MAGAZINES

MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

April 13, 2015 | Volume 10 Issue 7

ISSUE HIGHLIGHTS

TOP STORY: Two-Factor Authentication and the IBM i: A Beautiful Marriage
FEATURED ARTICLE: Robot in Modern IBM i Environments
NEWS HIGHLIGHT: IBM i Expert Tom Huntington to Speak at JDE COLLABORATE
WHITE PAPER: Business Intelligence for the IBM i Customer
EVENT: Applications to Go: Mobile Technologies on IBM i
MC VIDEO PORTAL: Introduction to Configuring iAccess Servers to use SSL

Sponsor - The MC Press Bookstore
 

Don’t leave your IBM mainframe security to chance!

Get your copy of IBM Mainframe Security: Beyond the Basics today. You’ll learn senior-level skills for mainframe security from IBM mainframe expert Dinesh D. Dattani. With more than 30 years of experience, Dattani shares his advice on important security issues from a practical, real-life perspective. The tutorial format includes quizzes and pointers to help you assess the current security in your organization. 


Read More >>

Feature Article - Security
 
Two-Factor Authentication and the IBM i: A Beautiful Marriage

What problem does Two-Factor Authentication (2FA) solve?

patrick townsendWritten by Patrick Townsend

The data breach at Target started in a typical way. The attackers planted malware on a user's PC via a phishing attack, captured a password, and used that password as the entry point to work their way into the Target corporate network. In this case, the stolen user credential was at a service provider to Target, not one of Target's own users. But that's immaterial. The attack method was very typical: steal a user credential to log into a system, and enter into the critical systems from there. You don't have to actually start by stealing the credentials to the most sensitive system. You can start at the periphery and work your way in.


Read More >>

Sponsor - The MC Press Bookstore
 

With Mastering IBM i, you’ll learn everything you need to work with IBM i systems, including traditional concepts and tools, as well as the latest methods such as SQL. Well-suited for new or veteran IBM i programmers, Mastering IBM i takes a hands-on, experience-based approach to learning. Key terms, review questions and step-by-step labs for each chapter make this book perfect for classroom use or individual study. Order today and get this great resource at a great low price!


Read More >>

Feature Article - System Administration
 
Robot in Modern IBM i Environments

Learn how Robot can be deployed to maximize business objectives.

Written by HelpSystems

Editor's note: This article introduces the white paper Robot in Modern IBM i Environments, which is available free from the MC White Paper Center.

 

Back in the day of AS/400, when a server was a server and a disk was a disk, things were easier to understand.

 

Today’s modern IBM i environments are increasingly virtualized, mirrored, switched, clustered, externalized, and partitioned. This makes them more capable of reacting to ever-changing business cycles, but arguably harder to understand.


Read More >>

Sponsor - The MC Press Bookstore
 

Prove your DB2 DBA knowledge! This new study guide for IBM Certification Exams 611 and 311 is designed to help you master all aspects of IBM DB2 database administration and prepare you to become a Certified Database Administrator. Brush up on all the areas covered on the test: DB2 server management, physical design, business rules implementation, activity monitoring, utilities, high availability, security, and connectivity and networking. Includes 400+ practice questions and answers! No other resource gives you this much help preparing for IBM’s DB2 DBA exam.


Read More >>

MC White Paper Center
 

Don't miss these great Featured White Papers:

 

Getting Started with IBM i Security

The IBM i platform is known for its robust security capabilities. And it’s this reputation that often keeps staff from giving IBM i the same attention as other platforms. But as new staff rotate in, IBM i expertise rotates out. Eventually organizations find themselves with maintenance gaps and dangerous security holes on a system once considered bulletproof. Even worse—no one has the knowledge to patch them up! From beginner basics to advanced tactics, this white paper provides the background and instruction you need to restore your IBM i security back to its former glory.

Element BreakMobile Computing and the IBM i

Mobile computing is rapidly maturing into a solid platform for delivering enterprise applications. Many IBM i shops today are realizing that integrating their IBM i with mobile applications is the fast path to improved business workflows, better customer relations, and more responsive business reporting. The ROI that mobile applications can produce for your business is substantial. This ASNA whitepaper takes a look at mobile computing for the IBM i. It discusses the different ways mobile applications may be used within the enterprise and how ASNA products solve the challenges mobile presents. It also presents the case that you already have the mobile programming team your projects need: that team is your existing RPG development team!

Element BreakBusiness Intelligence for the IBM i Customer

Are you on information overload from the barrage of announcements and ads for BI solutions, including IBM’s new DB2 Web Query V2.1? End the confusion and get informed. This White Paper guides you in evaluating which solution may be the best fit for your company, users, budget, environment and more. It also examines:

  • IBM’s analytics and services strategy
  • the repackaged DB2 Web QueryV2.1
  • IBM’s Cognos solution
  • other BI software in the market

The White Paper offers a comparison of these products with NGS-IQ, NGS’ scalable, proven BI suite of products used by thousands of i customers of all sizes in virtually every industry.

It concludes with a section designed to help IBM i and DB2 supporters explain the strengths of the environment to critics and the uninformed.

Element BreakRobot in Modern IBM i Environments

As hardware and software technologies evolve, so too does the complexity of the data center.

IBM i often serves as the backbone for business-critical applications, including ERP packages, leaving other servers to run email, print serving, and the website—but users and other computing technologies still draw data from the transactional database on IBM i.

Robot systems management solutions have been helping customers manage IBM i operations for over 30 years. This white paper is intended primarily for IT management and attempts to explain, in plain English, the components of modern IBM i environments and how Robot can be deployed to maximize business objectives.

Download this white paper to learn about:

  • IBM i virtualization technologies like SAN, LPM, and VIOS
  • IBM i high availability and disaster recovery technologies like PowerHA and VTL
  • Robot automation solutions for enhancing the ROI of IBM i

Element BreakWhat Authorities Do Programmers Really Need?

Left to their own preferences, many programmers will ask to be given all possible authorities on the system. That’s because most – not all – but most programmers are focused on getting their work done and would prefer not to be concerned with security. However, many organizations have policies or have to comply with laws or regulations that limit the authorities that programmers can have – especially to production systems. This white paper describes the authorities that programmers typically need along with techniques for determining the exact authorities your programmers need to continue to perform their job functions without having an all-powerful profile.

Element Break

 

Plus Choose From The Full Selection in the MC Press White Paper Center

 

*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.

The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card.  Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security,  and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!

Have a White Paper you would like to list? click here or call (208) 629-7275 Ext.504 for information.


Read More >>

In the News

Vendors:  Have a press release to share?  Send it to MC Press.


Read More >>
The Latest from IBM

Read More >>
Support MC Press - Visit Our Sponsors

Forums Sponsor

POPULAR FORUMS

Forums

Search Sponsor

POPULAR SEARCHES

Search


Read More >>
MC Video Portal

MC Video Portal

Introduction to Configuring iAccess Servers to use SSL

Due to popular demand, Carol has updated her presentation on configuring iAccess to use SSL sessions to include, not just the step-by-step configuration guidance but also a discussion on the benefits and challenges of using certificates from a well-known CA (Certificate Authority) vs a self-signed certificate as well as practical tips for enterprise implementation.


Read More >>
   MC-STORE.COM