TechTip: Back to Basics with IBM i Special Authorities

Special authorities give users the access they need quickly and easily, but they're hard to take away once granted. You need to understand what you're assigning someone. Special authorities are more serious than you might have thought.

steve pitcherWritten by Steve Pitcher

With great power comes great responsibility.


My company is about to go on a major ERP overhaul. That's right. We've got forty plus years of a mostly home-grown solution with pieces and parts bolted on over time. Do we have people who have too much authority given their job role? Yes. Are certain objects less secure than they could be? Yes. Like any shop, we have a couple of critical applications that "might break" if the authority is changed. We also have a couple of users who "might" not be able to do their jobs if their authority is restricted. With a new solution on the horizon, it's a good time to look at what we have from a security point of view so that when we go live, we can be sure that the IBM i environment is as watertight as possible. That means ensuring any special authorities are granted on a must-have basis.

Book Review: DB2 10.1 Fundamentals: Certification Study Guide

Too valuable to be classified as merely excellent certification material, this book should also rightly take its place on DB2 DBA bookshelves as a solid day-to-day DB2 reference.

rebecca bondWritten by Rebecca Bond

As the title indicates, DB2 10.1 Fundamentals: Certification Study Guide is an exceptional instructional guide for technologists who are interested in achieving IBM DB2 certification. Despite the intended focus on certification, the reader quickly realizes that this book is also an excellent day-to-day reference and, as such, it is likely to become a well-worn text for those who manage DB2 databases. Additionally, this book delivers sufficient detail to serve as foundational material for students or DBAs who are in the process of transitioning skills learned on other database platforms.

Understanding DB2 Object Privileges, Part 3

In the final installment of this three-part series, learn about DB2's system, server, nickname, and variable privileges plus several more.

roger sandersWritten by Roger E. Sanders

Editor's note: This article is an excerpt from the book DB2 10.1 Fundamentals: Certification Study Guide


In DB2 for Linux, UNIX, and Windows and DB2 for z/OS, object privileges convey the right to perform certain actions against specific database objects. Part 1 of this series reviewed DB2's authorization ID, buffer pool, table space, storage group, schema, table, view, and index privileges. Part 2 of this series reviewed DB2's sequence, distinct type, function, procedure, routine, collection, package, and plan privileges. In this article, we conclude our discussion of DB2 object privileges by examining the remaining privileges available to control user interactions with DB2 objects.

DR Strategy Guide for IBM i

Don't wait for a disaster. Start planning today.

Written by Maxava

Editor's note: This article introduces the white paper DR Strategy Guide for IBM i available free from the MC White Paper Center.


Organizations cannot control whether or not they will be affected by a natural disaster, extended power outage or any other unplanned incident. However, they can ensure their business is prepared to respond to and recover from these events with minimal disruption or impact to their customers.


These types of events disrupt business operations, and they all have the potential to cripple a business if a supporting contingency plan is not in place. So what happens after the worst-case scenario becomes a very real disaster situation? Your business is in a crisis. Can you rely on past practices or processes? Common Disaster Recovery framework is a classic risk management mistake that will impact your organization in both reputation and bottom line. The industry is riddled with numerous failed efforts resulting from monolithic Disaster Recovery implementations.



mrc Improves m-Power's Interactive Reporting

Today, software developer mrc announces improved interactive reporting within m-Power.

Alliance Key Manager Now Available on IBM Cloud Marketplace

Alliance Key Manager for IBM Cloud provides encryption and key management to help IBM Cloud customers meet data privacy compliance regulations and security best practices.

S4i Express Utilizes the Flexibility of IASPs on iSeries

S4i Systems, Inc. is pleased to announce the latest release of S4i Express, PTF38.

IBM DB2 with BLU Acceleration Pattern V1.2 Delivers Workload Optimization

IBM DB2 with BLU Acceleration Pattern V1.2 enables your online transaction processing (OLTP) database and data mart deployment to a private or public cloud.

Rational Solution for Test Automation V8.6 for Linux

IBM Rational Solution for Test Automation V8.6 delivers new capabilities for mobile and web UI test automation.

IBM InfoSphere Information Server Offers Unlimited Users and Simplifies Metric Counting Rules

Effective July 24, 2014, select IBM InfoSphere Information Server products will be offered under a new set of prices and pricing metrics that deliver greater value and flexibility to IBM clients.

Cognos Business Intelligence V10.2.1 Delivers Additional Chargeable Component Features

IBM Cognos Business Intelligence V10.2.1 provides the following new features to give you visibility into your businesses' past, present and future performance.

DRV Technologies Releases 6.0 of the DRV FlexTool Solutions Suite

DRV Technologies, Inc., the developer of FlexTools report management, electronic forms and MICR laser checks software, report writer / query tool, and system monitoring for the IBM i, iSeries, and AS/400, has announced the release of FlexTools V6.0 which is the DRV suite of solutions including SpoolFlex, FormFlex, Secure Checks, DBXFlex and MessageFlex.



Configuring IBM i iSeries Access Server to Use SSL

To see a list of all the MC Press videos, click here


No events

Events Calendar

August 2014
27 28 29 30 31 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6



Take Your PHP Skills to the Next Level


>> NEW BOOK:  Advanced Guide to PHP on IBM i




See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:


  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 


Watch the Webinar Now!



MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.


Latest Titles >>

eBook Special >>



Shop the MC Press Store