MAGAZINES

MC Press Resource Centers
MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power

May 1, 2009 | Vol 6 Issue 17

 

In This Issue:

Feature Article - TechTip
 
TechTip: Managing Authorization Lists 101, Part I

Do you really understand what authorization lists are and what they do?

rafael_victoria_preira.jpgBy Rafael Victória-Pereira

Securing a file, program, or other object with an authorization list is the same as granting access to each user profile on the authorization list. To help understand the concept, think of an authorization as two sub-lists:


Read More >>

Feature Article - Analysis
 
New IBM Hardware and Software Announcements Focus on Virtualization

Having the right hardware to support a virtualized system or data center may be key to future cost and energy savings.

chris_smith.jpgBy Chris Smith

IBM introduced some eagerly awaited hardware and some unanticipated, but very nifty, software for the i community at COMMON this week in Reno, Nevada.


Read More >>


Advertorial - The PowerTech Group
 
Partner TechTip: How Does Your IBM System i Security Compare to the Rest of the Industry's?

Download your free copy of the 2009 "State of System i Security" white paper.

john_earl.jpgBy John Earl

Are you responsible for IBM i security at your business? Are you wondering how well your security stacks up against that of your peers in other organizations? Have you dealt with auditors who don't understand System i (AS/400) security and don't have any guidelines for auditing your system? Wouldn't it be great if you could compare yourself to the rest of the industry?


Read More >>

Support MC Press - Visit Our Sponsors

 

Forums Sponsor

 

 Popular Forums

POPULAR FORUMS

Forums

 

Search Sponsor
  
 

 Popular Searches

POPULAR SEARCHES

Search


Read More >>
   MC-STORE.COM