Podcasts about as400

  • 19PODCASTS
  • 45EPISODES
  • 29mAVG DURATION
  • ?INFREQUENT EPISODES
  • Feb 1, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about as400

Latest podcast episodes about as400

The Screaming Blackbird Podcast
EP 20: CADET EMMA CAMPSEY - AS400 DETACHMENT TRANSFER

The Screaming Blackbird Podcast

Play Episode Listen Later Feb 1, 2024 37:18


Cadet Emma Campsey is an AS400 cadet pursuing a masters degree in Health Promotions at Mississippi State University. She received her undergraduate degree in exercise science from High Point University while also taking Aerospace Studies classes at North Carolina A&T university. In this episode, we discuss her experiences at two different detachments in two different states. She just got married and explains all of the new and exciting experiences that come with marriage.

Learning Without Scars
The March of Technology: Insights into Dealer Systems Evolution

Learning Without Scars

Play Episode Listen Later Aug 14, 2023 41:14 Transcription Available


Are you ready to embark on an enlightening journey through the evolution of computer systems in the dealership world? Accompany us, your hosts, as we rewind to our humble beginnings with Joseph and Jennifer on our first interaction with on-premise AS400 green screen applications. We delve into how the understanding of dealers' modus operandi plays a crucial role in identifying an optimal system for them and the importance of continuous improvement and process documentation.In our second chapter, Joseph and David enlighten us on the crucial aspect of system selection in this rapidly changing industry. They share their wisdom on the understanding of current processes, pain points, and gaps that dealers are striving to fill. We also illuminate our systematic approach to system selection, which emphasizes value over cost and understands technical requirements for successful implementation.Our final chapters take you to the future of technology and dealerships, exploring the potential and challenges it beholds. Together with Joseph and David, we look at the role of cloud computing's advantages, the potential of privatized technicians, and the changing landscape of customer relations. We candidly discuss the challenges of decision-making in today's society, abounding with choices. Join us as we share our experiences with technology and the critical thinking necessary in this era of plentiful options. Tune in for this enriching conversation and stay tuned for more engaging discussions. Visit us at LearningWithoutScars.org for more training solutions for Equipment Dealerships - Construction, Mining, Agriculture, Cranes, Trucks and Trailers.We provide comprehensive online learning programs for employees starting with an individualized skills assessment to a personalized employee development program designed for their skill level.

WBSRocks: Business Growth with ERP and Digital Transformation
WBSP362: Grow Your Business by Understanding Epicor Eclipse's Capabilities, an Objective Panel Discussion

WBSRocks: Business Growth with ERP and Digital Transformation

Play Episode Listen Later Aug 9, 2022 58:31


Epicor Eclipse has a more loyal community than crypto and Metaverse. But why is that? Based on the amount of technological innovation happening, you would guess that any school grad might be able to write ERP software. Right? So then why do technologies such as Mainframe, AS400, and Epicor Eclipse still exist? Is it really because change is hard. But change is hard for whom? For companies that are using it or companies that are selling it? Or is it because customers are unwilling to change because of their strong affinity with a technology or product? If so, why should we blame the companies trying to sell and support what customers are willing to buy? Epicor Eclipse has a loyal community for a reason. But what are those reasons?In today's episode, we invited a panel of industry experts for a live discussion on LinkedIn to conduct an independent review of Epicor Eclipse's capabilities. We covered many grounds, including their strength in HVAC, plumbing, and trade contracting industries. Finally, we discussed why companies are so loyal to this solution despite it being a legacy solution.For more information on growth strategies for SMBs using ERP and digital transformation, visit our community at wbs.rocks or elevatiq.com. To ensure that you never miss an episode of the WBS podcast, subscribe on your favorite podcasting platform.

Alex & Annie: The Real Women of Vacation Rentals
Re-Imagining The Leaning Tower of Tech, with Lino Maldonado, President of BeHome247

Alex & Annie: The Real Women of Vacation Rentals

Play Episode Listen Later Mar 9, 2022 46:15 Transcription Available


Lino Maldonado is recognized as one of the industry's most innovative players, known for his collaborative spirit and uncanny ability to see opportunity where most see road blocks. Lino's career includes 23 years with Wyndham Vacation Rentals as VP of Operations, where he managed a staff of 1200 employees and a budget in excess of $500M. Utilizing his wealth of knowledge and experience as an operator, Lino joined BeHome247 in 2019 to lead the charge and development of cutting-edge smart home technology, workflow automation and energy management solutions for the accommodations and real estate industry. Lino shares stories of the early days at ResortQuest and Abbott Resorts when property management companies were powered by AS400's and green screens, and the evolution that has since turned into The Leaning Tower of Tech for many property management companies using disparate systems. BeHome247 allows the front of the house to talk to the back of the house, with the ability for each client to customize the platform to fit their own unique use cases. This is very clearly a product built by operators, for operators. We also dive into the synergies Lino saw while at Wyndham between the vacation rental and timeshare divisions, and the programs he developed to optimize inventory efficiently. Alex and Lino recently attended GNEX Conference and participated in a panel specific to this topic, along with Ryan Dame of Casago, Scott Bunce of Cabins for You, and Gregg Anderson, moderated by Amy Hinote. Stay tuned for more episodes on this topic! Lino served as Chairman for VISIT FLORIDA during 2018-2019 and Chairman of the Florida Restaurant and Lodging Association in 2016. He was also selected by Governor Rick Scott as one of his six appointees to serve on the Gulf Consortium, which was tasked with helping to structure the States expenditure plan for the settlement funds from the 2010 BP Gulf Oil spill.Watch on YouTube here: https://youtu.be/W2fY343as8gCONTACT LINO MALDONADOhttps://www.behome247.comlino@behome247.comCell: 850-685-8325CONTACT ALEX & ANNIEAlexandAnniePodcast.comLinkedIn | Facebook | InstagramAlex Husner - LinkedinAnnie Holcombe - LinkedinPodcast Sponsored by Condo-World and Lexicon Travel

The Array Cast
Morten Kromberg, CTO of Dyalog Ltd.

The Array Cast

Play Episode Listen Later Feb 19, 2022 77:46


Array Cast - February 19, 2022 Show NotesMany thanks to Bob Therriault for collecting these links.[01] 00:01:43 TryAPL.org https://tryapl.org/[02] 00:02:20 J promotional video https://www.youtube.com/watch?v=aV936cVrN0I[03] 00:04:30 BASIC computer language https://en.wikipedia.org/wiki/BASIC[04] 00:05:04 Commodore Pet https://en.wikipedia.org/wiki/Commodore_PET[05] 00:05:50 Nascom One https://en.wikipedia.org/wiki/Nascom_(computer_kit)[06] 00:06:44 I.P. Sharpe Associates https://aplwiki.com/wiki/I.P._Sharp_Associates[07] 00:11:26 Gitte Christensen Episode 12 ArrayCast https://www.arraycast.com/episodes/episode12-gitte-christensen[08] 00:13:20 Futhark Computer Language https://futhark-lang.org/[09] 00:19:50 Smalltalk Computer Language https://en.wikipedia.org/wiki/Smalltalk[10] 00:20:13 Romilly Cocking Presentation Dyalog '08 https://dyalog.tv/Dyalog08/?v=thr-7QfQWJw[11] 00:20:52 OS/2 operating system https://en.wikipedia.org/wiki/OS/2[12] 00:21:37 ODBC https://docs.microsoft.com/en-us/sql/odbc/microsoft-open-database-connectivity-odbc?view=sql-server-ver15[13] 00:21:45 AS400 https://en.wikipedia.org/wiki/IBM_AS/400[14] 00:23:45 Adaytum Software https://aplwiki.com/wiki/Adaytum_Software[15] 00:25:22 Cognos https://en.wikipedia.org/wiki/Cognos[16] 00:26:45 Simcorp APL Italiana https://en.wikipedia.org/wiki/SimCorp[17] 00:33:49 John Scholes https://aplwiki.com/wiki/John_Scholes[18] 00:34:00 Geoff Streeter https://aplwiki.com/wiki/Geoff_Streeter[19] 00:34:00 Pete Donnely https://aplwiki.com/wiki/Pete_Donnelly[20] 00:34:31 "Mastering Dyalog APL" 1st edition PDF: https://dyalog.com/mastering-dyalog-apl.htm[21] 00:34:50 Rodrigo Girão Serrão Episode 20 ArrayCast https://www.arraycast.com/episodes/episode20-rodrigo-girao-serrao[22] 00:35:30 John Daintree https://aplwiki.com/wiki/John_Daintree[23] 00:35:50 ASP.NET https://en.wikipedia.org/wiki/ASP.NET[24] 00:38:08 Dyalog Problem solving competition https://aplwiki.com/wiki/APL_Problem_Solving_Competition[25] 00:59:32 Roger Hui Episode 13 ArrayCast https://www.arraycast.com/episodes/episode13-roger-hui[26] 00:41:50 Functional Conf https://functionalconf.com/[27] 00:41:55 LambdaConf https://lambdaconf.us/[28] 01:00:43 Aaron Hsu Codfns https://www.sacrideo.us/projects/[29] 01:03:06 APL2000 https://aplwiki.com/wiki/APL2000[30] 01:06:00 MicroAPL documentation https://microapl.com/apl_help/[31] 01:11:25 Link presentation https://dyalog.tv/Dyalog21/?v=K_-E1tnH06k[32] 01:14:31 Nick Nickolov https://aplwiki.com/wiki/Nick_Nickolov[33] 01:16:38 Dyalog Careers https://www.dyalog.com/careers.htm

os basic small talk morten asp serr commodore pet cognos odbc as400 simcorp john scholes lambdaconf
Innovando con AWS
#0014: Migración de Mainframes

Innovando con AWS

Play Episode Listen Later Jan 21, 2022 40:57


Jesús es Manager de Solution Architecture en Amazon Web Services para Iberia y maneja clientes del segmento de Enterprise. Jesús tiene un contraste muy importante, su extensa experiencia en grandes clientes y su pasión por la modernización lo cual lo lleva a meterse en proyectos como los que vamos a hablar hoy, Migración de Mainframes. En este episodio nos viene a contar que son los Mainframes, donde están, cómo operan y que están haciendo las compañías para modernizarlos utilizando AWS.Jesús Guerra - https://www.linkedin.com/in/jesusmguerra/Basado en Madrid, España, es responsable de un equipo de Solution Architecture del segmento Enterprise que ayuda a grandes clientes en Iberia a moverse al Cloud y aprovechar sus beneficios. Una de sus pasiones es acompañar a sus clientes en la modernización de sus sistemas críticos, tales como entornos mainframe. Además, podéis estar seguros de que siempre está dispuesto a continuar una conversación que empiece con un reto como…“Estoy dándole vueltas a una idea para transformar digitalmente mi compañía, y he pensado en AWS. Jesús, cómo me puedes ayudar?”Rodrigo Asensio - @rasensioBasado en Barcelona, España, Rodrigo es responsable de un equipo de Solution Architecture del segmento Enterprise que ayuda a grandes clientes en Iberia en sus procesos de Transformación Digital, en moverse al Cloud y reorganizar su estructura para aprovechar al máximo sus beneficios.Secciones00:00 Intro00:43 Carrera de Jesús02:29 Que es un Mainframe?06:22 Como se programa un Mainframe?07:08 Mid-range systems, AS400, AIX, Solaris07:33 Falta de talento disponible09:20 Casos de uso en Mainframes13:37 Por qué migrar de Mainframes?16:51 El costo de Mainframes20:41 Agilidad del Negocio22:24 Retos de la migración del Mainframes24:50 Como ayuda AWS en la migración?32:46 DevOps con Mainframes?33:28 Donde puedo ver mas información?34:57 Servicio de AWS favorito37:19 CierreLinksIBM Mainframes: https://en.wikipedia.org/wiki/IBM_mainframe IBM Z Systems: https://en.wikipedia.org/wiki/IBM_Z Mainframe Migration Program: https://aws.amazon.com/mainframe/ MAP for Mainframe: https://aws.amazon.com/migration-acceleration-program/mainframe/ Blue Age: https://www.bluage.com/ Migration Partners: https://aws.amazon.com/blogs/apn/introducing-the-new-aws-mainframe-migration-competency-featuring-validated-aws-partners/ Conectate con Rodrigo Asensio en Twitter https://twitter.com/rasensio y Linkedin en https://www.linkedin.com/in/rasensio/ Conectate con Jesús Guerra en Linkedin https://www.linkedin.com/in/jesusmguerra/

Of Je Stopt De Stekker Er In
#016 | Waarom is de Telum processor cache zo bijzonder, Turbonomic voor FlashSystemen en Redbook IBM i migratie naar de cloud

Of Je Stopt De Stekker Er In

Play Episode Listen Later Dec 17, 2021 27:02


Vandaag aan tafel Martijn Raave, Client Architect voor IBM Z Systemen. Hij neemt ons mee in de details van de nieuwe Telum processor voor IBM Z. Op internet wordt veel gesproken over de cache aanpassingen die IBM gemaakt heeft op deze chip. In deze podcast gaan we hier dieper op in. Shownotes:Turbonomic:- https://newsroom.ibm.com/2021-06-17-IBM-Closes-Acquisition-of-Turbonomic-to-Deliver-Comprehensive-AIOps-Capabilities-for-Hybrid-Cloud- https://www.ibm.com/blogs/systems/simple-resilient-hybrid-cloud-with-ibm-storage/ Redbook - IBM Power Systems Virtual Server Guide for IBM i: - https://www.redbooks.ibm.com/redpieces/abstracts/sg248513.html?Open YouTube L2 Cache filmpje van TechTechPotato:-  https://www.youtube.com/watch?v=z6u_oNIXFuU Did IBM Just Preview The Future of Caches: - https://www.anandtech.com/show/16924/did-ibm-just-preview-the-future-of-caches Gebruikte afkortingen:rPerf = Power Relative PerformanceMIPS = Million Instructions per Second of Meaningless Indicator of Processors Speed ;-)MSU = Million Service UnitsPCI = Processor Capacity IndexIBM = International Business Machines Z = Zero Downtime

Hack'n Speak
0x0E - Podalirius | Retour sur LDAPMonitor, pydsinternals et le rebuild d'un AS400

Hack'n Speak

Play Episode Listen Later Dec 6, 2021 49:05


Liens: mpgn: https://twitter.com/mpgn_x64 podalirius: https://twitter.com/podalirius_/ Github: https://github.com/p0dalirius Blog: https://podalirius.net/en/

IT-Direktoratet
Episode 20 - Svein-Egil Pettersen | I overkant mye faglig innhold

IT-Direktoratet

Play Episode Listen Later May 12, 2021 111:35


Andreas, Richard og Paul i IT-Direktoratet reiser tilbake i tid. Tidligere har det blitt bråstopp på nittitallet, men denne gangen har vi med oss Svein-Egil Pettersen som tar oss med til en verden av IBM stormaskiner, hullkort og magnettaper. Og vi må bare beklage at det i denne episoden så er det i overkant mye faglig innhold. Vi kompenserer med IT-Direktoratets lengste digresjon så langt, når det blir snakk om kaffe. I spalten «se hva jeg fant på internett» tar Andreas oss med til https://www.old-computers.com 

The Cloud Careers Podcast
Episode 03: Gaëlle Acas, SRE @Talend

The Cloud Careers Podcast

Play Episode Listen Later Apr 19, 2021 53:04


A Women in tech, Mom who code and SRE @Talend. Gaëlle Acas has a long and rich experience, from coding on AS400 and Unix systems to PHP and web to Cloud and SRE. I meet Gaëlle back in 2019 during kubecon Barecelona. We had a long conversation during the conference and kept in touch on Twitter. Gaëlle didn't hesitate to come on the show and share her experience and wisdom with us. If there is anything I'd like you to take from this episode is “Don't wait for people to congratulate you, pat yourself on the back, and move on”, that's the advice Gaëlle received at the beginning of her career and she still uses until today. I hope you will enjoy listening to this episode as much as I enjoyed recording it. The Show is now available on major podcast platforms: Apple Podcast: https://apple.co/3tlbYXp Google Podcast: https://bit.ly/3se7fFP Spotify: https://spoti.fi/3siWfXE Don't forget to follow up on our social media accounts: Twitter: http://twitter.com/cloudcareersdev Instagram: https://www.instagram.com/cloudcareers.dev LinkedIn: https://www.linkedin.com/company/cloud-careers-dev

No Agenda
1251: "Viewpoint Discrimination"

No Agenda

Play Episode Listen Later Jun 14, 2020


Show Notes No Agenda Episode 1251 - "Viewpoint Discrimination" "Viewpoint Discrimination" Direct [link] to the mp3 file ShowNotes Archive of links and Assets (clips etc) 1251.noagendanotes.com Sign Up for the newsletter Archive of Shownotes (includes all audio and video assets used) archive.noagendanotes.com The No Agenda News Network- noagendanewsnetwork.com RSS Podcast Feed Experimental IPFS RSS Feed Get the No Agenda News App for your iPhone and iPad Get the NoAgendDroid app for your Android Phone Torrents of each episode via BitLove document.write("Last Modified " + document.lastModified)This page created with the FreedomController Credits "Viewpoint Discrimination" Executive Producers: Baron Sir Nick Foster Bill Gress Sir Neville James Nancy Nichols Sir Layron Dothan Shawn & Joelle Edgington Jesse Shafer Rob Alter The Earl Nathaniel Wirgau Associate Executive Producers: Matthew Ogley Randy Holcomb Sir Jimmy James of the Flatlanders Dan Merchant Robert Hausner Become a member of the 1252 Club, support the show here Title Changes Sir Nick Foster -> Baron Knights & Dames Aaron Berman -> Sir Aaron Berman Randy Holcomb - Knight of the AS400 Art By: Gabe Grider Engineering, Stream Management & Wizardry Mark van Dijk - Systems Master Ryan Bemrose - Program Director NEW: and soon on Netflix: Animated No Agenda End of Show Mixes: Jesse Coy Nelson - John Fletcher Sign Up for the newsletter ShowNotes Archive of links and Assets (clips etc) 1251.noagendanotes.com New: Directory Archive of Shownotes (includes all audio and video assets used) archive.noagendanotes.com RSS Podcast Feed Get the No Agenda News App for your iPhone and iPad Get the NoAgendDroid app for your Android Phone No Agenda Lite in opus format NoAgendaTorrents.com has an RSS feed or show torrents document.write("Last Modified " + document.lastModified)This page created with the FreedomController 16645 Keywords

netflix politics club iphone engineering ipads knights assets discrimination curry archive baron credits dames viewpoint wizardry douchebags dvorak no agenda android phones torrents title changes flatlanders stream management as400 bitlove rss podcast nancy nichols no agenda episode no agenda news app noagenddroid new directory archive noagendatorrents no agenda news network
IBM Bi-Weekly
Application Development for IBM i | IBM Bi-Weekly Ep. 7

IBM Bi-Weekly

Play Episode Listen Later Jun 3, 2019 37:46


Tim Rowe, Business Architect Application Development & Systems Management IBM i at IBM, joins Josh Hall to discuss Application Development for IBM i and much more.Support IBM Bi-Weekly:Patreon: https://www.patreon.com/ibmbiweeklyFollow IBM Bi-Weekly:Facebook: https://facebook.com/ibmbiweeklyTwitter: https://twitter.com/ibmbiweeklyWebsite: https://ibmbiweekly.comThank you to The Omni User Group for sponsoring this episode.Support the show (https://www.patreon.com/ibmbiweekly)

IBM Bi-Weekly
ILE RPG | IBM Bi-Weekly Ep. 6

IBM Bi-Weekly

Play Episode Listen Later May 6, 2019 23:16


Barbara Morris, lead of RPG Compiler Development at IBM, joins Josh Hall to discuss ILE RPG.Support IBM Bi-Weekly:Patreon: https://www.patreon.com/ibmbiweeklyFollow IBM Bi-Weekly:Facebook: https://facebook.com/ibmbiweeklyTwitter: https://twitter.com/ibmbiweeklyWebsite: https://ibmbiweekly.comThank you to IBM i Competence for sponsoring this episode.Support the show (https://www.patreon.com/ibmbiweekly)

IBM Bi-Weekly
IBM i Infrastructure | IBM Bi-Weekly Ep. 5

IBM Bi-Weekly

Play Episode Listen Later Apr 22, 2019 31:10


Steve Pitcher, IBM i Specialist at iTech Solutions Group, joins co-hosts Josh Hall and Liam Allan to discuss IBM i Infrastructure.Support IBM Bi-Weekly:Patreon: https://www.patreon.com/ibmbiweeklyFollow IBM Bi-Weekly:Facebook: https://facebook.com/ibmbiweeklyTwitter: https://twitter.com/ibmbiweeklyWebsite: https://ibmbiweekly.comThank you to The Omni User Group for sponsoring this episode.Support the show (https://www.patreon.com/ibmbiweekly)

IBM Bi-Weekly
IBM Db2 for i | IBM Bi-Weekly Ep. 4

IBM Bi-Weekly

Play Episode Listen Later Apr 8, 2019 35:54


Scott Forstie, Db2 for i Business Architect at IBM, joins co-hosts Josh Hall and Liam Allan to discuss Db2 for i.Support IBM Bi-Weekly:Patreon: https://www.patreon.com/ibmbiweeklyFollow IBM Bi-Weekly:Facebook: https://facebook.com/ibmbiweeklyTwitter: https://twitter.com/ibmbiweeklyWebsite: https://ibmbiweekly.comThank you to IBM i Competence for sponsoring this episode.Support the show (https://www.patreon.com/ibmbiweekly)

Les Poésies d’Héloïse
Poésie immersive MP5/DTX™️

Les Poésies d’Héloïse

Play Episode Listen Later Apr 1, 2019 1:07


Poésie immersive en réalité virtuelle MP5/DTX™️ ! Chers abonnés, pour profiter pleinement du podcast d’aujourd’hui, vous devez tenir votre écran à l’envers. (Retourné.) En effet, cette poésie est diffusée en podcast immersif MP5/DTX™️ (pas encore sorti pour le grand public, c’est en phase de test final depuis une semaine). Notez bien que cela nécessite également deux haut-parleurs stéréophoniques HiFi (ou tout simplement compatibles Surround/ΙχΘυσlogic·II+) ainsi que la toute dernière version de votre système d’exploitation (iOS, Android, Windows, MacOS, Linux, AS400 ou CP/M), sans quoi il est probable que ça ne fonctionne pas du tout. Montez le volume sonore et bonne écoute ! Retrouvez toutes les poésies d’Héloïse sur lespoesiesdheloise.fr.

IBM Bi-Weekly
Open Source Software on IBM i | IBM Bi-Weekly Ep. 3

IBM Bi-Weekly

Play Episode Listen Later Mar 25, 2019 35:29


Jesse Gorzinski, Business Architect of Open Source on IBM i, joins co-hosts Josh Hall and Liam Allan to discuss open source software on IBM i.Support IBM Bi-Weekly:Patreon: https://www.patreon.com/ibmbiweeklyFollow IBM Bi-Weekly:Facebook: https://facebook.com/ibmbiweeklyTwitter: https://twitter.com/ibmbiweeklyWebsite: https://ibmbiweekly.comSupport the show (https://www.patreon.com/ibmbiweekly)

IBM Bi-Weekly
IBM i: What is it? ft. Steve Will | IBM Bi-Weekly Ep. 2

IBM Bi-Weekly

Play Episode Listen Later Mar 11, 2019 52:47 Transcription Available


Steve Will, Architect for IBM i at IBM, joins co-hosts Josh Hall and Liam Allan to discuss what the IBM i operating system is. If you've ever been curious about IBM i, or know someone that would be, this is the episode to watch!Support IBM Bi-Weekly:Patreon: https://www.patreon.com/ibmbiweeklyFollow IBM Bi-Weekly:Facebook: https://facebook.com/ibmbiweeklyTwitter: https://twitter.com/ibmbiweeklyWebsite: https://ibmbiweekly.comSupport the show (https://www.patreon.com/ibmbiweekly)

ibm architects josh hall as400 iseries liam allan steve will ibmi
IBM Bi-Weekly
Introduction | IBM Bi-Weekly Ep. 1

IBM Bi-Weekly

Play Episode Listen Later Feb 25, 2019 36:53


An introduction to IBM Bi-Weekly, a podcast focused on the technical aspects of the IBM i operating system and the community revolving around it. Every other week, co-hosts Liam Allan and Josh Hall, along with occasional guests, explore IBM i hot topics.Follow IBM Bi-Weekly:Facebook: https://facebook.com/ibmbiweeklyTwitter: https://twitter.com/ibmbiweeklyWebsite: https://ibmbiweekly.comSupport IBM Bi-Weekly:Patreon: https://www.patreon.com/ibmbiweeklySupport the show (https://www.patreon.com/ibmbiweekly)

ibm josh hall as400 iseries liam allan ibmi
Craig Peterson's Tech Talk
SecurityThing - Salisbury Police Department - Ransomware Attack

Craig Peterson's Tech Talk

Play Episode Listen Later Jan 31, 2019 8:41


Craig is starting a new daily podcast called It's a Security Thing. Today's security thing discusses about the zero day virus attack on a police department in Maryland. These and more tech tips, news, and updates visit - CraigPeterson.com --- Related Articles  --- Below is a rush transcript of this segment, it might contain errors. Airing date: 01/31/2019 Salisbury Police Department - Ransomware Attack Craig Peterson 0:00 Everybody, you know, I'm trying to do something a little different here. Now, you know, we were all into security, many of us that are listening, and this is going to be our Thursday and Friday for the next little while. Anyways, I kind of a security update here is what's going on in the world helping me understand a little bit more, but this is geekier. Okay, this is going to be for the geeks amongst us, because we're going to talk about actual things that have happened over the last, you know, few weeks, month, maybe bit more, as well. So we're going to start this out today, by talking about this zero day virus that hit we got there's a lot to talk about here. We've got a, you know, tomorrow, we'll talk a little bit more. But we've got a police department down in Maryland who got nailed. And I got to tell you both of these stories. Bottom line is they had very good backups. And that's always the first step. And I've got to warn people that because you think you have a backup, it's no indication that you really do have a backup. So keep that in mind as well. All right, that I have seen it time and time again, they think they're writing to tape or it's going to disc or going remotely. We have a client that has decided that they needed a cheaper disaster recovery solution than us. And they didn't understand what DR meant. Disaster Recovery what it really means. And what it means, by the way, is that you can get your business back online very quickly. You don't have to wait weeks in order to restore from backup tapes, or from online cloud, etc. You're back online, you're back in business in as little as five minutes, depending on on how much you want to pay. So they were getting this disaster service from us that is designed specifically to allow them to get back on within four hours. And in reality, it's more like 15 minutes. But it's a four hour guarantee, because that's what the law requires if you are a public entity, or you are a division of a public entity, in case you didn't know, okay, so they thinking that day, we're just a division of a public company, you know, they bought us, but we do our little thing, they don't really bother us, they why they had signed up with us for disaster recovery, because we had told them, here's the law, Sarbanes Oxley, here's all your requirement. Here's what you need to be doing. And so we put it in place. So they went out and they talked to this other vendor that all they offer is backup. Now, this is a vendor that was backing up their AS 400, which is kind of a mini computer of days gone by. Great little machine from IBM. And they had been backing this up, they were supposed to be providing disaster recovery. And everything in this company hadn't been. We were monitoring all the networks, we were looking at everything. We were taking care of all of the data transfers. And we went to our client and said, Hey, by the way, what's this link for? Because, you know, it hasn't been active now, in six to eight weeks at all? What do you mean at all? I said, Well, you know, there's been no data transferred at all. And for a while there was kind of busy just a thought I double check, because it was out of the norm. Usually, we get more interested when there is more data than usual, as opposed to less data than usual. In this case, it was less data than usual. They said, oh, yeah, well, that's our backup line. That's for our AS400 that's our main system. Well, why isn't there any traffic on it? Well, this company who was supposed to be providing them with some form of DR service and also backup hadn't been doing it their site with their their software and everything was broken and they never noticed. And the company our client never noticed. And so they were not only out of compliance with the law, but they would have been in deep trouble, even if they just had a hard disk crash, let alone their systems are brought down by someone who's malicious. Very, very big deal. So now that have gone to these guys that failed them already. And today, can you do a cheaper backup, you know, we need disaster recovery, too. And they say, Oh, yeah, we can do cheaper, of course, they can do cheaper and that's what I want to drive home here everybody. They can do cheaper because they're not monitoring it. They can do cheaper because they don't have multiple generations of backups, which is another problem. Because if you don't have multiple generations of backup, what happens when you get ransomware? What happens when you get nailed like this Salisbury, Maryland police department. This happened January 24th. Okay. So you get ransomware and your backups are overwritten because they run normally right and the overwritten with what with your data encrypted by the ransomers. So you can't get your data back. All you can get back is another copy of your encrypted ransom data. That's what they signed up for. This drives me crazy people. Absolutely crazy because they're doing the wrong thing. Of course, it costs more to do what we're doing for them, of course. But we're doing everything that should be done. We check their backups, integrity weekly.We have multiple generations of their backup going back for years, which is also required by law. Now, we don't keep every backup for all those years. But we have kind of what's called a grandfather, father, son type of relationship in these backups. And if you want to know more, let me know and I can, I can help you out. But we also spin up machines. So at least every month, all of their machines get spun up in our cloud. So we know that and not only is the backup data proper, but on top of it, their machines will come online in the cloud if they have a major failure. But no, they they went with a much cheaper option that has proven to not work already. I don't get it. I just don't get it. So Salisbury Police. Captain Richard Kaiser, told the Daily Times of Salisbury that the police department's entire internal computer network was compromised January 9, in a ransomware attack is in negotiations with the attacker who asked for an undisclosed sum quickly disintegrated. Now, that's the normal first response is let's negotiate. And, you know, I do this work with the FBI in regard program. And the FBI is advice is always don't pay ransoms. But the police department was negotiating because I knew it was going to be expensive to restore it. Everything all that does is two things it encourages them to do it again but guess what? The second thing is it encourages them to attack you again because they know you will pay a ransom okay so is that stupid or what right and police department ok, ok. It will be a $5,000 okay no problem and then who are they going to try and attack next time the police department right. So the captain says there was a backup system and they were able to recover stuff from backups there's no evidence anything was stolen or download of course there isn't because there was ransomware and I gotta tell you to ransomware is often used as a cover for them to steal your data in police departments ability to respond to calls wasn't hampered because they still had a paper system in place and the police are working with the FBI. Interesting eh? Salisbury, Maryland. This can happen to you this happened a couple of weeks ago in Salisbury. Something to keep an eye out for, make sure you have good backups. Make sure you understand what backups are about. And you may want to sign up for my course. Next week. I got free tickets. I'm going to give away a ton of my best information. And if you want to go further, you can go further. But I am going to get you out of this rut that you're in. Do it yourself. security done the right way. That's what this is all about. http://CraigPeterson.com. Anyways, have a great day. And you know what, it's all just a security thing. Fellow security geeks. I will be back tomorrow. Take care. Bye bye. --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Message Input: Message #techtalk Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

Security Insider - Podcast Edition
IBM i, Two Factor Authentication, and PCI DSS

Security Insider - Podcast Edition

Play Episode Listen Later Feb 16, 2018 15:57


PCI DSS requiress two factor authentication (also known as multifactor authentication) - something you know and something you have. For IBM i users, this usually means a password and an authentication code provided to a token or mobile device. However, tokens are expensive and are frequently lost - and SMS messages to mobile devices have become a deprecated method. Join Patrick Townsend, Founder and CEO of Townsend Security, as he discusses the PCI recommendations, how to meet 2FA compliance requirements with a mobile based solution, and how Townsend Security is helping IBM i users meet the latest two factor authentication compliance requirements. Download this podcast to learn about: PCI DSS and NIST requirements for two factor authentication Protecting critical data on the IBM i with two factor authentication Mobile based authentication with Twilio's Authy Introduction to Alliance Two Factor Authentication

Business and Technology in Tennessee with Josh Davis
Episode 4 - John Rockwell, All400s.com

Business and Technology in Tennessee with Josh Davis

Play Episode Listen Later Dec 6, 2017 46:57


In this episode, Josh Davis and John Rockwell (All400s.com) discuss the cult-like dedication to the IBM i platform family, which includes the legendary AS/400 hardware. The All400s.com website was created to provide a resource for people who need to find IBM i professionals and to understand the arguments for remaining on this platform when many technology vendors are trying to convince business leaders to move away from it.

tennessee ibm rockwell josh davis as400 ibmi infosystems
Security Insider - Podcast Edition
Securing the IBM i in the Cloud

Security Insider - Podcast Edition

Play Episode Listen Later Aug 11, 2017 28:07


While the IBM i (AS/400) is considered by many to be a secure platform, it is not immune to data breaches. For this special podcast, Clayton Weise of KeyInfo joins us to discuss running the IBM i in the cloud, maintaining a strong security posture, and common questions about cloud/on-prem hybrid networks. Download this podcast to learn about: IBM i, security, and why customers are moving to the cloud Improving IBM i security posture by moving to cloud Meeting compliance requirements in the cloud Future proofing your IBM i platform

Security Insider - Podcast Edition
Identify Escalated Privilege Attacks on IBM i

Security Insider - Podcast Edition

Play Episode Listen Later Jun 27, 2017 16:21


Cyber criminals attempt to escalate their level of privilege by stealing and using administrative credentials. Because IBM i servers are accessed from user PCs across internal and external networks, credential stealing from these exposed PCs and networks is the preferred mechanism for compromising an IBM i server. Download this podcast to learn about: Identifying escalated privilege attacks on the IBM i Determining the true level of authority of a user profile Controlling and monitoring administrative level users Setting email alerts to include critical job and security information

Safety on Tap
Safeopedia 1: Connectedness, the value of feedback, and the beginning of Safeopedia, with Scott Cuthbert

Safety on Tap

Play Episode Listen Later Mar 27, 2017 20:28


Andrew: This is Safety on Tap. I’m your host, Andrew Barrett, and since you’re listening in, you must be a leader wanting to grow yourself and drastically improve health and safety along the way. Welcome to you. You’re in the right place. If this is your first time listening in, thanks for joining us, and well done for trying something different to improve. And welcome back, of course, all of you excellent regular listeners. We’re super pumped to be collaborating on this podcast series with Safeopedia. Safeopedia’s mission is to organize the world’s environmental health and safety information to make access free and easy for everyone. Now, the team over at Safeopedia wanted to get to know you better, and for you to get to know Safeopedia better. So, this podcast series brings you some intimate conversations with the founders of Safeopedia and members of the Content Advisory Board. Safeopedia set up their Content Advisory Board to share observations and ideas on which topics and trends in the environmental health and safety industry will have the greatest impact for their audience. Their commitment to quality and to giving you relevant content is just top-notch. Listen in to each episode in this series, as we get to know the individuals involved, what makes them tick, and get some great advice, insightful stories, and motivation to help you grow. Here we go. Scott Cuthbert, co-founder of Safeopedia.com, welcome to the Safety on Tap podcast. Scott: Thank you very much, Andrew. A pleasure to be here. Andrew: This is the beginning of a bit of an experiment for both of us, where Safety on tap, with its support for leaders who want to grow themselves and drastically improve health and safety, and Safeopedia, aiming to be the place to go globally for health and safety and environmental information, come together. I’m pretty excited, I should say, on here, for our listeners, to be collaborating with you guys. Thank you very much, to begin with. Scott: Oh, our pleasure. We’re equally excited to be working with you and just understand the importance of leadership in environmental health and safety. Andrew: You have the genesis story. You have the very beginning, because this hatched, I’m sure, in your head, sitting in the bathtub or trudging through the snow or—one day, I’m sure, it popped into your head. So tell us a little bit about you and your story and how Safeopedia came to life. Scott: Sure. My background really started in the construction industry. Not swinging a hammer, so much, out on the job site—I started in the finance departments with the international general contractor. Because I was the guy that knew how to reboot a printer or run the backups for the AS400 at the time, I ended up getting pulled more and more into the IT side of things, and ended up leaving the grind of working for a general contractor and providing some consulting services back to the industry through project controls consulting and also system selection and implementation, and then decided to branch out on my own with a software company that was specifically designed to deal with the field data capture on these large-scale industrial projects. I guess it was really through that experience that I got pulled more and more into the safety side of the business. They needed to pull data from our system to do safety statistics, hours of exposure by plant area, by trade, by demographics of the workforce. I just sat in more and more safety meetings and really took a personal interest in it and volunteered to sit on several committees and just sit around the table more as an observer and as a safety expert and to hear what the guys out on the field were talking about, what their biggest hurdles were, and understand where their strengths were, versus where they were falling down, implementing the best practices out in the field. Andrew: How do you bridge the gap, then, between that active interest that you had in those still project-based roles on the consulting and how Safeopedia came to be? Scott: Well, it is one of those “light bulb goes on” stories, because I had— Andrew: It wasn’t in the bathtub? Scott: It wasn’t in the bathtub, but I was going to say it was one of those bathtub moments, but it was actually in my car. I was driving back from a safety committee meeting, and I had sat around the table with half a dozen—a dozen folks that had just a tremendous amount of experience. They were trying to do the best job that they could possibly do. They were trying to share best practices and understand what was working on this job site, versus that job site, and they were really struggling to collaborate with each other effectively. They were sending huge Word documents back and forth, and really, it wasn’t my idea, as much as it was the group’s idea, saying, “If there was just one place we could go where we had these best practices, where we had these tips and tricks, where we could share ideas, it would save us so much time and energy.” And so, I was driving back from the meeting, and it’s quite a ways away from where our office was, and I had this just pop into my head: “Safeopedia.” And as soon as that idea popped into my head, I just couldn’t wait to get back to the office. I drove safely, minded the speed limits, of course, but I drove straight back to the office and looked up the domain name, and it was available, and I purchased it right there and then and began the incorporation process to set it up as a legitimate company. I guess the rest is history from there. Andrew: You really just started with what was a relatively tiny bit of market research, passion for the area, and a spur-of-the-moment domain purchase. And after that, you really just worked it out from there. Scott: Yes, that’s absolutely correct. After securing the domain and starting the trademark and incorporation process, I did spend another year or two vetting the idea with industry folks to the best of my ability, throwing out ideas of “What should it be? Should we try to replicate LinkedIn? Should we make it more social, like Facebook? Or should we just be producing educational content to start with?” It was over the next 12 to 24 months where, again, the industry that had helped give me the idea helped me vet my ideas and strategies on how we should get it off the ground and where we should start. It wasn’t an overnight idea that popped into existence. It did certainly take some time to cultivate it and find the right folks to work with and align ourselves so that we could be successful out of the gate. Andrew: I think that really speaks to me, in the paradox of—on the one hand, you had an idea, and you just jumped on it. You kick-started it by that drive in the car and then purchasing that domain name. That, in itself, was very insightful, in that sometimes we spend too much time stewing on things, and we just don’t get them started. But then, on the other hand, the paradox is that you did spend a fair bit of time and effort in order to validate the idea, to make sure it worked. I think sometimes, often, there’s a learning out of that for us, where we spend too much time analyzing and thinking and planning, and maybe not enough time just getting stuff started. We might find that it is a big job—and that’s OK—but we might find sometimes that the job’s not as big as we think, and we’ll actually solve problems and help people a whole lot quicker if we just get on with it. I think that’s a great story to tell and a lesson for us to learn from. Safeopedia has been growing and growing, in terms of the numbers of people that it serves, visiting the website, attending webinars, consuming the content, contributing new content. We have our collaboration, obviously, which is moving into a new space with podcasts and potentially pushing the boundaries a little bit more. You’ve come up with this concept, which we described in the introduction, of this Content Advisory Board. From your point of view, with you leading the charge, why have a Content Advisory Board? Scott: Great question And both Jamie and I are the faces of Safeopedia. We have a tremendous amount of background and experience within these industries. But we’re not going to sit here and pretend that we know everything, that we’re experts in all the different areas. It was really important for us to pull a group together that could certainly augment our strategy and our ideas and provide some really strong expertise to the direction that we wanted to go in. As listeners will learn, we have a very diverse group of professionals across primarily North America, one in UK, and certainly, with your involvement, Andrew, some Australian representation, as well. Andrew: From Down Under. Scott: From Down Under. And they’re helping us to understand what the hot topics or the key topics are within their industries and their geographies, and help us look ahead a little bit to what will be the most valuable information we can produce for our users in those areas. Andrew: Makes plenty of sense to me. In the time that you have been grinding and driving and working to slowly grow Safeopedia, what’s the biggest lesson that you’ve learned in that process? What’s been your light bulb moment or a big height? What’s been the biggest lesson? Scott: The light bulb moment? I think it’s understanding the new economy—the Google economy, if you will—and how people are looking for information. It’s great. I think there’s a lot of really passionate people out there that are publishing great content. But unless you know how to get found, unless you know how to connect with others and have a voice in this ocean of data that we now live in, it’s all in vain. I think the most important lesson we’ve learned is, again, how to get your data out there, how to get your information out there, but make sure that you get heard, as well. I think that’s key. Andrew: Great lesson. Do you have a superpower? Scott: I don’t know if I have a superpower. Certainly, I was an early adopter on LinkedIn, and was connecting with people and keeping in touch with people. I think that, if anything, that’s been my superpower over the years. I can’t remember who wrote the book— Andrew: The Six Degrees of Separation? Scott: No, the connectors and the influencers and the mavens and Malcolm Gladwell, I think, The Tipping Point. Definitely, I’m a connector, and I’ve always been a connector. I think that’s key in this new digital economy: having an online presence and having some knowledge of how that all works. Andrew: You know what? You reached all the way across the globe in order to tap me on the shoulder. That brings us here today, so that’s a real testament to that. When we first started talking about getting together and working out how we can make a bigger dent in the world together than we might do separately—we’ll be honest with the listeners—I said to you, “I’m not sure that we’re a match. The content on Safeopedia is really good to support people in a technical sense, but it does have a focus on compliance and some of the detailed stuff, and there’s a different leaning towards stuff like hazards and IT systems and checklists and things like that.” Now, all of those things are important. They’re the foundational things that help us drive our programs in health and safety in our work. But I think, sometimes, we tend to ignore the gray and the messy and the people part, effectively. That’s very gray and messy. Here at Safety on Tap, we fuel leaders to grow themselves and drastically improve health and safety along the way, which often means challenging the status quo and pushing boundaries out of what I call “the conventional.” What direction do you personally want to see Safeopedia take in 2017? Scott: I definitely want to echo your comments. You can’t dismiss the fact that a lot of the compliance components are what has helped us build our audience of over 100,000 members. But in the long run—and this was echoed, as well, by the Content Advisory Board—there is a bit of a leadership vacuum within environmental health and safety. It’s been, to date, a very technically-focused discipline, and we really need to broaden that, to teach people and attract visionaries and leaders to the industry, so that we can not just make sure that companies are compliant, but that companies are embracing culture, health and safety, and they’re being leaders, not just followers, in the industry. Long-winded way of answering your question, but I’d really like to see us provide more content and more connections for people who want to take a leadership role, perhaps who don’t know how to get started or want to connect with leaders who have done it before and can share their experiences and best practices. That’s definitely an area that we want to focus on for 2017. Andrew: That’s the very reason why we’re talking today, because we’re all about supporting leaders to grow. I’m sure the listeners will tell I’m pretty excited about collaborating with you guys. Is there anything that you want to ask the listeners for, in terms of how they can contribute to improving Safeopedia, putting in what you get out, so to speak? Scott: Yes, absolutely. One of our biggest compliments—if you want to call it that—from last year, was when one of our team members was on a conference in Puerto Rico, thousands of miles from here, and was talking about different businesses that he was involved in, and mentioned Safeopedia, and the fellow that he was speaking to—his eyes just lit up, and he said, “Hey, I use Safeopedia all the time. I can’t believe you’re one of the guys involved in Safeopedia! We go there regularly to look at articles and share content with our management team and our guys on the field.” That’s one of the greatest compliments we can get. We see, through Google Analytics, that over 50,000 people are coming to our site every month, but we really only get an opportunity to interact with a few of them, who maybe have some suggestions for us, who have some criticisms for us, who think that we need to focus on different areas or expand an article or a term that we have posted on the site. I really encourage people to—and we listen. I’m sure there are sites out there where people send emails and you never hear back, but we want to hear from everybody. We only know what we know. If you know something we don’t, by all means, share with us. Our terms and articles—our content is there as a starting point to help improve industry and help people out in the field, so any ideas or suggestions or criticisms that you guys have for us, please, by all means, share it. We’d love to hear it. Andrew: I’ll just add to that, it’s not just about you, then, getting more of what you want out of Safeopedia, or providing feedback to our podcast, as well. It’s equally the same, where the feedback you provide will help hundreds, if not thousands, of people. Scott: That’s right. Andrew: That, I think, is the fantastic thing about this global connected economy that we live in. Scott: Absolutely, if you have a question, or you have a problem with an article, then chances are hundreds, perhaps thousands, of others do as well. It was a little while ago now, but we had posted an article, and somebody replied, and the tone of it was a little bit angry. He had written a big dissertation about what was wrong with the article and the approach that we were taking. We reached out. We contacted him and said, “Hey, this is fantastic. This criticism is absolutely invaluable. Can we take this and turn it into an opposing article that talks about the same subject from a different perspective? Because if you’re having that problem—no matter how many people like or share or retweet that original article, if you’re having problems with it, then somebody else is, too.” He agreed, and we posted his follow-up article as a Part 2, and it was hugely successful and really, really well-received. We’re here to make the site better. We don’t take anything personally, so by all means, get involved and let’s make it the best site we can make it. Andrew: That’s a fantastic example. We might link to those two articles, I think, in the Safeopedia article for this podcast interview, and also on the Safety on Tap website show notes, as well, so the listeners can have a look at those and compare and contrast for themselves. Before you go, Scott, what’s your best piece of advice for people who want to have a more effective impact in their environment, health, and safety practice? Scott: I would say, "be tenacious." It’s a very, very important industry. It’s an important part of every organization. But it still continues to be minimized. Some companies are looking at it as a cost item, and some people think that it negatively impacts productivity, but we have to keep providing them with—keep educating them and keep moving them forward, slowly if necessary. But be tenacious. Don’t give up. It’s so important. It’s about our planet. It’s about our coworkers. It’s about ourselves and making sure everybody gets to go home safe to their families at the end of the day. Don’t lose hope. Be tenacious. If you need to, reach out, and we’ll provide whatever support we can. Andrew: Fantastic advice, and I’m looking forward to continuing to make a difference in the world with you and Jamie and the rest of the guys at Safeopedia. Scott Cuthbert, thanks for joining us on the Safety on Tap podcast for Safeopedia. Scott: Thanks, Andrew. My pleasure. Andrew: Thanks to Scott for today’s conversation. Next episode, we have Scott’s partner in crime—hang on, that didn’t come out right—anyway, Jamie Young from Safeopedia. Given the commitment to improvement that we have here at Safety on Tap and at Safeopedia, let us know what you think about this episode. Give us a comment. The best way is to head over to iTunes or Stitcher to leave us a review and to comment, and we’ll be eternally grateful. If you haven’t already, check out even more episodes and great content over at Safeopedia.com and SafetyonTap.com. Until next time, I think you take positive, effective, and rewarding action to grow yourself and drastically improve health and safety along the way. See you!

Security Insider - Podcast Edition
The Future of Security Logging on the IBM i

Security Insider - Podcast Edition

Play Episode Listen Later Jan 10, 2017 26:35


Active monitoring (sometimes referred to as Continuous Monitoring) is one of the most effective security controls that an organization can deploy - and can often detect a data breach before any information is lost. As the IBM i continues to evolve, so do sources of security logs. With logs being created from so many different sources, it is important to collect and monitor them in real-time to detect security events. Download this podcast to learn about: Current status of security logging on the IBM i The future of log collection and monitoring New logging sources in IBM i V7R3 Elements of an effective active monitoring strategy

Security Insider - Podcast Edition
IBM i 7.3 Security: New Logs to Collect and Monitor

Security Insider - Podcast Edition

Play Episode Listen Later Oct 17, 2016 17:57


Active monitoring (sometimes referred to as Continuous Monitoring) is a critical security control for all organizations and is one of the most effective security controls you can deploy. The large majority of security breaches occur on systems that have been compromised days, weeks, or even months before sensitive data is lost. With the release of V7R3, IBM i administrators have additional security logs to collect and monitor. Download this podcast to learn about: Log collection and monitoring on the IBM i New logging sources in IBM i V7R3 System log formats and standards Elements of an effective active monitoring strategy

Security Insider - Podcast Edition
IBM i, PCI DSS 3.2, and Multi-Factor Authentication

Security Insider - Podcast Edition

Play Episode Listen Later Jun 1, 2016 19:08


Prior to version 3.2 of the PCI Data Security Standard (PCI DSS), remote users were required to use multi-factor authentication for access to all systems processing, transmitting, or storing credit card data. With version 3.2, this is now extended to include ALL local users performing administrative functions in the cardholder data environment (CDE). Download this podcast to learn about: What PCI DSS 3.2 means for IBM i administrators Why it is harder to identifiy an administrative user on the IBM i Challenges IBM i customers are facing regarding multi-factor authentication How Townsend Security is helping organizations meet PCI DSS 3.2 with multi-factor authentication

Security Insider - Podcast Edition
FIELDPROC Encryption with Legacy RPG Applications on IBM i

Security Insider - Podcast Edition

Play Episode Listen Later May 23, 2016 16:46


While the IBM DB2 Field Procedures (FieldProc) facility works quite well with native SQL applications, IBM i customers with legacy RPG applications have not been able to take full advantage of FieldProc to encrypt data in DB2 tables. In particular, the encryption of database columns, which are indexes, has been very difficult for IBM i customers using legacy RPG. This results with inability to use FieldProc encryption to protect sensitive data. Download this podcast to learn about: How IBM i customers with legacy RPG applications can deploy automatic DB2 encryption over sensitive data which are indexes How to leverage OAR capabilities to replace the legacy RPG file I/O with modern SQL operations What industries will benefit the most

Security Insider - Podcast Edition
Monitoring IBM i Security Logs with IBM QRadar

Security Insider - Podcast Edition

Play Episode Listen Later Oct 28, 2015 18:27


Collecting real-time security events on the IBM i platform is different than other platforms - logs are stored in many different places in a proprietary IBM format. This presents a challenge for administrators who need to monitor their IBM i logs. Download this podcast to learn about: Real-time security event logging on the IBM i Monitoring your most critical data with IBM Security QRadar Meeting compliance requirements like PCI DSS, HIPAA, FFIEC, and more

Security Insider - Podcast Edition
Two Factor Authentication on the IBM i

Security Insider - Podcast Edition

Play Episode Listen Later Jan 9, 2014 17:30


User names and passwords are no longer good enough. To protect sensitive data, businesses need another layer of security and are often turning to two factor authentication. By deploying a two factor authentication solution organizations can easily enhance their security in a cost-effective way, as well as meet compliance regulations and recommendations.

Security Insider - Podcast Edition
PGP Encryption on the IBM i - Securing Data in Motion

Security Insider - Podcast Edition

Play Episode Listen Later Aug 14, 2013 15:29


PGP encryption has become the de facto standard for securing data in motion on the IBM i. It can help businesses meet compliance regulations such as PCI DSS by encryption credit cards and other PII as it is in transit to your trading partners. In this podcast, Patrick Townsend discusses the differences between Open PGP and Commercial PGP, which version a company who faces compliance regulations should use, and how Townsend Security is helping IBM i users secure their data with PGP encryption.

Security Insider - Podcast Edition
Top IBM i Security Tips with Patrick Botz and Patrick Townsend

Security Insider - Podcast Edition

Play Episode Listen Later Jun 14, 2013 23:43


As a data security company, we see plenty of organizations think they are doing the right things to keep their data safe, but are falling down on a few key areas. For this special podcast, Patrick Botz of Botz and Associates joins Patrick Townsend to present their top three IBM i security tips to help keep your IBM i secure and data safe.

Security Insider - Podcast Edition
FIELDPROC Encryption on the IBM i

Security Insider - Podcast Edition

Play Episode Listen Later May 3, 2013 14:54


With IBM ending support on V5R4 of the IBM i later this year, many organizations are in the process of upgrading their systems to V7R1. In V7R1, IBM introduced support for automatic, field-level encryption in the DB2 database called FIELDPROC (short for "Field Procedures"). This allows IBM i users to now deploy encryption without making any program changes. Listen to this podcast to hear Patrick Botz, former lead security architect for IBM, and Patrick Townsend, Founder & CEO, discuss encryption, key management, and meeting compliance regulations on the IBM i.

Security Insider - Podcast Edition
Extending the Life of Your IBM i with PHP

Security Insider - Podcast Edition

Play Episode Listen Later Jan 10, 2013 15:28


Sensitive data can now be automatically encrypted using Townsend Security's NIST-certified encryption libraries and developers can use cross-platform PHP to easily communicate with modern systems. Additionally, PHP can be used to transform complicated green screens into a familiar, simple user interface. For this special podcast, Eric Nies from NSC Software Solutions joins Patrick Townsend, Founder and CEO of Townsend Security, to discuss data security with PHP on the IBM i.

Security Insider - Podcast Edition
IBM i Has Single Sign On (SSO) - You Just Have to Enable It!

Security Insider - Podcast Edition

Play Episode Listen Later Nov 27, 2012 18:19


Password management continues to be a challenge for all organizations - large and small. Poor management leads to insecure passwords and inconsistent policies – and these lead to more data breaches. For this special podcast, Patrick Botz joins us to talk about Single Sign On on the IBM i and how it can be used to easily and securely manage user accounts and passwords.

Security Insider - Podcast Edition
File Integrity Monitoring (FIM) on the IBM i

Security Insider - Podcast Edition

Play Episode Listen Later Oct 31, 2012 15:56


File Integrity Monitoring (FIM) tools allow administrators to selectively monitor data access and change activity at the column or field level - without changing applications or user accounts. Join Patrick Townsend as he discusses why implementing FIM tools is a best practice and compliance requirement, how administrators are using them, and what makes the Townsend Security solution unique.

Security Insider - Podcast Edition
System Logging on the IBM i - How to Do it Better

Security Insider - Podcast Edition

Play Episode Listen Later May 1, 2012 15:25


Collecting and monitoring system logs has become a hot topic for organizations that need to meet compliance regulations. Logging on the IBM i (AS/400) is different than other platforms and something an organization should not take the “do it yourself” approach.

Security Insider - Podcast Edition
IBM i Security: Skip V6R1 and Upgrade to V7R1

Security Insider - Podcast Edition

Play Episode Listen Later Mar 16, 2012 14:15


IBM recently announced the end of support date for V5R4. This will prompt many IBM i shops to upgrade to a newer release - either V6R1 or V7R1. This podcast will discuss the security reasons that you should go straight to V7R1. Additionally, we will discuss how Townsend Security can help you take advantage of FIELDPROC, a new addition to V7R1 that allows companies to encrypt their sensitive data without changing their applications.

Security Insider - Podcast Edition
Secure Managed File Transfer on the IBM i - An Introduction

Security Insider - Podcast Edition

Play Episode Listen Later Mar 8, 2012 16:42


Learn what secure managed file transfer is, how it can help you meet compliance regulations, and what to look for in a secure managed file transfer solution. Additionally, we will discuss how Townsend Security can help make your managed file transfers secure with PGP encryption.

Security Insider - Podcast Edition
System Logging on the IBM i: Getting Started

Security Insider - Podcast Edition

Play Episode Listen Later Jan 13, 2012 16:58


Like other IT projects, the implementation of up-to-date logging requires careful planning. For example: systems need to be monitored and the parameters related to security and archiving need to be defined. This podcast discusses what system logging is, how logging can help you meet compliance requirements, and what to look for in a logging solution. Additionally, learn how Townsend Security can help you transmit the logs from your IBM to any SIEM console.

Security Insider - Podcast Edition
IBM i FIELDPROC Performance: Speed Matters

Security Insider - Podcast Edition

Play Episode Listen Later Dec 2, 2011 14:16


FIELDPROC has made encryption on the IBM i much easier. It is now possible to encrypt your databases with NO APPLICATION CHANGES! The question is, what are the performance impacts? Patrick Townsend explains why the speed of your encryption is important, what to look for when deciding on a solution, and simple tests that listeners can do to help decide which FIELDPROC encryption solution is right for them.

Security Insider - Podcast Edition
Secure File Transfer Changes for the IBM i

Security Insider - Podcast Edition

Play Episode Listen Later Jul 14, 2009 18:05


A discussion of existing and new regulations that are changing the way System i users handle secure file transfer. Also includes information about solutions available to help the Enterprise meet today’s compliance challenges.

The Lubetkin Media Companies
Magic Software Enterprises Ltd. Podcast #1: Compliance Issues in Software Development, with Carol Woodbury

The Lubetkin Media Companies

Play Episode Listen Later Sep 4, 2007 17:14


Magic Software Enterprises Ltd. presents a conversation about compliance with Carol Woodbury, Founder and President of SkyView Partners. Carol Woodbury Prior to forming SkyView Partners, Inc with John Vanderwall Carol spent 16 years with IBM in Rochester, MN. She served for more than 10 years as the AS/400 Security Architect and Chief Engineering Manager of Security Technology for IBM's Enterprise Server Group. During this time Carol provided security architecture and design consultations with IBM Business Partners and large AS/400 customers. She is known worldwide as an author and speaker on security technology, specializing in OS/400 and i5/OS security issues. Carol co-authored the popular book, Experts' Guide to OS/400 and i5/OS Security from 29th Street Press, has written numerous articles on security and is a technical editor for the IBM Systems Magazine. Carol is also a subject matter expert on security for COMMON, security author for Experts Journal, contributing author on security for System iNEWS and MC Press Online and the security expert for search400. Download the podcast file here (23.6 mb stereo MP3 file, 17:12 length). Keywords: System i,iSeries,AS/400,regulatory compliance,data security,composite application development,integration,SOA,service oriented architecture,application modernization,legacy modernization,PCI,SOX,HIPPA Produced in the studios of Professional Podcasts LLC, Cherry Hill, NJ.

Magic Software Enterprises Podcasts
Magic Software Enterprises Podcast #1: Compliance Issues in Software Development, with Carol Woodbury

Magic Software Enterprises Podcasts

Play Episode Listen Later Sep 4, 2007


Magic Software Enterprises presents a conversation about compliance with Carol Woodbury, Founder and President of SkyView Partners.Carol WoodburyPrior to forming SkyView Partners, Inc with John Vanderwall Carol spent 16 years with IBM in Rochester, MN. She served for more than 10 years as the AS/400 Security Architect and Chief Engineering Manager of Security Technology for IBM's Enterprise Server Group. During this time Carol provided security architecture and design consultations with IBM Business Partners and large AS/400 customers. She is known worldwide as an author and speaker on security technology, specializing in OS/400 and i5/OS security issues. Carol co-authored the popular book, Experts' Guide to OS/400 and i5/OS Security from 29th Street Press, has written numerous articles on security and is a technical editor for the IBM Systems Magazine. Carol is also a subject matter expert on security for COMMON, security author for Experts Journal, contributing author on security for System iNEWS and MC Press Online and the security expert for search400. Download the podcast file here (23.6 mb stereo MP3 file, 17:12 length).Keywords: System i,iSeries,AS/400,regulatory compliance,data security,composite application development,integration,SOA,service oriented architecture,application modernization,legacy modernization,PCI,SOX,HIPPAProduced in the studios of Professional Podcasts LLC, Cherry Hill, NJ.