MAGAZINES

MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

August 29, 2014 | Volume 11 Issue 34

ISSUE HIGHLIGHTS

TOP STORY: Book Review: Flexible Input, Dazzling Output with IBM i
FEATURED ARTICLE: TechTip: Accessing Database Files in C and C++ 
NEWS HIGHLIGHT: HelpSystems Catches a Chill to Support ALS
WHITE PAPER: Environmental Hazards to Peak Performance
MC VIDEO PORTAL: Step by Step Approach to Implementing Object Level Security
EVENT: DeliverNow Product Feature Tour- Automate Document Distribution

 

Sponsor - The MC Press Bookstore
 

The IBM i no longer stands alone. It now lives harmoniously with its other server brethren. Flexible Input, Dazzling Output with IBM i shows you how to build the interfaces you need to move data between servers. The free, open-source code and tools included with the book allow you to import and export data, automate data transfers, create attractive charts and graphs easily, generate top-notch Excel spreadsheets, and much more. And it's all done with the language you know and love: RPG. Pre-order yours today!

 

Give your IBM i the freedom to connect to the rest of the world.


Read More >>

Feature Article - Programming
 
Book Review: Flexible Input, Dazzling Output with IBM i

Today, it's all about input and output. Getting data into the IBM i from non-traditional sources and then displaying it back out again in varied formats. But where can you go to learn all that you need to know about this critical skill?

david shireyWritten by David Shirey

Read a good technical book lately? Normally, I would have said "Me either," but I just finished Flexible Input, Dazzling Output with IBM i by Rafael Victoria-Pereira, and I give it an enthusiastic two thumbs upfine summer fun!


Read More >>

Sponsor - The MC Press Bookstore
 

Now Available in eBook Format: IBM System i APIs at Work, Second Edition: In this latest edition of the best-selling API reference, acclaimed expert Bruce Vining completely rewrites the book on APIs. With over 700 information-packed pages this is the ultimate API guide and a must-have for any professional working with System i (AS/400, i5/iSeries). Get your copy today!


Read More >>

Feature Article - TechTip
 
TechTip: Accessing Database Files in C and C++

Will there always be RPG and COBOL programmers? Learn how to access files natively using C and C++. Your application’s future may depend on it.

john vriezenWritten by John Vriezen

Google "Most popular programming languages in the world," peruse the top results, and you'll find that C and C++ programming languages are consistently among the top five languages listed. For COBOL and RPG, you have to dig a little deeper. On one site, programming language popularity based upon search engine hits is reported monthly. As of August 2014, COBOL had slipped to 29th, (down from 27th in July) and RPG was lumped in with an alphabetized list of those that ranked from 51 through 100, down from 47th in July. By the time you read this, who knows where they will be.


Read More >>

Sponsor - The MC Press Bookstore
 

System i Disaster Recovery Planning addresses the special disaster recovery planning issues of IBM i. It is your step-by-step guide to developing an effective, workable plan to protect your company's assets should the unthinkable happen. This title is now available in eBook format.

Click for a FREE chapter! >>


Read More >>

MC White Paper Center
 

  NEW FEATURED WHITE PAPER

Environmental Hazards to Peak Performance

 

While no one can be aware of every potential problem that may affect the system, you can reduce the impact of issues by proactively monitoring the areas where IBM i and the network overlap.
Download this white paper and learn how to:

 

  • Calculate the cost of problem resolution
  • Anticipate communication issues
  • Expose network bottlenecks
  • Evaluate your need for proactive network monitoring

 

Don't miss these great offerings in the MC Press White Paper Center:

Latest White Papers:

Environmental Hazards to Peak Performance

Getting Maximum Value from your Software Maintenance Agreement

Checklists for Checklists on Checklists … Why Not Automate?

2014 State of IBM i Security Study

Automate IBM i Operations using Wireless Devices

10 Facts You Need To Know About Laser Check Printing On Your IBM i

DR Strategy Guide from Maxava

Virus Got You Down?

PCI and What it means to IBM i

Data Access in a Big Data World

Top Security Issues for the Integrated File System (IFS)

How to Effectively Manage and Monitor Your Business Applications

The Promise of A/P Automation

The Essential Guide to IBM i Database Modernization

The State of IBM i Security 2013

Storing Metadata the Profound UI Way

Secure Inside and Out: Maximizing Intrusion Detection on IBM i

Solving the Little Things with Automation for IBM Power Systems

Managing Privileged Users on IBM i

5 Ways to Control Access using Application Administration

Analyzing IBM i Performance Metrics

3 Essential Steps to Successful Performance Management


Plus Choose From This Amazing Selection, Too

Lights Out IBM i Automation

10 Top Job Scheduling Challenges for your IBM i and How to Solve Them

101 things you can Automate on your IBM i & 10 Tips for Peace of Mind

3 Essential Steps to Successful Performance Management

5 Shortcuts to Sensible Operational Security

5 Ways to Control Access using Application Administration

6 Recommendations for Smarter Spooled File Processing on Your IBM i

A FREE HA/DR Jargon Buster

Analyzing IBM i Performance Metrics

Assess the Appropriateness of the iSeries/IBM i in My Business

Baker College Makes IBM i Apps More Cool, Less Old-School, With Profound UI

Best Practices: The Fundamentals of Document Automation

Beyond FTP: Securing and Managing File Transfers

Bringing Mashups to Your Enterprise Business Applications

Building a Sound Investment Strategy Through Technology

Business Intelligence for the IBM i Customer

Case Study: Streamline Purchase-to-Pay using Document Management

Cloud Computing

Compliance without the Complexities

Critical Elements for Business ContinuityDMZ Gateways: Secret Weapons for Data Security

Defending Against Data Breach: Developing the Right Strategy for Data Encryption

DMZ Gateways: Secret Weapons for Data Security

Getting the most from your SAP production reports

Getting the Most out of Your Audit Journal - Handouts

Goodbye Paper, Hello Freedom: Paperless Accounts Payable

Goodbye Paper, Hello Freedom: The Complete Guide to Going Paperless

How to Effectively Manage and Monitor Your Business Applications

IBM i Scheduling Survival Guide

IBM i Trends and the IBM i Cloud

Keeping your System i Applications Relevant in a Service-Oriented World

Laws and Regulations and Standards… Oh my!

Make “Paperwork” Smarter

Managing Data and Healthcare Regulations Efficiently

Managing Privileged Users on IBM i

Modern Monitoring Methods for Power Systems

Oh no! Another Audit!

PCI Compliance for Power Systems Running IBM i

PCI DSS Compliance with Managed File Transfer

Pillars Of Data Protection

Protecting your Data – How Much Security is Enough?

Revolutionizing System i Application Modernization

Secure Inside and Out: Maximizing Intrusion Detection on IBM i

SOA What? Why SOA is Critical for iSeries RPG Shops

Solving the Little Things with Automation for IBM Power Systems

Storing Metadata the Profound UI Way

Supply Chain Synchronization: Recession-proof Strategies for Improving Efficiencies

System Modernization Survival Guide

The Eight Pillars of an Enterprise Application Architecture

The Hidden Cost of Compliance

Top Security Issues for the Integrated File System (IFS)

Using Microsoft .NET to Build Scalable Enterprise IBM i Applications

Using Software for Compliance…

Ways to Use IBM i Audit Journal

What Authorities Do Programmers Really Need?

Why Companies Fail PCI Audits - Handouts

 

*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.

The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card.  Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security,  and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!

Have a White Paper you would like to list? click here or call (208) 629-7275 for information.

 


Read More >>

In the News

Read More >>
The Latest from IBM

Read More >>
Support MC Press - Visit Our Sponsors

Forums Sponsor

POPULAR FORUMS

Forums

Search Sponsor

POPULAR SEARCHES

Search


Read More >>
MC Video Portal

MC Video Portal

Step by Step Approach to Implementing Object Level Security

In this Webinar:  More organizations are realizing the need for implementing object level security -- especially for database files that contain information which must comply with various laws or regulations. But the question many administrators have is, how do you secure files without breaking the application or other processes? During this presentation, security expert Carol Woodbury will discuss how. Configuration options, testing steps, "gotchas" to avoid, along with real-life examples will be presented.


Read More >>
   MC-STORE.COM