Free, Live Webinar: Does this sound familiar? Reports based on yesterday’s data? Queries you have to change every time they run? Programs generating spool files no one has time to read? Analysts storing sensitive data in Microsoft Excel and Access? Users rejecting Query/400? Programmers writing new queries instead of new applications? Attend this webinar and learn how you can extend and enhance data access without sacrificing control or your budget. Call 800 824-1220 or register at www.ngsi.com.
Understanding how messages work is an important part of writing good CL programs. In fact, without at least a basic understanding of messages, your CL programs will be error-prone and, in many cases, unreliable.
IBM i is driven by messages. Messages are used for a multitude of different purposes, including initiating jobs, executing commands, communicating between programs, signaling error conditions, letting users communicate with each other, and letting jobs communicate with users.
An old dog can learn new tricks! Flexible Input, Dazzling Output with IBM i is full of clever ways to get data into your IBM i system, as well as new techniques to export and present this data in a modern, business-friendly manner. No more boring spreadsheets or ugly printouts! Your DB2 data will look great in program-generated spreadsheets and browser-based, interactive charts. Whether you’re an old dog or not, you’ll get the most out of your ILE RPG programs with the open source, free tools in this smart new release! Order your copy today!
PowerTech Compliance Monitor simplifies the task of audit reporting. It comes with a set of reports for SOX, PCI, and even MICS gaming standards.
IBM i's audit journal is often so large and cryptic, that most IT staff struggle to review the logged activity. Compliance Monitor analyzes your audit data across multiple systems and displays the exceptions to policy with remediation tips—all from your web browser! You can generate reports as PDF or Excel files.
Need custom reporting? Compliance Monitor’s flexible filters allow you to generate reports on any audit data you need—from system configuration to user activity.
Streamline your audit reports. Try Compliance Monitor free for 30 days.
The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice.We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card.Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security, and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card
Have Trial Software you would like to list? Click here or call (208) 726-6822 for information.
Introduction to Configuring iAccess Servers to use SSL
Due to popular demand, Carol has updated her presentation on configuring iAccess to use SSL sessions to include, not just the step-by-step configuration guidance but also a discussion on the benefits and challenges of using certificates from a well-known CA (Certificate Authority) vs a self-signed certificate as well as practical tips for enterprise implementation.