In SQL for eServer i5 and iSeries you will learn about Structured Query Language (SQL), but with an IBM eServer i5/iSeries twist. With a practical "how-to" style, the book first introduces you to the basics essential for any developer to build a solid foundation. Then, the book examines--in detail--the many ways in which SQL functions on the iSeries. Make your database access cutting-edge with SQL for eServer i5 and iSeries. Now available in eBook format. >>
With advances in technology, the operational benefits and laws have paved the way to support a more efficient process.
Written by Dan Forster
Increasingly, companies are discovering the countless benefits of a paperless office, and with the automation of documents comes significant savings. Achieving a truly paperless environment includes instituting solutions for the document workflow process from beginning to end. One of those components, which is often missed or not included, is that of capturing a signature.
This new white paper by Ash Giddings, IBM i industry expert, discusses how not to fall into the trap of ignoring or sometimes deleting large volumes of spooled files. These unassuming files can contain important nuggets of information and data that may be critical to business operations.
Give your users what they need to be successful in their work -- using RPG! Solutions such as Excel spreadsheets, Adobe PDF files, and email are requirements for today’s users, and today’s RPG is more than capable of fulfilling these needs. This book gives you the know-how to break through the obstacles and use common development tools to share information and provide more-compatible interfaces. Learn how to migrate your existing greenbar reports to Excel spreadsheets and PDFs, and discover how to automatically email reports using RPG and JavaMail with this hands-on guide! Buy your hard copy or e-book today!
Download your free copy of our DR Strategy Guide for IBM i before it’s too late. Learn more about the evolution of disaster recovery, how disasters of various types can impact business and the strategies you can employ to minimize the risk of impact to your business by downloading our latest e-book today. Your free copy of the DR Strategy Guide for IBM i will help uncover the secrets to ensuring your IBM i and your business is able to weather any storm – be it caused by human interruption or natural disaster.
How to best implement a disaster recovery strategy
The importance of testing your Disaster Recovery Plan and keeping it up to date
How to perform scheduled back-ups without bringing down your business
The benefits of the Cloud and how it can work for you
This whitepaper is a must read for anyone that is considering moving to Laser Check printing or anyone that has considered moving to laser check printing in the past and thought it was too expensive or too much trouble. Included in this white paper:
A supply List What to look for in laser check software
6 Steps to Getting Bank Approval of your checks
10 myths about laser check printing, find out if they are fact or fiction
Laser check printing is secure and easier to maintain than traditional pre-printed check printing. With a few quick steps, set-up is simple. You do not need to purchase any special equipment and it is very easy to maintain. Laser check printing can save thousands, potentially hundreds of thousands of dollars in supplies and labor, depending on the size of your company. Let this Free whitepaper by DRV Tech answer your questions about laser check printing on the IBM i.
While one may think that PCI is a thing of the past and that it’s already been implemented, major breaches (most notably of the Target PoS systems) have brought it back into focus. Some retailers are just now understanding how PCI applies to them and other organizations have started to accept credit cards when they didn’t in the past. To refresh everyone’s memory, here’s an overview of what PCI means to the IBM i community and what organizations that use an IBM i to store, process or access cardholder data need to be aware of.
Does a virus have your server down? Perhaps it’s the latest worm, Trojan horse, buffer overflow or denial of service attack that’s got you or one of your servers down. While one of these bugs may be affecting one or more of your servers in your enterprise, it is highly unlikely that the server affected is a Power server running IBM i. IBM i may be running your core business applications or it may be hosting your web site or running Domino. Whatever its function within your enterprise IBM i has remained unaffected by virus and malware attacks. Why is that? Viruses and other ailments spread by infecting a host that is vulnerable. Let’s take a look at how IBM i and the applications running on it can remain unscathed by the viruses and malware that are so prevalent today. In this white paper, Carol Woodbury of SkyView Partners defines each “ailment” and then describe the defenses and protection mechanisms provided by IBM i to ward off the attack.
Implementing proactive system monitoring in your IBM i environment begins with planning. The effectiveness of automated monitoring solutions should be evaluated based on the degree of visibility they can offer to potential problems, the time they save, and the flexibility they offer in meeting the specific views and requirements of your existing and developing network. Your proactive monitoring solution should be able to anticipate repeat issues based on your system demands, applications, throughput, and configuration, as well as provide fast access to information that will pinpoint the cause of unforeseen issues and those that are otherwise difficult to isolate. For system administrators and managers who are looking for a practical guide to help maximize a new or existing proactive approach to system and message monitoring. Download this white paper to learn:
Information on must-have monitors
Shortcuts to greater efficiency
Checklists of requirements for a customized roadmap
*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.
The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card. Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security, and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!
Have a White Paper you would like to list? click here or call (208) 629-7275 Ext.504 for information.
The 12 Sections of PCI DSS and How each Relates to the IBM i Community
In this session, Carol Woodbury draws on her experience consulting with SkyView Partners' clients and helping them with their PCI DSS implementation and compliance requirements. Carol explains each of the 12 sections of the Payment Card Industry's Data Security Standards (PCI DSS) and describes specifically how each relates to the IBM i community.