MAGAZINES

MC Press Resource Centers
MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power

March 4, 2011 | Volume 8 Issue 9

ISSUE HIGHLIGHTS

TOP STORY: TechTip: Use Print Adopting Objects (PRTADPOBJ ) to Keep Track of Adoption of Authority
FEATURED ARTICLE: Get Real-Time Security Alerts Using Database Triggers
ADVERTORIAL: Partner TechTip: The Auditor Needs to See WHAT?
NEWS HIGHLIGHT: 10ZiG Thin Client Models Now Support VMware View 4.6
FORUM: Need Old Lattice Docs or .DBF Handling Advice
BUYER'S GUIDE: Maxava HA Enterprise and Barcode 400
BUSINESS CONTINUITY TODAY: Ch.11: Is the Cloud Right for You?

Manage Subscription | Contact Us

Sponsor - The RPG & DB2 Summit
 
Upgrade your skills — and meet the legendary Dr. Frank Soltis — at the next RPG & DB2 Summit. Hear the latest on RPG IV, embedded SQL, DB2, SQL tuning, RPG & the Web, PHP & more. Learn practical, use-it-today tips and techniques and get 1-on-1 advice from top experts Paul Tuohy, Susan Gantner, Jon Paris, Skip Marchesani, Scott Klement, and others in a highly interactive, invigorating, fun environment. As a subscriber to MC Press Online, you can use code MCPS11 to get $200 off your registration rate — compliments of MC Press Online and System i Developer.

Click to see the Session Grid. Register today!


Read More >>

Feature Article - System Administration
 
TechTip: Use Print Adopting Objects (PRTADPOBJ ) to Keep Track of Adoption of Authority

Adopting authority enables users to drive the car to the store and back yet stay off the highway. To ensure no one ends up in the ditch, you must know where the keys are at all times.

steve_pitcherWritten by Steven C. Pitcher

Adoption of authority is a solution to the problem of having users who need to execute commands that are otherwise forbidden based on their current IBM i authority level.

 

For example, your helpdesk personnel must have the ability to re-enable user profiles that have been disabled, but you don't want to give them *SECADM special authority and access to the Change User Profile (CHGUSRPRF) command.


Read More >>

Feature Article - System Administration
 
Get Real-Time Security Alerts Using Database Triggers

KST Software gives users a free taste of its security solution that can monitor individual files—as well as users.

chris_smithWritten by Chris Smith

Perhaps I'm overly materialistic, but if there is one word I like over all others, it's "free." For the next three months, IBM i users in certain markets can download and activate KST Software's DataTrigger security program at no charge.

 

KST is an Israeli company that has a unique take on security: it uses IBM's trigger technology to monitor changes to the database and notify the administrator or security officer through an alert. The technique hasn't gained widespread use largely because of the overhead that triggers place on system resources. With IBM's newer high-performance processors, however, such work is of little consequence nowadays, according to KST.


Read More >>

Advertorial - PowerTech
 
Partner TechTip: The Auditor Needs to See WHAT?

PowerTech Compliance Monitor v3.0 ushers in the next generation of advanced audit reporting for IBM i.

robin_tatamWritten by Robin Tatam

Audits are a way of life in today's regulated world. Whether it's Sarbanes-Oxley (SOX), the Payment Card Industry (PCI), or the multitude of other government and industry standards, few organizations escape the reach of one or more of these regulations. Unfortunately, there are few things that drive fear into the heart of IT personnel more than the arrival of an auditor: "What are they going to ask to see?" "Do I have to explain what *JOBCTL means again?" "How can I get all my normal work done when I have to figure out how to report on the very information that will be used to penalize me?"


Read More >>

MC Showcase Featured Products
 
Maxava HA Enterprise delivers comprehensive High Availability and Disaster Recovery readiness for your IBM i. Maxava HA Enterprise includes all the functionality of the Maxava HA SMB version along with enhanced replication and tools necessary for more complex environments.

 

Secure, reliable replication of data, objects, spool files, IFS and MQ Series – Maxava HA Enterprise does it all, along with Command Scripting Function and maxView ; remote monitoring of your HA solution and key IBM i system resources from your web-ready mobile device.

 

Learn more about Maxava and its high availability and disaster recovery software solutions for IBM i systems here.

 

 

T.L. Ashford's award winning BARCODE400 software is the labeling answer for the iSeries. With this versatile and easy to use software you will be designing and printing labels in minutes. Compliance labeling is a snap using templates provide by TL Ashford.

Learn more about T.L. Ashford & Associates and its Barcode and RFID solutions here.

 

Want to feature your company products? Click here or call (208) 726-6822 for information.


Read More >>

In the News

Read More >>
Support MC Press - Visir Our Sponsors

 

Forums Sponsor

POPULAR FORUMS

Forums

 

 

Search Sponsor

 

POPULAR SEARCHES

Search


Read More >>
Business Continuity Today

E-Magazine: Business Continuity Today from Vision Solutions, Inc.

 

Latest Chapter: Business Continuity Today Ch.11: Is the Cloud Right for You?

 

Business Continuity Today Ch. 1: Planning for Business Resilience

Business Continuity Today Ch. 2: Security Threats, Trends and Risks

Business Continuity Today Ch. 3: Optimizing Data Availability in Information Hungry Organizations

Business Continuity Today Ch. 4: Compliance and the New Reality for IT Resiliency

Business Continuity Today Ch. 5: Maintaining Availability with Virtualization Technologies

Business Continuity Today Ch. 6: Data Replication: Making Sense of the Options

Business Continuity Today Ch. 7: Recovery: Strategies for Resilience

Business Continuity Today Ch. 8: BCROI: Measuring Returns on Your Business Investment

Business Continuity Today Ch. 9: Making the Green Connection: Ensuring Sustainability and Continuity

Business Continuity Today Ch.10: Disaster Recovery by the Numbers

 


Read More >>
   MC-STORE.COM