MAGAZINES

MC Press Resource Centers
MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power

June 22, 2009 | Vol 4 Issue 11

 

In This Issue:

Sponsor - Help/Systems
 
 SEQUEL

IBM® System i® Data Access Made Easy

•     Complete management access to critical data

•     Easy to use by IT and end users

•     Automated data access and display

•     Comprehensive BI package: reports, tables, key performance indicators, and dashboards

•     System i-centric for real-time data analysis

•     Multiple interface options: graphical, green-screen, browser

•     Expert support and training

Meet your System i data access and analysis needs. Click here for a FREE Information Kit!


Read More >>

Feature Article - Security
 
Do You Need to Include Encryption Keys in Your HA/DR Plans?

Key management solutions create, store, serve, and manage the life cycle of the secret keys needed for strong encryption.

patrick_townsendWritten by Patrick Townsend

Security auditors have begun placing new focus on encryption key management. Because the loss of encryption keys can compromise the security of all encrypted information, compliance auditors want enterprise customers to use best practices in the management and protection of encryption keys. This means integrating your encryption key management system into your high availability (HA) and disaster recovery (DR) plans.


Read More >>

Sponsor - MaxAva
 
 You can rely on *noMAX

No matter what size machine you rely on, or what model, if you run IBM i then *noMAX has a premium HA & DR solution for you. *noMAX is simple to install and easy to manage. And with secure & satisfied customers all around the world *noMAX has the proven experience, performance & people that you can rely on. Smart thinking saves you money. Call 1-888-400-1541 or click here. Subscription Edition Now Available.


Read More >>

Feature Article - System Administration
 
Next-Generation Technologies for Disaster Recovery and High Availability

A well-designed, well-implemented set of HA and DR technologies will protect an organization against equipment failures, utility interruptions, and natural disasters.

chris_thomasWritten by Chris Thomas

Editor's Note: This article is based on "Next-Generation Disaster Recovery and Availability Technologies for IBM Power Systems," a free white paper downloadable from the MC Press White Paper Center.

 

The High Availability/Disaster Recovery solution spectrum requires that you consider a technology's ability to protect data and keep operations online or bring them back online quickly. Each class of HA/DR technology exhibits different operating characteristics, providing a distinct range of data protection and downtime avoidance.


Read More >>

Advertorial - SkyView Partners, Inc.
 
Partner TechTip: Why Should You Care What Happens in Massachusetts?

What happens elsewhere is eventually going to affect you!

carol_woodbury.gifBy Carol Woodbury

Good question. Why should you care what happens in Massachusetts unless you live there? The answer is because what happens in states such as California and now Massachusetts tends to spread to other states. The breach notification law started in California has spread to almost all of the states, and similar ones are being debated across Europe and Asia. If the Massachusetts privacy laws spread like the California law, you'll want to be prepared. Let's take a closer look. 


Read More >>


In the News


Read More >>

Support MC Press - Visit Our Sponsors

Forums Sponsor

Popular Forums

POPULAR FORUMS

Forums

Search Sponsor

Popular Searches

POPULAR SEARCHES

Search


Read More >>
   MC-STORE.COM