MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

July 9, 2012 | Volume 7 Issue 12

TOP STORY: Are You Virtualized? That Is the Question
FEATURED ARTICLE: PCI Compliance for Power Systems Running IBM i
NEWS HIGHLIGHT: MarkMagic V8 from CYBRA Corp. Offers Better Performance, Enhanced Flexibility
WHITE PAPER: PCI Compliance for Power Systems Running IBM i
FORUM: Using SanDisk as Disaster Recovery
EVENT: IBM i Reporting Webinar
Manage Subscription | Contact Us


Feature Article - System Administration
Are You Virtualized? That Is the Question

With today's focus on IT simplification, green computing, and reducing operational costs, virtualization is an essential cornerstone toward your organization achieving such goals.

Written by Joe Cropper

With a little bit of time and patience, you can learn just how easily virtualization can completely change the way you and your enterprise do business. Do you ever find yourself wondering if you can better utilize all those systems in your data center? Are you looking for easier ways to manage your IT environment? Wouldn't you be thrilled if you could reduce your data center's energy footprint and lower your utility costs? Are you looking for ways to increase your business continuity? If you answered "Yes!" to any of these questions, the good news is that these are all byproducts of employing virtualization technology in your organization.


Feature Article - Security
PCI Compliance for Power Systems Running IBM i

Navigating the PCI DSS requirements can be challenging, but this white paper can help.

robin tatamWritten by Robin Tatam

Editor's Note: This article is an introduction to the white paper "PCI Compliance for Power Systems Running IBM i" available free from the MC White Paper Center.


According to the eye-opening "Chronology of Data Breaches" maintained by Privacy Rights Clearinghouse (, a consumer advocate organization, unauthorized access to data is growing into an everyday occurrence. Many shocking breaches are the result of egregious errors made by the guardians of the data. Some do not involve a criminal perpetrator; many others involve nefarious access to information and data—typically for financial gain.


In the News

Support MC Press - Visit Our Sponsors



Forums Sponsor



Search Sponsor