MAGAZINES

MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

April 16, 2010 | Volume 7 Issue 15

ISSUE HIGHLIGHTS

TOP STORY: TechTip: Take Charge of Your Situation with Job Watcher Situational Analysis
FEATURED ARTICLE: Is Your PC, Laptop, and Flash-Drive Data at Risk from Prying Eyes?
ADVERTORIAL: Partner TechTip: Alert! Alert! Unauthorized Object Access Attempt Detected!
NEWS HIGHLIGHT: IBM Announces New POWER7 Blades, Software, and Services
FORUM: Problem with Slow PHP Scripts
EVENT: OCEAN: IBM Systems Director and VMControl
BLOG: Additional ways to see the contents of a user space (*USRSPC)

Manage Subscription | Contact Us

Feature Article - TechTip
 
TechTip: Take Charge of Your Situation with Job Watcher Situational Analysis

Analyze your iSeries performance more effectively.

sandra_chromeyWritten by Sandra Chromey

Is your system running poorly and you don't understand why? Is the CPU underutilized, but customers are complaining about jobs taking too long? Are you feeling overwhelmed by the thought of managing your iSeries all on your own? Wouldn't it be great if you could talk to the performance experts and have them assess your situation?


Read More >>

Feature Article - Security
 
Is Your PC, Laptop, and Flash-Drive Data at Risk from Prying Eyes?

Using a combination of software and hardware solutions can defend against data theft.

chris_smithWritten by Chris Smith

The best reason to encrypt your data is because you have a very good chance of losing your laptop when you're traveling. I asked a hotel clerk once if there had ever been a problem with items being stolen out of the guests' rooms. "No, not really," he said. "We have had the occasional laptop disappear, but other than that, no one ever loses anything."


Read More >>

Advertorial - PowerTech
 
Partner TechTip: Alert! Alert! Unauthorized Object Access Attempt Detected!

Make important security events trigger an alarm.

robin_tatamWritten by Robin Tatam

To have any chance of preventing a major security breach, early detection of suspicious activities is critical. Fortunately, IBM i contains comprehensive event auditing functionality that is capable of satisfying most regulatory requirements. Using the Change Security Auditing (CHGSECAUD) command, you can create the security audit journal and the initial journal receiver, as well as configure the two main auditing system values—QAUDCTL and QAUDLVL.


Read More >>

In the News

Read More >>
Support MC Press - Visit Our Sponsors

Forums Sponsor

POPULAR FORUMS

Forums

 Search Sponsor

 

POPULAR SEARCHES

Search


Read More >>
   MC-STORE.COM