MAGAZINES

MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

December 5, 2016 | Volume 11 Issue 20

ISSUE HIGHLIGHTS

LEAD ARTICLE: Murphy’s Security Law
ADVERTORIAL: Maxava's Enterprise+ "Saves the Ship" for Averitt Express
NEWS HIGHLIGHT: Townsend Security Announces Major Update to Alliance LogAgent for IBM i
ON-DEMAND WEBCAST: Find Out Why You Should Keep Data on IBM i
EVENT: 4 Ways to Merge IBM i Data with Microsoft Excel

Sponsor - Computer Keyes
 

Computer Keyes New! Mobile Access to IFS

kLink is a mobile application server running on your IBM i providing user initiated secure document retrieval from your IFS to mobile devices. This allows your users to login and view documents that you make available to them. kLink has built in security to prevent hacking and to quickly deliver private content only to the appropriate authorized end user. Safe and efficient distribution of public and private content to any browser or mobile device.

Free Live Trial www.computerkeyes.com or call 800 356 0203


Read More >>

Feature Article - Analysis
 
Murphy’s Security Law

Holes are everywhere. Address them before someone addresses you.

steve pitcherWritten by Steve Pitcher

A couple articles ago, I talked about the need for modernizing encryption on our IBM i partitions. Shutting one door can shut others, and shutting other doors may give you a false sense of security when you have a few windows open. You can drive yourself batty looking for these holes, but every now and then a hole finds you.


Read More >>

Sponsor - The MC Press Bookstore
 

MC Press Year-End Blowout

The time is NOW to get the top books for tech professionals at our lowest prices ever!

Pay only $35 each for our newest titles! You save a whopping 40% to 70% off the regular price.

9 of our best titles for just $25 each!  Perfect gifts for your favorite Power Systems pro! Treat yourself or a colleague!

10 titles 70-85% Off. Get your copies today!  Pay just $15 each for popular books on RPG, PHP, Java, Project Management, DB2, and more. Don’t wait – at these prices, books will sell out soon!

19 books for $10 each  Buy them ALL for less than $200. Select every one or just a few before they're gone!

Give the Gift of Knowledge: Over 50 titles for $5 each!  RPG, IBM i, Security, PHP, Programming, DB2, Analytics, and more. Shop now—at these prices, books are going fast!


Read More >>

Advertorial - Maxava
 
Maxava's Enterprise+ "Saves the Ship" for Averitt Express

An international shipping company has plenty of trouble if it can’t get its Electronic Data Interchange (EDI) system to replicate accurately under its high availability (HA) system.

john gristWritten by John Ghrist

This was the scenario faced in October 2015 by Averitt Express, a provider of freight transportation and supply chain management services based in Cookeville, Tennessee. Averitt offers customized shipping solutions, serves customers in more than 100 countries, and services more than 300 international destinations. Averitt also provides its customers a full suite of web-based shipping tools, EDI services, and transportation and operations management systems. Among other online services Averitt offers its customers are such conveniences as a Bill of Lading creation utility, a transit-time calculator, less-than-truckload service maps based on ZIP code, and downloadable certificates, permits, customs forms, and other documents on demand.


Read More >>

MC Webcast Center
 

Choose one or more of these downloads in our MC Webcast Center

Element Break

 JUST ADDED

IBM i Resources Retiring?

Let’s face it: IBM i experts and RPG programmers are retiring from the workforce. These folks have been managing all areas of your business—often manually and behind the scenes—for decades, everything from IT operations to data and documents to cybersecurity.
Are you prepared to handle their departure?
During this 30-mintue recorded webinar, our panel of IBM i experts—Chuck Losinski, Robin Tatam, Richard Schoen, and Tom Huntington—will outline strategies that allow your company to cope with IBM i skills depletion by adopting these strategies that allow you to get the job done without deep expertise on the OS:

  • Automate IBM i processes
  • Use managed services to help fill the gaps
  • Secure the system against data loss and viruses

IBM i skills depletion is a top concern for IBM i shops around the world. The strategies you discover in this webinar will help you ensure that your system of record—your IBM i—continues to deliver a powerful business advantage, even as staff retires.

 

Element Break

 JUST ADDED

Find Out Why You Should Keep Data on IBM i

It’s simple. IBM i is the most reliable, securable, and powerful platform to house your critical business data.
IBM i was built for business and has added features and functionality over the years to keep up with modern business needs. You can trust it to run your business, access your data in real-time, and keep your data secure. Plus, IBM i can scale to your business and handle all of your critical data. Can your other platforms do that?
We didn’t think so.
Watch this 30-minute webinar to learn why you should keep your data on IBM i, including:

  • IBM i is reliable
  • IBM i offers fast and secure real-time data access
  • IBM i helps your business prepare for tomorrow

Plus, we demonstrate how Sequel Data Access helps you modernize IBM i data access and meet your business needs.

 

Element Break

Implementing Multiple Layers of Defense

Your IBM i holds a massive amount of data. In most organizations, that data constitutes a mission-critical and high-value asset.

How do you adequately protect the data residing on your IBM i, given its value to your organization? IBM has provided us with many options for protecting our data, but it’s now always clear how to select and implement the best options for your circumstances.

This recorded webinar describes IBM i’s different data security options, along with implementation recommendations and tips for getting started. Carol Woodbury, one of the world’s top IBM i security experts, also provides considerations to help you determine how many layers of security are right for your organization.

Element Break

7 Habits of Highly Secure Organizations

Everyone knows that cybersecurity is important, but getting started on the road to data protection and compliance can be confusing and intimidating. Understanding common vulnerabilities helps you focus your attention and resources on the areas that need the most help.

We all want “best-practice” security, but what are top organizations doing to achieve and maintain it?

Watch this webinar to learn the details about how to develop the seven habits that are part of daily life for secure organizations. You’ll learn how to:

  • Break the Ostrich Syndrome
  • Develop a Security Policy
  • Assess Current Standing
  • Perform Security Event Logging and Review
  • Use “Best of Breed” Technologies
  • Monitor for Ongoing Compliance
  • Plan for the Future

This on-demand webinar examines what each of these habits means to IBM i, and helps you make sure that you don’t become the next security statistic.

Element Break

Multi-Platform Application Monitoring

 

Make Application Monitoring Easy Across the IBM i, Windows, AIX, and Linux Platforms in Your Environment

IT departments are constantly bombarded by information from a wide variety of operating systems, business applications, and critical processes. At the same time, the department must support a complex array of servers and devices running across their entire network.
With limited resources and the need to keep costs in check, more and more is expected of operational staff to handle this information efficiently.

In this 45-minute recorded webinar, we’ll dissect complex systems monitoring by introducing best practices and smart techniques that will help you:

  • Ensure vital business applications run smoothly and without disruption
  • Respond swiftly and with appropriate actions
  • Confirm that essential data is received at the right time
  • Prove service levels are maintained
  • Keep contingency and high availability strategies fully operational

 Element Break

 

Don't miss the full collection of On-Demand Assets available in the MC Webcast Center


Read More >>

In the News

Vendors:  Have a press release to share?  Send it to MC Press.


Read More >>
The Latest from IBM

Read More >>
Support MC Press - Visit Our Sponsors

Forums

Search Sponsor

POPULAR SEARCHES

Search

Element Break 

The Year-End Sale Runs Until December 31st Get Our LOWEST Prices Ever!

Element Break 


Read More >>
   MC-STORE.COM