MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

December 9, 2016 | Volume 13 Issue 48


LEAD ARTICLE: TechTip: IFS Containers Part 3, Installing Open Source from the Internet
FEATURED ARTICLE: TechTip: C# for RPGers - Introducing Lists
NEWS HIGHLIGHT: LaserVault UBD/VM Integration Further Streamlines the IBM i Backup and Restore Process
WHITE PAPER: IBM i Security: Event Logging & Active Monitoring
EVENT: Overwhelmed by Operating Systems?

Sponsor - The MC Press Bookstore

MC Press Year-End Sale10 Titles 70-85% Off. Get Your Copies Today!

End the year with Super Savings on bestselling MC Press titles! Pay just $15 each for popular books on RPG, PHP, Java, Project Management, DB2, and more. Don’t wait – at these prices, books will sell out soon!

Visit our store NOW for great deals. 

Shop All $15 Books!


Feature Article - TechTip
TechTip: IFS Containers Part 3, Installing Open Source from the Internet

One of the core tenets of open source is freedom to obtain and use software. Now it's time to see that benefit in action.

aaron bartellWritten by Aaron Bartell

In the first article of this series, we learned about how IFS Containers could be manually created by copying things into a new directory and then running the chroot command against that directory. This was a laborious process that would cause the technology to not be used unless some amount of automation was introduced. In the second article, I introduced the IBM i Chroot (ibmichroot) project, which addresses the automation of creating IFS Containers in a matter of minutes and even more important, uniformity. In this article, we will navigate through the other core feature of the IBM i Chroot project: package installation.


Sponsor - The MC Press Bookstore

Advanced PHP on iTake the next step with PHP! Expand your knowledge and understanding of this essential programming language with the latest book from PHP guru Kevin Schroeder: Advanced Guide to PHP on IBM i. Master important PHP topics such as debugging, test-driven development, web-based development, advanced object-oriented programming, and web security. You’ll also get an in-depth look at the new PHP Toolkit for IBM i provided by Zend Technologies. Don’t delay; get started today on building your understanding and skill level with this example-packed, accessible book. Order today!

Just $15 during the MC Press Year-End Inventory Blowout!


Feature Article - TechTip
TechTip: C# for RPGers - Introducing Lists

Lists are a special type of “thing” in C#; they have no parallel in RPG. This is most unfortunate, because lists are awesome!

rafael victoria preiraWritten by Rafael Victória-Pereira

The last couple of TechTips introduced Arrays and explained the foreach loop. This kind of sets the stage for the List data type. You can think of a List as an Array with all the bells and whistles and none of its limitations. For instance, when you define an Array, you have to define its size. That value is (more or less) definitive, because the memory will be statically allocated to store the variable. Lists, however, are dynamically allocated, which means that you don’t have to specify the size of the List. Actually, you can’t specify it. Instead, you’re able to specify the initial capacity, but even that is optional.


Sponsor - The MC Press Bookstore

DB2 10.5 Fundamentals for LUW (Exam 615)Relax…he knows his stuff! You’ll be sure to pass Exam 615 with the help of DB2 expert Roger Sanders. He helped develop Exam 615 plus 22 other certification exams. This is the latest in the popular MC Press DB2 Certification Study Guide series. Get all you need to know about DB2 10.5 for Linux, UNIX, and Windows. This guide includes a complete practice exam with 125 questions and answers. Nothing will prepare you more for the DB2 10.5 Fundamentals for LUW exam! Order your copy today.

Just $35 during the MC Press Year-End Inventory Blowout!


MC White Paper Center

New Ebook from Townsend Security available now.

Security EbookIBM i Security: Event Logging & Active Monitoring

A Step by Step Guide
Active monitoring is one of the most critical and effective security controls that an organization can deploy. Unlike many Windows and Linux server deployments, the IBM i can host a complex mix of back-office applications, web applications, and open source applications and services - leaving millions of security events to actively monitor.
This eBook discusses:

  • Real-time security event logging and monitoring
  • Security architecture and logging sources on the IBM i
  • Creating the IBM security audit journal QAUDJRN
  • Enabling IBM security events through system values
  • File integrity monitoring (FIM)
  • A step by step checklist begin collecting and monitoring IBM i security logs

Download your copy today from the MC White Paper Center

Element Break

Plus Choose From The Outstanding Selection in our MC White Paper Center

*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.


In the News

Vendors:  Have a press release to share?  Send it to MC Press.

The Latest from IBM

Support MC Press - Visit Our Sponsors


Search Sponsor



Element Break 

The Year-End Sale Runs Until December 31st Get Our LOWEST Prices Ever!

Element Break