MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

July 14, 2014 | Volume 9 Issue 12


TOP STORY: Before Moving to the Cloud, Get Your Rain Gear On
FEATURED ARTICLE: Checklists for Checklists on Checklists: Why Not Automate?
NEWS HIGHLIGHT: IBM Announces $3B Research Project to Tackle Chip Grand Challenges for Cloud and Big Data Systems
WHITE PAPER: 2014 State of IBM i Security Study
MC VIDEO PORTAL:  Best Practices for IBM i Security Administration 
MC INDUSTRY BLOGS:  Possible hackability of Boeing 777 illustrates vulnerability of integrated systems
EVENT: 5 Ways to Secure Your IBM i Today from Cyber Attacks

Sponsor - The MC Press Bookstore

The Essential Guide to Security. In this practical and highly readable guide--an update to her acclaimed IBM i & i5/OS Security & Compliance: A Practical Guide--security expert Carol Woodbury explains IBM i security and the way it functions within IBM i systems. Whether you’re new to IBM i or a seasoned veteran, this book contains the critical information and explanations you need to successfully maintain a secure system. Get your copy today. >>


Feature Article - Security
Before Moving to the Cloud, Get Your Rain Gear On

The key to success is planning.

carol woodburyWritten by Carol Woodbury

Since I live in Seattle, it's only fitting that I discuss the preparations you need to make prior to moving to the cloud. One requirement for living in Seattle is to be prepared for changing weather. It may be bright and sunny, and an hour later be overcast and raining. Native Seattleites know to carry an extra fleece and Gore-Tex rain jacketin other words, we're prepared. In terms of moving part of your business to the cloud, you must also be prepared. This article discusses preparations you need to make prior to moving to the cloud.


Sponsor - The MC Press Bookstore

Don’t leave your IBM mainframe security to chance!

Get your copy of IBM Mainframe Security: Beyond the Basics today. You’ll learn senior-level skills for mainframe security from IBM mainframe expert Dinesh D. Dattani. With more than 30 years of experience, Dattani shares his advice on important security issues from a practical, real-life perspective. The tutorial format includes quizzes and pointers to help you assess the current security in your organization. 


Feature Article - System Administration
Checklists for Checklists on Checklists: Why Not Automate?

Today, we need automation more than ever before.

Sponsored by Halcyon Software

Editor's note: This article introduces the white paper "Checklists for Checklists on Checklists" available for download free from the MC White Paper Center.


The goal of computers taking care of themselves has been with us since commercial systems became available. Today, new needs are driving a continuing push to automation.


This is an old topic given new impetus in the always-changing world of IT. Applications become integrated; organizations become interconnected; and clients, customers, partners, and employees want to be online 24 hours a day and have little tolerance for downtime or delays.


Sponsor - The MC Press Bookstore

Take the next step with PHP! Expand your knowledge and understanding of this essential programming language with the latest book from PHP guru Kevin Schroeder: Advanced Guide to PHP on IBM i. Master important PHP topics such as debugging, test-driven development, web-based development, advanced object-oriented programming, and web security. You’ll also get an in-depth look at the new PHP Toolkit for IBM i provided by Zend Technologies. Don’t delay; get started today on building your understanding and skill level with this example-packed, accessible book. Order today! 


In the News

Support MC Press - Visit Our Sponsors

Forums Sponsor



Search Sponsor



MC Video Portal

MC Video Portal


Best Practices for IBM i Security Administration

In this Webinar, based on her just-released e-book on Security Administration, Carol Woodbury, the authority in IBM i Security, discusses the tasks every IBM i Security Administrator should perform.  From system values to managing user profiles, administering authorities and handling IFS security issues, Carol provides guidance for automating tasks as well as tips for simplifying them.

MC Industry Blogs

Read and Share the latest from the IBM i Security Blog

brought to you by PowerTech

Possible hackability of Boeing 777 illustrates vulnerability of integrated systems

Posted in News, Security on June 6th, 2014 by Robin – Be the first to comment


The March 2014 disappearance of Malaysian Airlines Flight 370 has renewed old concerns about the security of aircraft with embedded systems, such as the Boeing 777. While the exact causes of the plane’s demise have not been determined yet, security experts have taken the opportunity to point out that cyberattacks could exploit the features of advanced airliners and lead to similar incidents in the future.