Upgrade your skills — and meet the legendary Dr. Frank Soltis — at the next RPG & DB2 Summit. Hear the latest on RPG IV, embedded SQL, DB2, SQL tuning, RPG & the Web, PHP & more. Learn practical, use-it-today tips and techniques and get 1-on-1 advice from top experts Paul Tuohy, Susan Gantner, Jon Paris, Skip Marchesani, Scott Klement, and others in a highly interactive, invigorating, fun environment. As a subscriber to MC Press Online, you can use code MCPS11 to get $200 off your registration rate — compliments of MC Press Online and System i Developer.
Adopting authority enables users to drive the car to the store and back yet stay off the highway. To ensure no one ends up in the ditch, you must know where the keys are at all times.
Written by Steven C. Pitcher
Adoption of authority is a solution to the problem of having users who need to execute commands that are otherwise forbidden based on their current IBM i authority level.
For example, your helpdesk personnel must have the ability to re-enable user profiles that have been disabled, but you don't want to give them *SECADM special authority and access to the Change User Profile (CHGUSRPRF) command.
KST Software gives users a free taste of its security solution that can monitor individual files—as well as users.
Written by Chris Smith
Perhaps I'm overly materialistic, but if there is one word I like over all others, it's "free." For the next three months, IBM i users in certain markets can download and activate KST Software's DataTrigger security program at no charge.
KST is an Israeli company that has a unique take on security: it uses IBM's trigger technology to monitor changes to the database and notify the administrator or security officer through an alert. The technique hasn't gained widespread use largely because of the overhead that triggers place on system resources. With IBM's newer high-performance processors, however, such work is of little consequence nowadays, according to KST.
PowerTech Compliance Monitor v3.0 ushers in the next generation of advanced audit reporting for IBM i.
Written by Robin Tatam
Audits are a way of life in today's regulated world. Whether it's Sarbanes-Oxley (SOX), the Payment Card Industry (PCI), or the multitude of other government and industry standards, few organizations escape the reach of one or more of these regulations. Unfortunately, there are few things that drive fear into the heart of IT personnel more than the arrival of an auditor: "What are they going to ask to see?" "Do I have to explain what *JOBCTL means again?" "How can I get all my normal work done when I have to figure out how to report on the very information that will be used to penalize me?"
Maxava HA Enterprise delivers comprehensive High Availability and Disaster Recovery readiness for your IBM i. Maxava HA Enterprise includes all the functionality of the Maxava HA SMB version along with enhanced replication and tools necessary for more complex environments.
Secure, reliable replication of data, objects, spool files, IFS and MQ Series – Maxava HA Enterprise does it all, along with Command Scripting Function and maxView ; remote monitoring of your HA solution and key IBM i system resources from your web-ready mobile device.
Learn more about Maxava and its high availability and disaster recovery software solutions for IBM i systems here.
T.L. Ashford's award winning BARCODE400 software is the labeling answer for the iSeries. With this versatile and easy to use software you will be designing and printing labels in minutes. Compliance labeling is a snap using templates provide by TL Ashford.
Learn more about T.L. Ashford & Associates and its Barcode and RFID solutions here.
Want to feature your company products? Click here or call (208) 726-6822 for information.