MAGAZINES

MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

July 28, 2014 | Volume 9 Issue 13

ISSUE HIGHLIGHTS

TOP STORY: Understanding DB2 Object Privileges, Part 3
FEATURED ARTICLE: DR Strategy Guide for IBM i
NEWS HIGHLIGHT: Magic Software Launches New Enterprise Mobility Release
WHITE PAPER: Checklists for Checklists on Checklists … Why Not Automate?
MC VIDEO PORTAL: Best Practices for IBM i Security Administration
MC INDUSTRY BLOGS: Possible Hackability of Boeing 777 Illustrates Vulnerability of Integrated Systems
EVENT: IFS Security: Don’t Leave Your Server Vulnerable

Sponsor - The MC Press Bookstore
 

Taking Exam 610? Better brush up! Roger Sanders gives you all the help you need in his new DB2 10.1 Fundamentals: Certification Study Guide. As an exam developer and one of the world’s leading DB2 authors, Sanders walks you through every topic on the test and prepares you with 150 practice questions. Review planning, security, working with databases and database objects, SQL and XQuery, DB2 tables, and more. Arm yourself with this complete guide! Show what you know about DB2 10.1, and ace the exam!


Read More >>

Feature Article - Database
 
Understanding DB2 Object Privileges, Part 3

In the final installment of this three-part series, learn about DB2's system, server, nickname, and variable privileges plus several more.

roger sandersWritten by Roger E. Sanders

Editor's note: This article is an excerpt from the book DB2 10.1 Fundamentals: Certification Study Guide

 

In DB2 for Linux, UNIX, and Windows and DB2 for z/OS, object privileges convey the right to perform certain actions against specific database objects. Part 1 of this series reviewed DB2's authorization ID, buffer pool, table space, storage group, schema, table, view, and index privileges. Part 2 of this series reviewed DB2's sequence, distinct type, function, procedure, routine, collection, package, and plan privileges. In this article, we conclude our discussion of DB2 object privileges by examining the remaining privileges available to control user interactions with DB2 objects.


Read More >>

Sponsor - The MC Press Bookstore
 

Don't miss out! This is the hands-on guide to IBM's strategic language for IBM i. Database Design and SQL for DB2 delivers everything you need to know about database design and SQL. Author Jim Cooper gives you all the tips and techniques you need in one convenient place, whether you’re a beginner or an advanced developer. Includes real-life examples to help you hone your skills. The bonus companion website explains embedded SQL and explores client-side technologies.


Read More >>

Feature Article - System Administration
 
DR Strategy Guide for IBM i

Don't wait for a disaster. Start planning today.

Written by Maxava

Editor's note: This article introduces the white paper DR Strategy Guide for IBM i available free from the MC White Paper Center.

 

Organizations cannot control whether or not they will be affected by a natural disaster, extended power outage or any other unplanned incident. However, they can ensure their business is prepared to respond to and recover from these events with minimal disruption or impact to their customers.

 

These types of events disrupt business operations, and they all have the potential to cripple a business if a supporting contingency plan is not in place. So what happens after the worst-case scenario becomes a very real disaster situation? Your business is in a crisis. Can you rely on past practices or processes? Common Disaster Recovery framework is a classic risk management mistake that will impact your organization in both reputation and bottom line. The industry is riddled with numerous failed efforts resulting from monolithic Disaster Recovery implementations.


Read More >>


Sponsor - The MC Press Bookstore
 

System i Disaster Recovery Planning addresses the special disaster recovery planning issues of IBM i. It is your step-by-step guide to developing an effective, workable plan to protect your company's assets should the unthinkable happen. This title is now available in eBook format.

Click for a FREE chapter! >>


Read More >>

MC White Paper Center
 

  NEW FEATURED WHITE PAPER

Checklists for Checklists on Checklists … Why Not Automate?

This is not about getting rid of IT checklists. The power of a good checklist is awesome – but how can we make sure the best procedures are continuously in place and always ready for action if a problem is encountered. The key is to automate manual routines and checklists.

This White Paper discusses the advantages of automating traditional manual, hands-on management tasks for the operation and maintenance of IT platforms, systems, applications, networks and architectures.

For many of these tasks, missing a step or running steps out of sequence can be disastrous to IT services and the business.

Discover the five benefits of automation and how to cement in place a high quality set of actions, according to a proven plan.

 

Don't miss these great offerings in the MC Press White Paper Center:

Latest White Papers:

Checklists for Checklists on Checklists … Why Not Automate?

2014 State of IBM i Security Study

Automate IBM i Operations using Wireless Devices

10 Facts You Need To Know About Laser Check Printing On Your IBM i

DR Strategy Guide from Maxava

Virus Got You Down?

PCI and What it means to IBM i

Data Access in a Big Data World

Top Security Issues for the Integrated File System (IFS)

How to Effectively Manage and Monitor Your Business Applications

The Promise of A/P Automation

The Essential Guide to IBM i Database Modernization

The State of IBM i Security 2013

Storing Metadata the Profound UI Way

Secure Inside and Out: Maximizing Intrusion Detection on IBM i

Solving the Little Things with Automation for IBM Power Systems

Managing Privileged Users on IBM i

5 Ways to Control Access using Application Administration

Analyzing IBM i Performance Metrics

3 Essential Steps to Successful Performance Management


Plus Choose From This Amazing Selection, Too

Lights Out IBM i Automation

10 Top Job Scheduling Challenges for your IBM i and How to Solve Them

101 things you can Automate on your IBM i & 10 Tips for Peace of Mind

3 Essential Steps to Successful Performance Management

5 Shortcuts to Sensible Operational Security

5 Ways to Control Access using Application Administration

6 Recommendations for Smarter Spooled File Processing on Your IBM i

A FREE HA/DR Jargon Buster

Analyzing IBM i Performance Metrics

Assess the Appropriateness of the iSeries/IBM i in My Business

Baker College Makes IBM i Apps More Cool, Less Old-School, With Profound UI

Best Practices: The Fundamentals of Document Automation

Beyond FTP: Securing and Managing File Transfers

Bringing Mashups to Your Enterprise Business Applications

Building a Sound Investment Strategy Through Technology

Business Intelligence for the IBM i Customer

Case Study: Streamline Purchase-to-Pay using Document Management

Cloud Computing

Compliance without the Complexities

Critical Elements for Business ContinuityDMZ Gateways: Secret Weapons for Data Security

Defending Against Data Breach: Developing the Right Strategy for Data Encryption

DMZ Gateways: Secret Weapons for Data Security

Getting the most from your SAP production reports

Getting the Most out of Your Audit Journal - Handouts

Goodbye Paper, Hello Freedom: Paperless Accounts Payable

Goodbye Paper, Hello Freedom: The Complete Guide to Going Paperless

How to Effectively Manage and Monitor Your Business Applications

IBM i Scheduling Survival Guide

IBM i Trends and the IBM i Cloud

Keeping your System i Applications Relevant in a Service-Oriented World

Laws and Regulations and Standards… Oh my!

Make “Paperwork” Smarter

Managing Data and Healthcare Regulations Efficiently

Managing Privileged Users on IBM i

Modern Monitoring Methods for Power Systems

Oh no! Another Audit!

PCI Compliance for Power Systems Running IBM i

PCI DSS Compliance with Managed File Transfer

Pillars Of Data Protection

Protecting your Data – How Much Security is Enough?

Revolutionizing System i Application Modernization

Secure Inside and Out: Maximizing Intrusion Detection on IBM i

SOA What? Why SOA is Critical for iSeries RPG Shops

Solving the Little Things with Automation for IBM Power Systems

Storing Metadata the Profound UI Way

Supply Chain Synchronization: Recession-proof Strategies for Improving Efficiencies

System Modernization Survival Guide

The Eight Pillars of an Enterprise Application Architecture

The Hidden Cost of Compliance

Top Security Issues for the Integrated File System (IFS)

Using Microsoft .NET to Build Scalable Enterprise IBM i Applications

Using Software for Compliance…

Ways to Use IBM i Audit Journal

What Authorities Do Programmers Really Need?

Why Companies Fail PCI Audits - Handouts

 

*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.

The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card.  Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security,  and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!

Have a White Paper you would like to list? click here or call (208) 629-7275 for information.

 


Read More >>

In the News

Read More >>
The Latest from IBM

Read More >>
Support MC Press - Visit Our Sponsors

Forums Sponsor

POPULAR FORUMS

Forums

Search Sponsor

POPULAR SEARCHES

Search


Read More >>
MC Video Portal

MC Video Portal

Best Practices for IBM i Security Administration

In this Webinar, based on her just-released e-book on Security Administration, Carol Woodbury, the authority in IBM i Security, discusses the tasks every IBM i Security Administrator should perform.  From system values to managing user profiles, administering authorities and handling IFS security issues, Carol provides guidance for automating tasks as well as tips for simplifying them.


Read More >>
MC Industry Blogs

Read and Share the latest from the IBM i Security Blog

brought to you by PowerTech

Possible hackability of Boeing 777 illustrates vulnerability of integrated systems

Posted in News, Security on June 6th, 2014 by Robin – Be the first to comment

 

The March 2014 disappearance of Malaysian Airlines Flight 370 has renewed old concerns about the security of aircraft with embedded systems, such as the Boeing 777. While the exact causes of the plane’s demise have not been determined yet, security experts have taken the opportunity to point out that cyberattacks could exploit the features of advanced airliners and lead to similar incidents in the future.

 


Read More >>
   MC-STORE.COM