MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

May 14, 2012 | Volume 7 Issue 9


TOP STORY: Where GS1 Item Alignment Is Now and Where It's Headed
FEATURED ARTICLE: Beyond FTP: Securing and Automating File Transfers
NEWS HIGHLIGHT: COMMON Conference Reveals IBM Roadmap Includes Support for IBM i
ON-DEMAND WEBCAST: Beyond FTP, Securing and Automating File Transfers
EVENT: SkyView Partners: Implementing Security Best Practices for the IBM i
Manage Subscription | Contact Us

Feature Article - Internet
Where GS1 Item Alignment Is Now and Where It's Headed

GS1 US and 1SYNC have made remarkable progress, and much more is yet to come.

jeff_holzmanWritten by Jeff Holzman

This article provides an update on the status of GS1 standards-based initiatives from January 2011 to February 2012 and also looks at plans for the coming year. Special attention is given to the broadening focus of 1SYNC, which is now not only the world's leading Global Data Synchronization Network (GDSN) certified data pool, but also a leader in the area of Product Data Management. In line with this shift, I note the important improvement of GS1 US's capabilities in helping industries and enterprises benefit from the real world implementation of standards.  


Feature Article - Security
Beyond FTP: Securing and Automating File Transfers

Standard FTP can put an organization's data at risk, given the sophistication of today's cyber attacks. Are you willing to let your company take that risk?

maryrose_robertsWritten by Mary Rose Roberts

Editor's Note: This article is a review of the Webcast "Beyond FTP: Securing and Automating File Transfers" available to view free from the MC Press Webcast Center.


Today's networks are vulnerable to sophisticated cyber attacks, which means standard FTP encryption tools used by IT professionals often fail to safeguard the transmission of sensitive corporate data.


Cyber criminals continue to attack companies, using sniffer tools, non-switch shared hubs, and unsecured wireless networks to access data.


In the News

Support MC Press - Visit Our Sponsors

Forums Sponsor



Search Sponsor