 1999 to devote more time to teaching and consulting. Her primary emphasis is on enabling customers to take advantage of the latest programming and database technologies on IBM i.

Today she is part of System i Developer, the team that hosts the RPG & DB2 Summit events twice annually.

Susan is a regular speaker at user group and other technical conferences around the world and holds a number of Speaker Excellence medals from COMMON.

Susan is a Technical Editor for IBM Systems Magazine and a frequent writer for IBM Systems Magazine and IT Jungle.

Jon

Jon's IBM midrange career started when he fell in love with the System/38 while working as a consultant. This love affair ultimately led him to joining IBM.

In 1987, Jon was hired by the IBM Toronto Laboratory to work on the S/36 and S/38 COBOL compilers. Subsequently Jon became involved with the AS/400 and in particular COBOL/400.

In early 1989 Jon was transferred to the Languages Architecture and Planning Group, with particular responsibility for the COBOL and RPG languages. There he played a major role in the definition of the new RPG IV language and in promoting its use with IBM Business Partners and Users. He was also heavily involved in producing educational and other support materials and services related to other AS/400 programming languages and development tools, such as CODE/400 and VisualAge for RPG.

Jon left IBM in 1998 to focus on developing and delivering education focused on enhancing IBM i application development skills.

Today he is part of System i Developer, the team that hosts the RPG & DB2 Summit events twice annually.

Jon is a frequent speaker at User Groups meetings and conferences around the world and holds a number of speaker excellence awards from COMMON.

Jon is a Technical Editor with IBM Systems Magazine and a frequent author for IBM Systems Magazine and IT Jungle.


Wayne Bowers came to speak at NHMUG on Wednesday December 14th!

 

Wayne Bowers

Living Without Client Access - Part 1

IBM i Access Client Solutions is the newest member of the IBM i Access Product Family, and it is a platform independent client that is supported running on multiple Operating Systems like Macintosh, Linux, and Windows.

Familiarity with IBM i Access Client Solutions is very important as this is the future of the IBM i Access Family software on workstation operating systems. This future looks very bright and IBM i Access Client Solutions provides ease of deployment, and operational improvements in nearly every function the client provides.

Many of us though have a very high level of comfort with the IBM i Access for Windows or Client Access software that we have used for over well over 15 years, and the thought of discontinuing the use of that and moving to a new software package may be accompanied with some anxiety.

During this session we will be comparing and contrasting IBM i Access Client Solutions to IBM i Access for Windows. There are definite differences between how these products do some things and this session will offer Tips and Techniques on accomplishing the tasks and processes that we use IBM i Access for focusing on those differences.

We will cover items including, but not limited to, an overview of the main IBM i Access Client Solutions functions, System i Navigator vs. IBM Navigator for i, Data Transfer spreadsheet integration, Remote Commands, and managing configurations.

Become familiar and more comfortable with the differences between IBM i Access Client Solutions and IBM i Access for Windows.

Handouts:
LivingNoCA_NHUMG.pdf
(covers both parts 1 and 2)

Living Without Client Access - Part 2

We will continue from where we left off, and this session will specifically focus on moving a PC that has IBM i Access for Windows installed to using IBM i Access Client Solutions. We will be looking at the recommended best practices for deploying IBM i Access Client Solutions and migrating your IBM i Access for Windows investment to this environment.

Manage and Access your IBM i OS on the Go - IBM i Mobile Access

Managing your IBM i systems as well as providing user access from any mobile device (cell phones and tablets) is becoming more and more of a requirement for many businesses. In response to this, IBM i Mobile Access Solution was born. This solution has been available since May 20, 2015. During this session we will present an overview of the solution, covering things like System Management, the 5250 interface, running SQL Queries, interacting with Printed Output, including a live demo. We will finish up with discussing the robust tools built into the solution that allows administrators to control what users can do based on their IBM i OS Group or User Profile.

Handouts:
MobileAccess.pdf

Beyond SSL - IBM i OS Transport Security

Communications security is a necessity for nearly everyone in at least some scope, and SSL is a common, well known term in this environment. This session will go beyond SSL, to the broader level conversation of Transport Security, of which SSL is becoming an outdated technology, replaced by TLS. IBM i OS r7.1 and r7.2 now supports the current TLS 1.2 protocol, and some new cipher specifications. We will look at some protocol details, including sniffer traces showing different connection handshakes, and include the newer TLS 1.2 support in an overall conversation of managing the application communication Transport Security environment on your IBM i OS.

Handouts:
BeyondSSL.pdf

Biography

Wayne Bowers has been with IBM since 1997, where he works with the IBM i Global Support Center in Rochester MN. He is an Advisory Software Engineer specializing in the support of the IBM i Access (aka Client Access) products, Integrated Blade server solutions, and the TCP Telnet communications server. Wayne has been developing and delivering presentations on IBM i Access products since 1999, and at external conferences like COMMON and IBM Edge since 2009 where he is an award winning speaker.


Paul Tuohy presented at NHMUG on Wednesday September 14th!

It is with great excitement that we were able to host Paul Tuohy at the NHMUG meeting on Wednesday September 14th, 2016.
Paul is a world renowned speaker and well known throughout the IBM i community.

Embedded SQL in RPG Programs

Many RPG programmers have used interactive SQL as a tool to quickly browse data or to create test data scenarios, but have stopped short of embedding it into their RPG programs. Come to this session to learn why, when and how you may want to use SQL in conjunction with RPG. We will cover the basics of embedding SQL into RPG, including using SQL cursors and a few tips on getting good performance from your SQL applications.

This session looks at:

  • Why use embedded SQL?
  • Basic Syntax
  • Using host variables
  • Using a SELECT statement
  • Using a Cursor
  • Identifying and handling errors
  • The power of INSERT, UPDATE and DELETE
  • Compile options
  • When and how to use dynamic SQL
  • Using PREPARE and EXECUTE
  • Performance tips

Prerequisite: This session assumes you are familiar with the basics of the SQL language, such as the SQL SELECT and UPDATE statements

Embedded SQL in RPG - Beyond the Basics

You have been using embedded SQL in RPG. You have mastered the syntax, tried a few selects, declared a cursor, performed an update - you may even have tried some dynamic SQL!

Time to take it to the next stage and see what you can do with embedded SQL - beyond the basics

Topics covered in this session include:

  • Discussion of the key points in writing powerful embedded SQL
  • What tools should you use to write and test SQL prior to embedding it?
  • Controlling CRTSQLRPGI
  • SQLCA and SQLCODE considerations
  • Getting data without SELECT - GET DIAGNOSTICS and VALUES INTO
  • Mastering Multi Row Fetch
  • Handling NULL
  • Dates, Times and Timestamps

Prerequisite: This session assumes you are familiar with the topics covered in Embedded SQL - the Basics

An RPGer's Adventures in Webland

At System i Developer we like to practice what we preach. The company web site is designed for and is served from a System i. An application is used to manage conference information which, in turn, is used to generate web pages. There are also interactive web pages that communicate directly with RPG programs (e.g. selecting your session grid and repeat sessions).

This session shows you how the web site was built and how the following items played a key part in the development of the web site:

  • Design Decisions
  • Tools Used - WDSC, Navigator
  • Creating the Database using DDL (SQL)
  • Externalizing the Database
  • The public and the private web sites
  • Maintaining information (using CGIDEV2)
  • Making use of PHP
  • Generating Static Web Pages
  • Using and tuning embedded SQL
  • Using AJAX 

Introduction to AJAX for RPG Programmers

Although it has been around for a number of years Asynchronous JavaScript and XML (AJAX) has suddenly become a hot topic. What is all the fuss about? What relevance does AJAX have for the RPG programmer?

AJAX provides a means of having a web page communicate with a server, either synchronously or asynchronously. Combined with CGI programming techniques (CGIDEV2 is used in the presentation), you now have a means of dealing interactively with a web page i.e. changing the contents of a web page without having to re-write the whole page.

And best of all, it is already installed on every PC, all you have to do is use it!.

In this session you will learn:

  • The background to AJAX
  • How it works
  • Examples of how to use it

Biography

ComCon is a company owned and run by Paul Tuohy. It specializes in consultancy, software development and training for the IBM i (System i, i5, iSeries and AS/400).

Paul Tuohy has worked in the development of IBM Midrange applications since the '70s. He has been IT manager for Kodak Ireland Ltd. and Technical Director of Precision Software Ltd. As well as being CEO of ComCon he is also one of the co-founders of System iDeveloper, a consortium of top experts and educators on i technology. He has been teaching and lecturing since the mid-'80s.

Paul is the author of "Re-engineering RPG Legacy Applications", "The Programmers Guide to iSeries Navigator" and the self teach course "iSeries Navigator for Programmers".

He also writes regular articles for most of the industry publications and is one of the quoted industry experts in the IBM Redbook "Who knew you could do that with RPG IV?".

As well as speaking at renowned RPG & DB2 Summit conferences and other conferences around the world Paul is also an award winning speaker at numerous US Common conferences.