MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

May 14, 2010 | Volume 7 Issue 19


TOP STORY: TechTip: Email Made Simple(r) with PHP and Pear
FEATURED ARTICLE: The Modernization Tempo Picks Up Momentum at COMMON
ADVERTORIAL: Partner TechTip: Our System Administrator Did WHAT?
NEWS HIGHLIGHT: Halcyon Announces Major Releases of IBM i and Network Automation Suites
FORUM: V7 Functionality Backward-Compatible to V6?
BLOG: System i Management Tips

Manage Subscription | Contact Us

Feature Article - TechTip
TechTip: Email Made Simple(r) with PHP and Pear

Wouldn't it be great if we could bypass the IBM i SMTP and POP servers altogether? Well, we can!

jeff_olenWritten by Jeff Olen

I've written several TechTips related to improving your ability to send email effectively from your IBM i (See "TechTip: Use PHP and Zend_Mail to Send Email" and "TechTip: Using the QTMMSENDMAIL API"). This TechTip is the latest installment in that genre. It had to be done because the tools just keep getting better and easier to use.


Feature Article - Analysis
The Modernization Tempo Picks Up Momentum at COMMON

With new application development and system management tools, a powerful new hardware chipset, and a commitment to preserve customers' software assets, IBM customers have much to look forward to.

chris_smithWritten by Chris Smith

Having returned from COMMON's 50th Anniversary conference and exposition in Orlando last week, I think it's clear to everyone who was there that the IBM Power Systems platform and IBM i operating system will be with us for many years to come. If I could summarize the themes of the show, they would be these: modernization, consolidation, automation, and virtualization.


Advertorial - PowerTech
Partner TechTip: Our System Administrator Did WHAT?

Are your powerful users accountable for their actions?

robin_tatamWritten by Robin Tatam

One of the greatest challenges an organization faces when securing an IBM i environment is protecting the system from the very people who are charged with its care: programmers, administrators, and security officers. While these power users often need access to restricted objects and commands, they rarely need that level of access 24 hours a day—and definitely not without accountability.


In the News

Support MC Press - Visit Our Sponsors

Forums Sponsor



 Search Sponsor