Easy Design with Graphical Interface – Use the Graphical Designer to create high quality, professional forms using True Type fonts (Including the MICR font for checks), Barcodes, images and overlays. All in full color!
No Programming – Easily integrates with your existing applications with NO Programming
One Low Price includes ALL features –PDF Output, Email, Archive, Printing, MICR font, Graphical Interface and more!
ROI – Low Cost. High Functionality. Immediate Results!
Customer Support – Easily accessible and committed to making your experience with us as productive as possible.
Carol provides suggestions for ways you can "spruce up" your security configuration.
Written by Carol Woodbury
I've been in my house for a while now, and I'm looking around and thinking that it's time for a little redecorating. I did a major renovation about three years ago, but now some walls need to be painted and I need to switch out some accessories. My problem is that I can never come up with the ideas myself. I always need to look through some home decorating magazines first. So just in case you're in the mood to redecorate your IBM i, here are some suggestions for freshening up the décor of your security configuration.
A Compliance Check Doesn’t Mean Your IBM i Is Fully Secure
Successfully completing an audit of your compliance requirements doesn’t mean your system and applications are secure. Without proper protection on multiple levels, sensitive data can be compromised by both internal and external threats – that’s right, hacks of the IBM i are on the rise.
Nginx (pronounced Engine-X) is a very popular web server, second only to Apache in the open-source world. Did you know it runs on IBM i?
Written by Aaron Bartell
"Put on your big-boy pants!" is what they told me. "Dig deeper and figure stuff out for yourself!" they said. Based on the feedback I was getting from online forums, I realized I needed to step up my game in my first open-source ventures. Those were some tough days for my RPG programmer brain, but I stuck with it. Now I see the advantages of going through many mud puddles.
Get the facts to determine whether DB2 Web Query or the NGS-IQ query, reporting, and business intelligence solution is right for your company. This Webcast provides helpful analysis of DB2 Web Query features, licensing terms, pricing, and support considerations.
See a demo of how NGS-IQ gives you and your co-workers the ability to:
create Web reports, dynamic dashboards, OLAP models
output to Excel, Word, and Access in one click
work from Web, Windows and 5250 user interfaces
query DB2, MySQL, SQL Server, Oracle and Postgre SQL databases
run and enhance existing Query/400 queries with NGS’ Query/400 API
Carol is pleased to be joined for this Coffee with Carol by friend and former colleague Jeff Uehling, current Chief Security Architect for IBM i. Jeff and Carol will be discussing a number of the recent Security Vulnerabilities which have had a huge, industry-wide impact on both hardware and software vendors - including IBM and the IBM i development groups. These security vulnerabilities include well-publicized ones such as Heartbleed, Bash/Shellshock and Poodle as well as numerous vulnerabilities that haven’t hit the media. These vulnerabilities exist in areas such as Java, OpenSSL and many networking areas of your systems.
IBM i has long been known as a secure platform on which you can run your business critical applications. However, securing the system requires careful attention to the system-wide security configuration options, managing the authority settings on your data objects which contain your business critical data (corporate assets), and - as importantly - staying current with your enterprise-wide maintenance and ensure the latest PTFs/Fixes are installed in order to close "real" or "potential" security holes.
Is mobile an initiative for your business? Find out how you can go beyond Web applications to create applications with native device capabilities, such as Camera… even if you’ve never created a mobile application! Watch this on-demand Webinar with IBM’s Tim Rowe and Profound Logic’s Scott Klement and Alex Roytman, and discover how you can create high-quality mobile applications using your existing RPG knowledge and the right tools.
How the IBM i platform supports mobile development
Why hybrid applications are a great option to deliver mobile apps with more functionality than Web apps can offer
How to develop mobile apps with native capabilities without becoming an Obj-C and Java expert, or using overly complicated tools
Calling all programmers, system admins, operators, and data center managers! If your boss or your business just tossed you into the IBM i environment, you may find yourself up the operations creek without a paddle.
Let the IBM i experts at HelpSystems be your guide. Both first-timers and old hands will benefit from a few new tricks on where to get started with these essential IBM i areas:
Job management and subsystems
Memory management and allocation
System message handling
User profile creation and control
Commands and menus
Watch this one-hour recorded webinar to see how easy it can be to excel at IBM i systems management.
*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.
The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card. Visit the MC Webcast, MC White Paper and MC Software Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!
Have a Webcast you would like to list? click here or call (208) 629-7275 Ext.504 for information.