Do you aspire to become a leader, want to improve your leadership skills, or simply enjoy good stories? Then this book is for you. Leadership in My Rearview Mirror shares the leadership insights of a man who rose from reluctant draftee to decorated Army colonel, helped build the Department of Behavioral Sciences and Leadership at the U.S. Military Academy at West Point, and now works to develop IBM's most senior leaders. Using concise and highly entertaining anecdotal chapters, Jack Beach reveals what it takes to be a superior leader, demonstrating that the primary task of leaders, especially those in senior positions, is to create an organizational climate characterized by 360 degrees of trust and deep engagement. Buy your copy today.
The value of a user group is usually gauged by the collaboration within it's members. Let me tell you why COMMON does one better.
Written by Steve Pitcher
The first weekend of each December is when this brave columnist and his fellow Common Americas Advisory Council (CAAC) members brave the cold and travel to Rochester, Minnesota, to meet with IBM for two days of meetings where we represent the collective community of the COMMON Americas User Group. While I can't discuss in specific detail what we talk about, I will tell you that there is a tremendous amount of collaboration between the CAAC and IBM. This benefits independent software vendors (ISVs), IBM Business Partners, and most certainly Power Systems customers. The CAAC has a counterpart organization affiliated with COMMON Europe that gives IBM a perspective from the European Power Systems community as well.
What's the biggest cause of performance problems on IBM i servers? Not even three of the major performance-tool vendors completely agree on the answers.
Written by John Ghrist
Despite its reputation for security and reliability, even the IBM i server platform isn't perfect. As workloads increase and the demand for 24x7 access grows, sooner or later every enterprise reaches a point where system performance seems to start declining. But when it comes to pinning down the reasons, there's no easy answer because there are so many potential causes.
The quality of your applications' user experience counts.
Written by Roger Pence
User interfaces based on HTML and hosted in browsers have become quite nearly ubiquitous over the last several years. Thanks to IBM's Open Access API, IBM i RPG applications are able to access an HTML-driven user interface very effectively. ASNA Wings, for example, builds a browser-based user interface derived from existing display file DDS specifications.
Download your free copy of our DR Strategy Guide for IBM i before it’s too late. Learn more about the evolution of disaster recovery, how disasters of various types can impact business and the strategies you can employ to minimize the risk of impact to your business by downloading our latest e-book today. Your free copy of the DR Strategy Guide for IBM i will help uncover the secrets to ensuring your IBM i and your business is able to weather any storm – be it caused by human interruption or natural disaster.
How to best implement a disaster recovery strategy
The importance of testing your Disaster Recovery Plan and keeping it up to date
How to perform scheduled back-ups without bringing down your business
The benefits of the Cloud and how it can work for you
This whitepaper is a must read for anyone that is considering moving to Laser Check printing or anyone that has considered moving to laser check printing in the past and thought it was too expensive or too much trouble. Included in this white paper:
A supply List What to look for in laser check software
6 Steps to Getting Bank Approval of your checks
10 myths about laser check printing, find out if they are fact or fiction
Laser check printing is secure and easier to maintain than traditional pre-printed check printing. With a few quick steps, set-up is simple. You do not need to purchase any special equipment and it is very easy to maintain. Laser check printing can save thousands, potentially hundreds of thousands of dollars in supplies and labor, depending on the size of your company. Let this Free whitepaper by DRV Tech answer your questions about laser check printing on the IBM i.
While one may think that PCI is a thing of the past and that it’s already been implemented, major breaches (most notably of the Target PoS systems) have brought it back into focus. Some retailers are just now understanding how PCI applies to them and other organizations have started to accept credit cards when they didn’t in the past. To refresh everyone’s memory, here’s an overview of what PCI means to the IBM i community and what organizations that use an IBM i to store, process or access cardholder data need to be aware of.
Does a virus have your server down? Perhaps it’s the latest worm, Trojan horse, buffer overflow or denial of service attack that’s got you or one of your servers down. While one of these bugs may be affecting one or more of your servers in your enterprise, it is highly unlikely that the server affected is a Power server running IBM i. IBM i may be running your core business applications or it may be hosting your web site or running Domino. Whatever its function within your enterprise IBM i has remained unaffected by virus and malware attacks. Why is that? Viruses and other ailments spread by infecting a host that is vulnerable. Let’s take a look at how IBM i and the applications running on it can remain unscathed by the viruses and malware that are so prevalent today. In this white paper, Carol Woodbury of SkyView Partners defines each “ailment” and then describe the defenses and protection mechanisms provided by IBM i to ward off the attack.
Implementing proactive system monitoring in your IBM i environment begins with planning. The effectiveness of automated monitoring solutions should be evaluated based on the degree of visibility they can offer to potential problems, the time they save, and the flexibility they offer in meeting the specific views and requirements of your existing and developing network. Your proactive monitoring solution should be able to anticipate repeat issues based on your system demands, applications, throughput, and configuration, as well as provide fast access to information that will pinpoint the cause of unforeseen issues and those that are otherwise difficult to isolate. For system administrators and managers who are looking for a practical guide to help maximize a new or existing proactive approach to system and message monitoring. Download this white paper to learn:
Information on must-have monitors
Shortcuts to greater efficiency
Checklists of requirements for a customized roadmap
*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.
The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Ch Read More >>
The 12 Sections of PCI DSS and How each Relates to the IBM i Community
In this session, Carol Woodbury draws on her experience consulting with SkyView Partners' clients and helping them with their PCI DSS implementation and compliance requirements. Carol explains each of the 12 sections of the Payment Card Industry's Data Security Standards (PCI DSS) and describes specifically how each relates to the IBM i community.