MC Press Online

Thursday, Jun 22nd

Last updateTue, 20 Jun 2017 11am

You are here: Home PUBLICATIONS MC TNT Tips 'n Techniques April 28, 2017

MC TNT Header 2


Lead Article - Programming

TechTip: C# for RPGers: Making Stuff Happen, Part 2 - More Flow Control Structures

Last time around, I explained the IF statement. Now it’s time to get to know a couple more C# flow control structures.

Written by Rafael Victória-Pereira

If you read the previous TechTip of this series, you already know that the IF statement in C# is similar to its RPG counterpart. It’s true that there are differences, but in general they’re pretty much alike. Even though I didn’t mention it in the previous TechTip, you can create IF-ELSE-IF structures in C# just like you do in RPG. As you know, abusing this facility usually leads to a stairwell-like structure (if you’re using RPG /free and proper indentation) or a Find-The-Right-EndIf game (similar to Where’s Wally, but not so fun). To avoid these pitfalls, a sensible programmer uses a Select-When structure instead of nested IF-ELSE-IF blocks. There’s also a similar control flow structure in C#, under a different name: Switch-Case.

CNX Corporation

Valence 5.1 is on the Launch Pad!

Since 2008, RPG developers around the world have been using Valence to create stunning IBM i-based web and mobile apps.  Whether you’re looking to create executive dashboards with download-to-Excel features, file maintenance utilities, custom web services or even intricate order entry apps, Valence has a solution for you — in many cases with no programming required!  

Download Valence 5.0 today for a free test drive on your IBM i system and receive a 10% discount coupon for the forthcoming Valence 5.1 release.  Hurry!  Offer ends May 9.

MC Press Bookstore

Introducing the complete guide to building business Web applications! Now programmers of all levels can learn to build Web apps that do real business work. Written by business developers for business developers, Developing Business Applications for the Web bridges the gap between website and business application programming. You'll master the fundamentals of Web development tools and gain all the necessary skills to build Web browser front-end applications that let users interact with business data.

Order your copy today!

MC Press Bookstore

Confused About Identity Management? Get expert help in this latest release from MC Press. Author Graham Williamson explains identity management for business people. Business managers and CIOs will learn how to manage today's identity challenges relating to access control, the cloud, consumers, data security, and the Internet of Things. If you are tasked with fitting identity management into your business strategy, then Identity Management: A Business Perspective is the perfect guide for you!

Order your copy today!

Feature Article - Security

The Importance of Staying Current

Carol discusses why and how staying up to date reduces your company’s security risk.

Written by Carol Woodbury

You might wonder why I decided to discuss this particular issue. I chose this topic because, as I read about how breaches occur—that is, how hackers are able to penetrate organizations—in many instances, it’s due to organizations not staying current.

Equipment remains with default credentials or is running an old operating system or is left unpatched—even when there are known vulnerabilities. Hackers will “drive by” or may go explicitly looking to exploit servers with known vulnerabilities.

MC Resource Centers

IBM i Security: Event Logging & Active Monitoring

A Step by Step Guide
Active monitoring is one of the most critical and effective security controls that an organization can deploy. Unlike many Windows and Linux server deployments, the IBM i can host a complex mix of back-office applications, web applications, and open source applications and services - leaving millions of security events to actively monitor.
This eBook discusses:

  • Real-time security event logging and monitoring
  • Security architecture and logging sources on the IBM i
  • Creating the IBM security audit journal QAUDJRN
  • Enabling IBM security events through system values
  • File integrity monitoring (FIM)
  • A step by step checklist begin collecting and monitoring IBM i security logs

Download your copy today from the MC White Paper Center

Element Break

Plus Choose From The Outstanding Selection in our MC White Paper Center

*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.  

MC Video Showcase