MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

August 22, 2014 | Volume 11 Issue 33


TOP STORY: TechTip: Protecting Against Accidental Updates with Masked Values
FEATURED ARTICLE: TechTip: I Wrote My PJL Script, So Now What Do I Do?
NEWS HIGHLIGHT: HelpSystems Improves Web Interface of Its InterMapper Network Monitoring Software  
WHITE PAPER: Getting Maximum Value from your Software Maintenance Agreement
MC VIDEO PORTAL: Step by Step Approach to Implementing Object Level Security
EVENT: Five Top Problems Solved By Automated Report Delivery

Sponsor - The MC Press Bookstore

Don't miss out! This is the hands-on guide to IBM's strategic language for IBM i. Database Design and SQL for DB2 delivers everything you need to know about database design and SQL. Author Jim Cooper gives you all the tips and techniques you need in one convenient place, whether you’re a beginner or an advanced developer. Includes real-life examples to help you hone your skills. The bonus companion website explains embedded SQL and explores client-side technologies.


Feature Article - TechTip
TechTip: Protecting Against Accidental Updates with Masked Values

DB2 for I 7.2 delivers a feature that can increase the integrity of your database.

kent milligan 117x117Written by Kent Milligan

With the intense focus on data privacy, many applications are being modified to protect the personal data that they are processing. Masking is a data protection technique that's commonly being deployed so that the vast majority of application users are allowed to see only a masked version (############1234) of sensitive data values, such as credit card numbers. Access to the original card number value is limited to a select set of privileged users.


Sponsor - The MC Press Bookstore

PHP…Just for IBM i. This is the first book to comprehensively address PHP and how it can—and should—be deployed on the IBM i. Learn how to transfer skills from a green screen environment to the Web, become intimately familiar
with PHP’s commonly used features, and help start down the road of highly interactive Web-based application development. Click now to receive a FREE chapter of this best-selling resource! >>


Feature Article - TechTip
TechTip: I Wrote My PJL Script, So Now What Do I Do?

Sometimes you need to do complex things with your prints, and PJL is one way to get it done. But how do you incorporate a PJL script into an i job stream?

david shireyWritten by David Shirey

As explained in my previous TechTip, Printer Job Language (PJL) allows you to control how the printer reacts to jobs you submit. Now the truth is that many printers will automatically figure out what the heck is going on, but not all will. As you try to use many different types of printers to carry out your assignments, you may find yourself in need of the ability to tell the stupid printer what to do. A good example might be if you wanted to add a copier to print output from the IBM i.


Sponsor - The MC Press Bookstore

Give your users what they need to be successful in their work -- using RPG! Solutions such as Excel spreadsheets, Adobe PDF files, and email are requirements for today’s users, and today’s RPG is more than capable of fulfilling these needs. This book gives you the know-how to break through the obstacles and use common development tools to share information and provide more-compatible interfaces. Learn how to migrate your existing greenbar reports to Excel spreadsheets and PDFs, and discover how to automatically email reports using RPG and JavaMail with this hands-on guide! Buy your hard copy or e-book today!


In the News

The Latest from IBM

Support MC Press - Visit Our Sponsors

Forums Sponsor



Search Sponsor



MC Video Portal

MC Video Portal

Step by Step Approach to Implementing Object Level Security

In this Webinar:  More organizations are realizing the need for implementing object level security -- especially for database files that contain information which must comply with various laws or regulations. But the question many administrators have is, how do you secure files without breaking the application or other processes? During this presentation, security expert Carol Woodbury will discuss how. Configuration options, testing steps, "gotchas" to avoid, along with real-life examples will be presented.