MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

March 28, 2011 | Volume 6 Issue 6


TOP STORY: Enable Transparent Encryption with DB2 Field Procedures
FEATURED ARTICLE: How to Achieve High Availability with System Management in Five Simple Steps
ADVERTORIAL: Partner TechTip: Protect Yourself Against the RPG Brain Drain
NEWS HIGHLIGHT: eBusiness Training Course for IBM i Programmers Gets Update
WHITE PAPER: How to Achieve High Availability with Systems Management in five simple steps!
FORUM: SEC Nails IBM for $10 Million in Alleged Foreign Bribery Scandal
Manage Subscription | Contact Us

Sponsor - SEQUEL Software

SEQUEL makes Power Systems data access and analysis available to everyone. Easy to install, configure, and use, SEQUEL delivers the data you need, in the format you prefer, quickly and efficiently. Create queries with drill-down data analysis, design powerful executive dashboards, and access databases anywhere. SEQUEL meets all your data access and analysis needs. Click here for more info.



Feature Article - Database
Enable Transparent Encryption with DB2 Field Procedures

New in 7.1, FieldProc allows column-level encryption without requiring changes to existing applications.

kent_milligan_117x117Written by Kent Milligan

With all the scrutiny and legislation associated with protecting personal sensitive data, a good number of IBM i developers have had to investigate the effort it would take to add column-level encryption logic into their application programs. Anyone who has done this analysis quickly discovers that it's not a trivial amount of work.


Sponsor - Linoma Software
DB2 Field Procedures and Encryption in V7R1

Learn how the new DB2 Field Procedures in IBM i 7.1 can be used to provide transparent database field encryption. Field Procedures are ideal for IBM i shops that want to automate the encryption and decryption of sensitive fields without having to modify their applications or source code.

Free On-Demand Webinar – Encryption with DB2 Field Procedures

Watch Today!


Feature Article - System Administration
How to Achieve High Availability with System Management in Five Simple Steps

An approach to meeting the demands of a 24/7 availability environment and reducing the risk of downtime events.

Written by CCSS Ltd.

Editor's Note: This article is an extract of the white paper "How to Achieve High Availability with System Management in Five Simple Steps" available free from the MC White Paper Center. 


A hard-working System i environment is never more visible (or expensive) to an organization than when it becomes unavailable. The expectation is for optimal performance on a 24/7 basis, and beyond that, any system issues should be the remit of the IT manager—not seen, not heard, and most definitely not felt by the user community. Sadly, the realities of system availability can fall short of these exacting standards—whether the systems are truly available or not. This is because the definition of high availability means dif­ferent things to different groups within an organization.


Sponsor - Townsend Security
Your encryption project just got easier!

Automatic encryption is now possible on IBM V7R1 with AES/400.
It is absolutely the easiest, fastest and most secure way to encrypt data on the IBM i. Encrypt fields that contain sensitive information and control how data is decrypted without impacting existing applications.
Automatic Encryption on the i – now available! Learn more.


Advertorial - Databorough
Partner TechTip: Protect Yourself Against the RPG Brain Drain

Are the IT needs of your company on a collision course with the dwindling pool of RPG programmers?

steve_kilnerWritten by Steve Kilner

The question above is in many managers' minds as the pool of RPG programmers continues to shrink due to retirements and other forms of attrition. It is likely that there will be RPG developers available for many years to come, but that doesn't address the real problem. The real problem is what happens when you lose members of your team. A lot of knowledge is walking out the door with them. How can it possibly be replaced?


In the News

Support MC Press - Visit Our Sponsors

Forums Sponsor



Search Sponsor