FEATURE ARTICLES >>

RPG Academy: Parameters: Do You Know Your Options?, Part 2

The *NOPASS option is very useful, but it's not the perfect solution for every situation. This TechTip continues to discuss the different options available, explaining what *OMIT is and when and how to use it.

rafael victoria preiraWritten by Rafael Victória-Pereira

What if you need the 21st and 22nd parameters of a procedure's parameter list with 40 parameters to be optional? Should you change the procedure's parameters, making the 23rd to 40th parameters optional too? That means validating whether all those parameters were passed and assigning default values to each of them. Not the best of solutions, right? This is the most annoying shortcoming of *NOPASS.

Read more >>
 
Case Study: PowerTech's IBM i Security Solutions

PowerTech's security software helps Seneca Gaming Corporation play the security game and win by auditing, monitoring, and controlling user activity.

robin tatamWritten by Robin Tatam

For centuries, the Seneca people have made their home in the western portion of what is now New York State. During their proud, rich history, they relied heavily on hunting, fishing, and agriculture for food. They were great con­querors and fierce adversaries, as well as sophisticated politicians with centuries of democratic savvy. By 1848, they had developed their own constitution and elective government, and officially became the Seneca Nation of Indians.

Read more >>
 
In the Wheelhouse: SSL Concerns Met With Silence

IBM Domino customers continue to kick and scream about security. Will there be a supported solution in the near future?

steve pitcherWritten by Steve Pitcher

Author's Note: After publication of this article, IBM announced support for SHA-2 hashed SSL certificates via an upcoming Interim Fix.

 

Two months ago, I was literally on a 17-hour ferry ride in the North Atlantic writing a piece entitled "IBM, We Have an SSL Problem." It was one of those pieces that just came together the way musicians sometimes write complete songs in about a half hour.

 

Today's piece kind of fell out of me in just over an hour. It means something. It essentially wrote itself because it needed to be written.

Read more >>
 
Technology Focus: The IBM i Isn't Immune to Security Problems!

The IBM i server's reputation for security is well-deserved, but it's not foolproof. Complacency and short-handed IT staffs contribute to the problem.

john gristWritten by John Ghrist

In a world where perfection is seldomif everfound, it's amazing how some users of IBM i servers manage to persuade themselves that their systems are "perfectly" protected from security threats. As news stories of Home Depots and Targets and other big-time vendors' data-security castles being breached become increasingly routine, in the IBM i world denial is still a thriving cottage industry: "No one would bother to try to breach our company's security; we're too small and our i is too secure."

Read more >>
 
Who's More Dangerous? The Person You Know or the Person You Don't Know?

While external hacking incidents have been making the headlines recently, we can't ignore the insider threat.

carol woodburyWritten by Carol Woodbury

I'm fortunate to live in Seattle, where I have access to many professional security organizations. One organization is the Cloud Security Alliance, which holds a meeting each month where security professionals gather to learn about new technology and threats. Last month, the speaker was one of the authors of Verizon's 2014 Data Breach Investigations Report. Each year, Verizon analyzes more data as an increasing number of organizations provide data from their breach experiences. As was expected, there was a lot of data from breaches and incidents from external sourcesthat is, from sources not originating from within the organization breached. While that data was the topic of several interesting discussions, a different topiccentered around the internal threat (breaches and incidents originating from within the organization)also provoked some interesting discussions. This month's article focuses on the internal threat and what the data doesand doesn'tshow. Here's what I learned.

Read more >>
 

INDUSTRY NEWS >>

Halcyon Software Announces New Security Product for Securing Exit Points

New tool enables organizations to achieve higher levels of compliance when conforming to global regulatory requirements. 

Read more >>
 
Halcyon Software Launches New Security Product for Managing Passwords

Halcyon Software, a global leader in multi-platform systems management software, today announced the immediate availability of Password Reset Manager.

Read more >>
 
HelpSystems Offers Database Triggering and Java App Support in New Automation Platform for Windows

AutoMate and AutoMate BPA Server version 10 increase the speed and ease of creating automated IT and business tasks with 7 new actions and over 20 new activities.

Read more >>
 
IBM Cognos Command Center V10.2.1

IBM Cognos Command Center V10.2.1 delivers enhanced business user-driven application integration and automation that helps users manage their business intelligence reporting and enhanced IBM Cognos TM1 environments.

Read more >>
 
IBM Cognos Integration Server V10.2.1

IBM Cognos Integration Server V10.2.1 unlocks the data from Oracle Hyperion applications for direct use in IBM Cognos TM1.

Read more >>
 
IBM Endpoint Manager V9.2 for Linux

IBM Endpoint Manager V9.2 delivers new security access controls for user role management, enhanced capability for bare-metal imaging on Linux.

Read more >>
 
iBelieve Tour Returns to Europe Bigger and Stronger

Tour includes expert line-up: Frank Soltis and Trevor Perry joined by IBM’s Alison Butterill and Steve Will for extended six-date European tour!

Read more >>
 

Events Calendar

October 2014
S M T W T F S
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1

LATEST COMMENTS >>

WEBCAST

MC Webcast CenterFEATURED WEBCAST

See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:

 

  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 

 

Watch the Webinar Now!

 

TRIAL SOFTWARE

MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.

   MC-STORE.COM

Latest Titles >>

eBook Special >>

 

 

Shop the MC Press Store