In the Wheelhouse: SSL Concerns Met With Silence

IBM Domino customers continue to kick and scream about security. Will there be a supported solution in the near future?

steve pitcherWritten by Steve Pitcher

Author's Note: After publication of this article, IBM announced support for SHA-2 hashed SSL certificates via an upcoming Interim Fix.


Two months ago, I was literally on a 17-hour ferry ride in the North Atlantic writing a piece entitled "IBM, We Have an SSL Problem." It was one of those pieces that just came together the way musicians sometimes write complete songs in about a half hour.


Today's piece kind of fell out of me in just over an hour. It means something. It essentially wrote itself because it needed to be written.

Technology Focus: The IBM i Isn't Immune to Security Problems!

The IBM i server's reputation for security is well-deserved, but it's not foolproof. Complacency and short-handed IT staffs contribute to the problem.

john gristWritten by John Ghrist

In a world where perfection is seldomif everfound, it's amazing how some users of IBM i servers manage to persuade themselves that their systems are "perfectly" protected from security threats. As news stories of Home Depots and Targets and other big-time vendors' data-security castles being breached become increasingly routine, in the IBM i world denial is still a thriving cottage industry: "No one would bother to try to breach our company's security; we're too small and our i is too secure."

Who's More Dangerous? The Person You Know or the Person You Don't Know?

While external hacking incidents have been making the headlines recently, we can't ignore the insider threat.

carol woodburyWritten by Carol Woodbury

I'm fortunate to live in Seattle, where I have access to many professional security organizations. One organization is the Cloud Security Alliance, which holds a meeting each month where security professionals gather to learn about new technology and threats. Last month, the speaker was one of the authors of Verizon's 2014 Data Breach Investigations Report. Each year, Verizon analyzes more data as an increasing number of organizations provide data from their breach experiences. As was expected, there was a lot of data from breaches and incidents from external sourcesthat is, from sources not originating from within the organization breached. While that data was the topic of several interesting discussions, a different topiccentered around the internal threat (breaches and incidents originating from within the organization)also provoked some interesting discussions. This month's article focuses on the internal threat and what the data doesand doesn'tshow. Here's what I learned.

Partner TechTip: File Monitoring and Other Features of Robot SCHEDULE 12

Let's say you have a bank transmission or FTP process that occurs randomly throughout the day. How do you monitor that activity? OPAL? CLP scripts? Not anymore!

ChuckLosinski 116x116Written by Chuck Losinski

Version 12 of Robot SCHEDULE contains some helpful new features that will improve your processes and add value for your business. Perhaps the most important of these features are the new event monitors that can be set up to monitor file activity, allowing Robot SCHEDULE to react to file and directory events happening on IBM i.

Zend Studio 11: A Pretty Big Deal

This small package packs a powerful punch, providing many facilities that all PHP programmers definitely should have at their disposal.

david shireyWritten by David Shirey

Last month, we talked about the Zend Server, the Garth Brooks of the Zend world, and how it can be used to provide an effective environment to run PHP programs from the i. Now we will move on and talk about Zend Studio, the Ariana Grande of the Zend world.


 Zend Studio is an Integrated Development Environment (IDE) similar to RDi.



IBM Endpoint Manager V9.2 for Linux

IBM Endpoint Manager V9.2 delivers new security access controls for user role management, enhanced capability for bare-metal imaging on Linux.

iBelieve Tour Returns to Europe Bigger and Stronger

Tour includes expert line-up: Frank Soltis and Trevor Perry joined by IBM’s Alison Butterill and Steve Will for extended six-date European tour!

InfoSphere Change Data Delivery for PureData System for Analytics V11.3

IBM InfoSphere Change Data Delivery V11.3 is designed to provide real-time operational and analytical data synchronization and can deliver high volumes of big data with very low latency.

Security Access Manager for DataPower V8.0.1 Offers a Security Gateway for Web, Mobile, and Cloud

IBM Security Access Manager for DataPower V8.0.1 allows you to combine industry-proven web access management capabilities with leading web service and API security and connectivity into a consolidated, multi-channel, security, and integration gateway solution for the multi-channel enterprise.

Cloudant Data Layer Local Edition V1.0 Delivers Enterprise-Scale Advanced NoSQL Database Layer

IBM Cloudant Data Layer Local Edition delivers the availability, elasticity, and reach required by web and mobile applications based on Apache CouchDB.

Repair Damaged SQL Files with DataNumen SQL Recovery v. 2.4

DataNumen has released DataNumen SQL Recovery version 2.4, a powerful Windows application that repairs damaged files created by Microsoft SQL Server.



Tue Oct 21 @10:00 - 11:00AM
Promoting the Future of IBM i in Your Business

Events Calendar

October 2014
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1




See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:


  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 


Watch the Webinar Now!



MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.


Latest Titles >>

eBook Special >>



Shop the MC Press Store