Have you heard? RPG is now fully free-format! This latest edition from RPG expert Jim Martin is your one-stop resource for free-format information. It’s a must-read for all RPG programmers, featuring completely updated code. See the new H, F, D and P specs in action in this easy-to-use reference guide. You’ll learn rules and syntax but also grasp how this modern style of coding can improve your overall productivity--from initial development through maintenance. Get your copy today!
Many companies in manufacturing, wholesale, or retail already use the IBM Power i to integrate most mission-critical enterprise data and business processes. In large, medium, and small companies, a decision was made to support enterprise applications on the Power i because of its reliability, low cost of ownership, superior processing power, flexibility, expandability, and security.
So, given the above, it may be surprising to hear that many of these companies still run their shipping and transportation management applications (one of their most mission-critical applications) on a collection of PCs and servers. Why would that be?
SQL Built-In Functions and Stored Procedures: Boost your SQL programming skills! Stored procedures and built-in functions can greatly expand the power and usefulness of SQL, but surprisingly these highly useful tools remain untapped by many programmers. For those who are new to the subject or simply want to expand on what they already know, this best-selling book provides a terrific introduction to these powerful tools. Get a FREE chapter now!
NGS’ Software Developer Kit (SDK) gives IBM i developers comprehensive query, dynamic mobile reporting, analytics and Web report design features at an affordable cost. Install and create meaningful outputs for managers in one day! Web page and portal integration, email, FTP are included.
The $895* SDK includes a one user license, online training, user manuals, one year of software maintenance; toll-free support and online incident reporting.
want to modernize beyond Query/400 and PC files transfers
need a Web reporting solution without the learning curve and overhead of DB2 Web Query
have many reporting needs, but a tight budget and small staff
Carol is pleased to be joined for this Coffee with Carol by friend and former colleague Jeff Uehling, current Chief Security Architect for IBM i. Jeff and Carol will be discussing a number of the recent Security Vulnerabilities which have had a huge, industry-wide impact on both hardware and software vendors - including IBM and the IBM i development groups. These security vulnerabilities include well-publicized ones such as Heartbleed, Bash/Shellshock and Poodle as well as numerous vulnerabilities that haven’t hit the media. These vulnerabilities exist in areas such as Java, OpenSSL and many networking areas of your systems.
IBM i has long been known as a secure platform on which you can run your business critical applications. However, securing the system requires careful attention to the system-wide security configuration options, managing the authority settings on your data objects which contain your business critical data (corporate assets), and - as importantly - staying current with your enterprise-wide maintenance and ensure the latest PTFs/Fixes are installed in order to close "real" or "potential" security holes.
Is mobile an initiative for your business? Find out how you can go beyond Web applications to create applications with native device capabilities, such as Camera… even if you’ve never created a mobile application! Watch this on-demand Webinar with IBM’s Tim Rowe and Profound Logic’s Scott Klement and Alex Roytman, and discover how you can create high-quality mobile applications using your existing RPG knowledge and the right tools.
How the IBM i platform supports mobile development
Why hybrid applications are a great option to deliver mobile apps with more functionality than Web apps can offer
How to develop mobile apps with native capabilities without becoming an Obj-C and Java expert, or using overly complicated tools
Due to popular demand, Carol has updated her presentation on configuring iAccess to use SSL sessions to include, not just the step-by-step configuration guidance but also a discussion on the benefits and challenges of using certificates from a well-known CA (Certificate Authority) vs a self-signed certificate as well as practical tips for enterprise implementation.
*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.
The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card. Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security, and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!
Have a Webcast you would like to list? click here or call (208) 629-7275 Ext.504 for information.