POPULARITY
Hii Founders! Welcome back to Hangat! Segmen dari Teman Startup di mana kami merangkum berita-berita hangat yang terjadi minggu lalu! Lumayan buat kalian yang ketinggalan berita, nyari ide konten, atau buat bahan ngobrol kalau ketemu orang nanti. Drop berita Hangat yang kamu dengar minggu ini di Instagram @temanstartup untuk difitur di episode berita Hangat minggu depan.
It's that time of year when coaches get together to discuss the times and oh, how they've changed.Join us on this episode of Sporting Denver with the creator of The Koach Hub as we discuss the evolution of the game and how the way we learn has changed significantly.Established in 2020 in a little red dot called Singapore, The Koach Hub is made up of a group of friends who come from all walks of life – some of us are teachers, some transformed tech companies, some are best friends since school days, and some are those that we met along the way.Richie meets with Tariq Cassim “the leader of the pack” here on home turf.WEBSITE… www.koachhub.comI have invested my best years in the information technology industry, with two decades of experience in Agile-based Project and Product Management, Digital Transformation for multiple Banks, Telcos, Malls, and reputed F&B and Lifestyle organizations.Kicking off my career by working on the IBM AS/400 (now known as the iSeries) was probably the most challenging and exciting experience ever, predominantly due to the complex nature of the architecture of this machine which was also referred to as a machine from "dinosaur times".Having spent almost a decade at IBM, I have implemented ERP solutions in multiple industries in the APAC region including Sri Lanka, Australia, India, Fiji, Papua New Guinea, the Philippines, Malaysia, and Bangladesh.During my tenure at DHI, I got the opportunity to use the experience I gathered by working at large corporations and growing start-ups by pioneering the "agile movement" within the organization, and also by setting up an off-shore development team in Jakarta.I'm known to be a savvy negotiator for strong business development and relationship-building skills. My innate ability to build high-performance teams, including building strategically-selected startups across the region, has developed me into a growth catalyst in the region. I take pride in infusing productive energy when building, leading and nurturing multi-cultural teams.
SKB has brought us a much needed case! Introducing the iSeries Shure Microflex wireless system case, model 3i-342412MXC. SKB has designed this case for mobile conference and similar events in mind. High quality PE foam is custom cut to accommodate ten MXC420/C or MXC420DF/C microphones, as well as one MXCWAPT Access Point Transceiver, one MXCWNCS Network Charging Station and ten SB930 Rechargeable batteries inside the charger. This case also features space for ten MXCW640 wireless conference units, and offers a large pocket for cables, power supplies, and other accessories. For more information please visit skbcases.com https://www.skbcases.com/products/iseries-shure-microflex-wireless-case Sponsored by Pro Tech Marketing. www.protechm.com Please email your suggestions to reps@protechm.com
Thanks for listening! Like the show? Consider supporting our work by becoming a Patron , shopping our Amazon Link, or sharing it with someone who might enjoy it. You can leave a comment or ask a question here. Click the links for more Jeff or Lisa.
Thanks for listening! Like the show? Consider supporting our work by becoming a Patron , shopping our Amazon Link, or sharing it with someone who might enjoy it. You can leave a comment or ask a question here. Click the links for more Jeff or Lisa.
Thanks for listening! Like the show? Consider supporting our work by becoming a Patron , shopping our Amazon Link, or sharing it with someone who might enjoy it. You can leave a comment or ask a question here. Click the links for more Jeff or Lisa.
While Dominic is enjoying the sandy beaches of Italy, Zack and Mike welcome back Lilac Schoenbeck (https://www.linkedin.com/in/lilac/) VP, Go-to-Market Strategy for Rocket Software https://www.rocketsoftware.com/ Together they discuss what exactly does it mean when cloud is moving on premise and the challenges it poses to IT. Why does it matter? And isn't infrastructure just infrastructure? Followed by a discussion on the mounting pressure on IT to keep up, innovate and change at break neck speeds. The discuss turns to the challenges around budgets, tech talent and from the business itself. Where are the true decisions makers? Be prepared to count how many times you hear the term Mainframe, AS/400, iSeries and Power. Not to mention Zack’s favorite terms containers and kubernetes.
NASCAR ISERIES AND THE TOM BRADY EFFECT IN TAMPA BAYFrank Mills Show - Sports PodcastFrank Mills Show covers all sports and talking about the hottest topics and news. Frank has strong opinions and enjoys offering his take on the current sports news and tries hard to add a positive spin.Frank will rant and has no problem He enjoys telling it like it is using facts, statistics and will let you know what is really going on in the world of sports. If you are a REAL Sports Fan and have been looking for a show that targets a variety of topics and sports and a guy that is straight and to the point, then this is the Podcast you need to listen to starting today. ABOUT FRANKFrank tells it like it is and focuses on the facts. He definitely has a different take on things, an opinion that is strongly based on facts and sometimes instinct, a gut feeling. Frank likes to tell it like it is but stay as positive as he can. He enjoys people that are positive and have overcome adversity and show tenacity. They understand work hard and have never quit attitude. Website - www.FrankMillsShow.comThis show is available on iHeart Radio, Apple Podcasts, Google Podcasts, YouTube, Spotify, FrankMillsShow.com and most popular podcast apps.
Tim Rowe, Business Architect Application Development & Systems Management IBM i at IBM, joins Josh Hall to discuss Application Development for IBM i and much more.Support IBM Bi-Weekly:Patreon: https://www.patreon.com/ibmbiweeklyFollow IBM Bi-Weekly:Facebook: https://facebook.com/ibmbiweeklyTwitter: https://twitter.com/ibmbiweeklyWebsite: https://ibmbiweekly.comThank you to The Omni User Group for sponsoring this episode.Support the show (https://www.patreon.com/ibmbiweekly)
Barbara Morris, lead of RPG Compiler Development at IBM, joins Josh Hall to discuss ILE RPG.Support IBM Bi-Weekly:Patreon: https://www.patreon.com/ibmbiweeklyFollow IBM Bi-Weekly:Facebook: https://facebook.com/ibmbiweeklyTwitter: https://twitter.com/ibmbiweeklyWebsite: https://ibmbiweekly.comThank you to IBM i Competence for sponsoring this episode.Support the show (https://www.patreon.com/ibmbiweekly)
Steve Pitcher, IBM i Specialist at iTech Solutions Group, joins co-hosts Josh Hall and Liam Allan to discuss IBM i Infrastructure.Support IBM Bi-Weekly:Patreon: https://www.patreon.com/ibmbiweeklyFollow IBM Bi-Weekly:Facebook: https://facebook.com/ibmbiweeklyTwitter: https://twitter.com/ibmbiweeklyWebsite: https://ibmbiweekly.comThank you to The Omni User Group for sponsoring this episode.Support the show (https://www.patreon.com/ibmbiweekly)
Scott Forstie, Db2 for i Business Architect at IBM, joins co-hosts Josh Hall and Liam Allan to discuss Db2 for i.Support IBM Bi-Weekly:Patreon: https://www.patreon.com/ibmbiweeklyFollow IBM Bi-Weekly:Facebook: https://facebook.com/ibmbiweeklyTwitter: https://twitter.com/ibmbiweeklyWebsite: https://ibmbiweekly.comThank you to IBM i Competence for sponsoring this episode.Support the show (https://www.patreon.com/ibmbiweekly)
Jesse Gorzinski, Business Architect of Open Source on IBM i, joins co-hosts Josh Hall and Liam Allan to discuss open source software on IBM i.Support IBM Bi-Weekly:Patreon: https://www.patreon.com/ibmbiweeklyFollow IBM Bi-Weekly:Facebook: https://facebook.com/ibmbiweeklyTwitter: https://twitter.com/ibmbiweeklyWebsite: https://ibmbiweekly.comSupport the show (https://www.patreon.com/ibmbiweekly)
Steve Will, Architect for IBM i at IBM, joins co-hosts Josh Hall and Liam Allan to discuss what the IBM i operating system is. If you've ever been curious about IBM i, or know someone that would be, this is the episode to watch!Support IBM Bi-Weekly:Patreon: https://www.patreon.com/ibmbiweeklyFollow IBM Bi-Weekly:Facebook: https://facebook.com/ibmbiweeklyTwitter: https://twitter.com/ibmbiweeklyWebsite: https://ibmbiweekly.comSupport the show (https://www.patreon.com/ibmbiweekly)
An introduction to IBM Bi-Weekly, a podcast focused on the technical aspects of the IBM i operating system and the community revolving around it. Every other week, co-hosts Liam Allan and Josh Hall, along with occasional guests, explore IBM i hot topics.Follow IBM Bi-Weekly:Facebook: https://facebook.com/ibmbiweeklyTwitter: https://twitter.com/ibmbiweeklyWebsite: https://ibmbiweekly.comSupport IBM Bi-Weekly:Patreon: https://www.patreon.com/ibmbiweeklySupport the show (https://www.patreon.com/ibmbiweekly)
PCI DSS requiress two factor authentication (also known as multifactor authentication) - something you know and something you have. For IBM i users, this usually means a password and an authentication code provided to a token or mobile device. However, tokens are expensive and are frequently lost - and SMS messages to mobile devices have become a deprecated method. Join Patrick Townsend, Founder and CEO of Townsend Security, as he discusses the PCI recommendations, how to meet 2FA compliance requirements with a mobile based solution, and how Townsend Security is helping IBM i users meet the latest two factor authentication compliance requirements. Download this podcast to learn about: PCI DSS and NIST requirements for two factor authentication Protecting critical data on the IBM i with two factor authentication Mobile based authentication with Twilio's Authy Introduction to Alliance Two Factor Authentication
While the IBM i (AS/400) is considered by many to be a secure platform, it is not immune to data breaches. For this special podcast, Clayton Weise of KeyInfo joins us to discuss running the IBM i in the cloud, maintaining a strong security posture, and common questions about cloud/on-prem hybrid networks. Download this podcast to learn about: IBM i, security, and why customers are moving to the cloud Improving IBM i security posture by moving to cloud Meeting compliance requirements in the cloud Future proofing your IBM i platform
Cyber criminals attempt to escalate their level of privilege by stealing and using administrative credentials. Because IBM i servers are accessed from user PCs across internal and external networks, credential stealing from these exposed PCs and networks is the preferred mechanism for compromising an IBM i server. Download this podcast to learn about: Identifying escalated privilege attacks on the IBM i Determining the true level of authority of a user profile Controlling and monitoring administrative level users Setting email alerts to include critical job and security information
Active monitoring (sometimes referred to as Continuous Monitoring) is one of the most effective security controls that an organization can deploy - and can often detect a data breach before any information is lost. As the IBM i continues to evolve, so do sources of security logs. With logs being created from so many different sources, it is important to collect and monitor them in real-time to detect security events. Download this podcast to learn about: Current status of security logging on the IBM i The future of log collection and monitoring New logging sources in IBM i V7R3 Elements of an effective active monitoring strategy
Active monitoring (sometimes referred to as Continuous Monitoring) is a critical security control for all organizations and is one of the most effective security controls you can deploy. The large majority of security breaches occur on systems that have been compromised days, weeks, or even months before sensitive data is lost. With the release of V7R3, IBM i administrators have additional security logs to collect and monitor. Download this podcast to learn about: Log collection and monitoring on the IBM i New logging sources in IBM i V7R3 System log formats and standards Elements of an effective active monitoring strategy
Prior to version 3.2 of the PCI Data Security Standard (PCI DSS), remote users were required to use multi-factor authentication for access to all systems processing, transmitting, or storing credit card data. With version 3.2, this is now extended to include ALL local users performing administrative functions in the cardholder data environment (CDE). Download this podcast to learn about: What PCI DSS 3.2 means for IBM i administrators Why it is harder to identifiy an administrative user on the IBM i Challenges IBM i customers are facing regarding multi-factor authentication How Townsend Security is helping organizations meet PCI DSS 3.2 with multi-factor authentication
While the IBM DB2 Field Procedures (FieldProc) facility works quite well with native SQL applications, IBM i customers with legacy RPG applications have not been able to take full advantage of FieldProc to encrypt data in DB2 tables. In particular, the encryption of database columns, which are indexes, has been very difficult for IBM i customers using legacy RPG. This results with inability to use FieldProc encryption to protect sensitive data. Download this podcast to learn about: How IBM i customers with legacy RPG applications can deploy automatic DB2 encryption over sensitive data which are indexes How to leverage OAR capabilities to replace the legacy RPG file I/O with modern SQL operations What industries will benefit the most
More talk about I words... Thanks for listening! Like the show? Consider supporting our work by becoming a Patron , shopping our Amazon Link, or sharing it with someone who might enjoy it. You can leave a comment or ask a question here. Click the links for more Jeff or Lisa.
Collecting real-time security events on the IBM i platform is different than other platforms - logs are stored in many different places in a proprietary IBM format. This presents a challenge for administrators who need to monitor their IBM i logs. Download this podcast to learn about: Real-time security event logging on the IBM i Monitoring your most critical data with IBM Security QRadar Meeting compliance requirements like PCI DSS, HIPAA, FFIEC, and more
Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Bart-Kulach-Hack-the-Legacy-IBMi-revealed.pdf Hack the Legacy! IBM i (aka AS/400) Revealed. Bart Kulach (Bartlomiej Jakub Kulach) Security Researcher Have you ever heard about the famous "green screen"? No, it's not a screensaver... Believe me, it still does exist! In many industries, although the front-end systems are all new and shiny, in the back-end they still rely on well-known, proven IBM i (aka AS/400) technology for their back-office, core systems. Surprisingly, nobody truly seems to care about the security. Even if these nice IBM heavy black boxes are directly connected to the Internet... The aim of the talk is to give you more insight in a number of techniques for performing a security test of / securing an IBM i system from perspective of an external and internal intruder. Methods like privilege escalation by nested user switching, getting full system access via JDBC or bypassing the "green screen" (5250) limitations will be presented. Last but not least: I will also show a undocumented output format of the built-in password transfer API, giving you direct access to all password hashes. Even IBM engineers may wonder... Bart Kulach: Aged 31, with 14 years of work experience within IT security, risk management and IT operations. Security specialist and experienced supervisor for IT audits, CISA, CISM. Working currently for NN Group in the Netherlands as coordinator for IT audits within Investment and Insurance business units in Europe and Asia. The past 7 years he held various security and risk management related positions. Focused on security of IBM i (aka AS/400, iSeries), website security as well as lean IT processes and architecture. Facebook: (bart.kulach)
We talk about things that start with the letter I... Thanks for listening! Like the show? Consider supporting our work by becoming a Patron , shopping our Amazon Link, or sharing it with someone who might enjoy it. You can leave a comment or ask a question here. Click the links for more Jeff or Lisa.
PGP encryption has become the de facto standard for securing data in motion on the IBM i. It can help businesses meet compliance regulations such as PCI DSS by encryption credit cards and other PII as it is in transit to your trading partners. In this podcast, Patrick Townsend discusses the differences between Open PGP and Commercial PGP, which version a company who faces compliance regulations should use, and how Townsend Security is helping IBM i users secure their data with PGP encryption.
Sensitive data can now be automatically encrypted using Townsend Security's NIST-certified encryption libraries and developers can use cross-platform PHP to easily communicate with modern systems. Additionally, PHP can be used to transform complicated green screens into a familiar, simple user interface. For this special podcast, Eric Nies from NSC Software Solutions joins Patrick Townsend, Founder and CEO of Townsend Security, to discuss data security with PHP on the IBM i.
Password management continues to be a challenge for all organizations - large and small. Poor management leads to insecure passwords and inconsistent policies – and these lead to more data breaches. For this special podcast, Patrick Botz joins us to talk about Single Sign On on the IBM i and how it can be used to easily and securely manage user accounts and passwords.
File Integrity Monitoring (FIM) tools allow administrators to selectively monitor data access and change activity at the column or field level - without changing applications or user accounts. Join Patrick Townsend as he discusses why implementing FIM tools is a best practice and compliance requirement, how administrators are using them, and what makes the Townsend Security solution unique.
Calendarul SCOOP Invitat: Alex Papazian aka alexxapz aka titlt21sted, finalist la Sunday Million - despre ultima performanta si despre soarta jucatorilor de MTT in general; Se prevede ca mesele de high stakes pe PokerStars vor fi ZOOM only; FTP face angajari de personal la IT si PR; PokerStars 1M Challenge game over; Teorie: discutie cu Edy Dumitru aka edy314 pe urmatoarele maini: http://www.holdem.ro/forum/small-stakes-nl/17641-aj-thin-vb.html http://www.holdem.ro/forum/small-stakes-nl/17635-top-2pair-3b-pot-vs-reg-bvb.html Turnee live: - iSeries: cat de reusit a fost de fapt? - Irish Open, cu invitatul nostru Abdulah Atila intr-o discutie despre Irish Open si despre Phil Helmuth si Shaun Deeb ca adversari directi. - posibil sa-l vedem pe Liviu Ignat la Pokerfest Piatra Neamt! Auditie placuta!
Today on The Mental Game of Poker Podcast Jared had the opportunity to interview two big names in poker: Phil Hellmuth and Maria Ho. They're in Ireland for the inaugural iSeries Live event where they'll competing against Daniel Negreanu, Eoghan O'Dea, Carlos Mortensen, and 5 other top players in a winner take all SNG that will be streaming live on the internet with all hole cards shown. Phil proved at last year's WSOP that he has resurrected his game and his mental game. He admits to not working on his game and just expecting to roll into events expecting to win. He's working a lot more on his game with the help of some solid players, preparing better, and taking his mental game seriously. He also reveals a few other things about his preparation for the iSeries that may shock you… Maria is the underdog going in and she shares her mental approach going into the event. She knows she's up against a tough table and is ready for the challenge. She's also worked a lot on her mental game over the years, listen in to hear what she's done to become mentally stronger.
IBM recently announced the end of support date for V5R4. This will prompt many IBM i shops to upgrade to a newer release - either V6R1 or V7R1. This podcast will discuss the security reasons that you should go straight to V7R1. Additionally, we will discuss how Townsend Security can help you take advantage of FIELDPROC, a new addition to V7R1 that allows companies to encrypt their sensitive data without changing their applications.
Learn what secure managed file transfer is, how it can help you meet compliance regulations, and what to look for in a secure managed file transfer solution. Additionally, we will discuss how Townsend Security can help make your managed file transfers secure with PGP encryption.
Like other IT projects, the implementation of up-to-date logging requires careful planning. For example: systems need to be monitored and the parameters related to security and archiving need to be defined. This podcast discusses what system logging is, how logging can help you meet compliance requirements, and what to look for in a logging solution. Additionally, learn how Townsend Security can help you transmit the logs from your IBM to any SIEM console.
Magic Software Enterprises Ltd. presents a conversation about compliance with Carol Woodbury, Founder and President of SkyView Partners. Carol Woodbury Prior to forming SkyView Partners, Inc with John Vanderwall Carol spent 16 years with IBM in Rochester, MN. She served for more than 10 years as the AS/400 Security Architect and Chief Engineering Manager of Security Technology for IBM's Enterprise Server Group. During this time Carol provided security architecture and design consultations with IBM Business Partners and large AS/400 customers. She is known worldwide as an author and speaker on security technology, specializing in OS/400 and i5/OS security issues. Carol co-authored the popular book, Experts' Guide to OS/400 and i5/OS Security from 29th Street Press, has written numerous articles on security and is a technical editor for the IBM Systems Magazine. Carol is also a subject matter expert on security for COMMON, security author for Experts Journal, contributing author on security for System iNEWS and MC Press Online and the security expert for search400. Download the podcast file here (23.6 mb stereo MP3 file, 17:12 length). Keywords: System i,iSeries,AS/400,regulatory compliance,data security,composite application development,integration,SOA,service oriented architecture,application modernization,legacy modernization,PCI,SOX,HIPPA Produced in the studios of Professional Podcasts LLC, Cherry Hill, NJ.
Magic Software Enterprises presents a conversation about compliance with Carol Woodbury, Founder and President of SkyView Partners.Carol WoodburyPrior to forming SkyView Partners, Inc with John Vanderwall Carol spent 16 years with IBM in Rochester, MN. She served for more than 10 years as the AS/400 Security Architect and Chief Engineering Manager of Security Technology for IBM's Enterprise Server Group. During this time Carol provided security architecture and design consultations with IBM Business Partners and large AS/400 customers. She is known worldwide as an author and speaker on security technology, specializing in OS/400 and i5/OS security issues. Carol co-authored the popular book, Experts' Guide to OS/400 and i5/OS Security from 29th Street Press, has written numerous articles on security and is a technical editor for the IBM Systems Magazine. Carol is also a subject matter expert on security for COMMON, security author for Experts Journal, contributing author on security for System iNEWS and MC Press Online and the security expert for search400. Download the podcast file here (23.6 mb stereo MP3 file, 17:12 length).Keywords: System i,iSeries,AS/400,regulatory compliance,data security,composite application development,integration,SOA,service oriented architecture,application modernization,legacy modernization,PCI,SOX,HIPPAProduced in the studios of Professional Podcasts LLC, Cherry Hill, NJ.