MAGAZINES

MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

March 23, 2015 | Volume 10 Issue 6

ISSUE HIGHLIGHTS

TOP STORY: The Tool That Makes Monitoring and Tuning Your IBM i Web Environment Easy
FEATURED ARTICLE: Getting Started with IBM i Security
NEWS HIGHLIGHT: IBM Intelligent Operations Center V1.6
WHITE PAPER: Business Intelligence for the IBM i Customer
EVENT: The Power of i
MC VIDEO PORTAL: Introduction to Configuring iAccess Servers to use SSL

Sponsor - The MC Press Bookstore
 

Calling all CDOs! Here’s a playbook for your newly created role! Every chief data officer needs this practical guide to help you manage your data governance program. Data governance guru Sunil Soares walks you through the CDO’s role and provides valuable industry insight into the CDO reporting relationship, scope and authority level, and alignment with the CIO role. You’ll explore data policies, standards, and processes and learn approaches to monitoring and enforcing compliance. Get your copy today!


Read More >>

Feature Article - System Adminlistration
 
The Tool That Makes Monitoring and Tuning Your IBM i Web Environment Easy

One of the trickiest metrics for any IBM i partition is performance of web workloads. Luckily, there's an app for that.

steve pitcherWritten by Steve Pitcher

Over the last few years, IBM has been pumping more and more features into IBM Navigator for i, the strategic systems management utility for IBM i. Performance analysis is one area that has been given extensive focus with Performance Data Investigator. You might launch a web service but not know how to analyze performance, let alone know where to tune it. Hidden away in the IBM Web Administration utility since V5R3 is a great little tool called Web Performance Advisor.

 

 


Read More >>

Sponsor - The MC Press Bookstore
 

Have you heard? RPG is now fully free-format! This latest edition from RPG expert Jim Martin is your one-stop resource for free-format information. It’s a must-read for all RPG programmers, featuring completely updated code. See the new H, F, D and P specs in action in this easy-to-use reference guide. You’ll learn rules and syntax but also grasp how this modern style of coding can improve your overall productivity--from initial development through maintenance. Get your copy today!


Read More >>

Feature Article - Security
 
Getting Started with IBM i Security

It's a growing concern.

Written by PowerTech Group, Inc.

Editor's note: This article introduces the white paper "Getting Started with IBM i Security" available free at the MC White Paper Center.

 

Data security, while always a business concern, rose to critical prominence after 2012. The year was a record-breaker in both size and scope of breaches; there were massive distributed-denial-of-service (DDoS) attacks against financial institutions, not to mention the shocking incident at the South Carolina Internal Revenue Service, a breach that spanned several months and resulted in 44 systems being compromised.


Read More >>

Sponsor - The MC Press Bookstore
 

In this new release of Data Governance Tools, subject matter expert Sunil Soares walks you through all of the available software tools and shows you how to evaluate them for your program. Soares explains why your organization should consider tools to be a critical component of your data governance program, clarifies how these tools integrate with big data technologies, and shows you how the various software vendors stack up. Pre-order this latest release today!


Read More >>

MC White Paper Center
 

Don't miss these great Featured White Papers:

 

Getting Started with IBM i Security

The IBM i platform is known for its robust security capabilities. And it’s this reputation that often keeps staff from giving IBM i the same attention as other platforms. But as new staff rotate in, IBM i expertise rotates out. Eventually organizations find themselves with maintenance gaps and dangerous security holes on a system once considered bulletproof. Even worse—no one has the knowledge to patch them up! From beginner basics to advanced tactics, this white paper provides the background and instruction you need to restore your IBM i security back to its former glory.

Element Break

Mobile Computing and the IBM i

Mobile computing is rapidly maturing into a solid platform for delivering enterprise applications. Many IBM i shops today are realizing that integrating their IBM i with mobile applications is the fast path to improved business workflows, better customer relations, and more responsive business reporting. The ROI that mobile applications can produce for your business is substantial. This ASNA whitepaper takes a look at mobile computing for the IBM i. It discusses the different ways mobile applications may be used within the enterprise and how ASNA products solve the challenges mobile presents. It also presents the case that you already have the mobile programming team your projects need: that team is your existing RPG development team!

Element BreakBusiness Intelligence for the IBM i Customer

Are you on information overload from the barrage of announcements and ads for BI solutions, including IBM’s new DB2 Web Query V2.1? End the confusion and get informed. This White Paper guides you in evaluating which solution may be the best fit for your company, users, budget, environment and more. It also examines:

  • IBM’s analytics and services strategy
  • the repackaged DB2 Web QueryV2.1
  • IBM’s Cognos solution
  • other BI software in the market

The White Paper offers a comparison of these products with NGS-IQ, NGS’ scalable, proven BI suite of products used by thousands of i customers of all sizes in virtually every industry.

It concludes with a section designed to help IBM i and DB2 supporters explain the strengths of the environment to critics and the uninformed.

Element BreakData Access in a Big Data World

With big data comes big responsibility, but it doesn't have to stress you out, especially when it comes to accessing partitioned files. You can learn how to adapt to the trends and take control of your partitioned data without losing the ability to query multiple files at once. Download the free Big Data Access Pack today!
Download Your Free Copy.

Element BreakWhat Authorities Do Programmers Really Need?

 

Left to their own preferences, many programmers will ask to be given all possible authorities on the system. That’s because most – not all – but most programmers are focused on getting their work done and would prefer not to be concerned with security. However, many organizations have policies or have to comply with laws or regulations that limit the authorities that programmers can have – especially to production systems. This white paper describes the authorities that programmers typically need along with techniques for determining the exact authorities your programmers need to continue to perform their job functions without having an all-powerful profile.

Element Break

 

Plus Choose From The Full Selection in the MC Press White Paper Center

 

*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.

The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card.  Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security,  and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!

Have a White Paper you would like to list? click here or call (208) 629-7275 Ext.504 for information.


Read More >>

In the News

Vendors:  Have a press release to share?  Send it to MC Press.


Read More >>
The Latest from IBM

Read More >>
Support MC Press - Visit Our Sponsors

Forums Sponsor

POPULAR FORUMS

Forums

Search Sponsor

POPULAR SEARCHES

Search


Read More >>
MC Video Portal

MC Video Portal

Introduction to Configuring iAccess Servers to use SSL

 

Due to popular demand, Carol has updated her presentation on configuring iAccess to use SSL sessions to include, not just the step-by-step configuration guidance but also a discussion on the benefits and challenges of using certificates from a well-known CA (Certificate Authority) vs a self-signed certificate as well as practical tips for enterprise implementation.


Read More >>
   MC-STORE.COM