Co-founder. Chief Global Officer. AI. Author of 9 books. Keynote speaker talking about the brain & AI., Edsvärd
Dr. Katarina Gospic is a renowned physiologist, MD, PhD, entrepreneur, author of nine books and international keynote speaker. Katarina is a sought-after expert in the intersection of digitalization and the human brain. Throughout the years she has been honored with prestigious awards... Read More →
Significant security enhancements have been delivered in recent releases (IBM i 7.5 and IBM i 7.6) as well as technology refreshes (TRs). In this session Carol will describe new and enhanced security-related features and describe how and why you should use them.
Administration Runtime Expert (ARE) is one of IBM i’s most powerful yet overlooked tools. This session reveals how ARE can simplify the management of even the most complex IBM i estates by automating configuration checks, detecting risks early, and ensuring consistent, compliant system environments.Attendees will see practical examples of how ARE reduces manual effort, reduces outages, and strengthens overall business continuity. If you’ve never explored ARE or didn’t realize what it can do, this session will show you why it should be a core part of every IBM i strategy.
After having started as a System/38 programmer in 1986. In 1989 the switch was made to system programming and systems management. Being passionate about systems management he founded van Helvoirt Automatisering in 1993. Rudi enjoys helping IBM i customers ever since for running the... Read More →
Ash Giddings is an IT professional with over 30 years of experience in and around IBM midrange servers. He is the Product Manager at Maxava, a leading provider of disaster recovery, high availability, and cloud-based monitoring solutions for IBM i and beyond. Ash is an IBM Champi... Read More →
In this session, Victor Klaren shows a new approach to RPG modernization: one that builds on the strength of IBM i.
Using the Thinkwise AI-Upcycler, RPG code is analyzed and automatically transformed into a modern application on the Thinkwise Platform. While IBM i and Db2 remain fully in place.
You’ll see how at least 90% of an RPG application can be converted in a single step: including data, business rules and process flows.
But modernization is only the starting point. We’ll show how this creates a foundation for what’s next: integrating with modern architectures, exposing functionality through APIs, and enabling new interaction patterns such as MCP and agentic AI.
Victor Klaren is co-founder and Chief Visionary Officer at Thinkwise, a platform for modernizing business-critical software. He is responsible for the strategic vision behind the Platform, which enables organizations to transform legacy applications into a future-proof application... Read More →
Today's IT landscape is changing from traditional logic workflows to agentic AI inferencing. AI agents require low-latency inference and real-time system responsiveness. IBM recognized the need for servers to run AI models along with the most demanding enterprise workloads without compromising on throughput. To address this demand, clients need AI inferencing hardware that supports generative and agentic AI while maintaining the security and resilience of core data, transactions and applications. A Linux LPAR with Spyre accelerators is built to enable systems keeping mission-critical data close to mitigate risk while addressing operational efficiency.In this session we will show how mgd's internal IBM i systems are running SAP on IBM i with integrated AI we will show the S1122 we use as production system and the Linux LPAR with Spyre acceleratorswe will demonstrate how we integrate AI in SAP on IBM i and demo AI queries from IBM i CLI
Data is the new currency, and protecting it is more important than ever. In IBM i environments, safeguarding sensitive information at the database level is a key requirement for compliance, risk reduction, long-term application trust and data consitency. With traditional database methods and additional programming, data access can be restricted, but also circumvented! Db2 for i provides powerful, built-in capabilities for fine-grained security through Row and Column Access Control (RCAC), enabling precise control over which data can be seen and by whom (on user profile and group profile level) —without requiring changes to application code.If RCAC is activated only explicitly registered users can see an access the database data. Even powerful profiles with QSECOFR user classe or *ALLOBJ authority cannot see any data if they are not registered.Since the implemented RCAC rules cannot be circumvented (not even by powerful user profiles) an detailed planning is required, so no data will get lost