MAGAZINES

MC Press Resource Centers
MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power

May 14, 2010 | Volume 7 Issue 19

ISSUE HIGHLIGHTS

TOP STORY: TechTip: Email Made Simple(r) with PHP and Pear
FEATURED ARTICLE: The Modernization Tempo Picks Up Momentum at COMMON
ADVERTORIAL: Partner TechTip: Our System Administrator Did WHAT?
NEWS HIGHLIGHT: Halcyon Announces Major Releases of IBM i and Network Automation Suites
FORUM: V7 Functionality Backward-Compatible to V6?
BLOG: System i Management Tips

Manage Subscription | Contact Us

Feature Article - TechTip
 
TechTip: Email Made Simple(r) with PHP and Pear

Wouldn't it be great if we could bypass the IBM i SMTP and POP servers altogether? Well, we can!

jeff_olenWritten by Jeff Olen

I've written several TechTips related to improving your ability to send email effectively from your IBM i (See "TechTip: Use PHP and Zend_Mail to Send Email" and "TechTip: Using the QTMMSENDMAIL API"). This TechTip is the latest installment in that genre. It had to be done because the tools just keep getting better and easier to use.


Read More >>

Feature Article - Analysis
 
The Modernization Tempo Picks Up Momentum at COMMON

With new application development and system management tools, a powerful new hardware chipset, and a commitment to preserve customers' software assets, IBM customers have much to look forward to.

chris_smithWritten by Chris Smith

Having returned from COMMON's 50th Anniversary conference and exposition in Orlando last week, I think it's clear to everyone who was there that the IBM Power Systems platform and IBM i operating system will be with us for many years to come. If I could summarize the themes of the show, they would be these: modernization, consolidation, automation, and virtualization.


Read More >>

Advertorial - PowerTech
 
Partner TechTip: Our System Administrator Did WHAT?

Are your powerful users accountable for their actions?

robin_tatamWritten by Robin Tatam

One of the greatest challenges an organization faces when securing an IBM i environment is protecting the system from the very people who are charged with its care: programmers, administrators, and security officers. While these power users often need access to restricted objects and commands, they rarely need that level of access 24 hours a day—and definitely not without accountability.


Read More >>

MC Industry Blogs
 

BLOG: System i Management Tips from Vision Solutions, Inc.

 

Latest Posting: 3/26/10 Additional ways to see the contents of a user space (*USRSPC)

 

01/29/10 How to determine the jobs or objects responsible for generating journal entries in a journal receiver?


12/17/09 How to search for text in a file at the member level


11/20/09 Simplify replication of devices between two systems by matching hardware resource names


10/21/09 Know the impact of using the ENDJOBABN command


10/2/09 How to rapidly set up a network printer using IBM Personal Communications


Read More >>

In the News

Read More >>
Support MC Press - Visit Our Sponsors

Forums Sponsor

POPULAR FORUMS

Forums

 Search Sponsor

 

POPULAR SEARCHES

Search


Read More >>
   MC-STORE.COM