MAGAZINES

MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

January 26, 2015 | Volume 10 Issue 2

ISSUE HIGHLIGHTS

TOP STORY: Data Security in a Nebulous World
FEATURED ARTICLE: When Management Turns Its Back on Security: The Business Effects
NEWS HIGHLIGHT: IBM Reports 2014 Fourth-Quarter and Full-Year Results
WHITE PAPER: PCI and What it means to IBM i
EVENT: What’s New in QMessage Monitor?
MC VIDEO PORTAL: Using the Newer Clients for Accessing IBM i – Good for Security or Not

Sponsor - New Generation Software, Inc.
 

Graphical, Secure, Affordable Query, Reporting, and Analytics: You know your company’s crazy quilt of printouts, custom programs, file transfers, and manually updated spreadsheets isn’t a solution, but who’s going to help you gather requirements, win budget approval, get training, and support your users? Ask us. We help companies like yours achieve impressive results every day. Watch an On Demand Demo. Order a FREE Trial of NGS-IQ. Ask about our SDK offer. Call 800 824-1220. Visit www.ngsi.com.


Read More >>

Feature Article - Security
 
Data Security in a Nebulous World

What's safer? The cloud or your own IBM i?

paul keyesWritten by Paul Keyes

Nobody understands the cloud. That's a common joke amongst IT professionals. It's often spoken tongue in cheek about laymen consumers uploading selfies by the millions as they constantly sync their devices without a clue in the world about what's actually happening to their data. While the concept of cloud-based data may confuse most consumers, two groups of people actually do thoroughly understand how the cloud works: the IT professionals who build and maintain the droves of servers on which all of our data is stored, and the hackers who spend their every waking moment trying to break into them.


Read More >>

Sponsor - Profound Logic Software
 

Reach Your Modernization Goals with ARCAD and Profound Logic

February 25, 2015 | 8:30 PST/11:30 EST
Make 2015 the year of modernization in your company! It’s easy with tools from ARCAD Software and Profound Logic Software.

ARCAD and Profound Logic have partnered to provide the most comprehensive solutions for database, code and application modernization.

Attend their February 25 Webinar and learn how modernization will help you:

  • Reduce Costs
  • Minimize Risks
  • Future-Proof Technology
  • Improve User Satisfaction

Register for the Webinar now!


Read More >>

Feature Article - Security
 
When Management Turns Its Back on Security: The Business Effects

Something is preventing management from understanding the need to secure its electronic data.

Written by SkyView Partners

Editor's note: This article introduces the white paper "When Management Turns Its Back on Security: The Business Effects" available free at the MC White Paper Center.

 

One of the great mysteries as we walk into an IBM i shop is the lock on the computer room door. Often, when we first start consulting engagements, we are given a tour of the facility, and inevitably it includes a tour of the "raised floor" computer room, outfitted with expensive air-handling equipment and protected by a door that requires specific authorization to enter. The mystery is that, while all this expensive hardware needs physical protection, the company's most valuable assets are wide open to people who don't need access to them.


Read More >>

Sponsor - The MC Press Bookstore
 

Bookstore New Year's Sale

Take an EXTRA 15% OFF the Top 15 Bestsellers for 2014

Sale Ends at Midnight on January 31st

Click Here for Details


Read More >>

MC White Paper Center
 

Don't miss these great Featured White Papers:

Business Intelligence for the IBM i Customer

Are you on information overload from the barrage of announcements and ads for BI solutions, including IBM’s new DB2 Web Query V2.1? End the confusion and get informed. This White Paper guides you in evaluating which solution may be the best fit for your company, users, budget, environment and more. It also examines:

  • IBM’s analytics and services strategy
  • the repackaged DB2 Web QueryV2.1
  • IBM’s Cognos solution
  • other BI software in the market

The White Paper offers a comparison of these products with NGS-IQ, NGS’ scalable, proven BI suite of products used by thousands of i customers of all sizes in virtually every industry.

It concludes with a section designed to help IBM i and DB2 supporters explain the strengths of the environment to critics and the uninformed.

 

Element Break

Cloud Computing

Carol Woodbury discusses the security concerns of cloud computing and provides resources you can check into as you address the security issues of this new technology.

 

Element Break

PCI and What it means to IBM i

While one may think that PCI is a thing of the past and that it’s already been implemented, major breaches (most notably of the Target PoS systems) have brought it back into focus. Some retailers are just now understanding how PCI applies to them and other organizations have started to accept credit cards when they didn’t in the past. To refresh everyone’s memory, here’s an overview of what PCI means to the IBM i community and what organizations that use an IBM i to store, process or access cardholder data need to be aware of.

Element Break

Virus Got You Down?

Does a virus have your server down? Perhaps it’s the latest worm, Trojan horse, buffer overflow or denial of service attack that’s got you or one of your servers down. While one of these bugs may be affecting one or more of your servers in your enterprise, it is highly unlikely that the server affected is a Power server running IBM i. IBM i may be running your core business applications or it may be hosting your web site or running Domino. Whatever its function within your enterprise IBM i has remained unaffected by virus and malware attacks. Why is that? Viruses and other ailments spread by infecting a host that is vulnerable. Let’s take a look at how IBM i and the applications running on it can remain unscathed by the viruses and malware that are so prevalent today. In this white paper, Carol Woodbury of SkyView Partners defines each “ailment” and then describe the defenses and protection mechanisms provided by IBM i to ward off the attack.

Element Break

IBM i Scheduling Survival Guide

Survive the climb toward scheduling automation with this indispensable guide. Clear internal and external hurdles, and succeed in each phase of your rollout, from research to implementation.

Our New Must-Have Resource: IBM i Scheduling Survival Guide

Download it free.

Help/Systems has been helping customers automate their IBM i environments for over 30 years.

 

Element Break

Plus Choose From The Full Selection in the MC Press White Paper Center

 

*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.

The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card.  Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security,  and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!

Have a White Paper you would like to list? click here or call (208) 629-7275 Ext.504 for information.


Read More >>

In the News

Vendors:  Have a press release to share?  send it to MC Press


Read More >>
The Latest from IBM

Read More >>
Support MC Press - Visit Our Sponsors

Forums Sponsor

POPULAR FORUMS

Forums

Search Sponsor

POPULAR SEARCHES

Search


Read More >>
MC Video Portal

MC Video Portal

Using the Newer Clients for Accessing IBM i – Good for Security or Not

 

In this session, Carol is pleased to be joined by long-time friend Tim Rowe – Business Architect for Systems Management and Application Development - from IBM in Rochester, MN. Tim and Carol will be discussing the security ‘pros and cons’ of the newer strategic clients that are available for accessing IBM i – including mobile, IBM i Access Client Solutions and i Access for the Web as well as a discussion on recently discovered vulnerabilities and exploits that may – or may not - affect these clients.


Read More >>
   MC-STORE.COM