MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

November 3, 2008 | Vol 3 Issue 19


In This Issue:

Feature Article - Database
Is Working with the .NET Tribe a Secret to Surviving in Paradise?

LANSA's Open for .NET solution is designed to help make integrating Microsoft applications and IBM data a trouble-free experience.

chris_smith.jpgBy Chris Smith

Ever roll into work and think you're actually in Gabon on the set of Survivor? Everyone has his little tribe, and no one thinks anyone else is contributing enough to justify their existence?


Think of the IBM i tribe as the red tribe, Fang. Think of the Microsoft .NET tribe as the yellow tribe, Kota. They wrestle, they compete, they try to survive on limited resources. If this describes your world, you may long for the good old days when there was but one tribe, the AS/400 tribe. Those days are over, however, so you might as well accept that there are now two tribes in Gabon. Do you want to compete, or do you want to get along?


Feature Article - Application Software
Collaboration Solutions for SMBs: SaaSy Communication

Are you aware of the broad range of SaaS solutions, including enterprise solultions, available for SMBs?

ron_exler.gifby Ron Exler

Of all Software as a Service (SaaS) applications, collaboration is perhaps the most used yet least realized in enterprises of all sizes. Most organizations use online conferencing, such as Cisco WebEx or Citrix GoToMeeting. Many use instant messaging, such as AOL Instant Messenger. There is also growing use of online document collaboration tools, such as Microsoft SharePoint and Google Apps.


Gartner Group recently reported that it expects SaaS sales in enterprise application markets to surpass $6.4 billion in 2008. For collaboration SaaS, Gartner reported that it believes sales will exceed $2.1 billion in 2008 and $4.7 billion in 2012.


Advertorial - The PowerTech Group
Partner TechTip: Use Syslog to Monitor IBM i Security Events and Integrate with SIEM Solutions

Ensure that your security events are being aggregated and included with other logs from your network.

brendan_patterson.jpgBy Brendan Patterson

In the wake of the SQL slammer worm in 2003, the attention of information security professionals was primarily focused on distributed computing architectures and Windows, UNIX, and Linux servers. Protecting the perimeter against worms and viruses was the order of the day. But today, meeting compliance initiatives and guarding against the insider threat from employees are just as important. Regulations specify the need for regular review and analysis of security logs. The Payment Card Industry (PCI) Data Security Standard, which was recently updated to version 1.2, requires that log files be reviewed daily and that at least three months of log data be available for immediate analysis.


Support MC Press - Visit Our Sponsors


 Popular Forums



   Search Sponsor


 Popular Searches