MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

September 24, 2014 | Volume 3 Issue 5


TOP STORY: You Want to Build Business Apps for Mobile Devices?
FEATURED ARTICLE: Technology Focus: Mobile Application Development Tools
NEWS HIGHLIGHT:  Bytware's IBM i Message Monitoring Tool Supports Centralized Log Collection and Reporting
ON-DEMAND WEBCAST:Create Amazing, Modern Apps With Profound UI
MC VIDEO PORTAL: Top Ten Security Vulnerabilities of IBM i Security Configuration  
EVENT: Back to School with Bytware

Sponsor - ASNA

ASNA Mobile RPG empowers RPG programmers to create great IBM i-driven smartphone and tablet mobile apps with nothing but plain ol’ RPG. Programmers don’t need to learn obtuse languages like HTML, JavaScript, PHP, Java or Objective C. The only skills required to create superb mobile applications with Mobile RPG are traditional RPG coding skills—period! These applications feature secure and fast read/write access to your IBM i database and provide game-changing possibilities for your business. Learn more - Attend ASNA's free webcast tomorrow!


Feature Article - Networking
You Want to Build Business Apps for Mobile Devices?

It's easy; just acquire some mobile app development tools and get started.


richard lancasterWritten by Richard Lancaster



Building business apps for mobile devices should be easy.  


  • The physical features of mobile devices impose limits on memory, storage capacity, and screen size.
  • The apps typically satisfy a narrow set of business requirements.


One might expect that the device constraints and a narrow requirement domain would simplify the task of building mobile apps. However, building business apps for mobile devices can be hard work, especially for companies that have little experience in mobile development and are embarking on new projects.


Sponsor - Profound Logic Software

Don’t Miss: “See What i Can Do with Mobile Applications”
October 1, 2014 | 10:30-11:30 PDT

San Diego Regional Center (SDRC) needed a more efficient way to support their service coordinators in the field, but wanted to maintain their trusted RPG business application. The answer: mobile applications!

Discover the positive impact mobile applications can have on your workforce! Attend this Webinar and find out how Profound UI helped SDRC:

  • Create intuitive, modern mobile apps
  • Improve IBM i application adoption & reach
  • Support their clients from anywhere
  • Pave the way for future modernization

Save your spot now!


Feature Article - Networking
Technology Focus: Mobile Application Development Tools

Building mobile-device version of server apps isn't so much about what High-Level Language is best to do the job. It's more about what an enterprise's entire strategy for mobile apps is.

john gristWritten by John Ghrist


If you thought the Mac vs. PC religious wars were amusing, you've gotta love the philosophical split that's grown up the past several years around building mobile-device apps that provide access to software running on servers, including IBM i.


Essentially, the debate is about whether it's best to use HTML5 to build Web-friendly versions of server apps that are accessible by a wide variety of mobile devices, to build apps native to each mobile device even though it's more work for developers to tailor an app to each type, or to follow the Third Way crowd, which advocates building hybrid apps that offer features of both philosophies.


Sponsor - The MC Press Bookstore

PHP…Just for IBM i. This is the first book to comprehensively address PHP and how it can—and should—be deployed on the IBM i. Learn how to transfer skills from a green screen environment to the Web, become intimately familiar
with PHP’s commonly used features, and help start down the road of highly interactive Web-based application development. Click now to receive a FREE chapter of this best-selling resource! >>


MC Webcast Center


Create Amazing, Modern Apps With Profound UI


In this information-packed Webinar featuring IBM Champion Scott Klement and Profound Logic Developer David Russo, you’ll learn why you don’t need to compromise your investment in IBM i to deliver amazing, modern business applications!


  • A patented, drag-and-drop visual designer for easy modernization
  • The first available Handler for RPG Open Access
  • Over 150 built-in rich UI widgets that take your apps beyond anything possible in 5250
  • Integration with a suite of tools that future-proof your applications

  • Watch the on-demand Webinar now!


    Be sure to check out these other useful offerings in the MC Webcast Center. 


    5 Steps for Implementing Role-based Access on the IBM i. Presented by Carol Woodbury

    5 Tips for Administering Security in the IFS

    Affordable, Achievable Query, Reporting and Analytics

    Addressing and Automating Audit Requirements for the IBM i

    Auditing the IBM i

    Automating IBM AIX PCI Compliance Reporting

    Automating PCI Compliance Reporting on IBM i

    Beyond FTP, Securing and Automating File Transfers

    Coffee with Carol - Configuring IBM i (iSeries) Access servers to use SSL

    Coffee with Carol: Step by Step Approach to Implementing Object Level Security

    Coffee with Carol: Where do I Start with IBM i Security?

    Common Configuration Mistakes and How to Correct Them

    Create Amazing, Modern Apps With Profound UI

    Dynamic Performance Management for the IBM i: Anticipate System Needs before Issues Happen

    Get Results with NGS-IQ Business Intelligence

    Getting the Most out of Your Audit Journal

    IFS Security

    Introducing ASNA Wings

    Is Your Query Tool Limiting You?

    Managing the Security of Your Data to Meet Your Business Needs

    Mobile Applications for IBM i

    Preparing for and Automating Audit Requirements for AIX

    Programming/RPG - Advanced, Integrated RPG with Tom Snyder

    Security and Compliance: What are the Issues on IBM AIX and How do they Relate to the IBM i

    Security Considerations for IBM i Navigator for the Web

    Simplifying IBM i Security Administration Tasks

    SkyView Security Compliance Solution featuring Audit Journal Reporter.

    The 12 Sections of PCI DSS and How Each Relates to the IBM i Community by Carol Woodbury

    The Hidden Jewels of IBM i Security

    The State of IBM i Security 2014

    The Top Five RPG Open Access Myths....BUSTED!

    Top 10 New Features of IBM i Security by Carol Woodbury

    Top 10 Security and Compliance Considerations for Cloud Computing

    Understanding the Cost of Downtime

    Unleash the Power of IBM i

    What's New with V6R1 Security

    Why Companies Fail PCI audits


    *Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.

    The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card.  Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security,  and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!


    Have a On-Demand Webcast you would like to list? click here or call (208) 629-7275 for information.




    In the News

    The Latest from IBM

    Support MC Press - Visit Our Sponsors

    Forums Sponsor



    Search Sponsor



    MC Video Portal

    MC Video Portal

    Top Ten Security Vulnerabilities of IBM i Security Configuration

    In this Webinar:  SkyView Partners has been performing security assessments for the IBM i community for over 12 years. Based on the findings of these assessments, Carol Woodbury will present the Top 10 vulnerabilities found in IBM i security configurations. She will talk about each issue, making sure to describe how the vulnerability poses risk to your data. In addition, her discussion will include the prevalence of these issues, how to assess the risk of these issues as they pertain to your environment and options for addressing the vulnerabilities.