MAGAZINES

MC Press Resource Centers
MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power

April 16, 2010 | Volume 7 Issue 15

ISSUE HIGHLIGHTS

TOP STORY: TechTip: Take Charge of Your Situation with Job Watcher Situational Analysis
FEATURED ARTICLE: Is Your PC, Laptop, and Flash-Drive Data at Risk from Prying Eyes?
ADVERTORIAL: Partner TechTip: Alert! Alert! Unauthorized Object Access Attempt Detected!
NEWS HIGHLIGHT: IBM Announces New POWER7 Blades, Software, and Services
FORUM: Problem with Slow PHP Scripts
EVENT: OCEAN: IBM Systems Director and VMControl
BLOG: Additional ways to see the contents of a user space (*USRSPC)

Manage Subscription | Contact Us

Feature Article - TechTip
 
TechTip: Take Charge of Your Situation with Job Watcher Situational Analysis

Analyze your iSeries performance more effectively.

sandra_chromeyWritten by Sandra Chromey

Is your system running poorly and you don't understand why? Is the CPU underutilized, but customers are complaining about jobs taking too long? Are you feeling overwhelmed by the thought of managing your iSeries all on your own? Wouldn't it be great if you could talk to the performance experts and have them assess your situation?


Read More >>

Feature Article - Security
 
Is Your PC, Laptop, and Flash-Drive Data at Risk from Prying Eyes?

Using a combination of software and hardware solutions can defend against data theft.

chris_smithWritten by Chris Smith

The best reason to encrypt your data is because you have a very good chance of losing your laptop when you're traveling. I asked a hotel clerk once if there had ever been a problem with items being stolen out of the guests' rooms. "No, not really," he said. "We have had the occasional laptop disappear, but other than that, no one ever loses anything."


Read More >>

Advertorial - PowerTech
 
Partner TechTip: Alert! Alert! Unauthorized Object Access Attempt Detected!

Make important security events trigger an alarm.

robin_tatamWritten by Robin Tatam

To have any chance of preventing a major security breach, early detection of suspicious activities is critical. Fortunately, IBM i contains comprehensive event auditing functionality that is capable of satisfying most regulatory requirements. Using the Change Security Auditing (CHGSECAUD) command, you can create the security audit journal and the initial journal receiver, as well as configure the two main auditing system values—QAUDCTL and QAUDLVL.


Read More >>

MC Industry Events Calendar
 

April 16th to April 23rd:

ASNA Visual RPG for .NET Programming – Intermediat ... - Seminar

April 19th & 20th:

LANSA: 2010 Solution Summit - Webinar 

April 20th:

OCEAN: IBM Systems Director and VMControl  - Local Users Group Meeting

April 27th:

Modernization without Boundaries - Webinar

May 3rd to 6th:

COMMON 2010 Annual Meeting and Exposition - Conference & Expo

 


Read More >>

In the News

Read More >>
Support MC Press - Visit Our Sponsors

Forums Sponsor

POPULAR FORUMS

Forums

 Search Sponsor

 

POPULAR SEARCHES

Search


Read More >>
MC Industry Blogs

BLOG: System i Management Tips from Vision Solutions, Inc.

 

Latest Posting: 3/26/10 Additional ways to see the contents of a user space (*USRSPC)

 

01/29/10 How to determine the jobs or objects responsible for generating journal entries in a journal receiver?


12/17/09 How to search for text in a file at the member level


11/20/09 Simplify replication of devices between two systems by matching hardware resource names


10/21/09 Know the impact of using the ENDJOBABN command


10/2/09 How to rapidly set up a network printer using IBM Personal Communications


Read More >>
   MC-STORE.COM