Don't miss out! This is the hands-on guide to IBM's strategic language for IBM i. Database Design and SQL for DB2 delivers everything you need to know about database design and SQL. Author Jim Cooper gives you all the tips and techniques you need in one convenient place, whether you’re a beginner or an advanced developer. Includes real-life examples to help you hone your skills. The bonus companion website explains embedded SQL and explores client-side technologies.
DB2 for I 7.2 delivers a feature that can increase the integrity of your database.
Written by Kent Milligan
With the intense focus on data privacy, many applications are being modified to protect the personal data that they are processing. Masking is a data protection technique that's commonly being deployed so that the vast majority of application users are allowed to see only a masked version (############1234) of sensitive data values, such as credit card numbers. Access to the original card number value is limited to a select set of privileged users.
Sometimes you need to do complex things with your prints, and PJL is one way to get it done. But how do you incorporate a PJL script into an i job stream?
Written by David Shirey
As explained in my previous TechTip, Printer Job Language (PJL) allows you to control how the printer reacts to jobs you submit. Now the truth is that many printers will automatically figure out what the heck is going on, but not all will. As you try to use many different types of printers to carry out your assignments, you may find yourself in need of the ability to tell the stupid printer what to do. A good example might be if you wanted to add a copier to print output from the IBM i.
Give your users what they need to be successful in their work -- using RPG! Solutions such as Excel spreadsheets, Adobe PDF files, and email are requirements for today’s users, and today’s RPG is more than capable of fulfilling these needs. This book gives you the know-how to break through the obstacles and use common development tools to share information and provide more-compatible interfaces. Learn how to migrate your existing greenbar reports to Excel spreadsheets and PDFs, and discover how to automatically email reports using RPG and JavaMail with this hands-on guide! Buy your hard copy or e-book today!
Most IT Managers must question at one time or another ? what exactly they are getting for their money from a software maintenance agreement? Beyond ‘corrective maintenance’ what should you expect from a software vendor in today’s world to ensure the software is constantly moving in a direction which benefits your business? Lorraine Cousins, CEO of Halcyon Software, discusses why some companies see their maintenance agreement as a way of getting new features with tangible business benefits while others regard it as insurance to protect against the risk of software malfunction. Discover how to benchmark current and future software vendors to make sure your organization is getting the maximum value from your software maintenance agreement.
*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.
The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card. Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security, and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!
Have a White Paper you would like to list? click here or call (208) 629-7275 for information.
Step by Step Approach to Implementing Object Level Security
In this Webinar:More organizations are realizing the need for implementing object level security -- especially for database files that contain information which must comply with various laws or regulations. But the question many administrators have is, how do you secure files without breaking the application or other processes? During this presentation, security expert Carol Woodbury will discuss how. Configuration options, testing steps, "gotchas" to avoid, along with real-life examples will be presented.