MAGAZINES

MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

June 11, 2012 | Volume 7 Issue 10

ISSUE HIGHLIGHTS

TOP STORY: Security: What Are the Best Practices of the Best Companies?
FEATURED ARTICLE: Protecting Your Data: How Much Security Is Enough?
NEWS HIGHLIGHT: Halcyon Software Invests in Next Generation of IBM Power Systems Professionals
WHITE PAPER: Protecting Your Data - How Much Security is Enough?
FORUM: Cursors in SQLRPGLE
EVENT: PowerTech: IFS Security – Don't Leave Your Server
Manage Subscription | Contact Us

Sponsor - ASNA
 

The weak link in virtually every IBM i RPG application is the green user interface. For years, now, band aids and half-measures have been used to try to fix the problem. But no one solution has really solved the problem appropriately. That’s where ASNA Wings® comes in. ASNA Wings lets you easily create an alternative browser-based user interface for your RPG programs. Wings doesn’t require invasive changes to your RPG and includes a browser-based emulator for use with non-enhanced displays.

 

Click here for more information on ASNA Wings!


Read More >>

Feature Article - Security
 
Security: What Are the Best Practices of the Best Companies?

Your IBM i didn't come to you secure. But you certainly can—and should—make it secure.

robin tatamWritten by Robin Tatam

One of the presentations I make to the IBM i community is coyly entitled "7 Habits of Highly Secure Organizations." Although the title is just a play on the name of the famous series of books by motivational speaker Stephen R. Covey, its message is intended to identify several important habits that companies need to consider as part of an overall strategy for becoming first secure and then compliant. I am not suggesting that there are a finite number of habits needed to become secure or compliant, but there are some baseline practices that all companies should adhere to.


Read More >>

Feature Article - Security
 
Protecting Your Data: How Much Security Is Enough?

An organization's data is a vital corporate asset. So how do you determine how much security is enough to adequately protect that data?

carol woodburyWritten by Carol Woodbury

Editor's Note: This is an introduction to the white paper "Protecting Your Data: How Much Security Is Enough?" available for free from the MC White Paper Center.

 

The answer to how much security is enough depends on the type of data, its value to your organization, and your organization's policy requirements. If the data stored on your systems is governed by a law or regulation (such as HIPAA or PCI DSS), then those laws and regulations may dictate how much is enough—at least to be in compliance with those laws and regulations. However, your organization may decide that those requirements are not sufficient to adequately secure the data. In this case, you may add additional requirements for securing the data.


Read More >>

In the News

Read More >>
Support MC Press - Visit Our Sponsors

Forums Sponsor

POPULAR FORUMS

Forums

Search Sponsor

Search

 


Read More >>
   MC-STORE.COM