POWERUp 2019 has ended
Experience the magic of education. 
Back To Schedule
Monday, May 20 • 8:00am - 9:00am
21AI Discovering your IBM i Data – For System Administrators Issues

Log in to save this to your schedule, view media, leave feedback and see who's attending!

There’s plenty information on IBM i that is so valuable for the daily tasks. Many commands, APIs, and lately SQL functions, gather information from your IBM i, into database tables. While other System functions register data on different tables all the time.
Throughout my life I spent a lot of time working on this information. Particularly related to system administration activities: analyzing object sizing, working on performance, resolving lock conflicts, obtaining job statistics, documenting TCPIP configurations, checking backup activities, investigating PTFs installed, and the list goes on and on. All this information is as valuable to IT System Managers, as it is enterprise information to Business executives. You need to understand, evaluate, and take advantage of this knowledge.
In this session we will review the different types of system information you can find on IBM i, that are important for System Administrators. We’ll also analyze different case studies of how to interpret and prepare the info for future exploitation.

Learning Objectives:

1. Identify different kinds of Information available in your IBM i.
2. Analyze different ways of obtaining and/or finding this information in your systems.
3. Prepare information for better use with modern tools.

avatar for Cecilia Howlin

Cecilia Howlin

Cecilia Howlin has been working on this platform from the very beginning. On her first job at IBM Argentina, she learned S/38. And never left the platform, since she thinks it never appeared other operating system as good as this one.She usually worked on technical issues, like installing... Read More →

Monday May 20, 2019 8:00am - 9:00am
Fantasy Tower South Ballroom B
  • Level All
  • Operating System IBM i
  • Audience System Administrators who need to find and exploit System Information