News & Events

Eradani in the News

COMMON: Eye on the i

DECEMBER 30, 2024: Eradani’s Director of Product, Tim Wright, explores the changing landscape of IT middle management.

 

COMMON: Eye on the i

November 20, 2024: Eradani’s Director of Product, Tim (Tilmer) Wright shares his experience at COMMON NAViGATE 2024 in Bonita Springs, FL. He dives into the most important things he learned, with an emphasis on the importance of the IBM i community.

TechChannel

November 19, 2024: Benjamin Strube, a software engineer at Eradani and active U.S. National Guard member, has been recognized as an IBM i Rising Star. The former Marine combines technical expertise with military discipline to manage mission-critical integrations and provide open-source support while mentoring developers across multiple platforms.

Eradani Events

March 18, 2025​

Is Your IBM i System Secure? Are you sure?

Join us for our eye-opening webinar “Be Afraid: IBM i Security Vulnerabilities in Today’s Connected World” – the first session in our comprehensive 4-part security series.

In this demo-driven session, we’ll reveal:
– Why traditional IBM i security approaches are leaving you exposed
– How attackers can silently breach your systems
– Where your integration points are most vulnerable
– What modern security approaches can protect you

Watch the Replay

April 7-9, 2025

Join us for the Northeast IBM i User Groups Conference in Leominster, MA!

It is the largest technical conference in the Northeast for IBM i. With more than 50 sessions and in-depth seminars, NEUGC will help you supercharge developer productivity, empower user data access, modernize your apps and database, and enhance your skills.

We hope to see you there!

More Information

April 8, 2025

Beyond Passwords: Modern Authentication & Authorization for IBM i

Is your IBM i system still relying on basic password authentication while the rest of your enterprise adopts modern security practices?

In this practical, demonstration-focused webinar, we’ll explore how modern authentication and authorization methods can elevate your IBM i security posture while seamlessly integrating with your enterprise security architecture.