MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

June 15, 2012 | Volume 9 Issue 24


TOP STORY: Cool Things: Retrieving Program Information
FEATURED ARTICLE: Create a Working Simulation of Your Mobile App with Free iRise Studio MX
ADVERTORIAL: Partner TechTip: PCI Is a Requirement for Many, a Good Example for All
NEWS HIGHLIGHT: ICANN Reveals New Top-level Domain Name Applications  
EVENT: iNSPIRE 2012 IBM i Tech Day  
Manage Subscription | Contact Us

Feature Article - Programming
Cool Things: Retrieving Program Information

Who writes the commands that IBM forgot to write?

mike faustWritten by Mike Faust

Every now and then, I think that there are functions that IBM simply forgot to provide. One example is the inability to do a command like DSPPGM for all programs in a given library. I recently had a need for exactly this functionality. It seemed like a perfect opportunity to create a new utility. In this tip, I'll show you the GETPGMINFO utility.


Feature Article - Networking
Create a Working Simulation of Your Mobile App with Free iRise Studio MX

If you want to get into mobile application development, there is no easier way to get started than with this new easy-to-use mobile simulation tool.

chris smith

Written by Chris Smith

A couple of years ago, I drove from California to New York via Bismarck, North Dakota, and Chicago, Illinois, winding up on the beach at the far eastern tip of Long Island. I'll never forget traveling through Manhattan and negotiating the myriad bridges and complex route changes required to finally get onto the Long Island Expressway. I truly believe I couldn't have done it alone without MapQuest.


Advertorial - PowerTech
Partner TechTip: PCI Is a Requirement for Many, a Good Example for All

Get started with PCI and learn why every company should be in compliance.

robin tatamWritten by Robin Tatam

Few things strike fear into the hearts of consumers and businesses more than a breach of financial information. Why? Because it hits us where we're most sensitive: our pocketbooks! Long gone are the "good ol' days" when hackers were motivated by the challenge of breaking though security. While arguably no less troubling, a guarded admiration and respect was earned as a result of the intelligence and creativity exhibited by those early individuals. After all, these cyber-battles often pitted the little guy against "the Man." The more impenetrable the defenses, the greater the respect garnered by the individual who was able to break in.


MC Industry Events Calendar

June 19:

9:00a - 10:00 Magic Software and Sage: Real-life Solutions for Enterprise Mobility :: Webcast / Webinar

12:00p - 1:00 Coglin Mill / RODIN: Addressing Data Quality—The fundamentals of data quality management :: Webcast / Webinar

12:00p - 1:00 Karmasphere: Collaborative Analytics Workspace :: Webcast / Webinar

6:00p - 9:00 OCEAN: Intro to PhoneGap for RPG Programmers :: Webcast / Webinar


June 21:

9:00a - 10:00 Vault400: Disaster Recovery--What You Need to Know :: Webcast / Webinar

12:00p - 1:00 Coglin Mill / RODIN: Drowning in Data: Quenching your thirst for information about your business :: Webcast / Webinar


June 22:

8:00a - 5:00 iNSPIRE 2012 IBM i Tech Day :: Conference


June 27:

10:00a - 11:00 SkyView: Coffee with Carol - Step by Step Approach to Implementing Object Level Security :: Webcast / Webinar




Have an event you want to list? Send the information to today.


In the News

Support MC Press - Visit our Sponsors

Forums Sponsor




Search Sponsor