FEATURE ARTICLES >>

In the Wheelhouse: SSL Concerns Met With Silence

IBM Domino customers continue to kick and scream about security. Will there be a supported solution in the near future?

steve pitcherWritten by Steve Pitcher

Author's Note: After publication of this article, IBM announced support for SHA-2 hashed SSL certificates via an upcoming Interim Fix.

 

Two months ago, I was literally on a 17-hour ferry ride in the North Atlantic writing a piece entitled "IBM, We Have an SSL Problem." It was one of those pieces that just came together the way musicians sometimes write complete songs in about a half hour.

 

Today's piece kind of fell out of me in just over an hour. It means something. It essentially wrote itself because it needed to be written.

Read more >>
 
Technology Focus: The IBM i Isn't Immune to Security Problems!

The IBM i server's reputation for security is well-deserved, but it's not foolproof. Complacency and short-handed IT staffs contribute to the problem.

john gristWritten by John Ghrist

In a world where perfection is seldomif everfound, it's amazing how some users of IBM i servers manage to persuade themselves that their systems are "perfectly" protected from security threats. As news stories of Home Depots and Targets and other big-time vendors' data-security castles being breached become increasingly routine, in the IBM i world denial is still a thriving cottage industry: "No one would bother to try to breach our company's security; we're too small and our i is too secure."

Read more >>
 
Who's More Dangerous? The Person You Know or the Person You Don't Know?

While external hacking incidents have been making the headlines recently, we can't ignore the insider threat.

carol woodburyWritten by Carol Woodbury

I'm fortunate to live in Seattle, where I have access to many professional security organizations. One organization is the Cloud Security Alliance, which holds a meeting each month where security professionals gather to learn about new technology and threats. Last month, the speaker was one of the authors of Verizon's 2014 Data Breach Investigations Report. Each year, Verizon analyzes more data as an increasing number of organizations provide data from their breach experiences. As was expected, there was a lot of data from breaches and incidents from external sourcesthat is, from sources not originating from within the organization breached. While that data was the topic of several interesting discussions, a different topiccentered around the internal threat (breaches and incidents originating from within the organization)also provoked some interesting discussions. This month's article focuses on the internal threat and what the data doesand doesn'tshow. Here's what I learned.

Read more >>
 
Partner TechTip: File Monitoring and Other Features of Robot SCHEDULE 12

Let's say you have a bank transmission or FTP process that occurs randomly throughout the day. How do you monitor that activity? OPAL? CLP scripts? Not anymore!

ChuckLosinski 116x116Written by Chuck Losinski

Version 12 of Robot SCHEDULE contains some helpful new features that will improve your processes and add value for your business. Perhaps the most important of these features are the new event monitors that can be set up to monitor file activity, allowing Robot SCHEDULE to react to file and directory events happening on IBM i.

Read more >>
 
Zend Studio 11: A Pretty Big Deal

This small package packs a powerful punch, providing many facilities that all PHP programmers definitely should have at their disposal.

david shireyWritten by David Shirey

Last month, we talked about the Zend Server, the Garth Brooks of the Zend world, and how it can be used to provide an effective environment to run PHP programs from the i. Now we will move on and talk about Zend Studio, the Ariana Grande of the Zend world.

 

 Zend Studio is an Integrated Development Environment (IDE) similar to RDi.

Read more >>
 

INDUSTRY NEWS >>

HelpSystems Offers Database Triggering and Java App Support in New Automation Platform for Windows

AutoMate and AutoMate BPA Server version 10 increase the speed and ease of creating automated IT and business tasks with 7 new actions and over 20 new activities.

Read more >>
 
IBM Cognos Command Center V10.2.1

IBM Cognos Command Center V10.2.1 delivers enhanced business user-driven application integration and automation that helps users manage their business intelligence reporting and enhanced IBM Cognos TM1 environments.

Read more >>
 
IBM Cognos Integration Server V10.2.1

IBM Cognos Integration Server V10.2.1 unlocks the data from Oracle Hyperion applications for direct use in IBM Cognos TM1.

Read more >>
 
IBM Endpoint Manager V9.2 for Linux

IBM Endpoint Manager V9.2 delivers new security access controls for user role management, enhanced capability for bare-metal imaging on Linux.

Read more >>
 
iBelieve Tour Returns to Europe Bigger and Stronger

Tour includes expert line-up: Frank Soltis and Trevor Perry joined by IBM’s Alison Butterill and Steve Will for extended six-date European tour!

Read more >>
 
InfoSphere Change Data Delivery for PureData System for Analytics V11.3

IBM InfoSphere Change Data Delivery V11.3 is designed to provide real-time operational and analytical data synchronization and can deliver high volumes of big data with very low latency.

Read more >>
 
Security Access Manager for DataPower V8.0.1 Offers a Security Gateway for Web, Mobile, and Cloud

IBM Security Access Manager for DataPower V8.0.1 allows you to combine industry-proven web access management capabilities with leading web service and API security and connectivity into a consolidated, multi-channel, security, and integration gateway solution for the multi-channel enterprise.

Read more >>
 

Events Calendar

October 2014
S M T W T F S
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1

LATEST COMMENTS >>

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.

   MC-STORE.COM

Latest Titles >>

eBook Special >>

 

 

Shop the MC Press Store