MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

May 1, 2009 | Vol 6 Issue 17


In This Issue:

Feature Article - TechTip
TechTip: Managing Authorization Lists 101, Part I

Do you really understand what authorization lists are and what they do?

rafael_victoria_preira.jpgBy Rafael Victória-Pereira

Securing a file, program, or other object with an authorization list is the same as granting access to each user profile on the authorization list. To help understand the concept, think of an authorization as two sub-lists:


Feature Article - Analysis
New IBM Hardware and Software Announcements Focus on Virtualization

Having the right hardware to support a virtualized system or data center may be key to future cost and energy savings.

chris_smith.jpgBy Chris Smith

IBM introduced some eagerly awaited hardware and some unanticipated, but very nifty, software for the i community at COMMON this week in Reno, Nevada.


Advertorial - The PowerTech Group
Partner TechTip: How Does Your IBM System i Security Compare to the Rest of the Industry's?

Download your free copy of the 2009 "State of System i Security" white paper.

john_earl.jpgBy John Earl

Are you responsible for IBM i security at your business? Are you wondering how well your security stacks up against that of your peers in other organizations? Have you dealt with auditors who don't understand System i (AS/400) security and don't have any guidelines for auditing your system? Wouldn't it be great if you could compare yourself to the rest of the industry?


Support MC Press - Visit Our Sponsors


Forums Sponsor


 Popular Forums




Search Sponsor

 Popular Searches