MAGAZINES

MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

October 27, 2014 | Volume 9 Issue 19

ISSUE HIGHLIGHTS

TOP STORY: The Frustrating Challenges of Application Enhancement
FEATURED ARTICLE: DR Strategy Guide for IBM i: Recovery Strategy Requirements
NEWS HIGHLIGHT: Halcyon Software Announces New Security Product for Securing Exit Points
WHITE PAPER: Getting Maximum Value from your Software Maintenance Agreement
MC VIDEO PORTAL: Security Admin Tasks - Examining the audit journal
INDUSTRY BLOGS: Why Network Security 6.50?
EVENT: Reporting and Analytics for Manufacturers and Distributors

 

Sponsor - The MC Press Bookstore
 

An old dog can learn new tricks! Flexible Input, Dazzling Output with IBM i is full of clever ways to get data into your IBM i system, as well as new techniques to export and present this data in a modern, business-friendly manner. No more boring spreadsheets or ugly printouts! Your DB2 data will look great in program-generated spreadsheets and browser-based, interactive charts. Whether you’re an old dog or not, you’ll get the most out of your ILE RPG programs with the open source, free tools in this smart new release! Order your copy today!


Read More >>

Feature Article - Programming
 
The Frustrating Challenges of Application Enhancement

A famous editor once said, "You know how when you tighten a bolt on your engine the front bumper falls off?" That started me thinking of writing about how difficult it can be to modify an existing application. Oh, all right. It was her idea from the beginning. So what.

david shireyWritten by David Shirey

In the beginning, an application was written from scratch. And it was beautiful to behold. It did what it was supposed to do, and the logic flow was as clean and as clear as you could reasonably expect it to be. And it lived happily with a dozen unicorns, a handsome prince who liked watching romantic comedy movies, and a beautiful princess with long hair and a diaphanous gown.

 

But then, somebody decided that some changes needed to be made to it. So they modified the code to show the customer AR Tariff code. And suddenly, one of the unicorns disappeared and was replaced by a hippo.


Read More >>

Sponsor - The MC Press Bookstore
 

Take the next step with PHP! Expand your knowledge and understanding of this essential programming language with the latest book from PHP guru Kevin Schroeder: Advanced Guide to PHP on IBM i. Master important PHP topics such as debugging, test-driven development, web-based development, advanced object-oriented programming, and web security. You’ll also get an in-depth look at the new PHP Toolkit for IBM i provided by Zend Technologies. Don’t delay; get started today on building your understanding and skill level with this example-packed, accessible book. Order today! 


Read More >>

Feature Article - System Administration
 
DR Strategy Guide for IBM i: Recovery Strategy Requirements

Disaster Recovery (DR) strategies are many and varied.

Written by Maxava

Editor's note: This article introduces the white paper "DR Strategy Guide from Maxava" available free from the MC White Paper Center.

The components of your business impact analysis and mission-critical server rankings will be used as the basis for the development and implementation of a supporting recovery strategy.

Ensure the following information is absolutely clear:


Read More >>

Sponsor - The MC Press Bookstore
 

System i Disaster Recovery Planning addresses the special disaster recovery planning issues of IBM i. It is your step-by-step guide to developing an effective, workable plan to protect your company's assets should the unthinkable happen. This title is now available in eBook format.

Click for a FREE chapter! >>


Read More >>

MC Industry Blogs
 

Read and Share the latest from the IBM i Security Blog

brought to you by PowerTech

Why Network Security 6.50?

Posted on September 23, 2014 by Robin Tatum – Director of Security Technologies/PowerTech

 

Users neglected the security void created by TCP/IP services for years, but exit programs can provide the robust solution today's threat environment demands.


Read More >>

MC White Paper Center
 

  FEATURED WHITE PAPER

Getting Maximum Value from your Software Maintenance Agreement

Most IT Managers must question at one time or another ? what exactly they are getting for their money from a software maintenance agreement?
Beyond ‘corrective maintenance’ what should you expect from a software vendor in today’s world to ensure the software is constantly moving in a direction which benefits your business?
Lorraine Cousins, CEO of Halcyon Software, discusses why some companies see their maintenance agreement as a way of getting new features with tangible business benefits while others regard it as insurance to protect against the risk of software malfunction.
Discover how to benchmark current and future software vendors to make sure your organization is getting the maximum value from your software maintenance agreement.

 

Download the white paper

 

Don't miss these great offerings in the MC Press White Paper Center:

Latest White Papers:

Transform Your Data into Insight

Environmental Hazards to Peak Performance

Getting Maximum Value from your Software Maintenance Agreement

Checklists for Checklists on Checklists … Why Not Automate?

2014 State of IBM i Security Study

Automate IBM i Operations using Wireless Devices

10 Facts You Need To Know About Laser Check Printing On Your IBM i

DR Strategy Guide from Maxava

Virus Got You Down?

PCI and What it means to IBM i

Data Access in a Big Data World

Top Security Issues for the Integrated File System (IFS)

How to Effectively Manage and Monitor Your Business Applications

The Promise of A/P Automation

The Essential Guide to IBM i Database Modernization

The State of IBM i Security 2013

Storing Metadata the Profound UI Way

Secure Inside and Out: Maximizing Intrusion Detection on IBM i

Solving the Little Things with Automation for IBM Power Systems

Managing Privileged Users on IBM i

5 Ways to Control Access using Application Administration

Analyzing IBM i Performance Metrics

3 Essential Steps to Successful Performance Management


Plus Choose From This Amazing Selection, Too

Lights Out IBM i Automation

10 Top Job Scheduling Challenges for your IBM i and How to Solve Them

101 things you can Automate on your IBM i & 10 Tips for Peace of Mind

3 Essential Steps to Successful Performance Management

5 Shortcuts to Sensible Operational Security

5 Ways to Control Access using Application Administration

6 Recommendations for Smarter Spooled File Processing on Your IBM i

A FREE HA/DR Jargon Buster

Analyzing IBM i Performance Metrics

Assess the Appropriateness of the iSeries/IBM i in My Business

Baker College Makes IBM i Apps More Cool, Less Old-School, With Profound UI

Best Practices: The Fundamentals of Document Automation

Beyond FTP: Securing and Managing File Transfers

Bringing Mashups to Your Enterprise Business Applications

Building a Sound Investment Strategy Through Technology

Business Intelligence for the IBM i Customer

Case Study: Streamline Purchase-to-Pay using Document Management

Cloud Computing

Compliance without the Complexities

Critical Elements for Business ContinuityDMZ Gateways: Secret Weapons for Data Security

Defending Against Data Breach: Developing the Right Strategy for Data Encryption

DMZ Gateways: Secret Weapons for Data Security

Getting the most from your SAP production reports

Getting the Most out of Your Audit Journal - Handouts

Goodbye Paper, Hello Freedom: Paperless Accounts Payable

Goodbye Paper, Hello Freedom: The Complete Guide to Going Paperless

How to Effectively Manage and Monitor Your Business Applications

IBM i Scheduling Survival Guide

IBM i Trends and the IBM i Cloud

Keeping your System i Applications Relevant in a Service-Oriented World

Laws and Regulations and Standards… Oh my!

Make “Paperwork” Smarter

Managing Data and Healthcare Regulations Efficiently

Managing Privileged Users on IBM i

Modern Monitoring Methods for Power Systems

Oh no! Another Audit!

PCI Compliance for Power Systems Running IBM i

PCI DSS Compliance with Managed File Transfer

Pillars Of Data Protection

Protecting your Data – How Much Security is Enough?

Revolutionizing System i Application Modernization

Secure Inside and Out: Maximizing Intrusion Detection on IBM i

SOA What? Why SOA is Critical for iSeries RPG Shops

Solving the Little Things with Automation for IBM Power Systems

Storing Metadata the Profound UI Way

Supply Chain Synchronization: Recession-proof Strategies for Improving Efficiencies

System Modernization Survival Guide

The Eight Pillars of an Enterprise Application Architecture

The Hidden Cost of Compliance

Top Security Issues for the Integrated File System (IFS)

Using Microsoft .NET to Build Scalable Enterprise IBM i Applications

Using Software for Compliance…

Ways to Use IBM i Audit Journal

What Authorities Do Programmers Really Need?

Why Companies Fail PCI Audits - Handouts

 

*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.

The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card.  Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security,  and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!

Have a White Paper you would like to list? click here or call (208) 629-7275 for information.

 


Read More >>

In the News

Read More >>
The Latest from IBM

Read More >>
Support MC Press - Visit Our Sponsors

Forums Sponsor

POPULAR FORUMS

Forums

Search Sponsor

POPULAR SEARCHES

Search


Read More >>
MC Video Portal

MC Video Portal

Security Admin Tasks - Examining the audit journal

In this informative video:  Carol Woodbury, President of SkyView Partners, discusses the security administration requirement to view audit journal entries on a daily basis and how that can realistically be accomplished using SkyView's Audit Journal Reporter product.


Read More >>
   MC-STORE.COM