MAGAZINES

MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

August 10, 2012 | Volume 9 Issue 32

ISSUE HIGHLIGHTS

TOP STORY: TechTip: Analyze Your Programs and Applications, Part III
ADVERTORIAL: Partner TechTip: How to Maintain Your Data Integrity
NEWS HIGHLIGHT: iBelieve NY - September 27, 2012
WHITE PAPER: IBM i Scheduling Survival Guide
EVENT: Ad-Hoc File Transfers Using GoAnywhere Secure Mail
Manage Subscription | Contact Us

 

Feature Article - TechTip
 
TechTip: Analyze Your Programs and Applications, Part III

Fill the gap between modules and ILE programs for a full panorama of your ILE application.

jean-paul lamontreWritten by Jean-Paul Lamontre

Part I and Part II of this series have shown how some system commands can be used to dissect in depth one application, without the source code. But these analyses suffer from a lack of information for ILE programs—namely, the link between the program and embedded modules.


Read More >>

Advertorial - PowerTech
 
Partner TechTip: How to Maintain Your Data Integrity

File Integrity Monitoring techniques prevent unauthorized configuration and data changes from occurring unnoticed.

robin tatamWritten by Robin Tatam

File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files. FIM is a requirement of several regulatory standards, including the Payment Card Industry Data Security Standards (PCI DSS).


Read More >>

In the News

 


Read More >>
Support MC Press - Visit Our Sponsors

Forums Sponsor

POPULAR FORUMS

 

Forums

 

 

Search Sponsor

 

POPULAR SEARCHES

 

Search

 

 


Read More >>
   MC-STORE.COM