FEATURE ARTICLES >>

The Frustrating Challenges of Application Enhancement

A famous editor once said, "You know how when you tighten a bolt on your engine the front bumper falls off?" That started me thinking of writing about how difficult it can be to modify an existing application. Oh, all right. It was her idea from the beginning. So what.

david shireyWritten by David Shirey

In the beginning, an application was written from scratch. And it was beautiful to behold. It did what it was supposed to do, and the logic flow was as clean and as clear as you could reasonably expect it to be. And it lived happily with a dozen unicorns, a handsome prince who liked watching romantic comedy movies, and a beautiful princess with long hair and a diaphanous gown.

 

But then, somebody decided that some changes needed to be made to it. So they modified the code to show the customer AR Tariff code. And suddenly, one of the unicorns disappeared and was replaced by a hippo.

Read more >>
 
DR Strategy Guide for IBM i: Recovery Strategy Requirements

Disaster Recovery (DR) strategies are many and varied.

Written by Maxava

Editor's note: This article introduces the white paper "DR Strategy Guide from Maxava" available free from the MC White Paper Center.

The components of your business impact analysis and mission-critical server rankings will be used as the basis for the development and implementation of a supporting recovery strategy.

Ensure the following information is absolutely clear:

Read more >>
 
RPG Academy: Parameters: Do You Know Your Options?, Part 2

The *NOPASS option is very useful, but it's not the perfect solution for every situation. This TechTip continues to discuss the different options available, explaining what *OMIT is and when and how to use it.

rafael victoria preiraWritten by Rafael Victória-Pereira

What if you need the 21st and 22nd parameters of a procedure's parameter list with 40 parameters to be optional? Should you change the procedure's parameters, making the 23rd to 40th parameters optional too? That means validating whether all those parameters were passed and assigning default values to each of them. Not the best of solutions, right? This is the most annoying shortcoming of *NOPASS.

Read more >>
 
Case Study: PowerTech's IBM i Security Solutions

PowerTech's security software helps Seneca Gaming Corporation play the security game and win by auditing, monitoring, and controlling user activity.

robin tatamWritten by Robin Tatam

For centuries, the Seneca people have made their home in the western portion of what is now New York State. During their proud, rich history, they relied heavily on hunting, fishing, and agriculture for food. They were great con­querors and fierce adversaries, as well as sophisticated politicians with centuries of democratic savvy. By 1848, they had developed their own constitution and elective government, and officially became the Seneca Nation of Indians.

Read more >>
 

INDUSTRY NEWS >>

Halcyon Software Announces New Security Product for Securing Exit Points

New tool enables organizations to achieve higher levels of compliance when conforming to global regulatory requirements. 

Read more >>
 
Halcyon Software Launches New Security Product for Managing Passwords

Halcyon Software, a global leader in multi-platform systems management software, today announced the immediate availability of Password Reset Manager.

Read more >>
 
HelpSystems Offers Database Triggering and Java App Support in New Automation Platform for Windows

AutoMate and AutoMate BPA Server version 10 increase the speed and ease of creating automated IT and business tasks with 7 new actions and over 20 new activities.

Read more >>
 
IBM Cognos Command Center V10.2.1

IBM Cognos Command Center V10.2.1 delivers enhanced business user-driven application integration and automation that helps users manage their business intelligence reporting and enhanced IBM Cognos TM1 environments.

Read more >>
 
IBM Cognos Integration Server V10.2.1

IBM Cognos Integration Server V10.2.1 unlocks the data from Oracle Hyperion applications for direct use in IBM Cognos TM1.

Read more >>
 
IBM Endpoint Manager V9.2 for Linux

IBM Endpoint Manager V9.2 delivers new security access controls for user role management, enhanced capability for bare-metal imaging on Linux.

Read more >>
 

VIDEOS>>

Security Admin Tasks - Examining the Audit Journal

To see a list of all the MC Press videos, click here

Events Calendar

October 2014
S M T W T F S
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1

LATEST COMMENTS >>

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.

   MC-STORE.COM

Latest Titles >>

eBook Special >>

 

 

Shop the MC Press Store