• LEAD ARTICLE: TechTip: Just a Bit About Git
• FEATURED ARTICLE: Carol’s IBM i Security Wish List
• NEWS HIGHLIGHT: Spanish Business Partners Host IBM i Modernization Meeting
• ON-DEMAND WEBCAST: 7 Habits of Highly Secure Organizations
• EVENT: Coming in 2017: i Can Do Anything at NEUGC
Carol describes scenarios where the configuration options aren’t optimal, but a choice must be made.
Written by Carol Woodbury
By the time you read this, the election in the United States will be over. Many in the States view this election as having to choose between the lesser of two evils. While I’m not going to discuss the way I voted, I thought I might discuss some similar situations—where I’ve been presented with two IBM i configurations to choose from, and neither is optimal.
Barcode400 Version 4.0 is the best software yet for designing and printing bar code labels from the IBM i.
- Easy Design with a Graphical Interface using IBM i Files.
- IBM i Power - Barcode400 resides on the IBM i. Label formats are stored on the IBM i.
- Many Ways to print - Print stand-alone from your desktop, or completely automate label printing by integrating into your application software. No Programming Required! The Power is in your hands.
- Print to hundreds of thermal transfer printers and HP and compatible printers.
- Output your labels as PDF documents.
- Customer Support - Easily accessible and committed to making your experience with us as productive as possible.
The time is NOW to get the top books for tech professionals at our lowest prices ever!
Pay only $35 each for our newest titles! You save a whopping 40% to 70% off the regular price.
9 of our best titles for just $25 each! Perfect gifts for your favorite Power Systems pro! Treat yourself or a colleague!
10 titles 70-85% Off. Get your copies today! Pay just $15 each for popular books on RPG, PHP, Java, Project Management, DB2, and more. Don’t wait – at these prices, books will sell out soon!
19 books for $10 each Buy them ALL for less than $200. Select every one or just a few before they're gone!
Give the Gift of Knowledge: Over 50 titles for $5 each! RPG, IBM i, Security, PHP, Programming, DB2, Analytics, and more. Shop now—at these prices, books are going fast!
Can’t wait? The wait is over…It’s finally here! The latest update to the classic IBM i security reference is now available. Fully secure your IBM i applications and data with help from security guru Carol Woodbury. Written in a clear, jargon-free style, you’ll learn why it’s vital to develop a security policy and how to implement and maintain such a system. You’ll also get expert advice for tackling today’s security threats. This new release is updated for the latest version of the IBM i operating system. Get your copy today!
Just $35 during the MC Press Year-End Inventory Blowout!
Learn how the latest DB2 for i features can reduce development time when interacting with the popular JSON data format.
Written by Michael Sansoterra
In my prior tip about using JSON with DB2 for i, I articulated a method of accessing JSON with SQL by use of Java external user-defined functions (UDFs) that convert JSON to XML and XML to JSON. Starting in IBM i 7.1 TR10 (Database Group PTF Level 34) and IBM i 7.2 TR2 (Database Group PTF Level 5), IBM has added native JSON support to the DB2 for i database engine. Keep in mind that, at this first release, the JSON support is still considered a "technology preview," so be sure to test any JSON implementations carefully before using them in production. Also, based on available documentation, some of these features and JSON functions are not yet advertised by IBM for the IBM i and may be subject to change.
Choose one or more of these downloads in our MC Webcast Center
Let’s face it: IBM i experts and RPG programmers are retiring from the workforce. These folks have been managing all areas of your business—often manually and behind the scenes—for decades, everything from IT operations to data and documents to cybersecurity.
Are you prepared to handle their departure?
During this 30-mintue recorded webinar, our panel of IBM i experts—Chuck Losinski, Robin Tatam, Richard Schoen, and Tom Huntington—will outline strategies that allow your company to cope with IBM i skills depletion by adopting these strategies that allow you to get the job done without deep expertise on the OS:
- Automate IBM i processes
- Use managed services to help fill the gaps
- Secure the system against data loss and viruses
IBM i skills depletion is a top concern for IBM i shops around the world. The strategies you discover in this webinar will help you ensure that your system of record—your IBM i—continues to deliver a powerful business advantage, even as staff retires.
It’s simple. IBM i is the most reliable, securable, and powerful platform to house your critical business data.
IBM i was built for business and has added features and functionality over the years to keep up with modern business needs. You can trust it to run your business, access your data in real-time, and keep your data secure. Plus, IBM i can scale to your business and handle all of your critical data. Can your other platforms do that?
We didn’t think so.
Watch this 30-minute webinar to learn why you should keep your data on IBM i, including:
- IBM i is reliable
- IBM i offers fast and secure real-time data access
- IBM i helps your business prepare for tomorrow
Plus, we demonstrate how Sequel Data Access helps you modernize IBM i data access and meet your business needs.
Your IBM i holds a massive amount of data. In most organizations, that data constitutes a mission-critical and high-value asset.
How do you adequately protect the data residing on your IBM i, given its value to your organization? IBM has provided us with many options for protecting our data, but it’s now always clear how to select and implement the best options for your circumstances.
This recorded webinar describes IBM i’s different data security options, along with implementation recommendations and tips for getting started. Carol Woodbury, one of the world’s top IBM i security experts, also provides considerations to help you determine how many layers of security are right for your organization.
Everyone knows that cybersecurity is important, but getting started on the road to data protection and compliance can be confusing and intimidating. Understanding common vulnerabilities helps you focus your attention and resources on the areas that need the most help.
We all want “best-practice” security, but what are top organizations doing to achieve and maintain it?
Watch this webinar to learn the details about how to develop the seven habits that are part of daily life for secure organizations. You’ll learn how to:
- Break the Ostrich Syndrome
- Develop a Security Policy
- Assess Current Standing
- Perform Security Event Logging and Review
- Use “Best of Breed” Technologies
- Monitor for Ongoing Compliance
- Plan for the Future
This on-demand webinar examines what each of these habits means to IBM i, and helps you make sure that you don’t become the next security statistic.
Don't miss the full collection of On-Demand Assets available in the MC Webcast Center