MAGAZINES

MC Press Resource Centers
MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power

February 9, 2009 | Vol 4 Issue 3

 

In This Issue:

Sponsor - New Generation Software, Inc.
 

Take a shortcut on your way to data warehousing & business analytics. Begin your project with a packaged, customizable data model, templates, ready-to-run reports, dashboards, multi-dimensional models, doc, training, & our proven NGS-IQ software that quickly deliver tangible results. NGS’ Decision Assist models include sales, inventory, finance, customer, & healthcare. Benefit from the experience of data warehousing & business intelligence specialists. For info, click here or call 800-824-1220.  


Read More >>

Feature Article - Database
 
Strategies for Successful Data Warehousing Projects

Data warehousing can add significant value by facilitating enhanced business intelligence, but success isn't automatic. This article explores critical data-warehousing success factors.

henry_martinez.jpgBy Henry Martinez

Operational databases are predominantly optimized for transaction processing. They are usually highly normalized and are very efficient at reading and writing a few related records at a time. However, they are typically not optimally architected to serve the needs of executives and business analysts who perform query, reporting, and analysis against vast swaths of data. When these people use operational databases to complete these tasks, the database must often perform large, complex table joins. The necessary disk I/O and processing can bring systems to their knees.


Read More >>


Feature Article - Security
 
IBM i Security: Protecting IBM i Data with Encryption

Stringent regulations and demanding customers have increased the importance of data privacy. Cryptography plays a significant role in protecting data confidentiality.

By John Concini

Note: This article was derived from an IBM Redbooks publication, IBM System i Security: Protecting i5/OS Data with Encryption, written by a team that included the author of this article as well as Beth Hagemeister, Milan Kalabis, Robin Tatam, and Yessong Johng. The following is a management overview of some of the issues discussed in the publication, which should be consulted for a more detailed and technical discussion.


Read More >>

Support MC Press - Visit Our Sponsors

 

Forums Sponsor

 

 Popular Forums

POPULAR FORUMS

Forums

   Search Sponsor

 

 Popular Searches

POPULAR SEARCHES

Search


Read More >>
   MC-STORE.COM