Home » Blog


Posts Categorized Under "EVENTS"

Webinar: Encryption on the IBM i Platform

Do you need to encrypt sensitive data on the IBM i, but are unsure how to get started or which techniques are best?

Encryption is essential for protecting sensitive data like credit card numbers, social security numbers, birth dates and other PII information. It is also critical for meeting compliance requirements like PCI DSS, HIPAA and State Privacy Laws.

Encryption on the IBM i Platform

This webinar is your chance to learn the basic methods of encrypting data on the IBM i, whether if it is stored within your database files or transmitted to your trading partners. During the webinar, you will learn about these key topics:

  • Exploring the basics of Encryption
  • Hashing vs Encryption
  • Introduction to Key Management
  • Database Field Encryption
  • Open PGP Encryption
  • SFTP and FTPS protocols

You are invited to join us for this free webinar. Linoma Software's senior IBM i engineers will be on hand during to answer your encryption questions.

To reserve your place, and to learn more about the webinar, visit the registration page. Don't delay, register today.

If you're unable to attend, we are recording the webinar and will make it available on our website.

Linoma Software celebrates 20 Year Anniversary

Linoma Software-20 Year-FINALLinoma Software is celebrating 20 years in helping organizations around the world to automate their IT processes and protect sensitive data. The company will commemorate this milestone anniversary with the much anticipated unveiling of their new corporate headquarters, groundbreaking new software releases and promotional events throughout the next twelve months.

"From the beginning, our goal has been to provide great products at affordable prices that are backed with unparalleled customer support and service," said Linoma Software founder, Bob Luebbe. "We attribute our success over the last 20 years to this simple company philosophy. It encompasses all that we do."

Looking Back: A Modest Beginning

Husband and wife team, Bob and Christy Luebbe, started Linoma out of their home in 1994 to provide IT consulting and contract programming services to area businesses. The concept was simple, in that they offered experienced IT talent for affordable rates.

By late 1995, the Luebbes had hired several consultants to service their expanding customer base which included Fortune 500 companies such as Union Pacific, First Data Resources and Hewlett-Packard. They also officially opened their first office in Omaha, Nebraska to offer offsite programming services to out-of-state customers.

Around 1996, Bob had an idea for a product that addressed the challenge of converting legacy IBM RPG code to the new RPG IV (ILE RPG) language. During his off hours, Luebbe built the Convert to ILE RPG software, named it CVTILERPG and released it on a programming list server as a downloadable file. This proved to be a move that was ahead of its time as most software for IBM systems was distributed by mail and installed using cumbersome tapes.

BobLuebbeLinomaSoftwareCVTILERPG became an overnight success as a convenient-to-install and affordable utility, which paved the way for Linoma to evolve into a software company. Many of the original users of CVTILERPG (now called RPG Toolbox) are still loyal customers today.

Finding ways to make tasks easier and more efficient has always been the core of Linoma Software's approach to software development. From creating graphical interfaces for the AS/400 in 1997 with Surveyor/400, to the debut of Transfer Anywhere in 2002, to encrypting databases with Crypto Complete in 2007, Luebbe and his growing R&D team continued to innovate and streamline processes for the IBM i. As new products were developed and released, Linoma put an emphasis on affordability and five-star support, which the company is known for.

The release of GoAnywhere Director in early 2008 was a turning point for the company. Quickly becoming the flagship product for Managed File Transfer and secure data exchange, the multi-platform software delivered full automation, encryption and detailed audit trails for file transfers. Following shortly after in 2009, the introduction of GoAnywhere Services expanded the product offering to support secure file services using FTP, FTPS, SFTP and HTTP protocols. GoAnywhere Gateway joined the product suite in 2010 with enhanced forward and reverse proxy to protect files in the DMZ.

LinomaSoftware2014 Looking Forward: Success through Innovation

As the GoAnywhere software suite continues to grow and evolve, the company has grown as well. Linoma Software has been named to the Inc. 5000 list of top growing companies in Nebraska for the past two years. Their customer base consists of over 3,000 installations worldwide including government entities, large corporations and mid-sized companies. Boasting over a 98% customer retention rate, Linoma Software continues to win customers over through innovation, affordable product offerings and responsive product enhancements.

According to Luebbe, "Several of our customers have been with us since the beginning. They love the products and rave about our support. We're thrilled to be celebrating 20 years and it's because our customers truly appreciate what we do. Without their trust and support, we wouldn't be here. It's that simple, and we are truly grateful."

Click to Download and Print PDF

Linoma Software Salutes Its Big Winners At RPG & DB2 Summit 2014

Linoma Software's Ron Byrd made his annual trek to Dallas for the RPG & DB2 Summit 2014. The event is a tremendous opportunity to meet with IBM i professionals.

Part of the IBM i community since 1994, we enjoy talking with customers and attendees about our full line of data management tools. At this year's Summit, Ron rewarded visitors to our booth with a chance to win valuable prizes and Susan Gantner with System i Developer helped with the drawing.

The three lucky attendees were:
  • James Huang, Core-Mark
  • Ted Poskey, Hochheim Prairie Ins.
  • Lynn Laber, Nodak Mutual Ins.

We'd like to thank everyone who stopped by to talk with Ron, and a special salute to the winners of our drawing. Also a big shout out to everyone at System i Developer, and the sponsors, for putting on a fantastic event.


From RPG Toolbox, Crypto Complete and Surveyor/400 for iSeries to the family of GoAnywhere secure file transfer products there's a solution for everyone at Linoma Software. Contact us today to learn more.

Stop by our booth at the COMMON Annual Meeting and Exposition, May 4-6 in Orlando. See you there.  

RPG & DB2 Summit - JamesHuang
Susan Gantner of System i Developer, prize winner James Huang with Core-Mark and Ron Byrd from Linoma Software.

RPG & DB2 Summit - TedPoskey
Ted Poskey, Hochheim Prairie Insurance (right).

RPG & DB2 Summit - TedPoskey
Lynn Laber, Nodak Mutual Insurance (right).


DB2 Field Encryption Has Been Simplified

Compliance regulations like HIPAA and PCI DSS have us all looking for more efficient and secure ways to keep sensitive data protected, especially the personal information fields we've all come to rely on: social security numbers, credit card numbers, birth dates, driver's license numbers, insurance policy ID numbers, etc.

Register for DB2 FieldProcs WebinarFortunately, IBM is working hard to meet the growing demands of companies who must store and share private information and compliance auditors who govern how it must be done. When it released IBM i 7.1, it included a feature for encrypting DB2 form fields to give IT staffs more control.

Surprisingly, not everyone is taking full advantage of these DB2 FieldProcs either because they're not aware of their benefit, or because they're waiting for an even more comprehensive approach.

If you fall into either of these groups, then we've got good news. The Linoma Software team is hosting a webinar next week to share tips for how to maximize the DB2 FieldProcs feature in IBM i 7.1. In addition, we'll provide some options that could give your processes even more functionality, making things more efficient.

We invite you to grab some lunch and join us for "IBM i Field Procedures Simplified with DB2 Field Procedures" on June 13 at noon central. There will be lots of opportunities to ask questions, and we'll also record the webinar so you can share it with your colleagues.

Hope you'll be able to join us!

Upcoming Webinar: Focus on FTP Server Compliance

Get Your FTP Server in Compliance

Revised - Watch the Latest Webinar Recording

With the recently added rules for the Healthcare Insurance Portability and Accountability Act (HIPAA) that now holds trading partners and business associates accountable if they also handle patient data, it's a good time to review whether your FTP server is updated and ready to meet compliance requirements. Learn how to keep your data as well as trading partner files protected within your network and still allow external access without opening inbound network ports. You can also see a demo of Linoma Software's GoAnywhere™, a managed file transfer solution that includes a secure FTP server and a reverse proxy DMZ gateway with clustering and load balancing capabilities to ensure high availability.


IBM i Encryption Made Easy with DB2 Field Procedures

Now Available On Demand

IBM i 7.1 DB2 Field Procedures, data encryptionDuring this recorded webinar, you can learn about how to make the DB2 Field Procedures Tool in IBM version 7.1 work even more efficiently as part of a more comprehensive solution, one that makes it easier to implement encryption, manage keys, and generate auditing reports so important for meeting compliance regulations like HIPAA and PCI DSS,. You can also see a demo of Linoma's popular encryption software Crypto Complete.

Learn more

All of our webinars are recorded, so if you register and are not able to attend live, you'll be able to review the webinar at a more convenient time.

We look forward to having you join us and will be happy to answer any questions you have.



Wrapping Up Another Great COMMON Conference

Like many in our industry, we do our fair share of trade shows, and as anyone who has ever exhibited will tell you, it's a lot of work.

In our company, Lu Ann handles all of the arrangements. She books the plane tickets, reserves the rooms, secures the exhibition space, orders the exhibitor badges, organizes and ships the collateral, and coordinates a thousand other details to ensure everything goes smoothly for the team when they arrive.

The sales team does all of the manual labor, including packing and repacking the booth displays and equipment, helping load and unload the heavy boxes onto the shipping company's truck, and of course setting up and tearing down the booth. Again, so many details to manage to make sure everything is perfect for the opening of the show.

Months in advance, our marketing team is planning giveaways and prizes, updating collateral, and trying to add new ways to catch visitors' attention.

Throughout the show, we're working hard to connect, meeting new trade show participants and vendors, and reconnecting with long-time customers and partners. We're striking up conversations with people who pass our booth, and we're walking the floor saying hi to old friends and introducing ourselves to new ones. It's an energizing, exhausting, rewarding process.

COMMON 2012 posterAnd of all of the trade shows that we attend and/or where we exhibit, COMMON holds a special place for us. The COMMON community is tightly knit and loyal, and every show is like a family reunion. New deals are forged, partnerships are discovered, and all the while relationships are built and nurtured. When we reconnect with customers or friends, it's as if we're just picking up the conversation right where we left off from last year's COMMON conference.

As I approach my one-year anniversary as marketing manager at Linoma Software, I'm fortunate to have been invited to attended my first COMMON conference. When our president Bob Luebbe toured me around from booth to booth introducing me to people, I quickly realized the level of connection Linoma has with the IBM i community.

It was wonderful to finally meet in person all of the folks I'd been working with all year: Jennifer and Megan from iPro Developer; Chris, Kara, David and Jeff from MC Press; Tami and Darryl from IBM Systems Magazine; Dan,Timothy, Kim and Jenny with IT Jungle; and Dan Cheney, our most prolific blogger on this and the GoAnywhere Managed File Transfer blog whom I finally got to hug. It was especially amazing to spend quality time with my friend and mentor Bill Rice, with Humanized Communication.

Today, as we're breaking down the booth, saying goodbye to friends, and anticipating the long flights home, it's clear that the IBM i community is thriving. We are proud to be a part of it all, and are already planning for next spring's COMMON conference.


AIX Webinar Next Week To Make File Transfers Easier

As any AIX administrator or programmer knows, file transfers can be a huge headache. Writing all of those shell scripts is not only time consuming, but it's tedious and presents many opportunities for errors. Then there's keeping track of which files need to be sent, which need to be placed in the DMZ for trading partners to retrieve, and which ones may be being sent ad-hoc from elsewhere in the company.

Another huge hassle is verifying that every file actually reached its intended recipient intact, which often requires checking multiple times and then tracking down what went wrong.

Finally, don't forget the pressure to meet compliance regulations such as PCI DSS, HIPAA, SOX, and state privacy laws. With the Global Systems data breach still fresh in the news, it's obvious that no AIX administrator wants to have to explain how sensitive data was compromised.

Fortunately, there are tools and processes available that can minimize the time and effort involved with file transfers while increasing efficiency and data security.

We invite you to sit in on this AIX-only webinar on Thursday, April 12, at noon CDT to learn about how a managed file transfer solution can cure the headaches of manual file transfers while preventing future headaches related to the possibility of compromised data.

Now Available On-Demand. View the webinar recording here.