MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

November 20, 2015 | Volume 12 Issue 45


TOP STORY: Time to "Redecorate" Your IBM i?
FEATURED ARTICLE: TechTip: Drivers, Start Your Nginx!
NEWS HIGHLIGHT: IBM i Log and File Monitoring - Special Pricing
ON-DEMAND WEBCAST: Easy Mobile Development with Scott Klement
EVENT: Taking the Pain Out of User Provisioning

Sponsor - T.L. Ashford & Associates

Top 5 Reasons Companies are using TLAForms:

  1. Easy Design with Graphical Interface – Use the Graphical Designer to create high quality, professional forms using True Type fonts (Including the MICR font for checks), Barcodes, images and overlays.  All in full color!
  2. No Programming – Easily integrates with your existing applications with NO Programming
  3. One Low Price includes ALL features –PDF Output, Email, Archive, Printing, MICR font, Graphical Interface and more!
  4. ROI – Low Cost.  High Functionality.  Immediate Results!
  5. Customer Support – Easily accessible and committed to making your experience with us as productive as possible. 

How much time and money will you save yourself and your company? Watch this 2 minute video to learn more, and order a 30-day trial here.


Feature Article - Security
Time to "Redecorate" Your IBM i?

Carol provides suggestions for ways you can "spruce up" your security configuration.

carol woodburyWritten by Carol Woodbury

I've been in my house for a while now, and I'm looking around and thinking that it's time for a little redecorating. I did a major renovation about three years ago, but now some walls need to be painted and I need to switch out some accessories. My problem is that I can never come up with the ideas myself. I always need to look through some home decorating magazines first. So just in case you're in the mood to redecorate your IBM i, here are some suggestions for freshening up the décor of your security configuration.


Sponsor - Cilasoft

A Compliance Check Doesn’t Mean Your IBM i Is Fully Secure

Successfully completing an audit of your compliance requirements doesn’t mean your system and applications are secure.  Without proper protection on multiple levels, sensitive data can be compromised by both internal and external threats – that’s right, hacks of the IBM i are on the rise.

 It’s time to consider the Cilasoft Security and Auditing Suite:

  • QJRN/400 – Uses IBM i journaling to detect and alert fraudulent activity on any system or database.
  • CONTROLER – Provides comprehensive global access control, thanks to its data-centric, low-impact engine.
  • EAM (Elevated Authority Manager) – Reduce powerful user profiles with the ability to elevate the authority of user profiles on an as-needed basis, while fully logging the related activity.
  • CENTRAL - consolidates Cilasoft-related log files, deploys rules across multiple machines, or runs remote commands across multiple machines.

Learn more about the Cilasoft Security and Auditing Suite at


Feature Article - TechTip
TechTip: Drivers, Start Your Nginx!

Nginx (pronounced Engine-X) is a very popular web server, second only to Apache in the open-source world. Did you know it runs on IBM i?

aaron bartellWritten by Aaron Bartell

"Put on your big-boy pants!" is what they told me. "Dig deeper and figure stuff out for yourself!" they said. Based on the feedback I was getting from online forums, I realized I needed to step up my game in my first open-source ventures. Those were some tough days for my RPG programmer brain, but I stuck with it. Now I see the advantages of going through many mud puddles.


Sponsor - The MC Press Bookstore

The Essential Guide to Security. In this practical and highly readable guide--an update to her acclaimed IBM i & i5/OS Security & Compliance: A Practical Guide--security expert Carol Woodbury explains IBM i security and the way it functions within IBM i systems. Whether you’re new to IBM i or a seasoned veteran, this book contains the critical information and explanations you need to successfully maintain a secure system. Get your copy today. >>


MC Webcast Center

Don't miss these Featured On-Demand Webcasts:

Easy Mobile Development with Scott Klement

Watch this on-demand webinar and learn how to rapidly and easily deploy mobile apps to your organization – even when working with legacy RPG code! IBM Champion Scott Klement will demonstrate how to:


  • Develop RPG applications without mobile development experience
  • Deploy secure applications for any mobile device
  • Build one application for all platforms, including Apple and Android
  • Extend the life and reach of your IBM i (aka iSeries, AS400) platform


You’ll see examples from customers who have used our products and services to deliver the mobile applications of their dreams, faster and easier than they ever thought possible!

Element Break 

Migrating from IBM Query/400?

Get the facts to determine whether DB2 Web Query or the NGS-IQ query, reporting, and business intelligence solution is right for your company. This Webcast provides helpful analysis of DB2 Web Query features, licensing terms, pricing, and support considerations.

See a demo of how NGS-IQ gives you and your co-workers the ability to:

  • create Web reports, dynamic dashboards, OLAP models
  • output to Excel, Word, and Access in one click
  • work from Web, Windows and 5250 user interfaces
  • query DB2, MySQL, SQL Server, Oracle and Postgre SQL databases
  • run and enhance existing Query/400 queries with NGS’ Query/400 API
  • develop Web applications
  • use integrated e-mail and FTP
  • maintain control with NGS-IQ’s security

 Element Break

The Explosion of Security Vulnerabilities Requires Diligent Act with Carol Woodbury & special guest Jeff Uehling

Carol is pleased to be joined for this Coffee with Carol by friend and former colleague Jeff Uehling, current Chief Security Architect for IBM i.  Jeff and Carol will be discussing a number of the recent Security Vulnerabilities which have had a huge, industry-wide impact on both hardware and software vendors - including IBM and the IBM i development groups. These security vulnerabilities include well-publicized ones such as Heartbleed, Bash/Shellshock and Poodle as well as numerous vulnerabilities that haven’t hit the media. These vulnerabilities exist in areas such as Java, OpenSSL and many networking areas of your systems.

IBM i has long been known as a secure platform on which you can run your business critical applications. However, securing the system requires careful attention to the system-wide security configuration options, managing the authority settings on your data objects which contain your business critical data (corporate assets), and - as importantly - staying current with your enterprise-wide maintenance and ensure the latest PTFs/Fixes are installed in order to close "real" or "potential" security holes.

Element Break

Take IBM i Everywhere with Mobile Apps – Watch the Webinar!

Is mobile an initiative for your business? Find out how you can go beyond Web applications to create applications with native device capabilities, such as Camera… even if you’ve never created a mobile application!
Watch this on-demand Webinar with IBM’s Tim Rowe and Profound Logic’s Scott Klement and Alex Roytman, and discover how you can create high-quality mobile applications using your existing RPG knowledge and the right tools.

You’ll learn:

  • How the IBM i platform supports mobile development
  • Why hybrid applications are a great option to deliver mobile apps with more functionality than Web apps can offer
  • How to develop mobile apps with native capabilities without becoming an Obj-C and Java expert, or using overly complicated tools

Element Break

Operations on IBM i: Where Do I Start?

Calling all programmers, system admins, operators, and data center managers! If your boss or your business just tossed you into the IBM i environment, you may find yourself up the operations creek without a paddle.

Let the IBM i experts at HelpSystems be your guide. Both first-timers and old hands will benefit from a few new tricks on where to get started with these essential IBM i areas:

  • Job management and subsystems
  • Memory management and allocation
  • Report management
  • System message handling
  • User profile creation and control
  • Commands and menus

Watch this one-hour recorded webinar to see how easy it can be to excel at IBM i systems management.

Element Break



Plus choose from the Complete Collection in the MC Press Webcast Center


*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.


The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card.  Visit the MC Webcast, MC White Paper and MC Software Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!


Have a Webcast you would like to list? click here or call (208) 629-7275 Ext.504 for information.




In the News

Vendors:  Have a press release to share?  Send it to MC Press.

The Latest from IBM

Support MC Press - Visit Our Sponsors



Search Sponsor