MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

June 14, 2010 | Volume 5 Issue 11


TOP STORY: Virtualization: Where It Is and Where It's Going
FEATURED ARTICLE: Real-Time Data Sharing: What Can It Do for Your Business? 
NEWS HIGHLIGHT: Next RPG & DB2 Summit to Be Held in Minneapolis Oct. 12-14
WHITE PAPER: Real-Time Database Sharing: What Can It Do for Your Business?
FORUM: Free Utility to Maintain Validation Lists

Manage Subscription | Contact Us

Sponsor - T.L. Ashford & Associates
T.L. Ashford is “The Labeling Answer”® for the System i.

Ashford's Barcode400 has been the dependable choice for the industry since 1983. With Barcode400's newly enhanced Graphic Designer no “green screen” interaction is needed for label design. New features include: AFP/HP-compatible printing, easy-to-use graphics import tool, test print to desktop printer, simple font download tool, updated drivers and format listing reports. Even compliance labeling is made easy with design templates. Call 800-541-4893 to order your Fully-Functional, FREE Trial Software or visit us at T.L. Ashford & Associates.

Also, be sure to download the new white paper: Bar Code / RFID Label Printing, Don't get caught in the integration trap.


Feature Article - Networking
Virtualization: Where It Is and Where It's Going

Server, storage, and network virtualization increase flexibility, mask complexity, and reduce costs for IT departments.

joel_klebanoffWritten by Joel Klebanoff

Virtualization is getting to be long in the tooth, at least in terms of the accelerated universe in which IT now operates. Nonetheless, the term is still somewhat confusing. That's not surprising because there isn't just one variety. Thus, when someone tries to talk to you about or sell you virtualization, your first question should be, "Which type?"


Sponsor - Symtrax
WEBINAR: Inexpensive I-series and ERP Document Archiving with Compleo Archivor

Automatically and inexpensively archive all your documents. A simple web based interface allows users to easily search the archive, view, print, email, and augment with notes and attachments any archived document. Our live demonstration will walk you through setting up search models, indexing your documents and assigning security for document retrieval.

Please register now to join us Tuesday, June 22nd and learn more.


Feature Article - Application Software
Real-Time Data Sharing: What Can It Do for Your Business?

Real-time, heterogeneous data sharing puts information where it is needed, when it is needed, and in the formats that best serve diverse needs across the enterprise.

andy_chaseWritten by Andy Chase

Editor's note: This article is an extraction from the Vision Solutions white paper "Real-Time Database Sharing: What Can It Do for Your Business," available free from the MC Press White Paper Center.


Managers striving to use smarter data to create smarter businesses need clear pictures of the state of their enterprise, without having to rely on isolated snapshots from a variety of incompatible data sources. Yet, in many organizations, data silos segregated by department and/or business function are built on incongruent platforms. In these environments, fashioning an integrated enterprise view presents major data formatting, transformation, and consistency challenges.


In the News

Support MC Press - Visit Our Sponsors


Forums Sponsor






Search Sponsor






MC Industry Blogs

Welcome to Carol Woodbury's blog


Worst Practices

on 06-11-2010 at 03:49 PM 

Over the years I've published a lot on security best practices. In fact, our SkyView Risk Assessor product is based on all of those recommendations. But today I feel a bit contrarian so I've decided to post a few "worst practices." And like my "best practices" these are based on my years of experience in the security world.

Worst practice #1 - when asked how all users ended up with *ALLOBJ special authority, the answer was, "I didn't want to take calls in the middle of the night - so I just gave everyone *ALLOBJ."

Worst practice #2 - No auditing. No joblogs. History log cleared. The reason - lack of storage. Also meant that there was a significant lack of evidence when we were called in to investigate a breach that had occurred on their network!

These are just two of the many "worst practices" I've experienced. What are some of your "worst practices?"