• LEAD ARTICLE: TechTip: Trees Are Good for Climbing and More
• FEATURED ARTICLE: TechTip: DB2 Access for PHP
• NEWS HIGHLIGHT: Green Screen Modernization in Half the Time
• WHITE PAPER: IBM i Security: Event Logging & Active Monitoring
• FEATURED VIDEO: Part 1 - Business As Unusual: Success Strategies for a Changing World
• EVENT: IBM i iSeries AS/400 Programming Concepts and Facilities Workshop
The “tree” command can quickly show you the structure of an IFS directory, but it’s not installed in PASE by default. Learn how to get it.
Written by Aaron Bartell
My days are in large part spent in the PASE environment on IBM i. PASE is based on AIX, and both are Linux-like in their abilities, though PASE does not contain many commands and utilities that I'd consider on the "need" list. Sometimes I'm also doing things on Linux systems and get exposed to utilities and commands that I then desire to have on PASE. Such was the case the other day when I was writing my "PASE Intro" lab for COMMON Spring 2017. I needed to print out a directory listing of parent and child directories, and I knew the Linux “tree” command would foot the bill. Well, I quickly learned it didn't exist in PASE, so this article will convey the…
Enter Now: State of IBM i Modernization Survey
10 minutes of your time will enter you in a drawing for an Amazon Echo!
Our 2016 survey uncovered valuable data on the attitudes toward IBM i and plans businesses like yours have to modernize their applications.
Here’s your chance to take part in our 2017 study – Just give us 10 minutes to answer questions including:
- Do you plan to modernize in 2017?
- What’s your management’s perception of IBM i?
- Will your development team grow or shrink in the coming year?
In exchange, you’ll be entered to win an Amazon Echo and other prizes!*
*Rules and conditions apply
The time is NOW to Learn Something NEW!
Pay only $35 each for our newest titles! You save a whopping 40% to 70% off the regular price.
9 of our best titles for just $25 each! Treat yourself or a colleague to new knowledge for the new year!
10 titles 70-85% Off. Get your copies today! Pay just $15 each for popular books on RPG, PHP, Java, Project Management, DB2, and more. Don’t wait – at these prices, books will sell out soon!
19 books for $10 each Buy them ALL for less than $200. Select every one or just a few before they're gone!
Learn something new in 2017: Over 50 titles for $5 each! RPG, IBM i, Security, PHP, Programming, DB2, Analytics, and more. Shop now—at these prices, books are going fast!
This latest book in the MC Press DB2 Certification series is a must-have for anyone preparing for Exam 317. You’ll get an in-depth review of the core exam topics, including the changes to DB2 11. Featuring 60 practice questions and answers, this guide explains every objective included on the test and serves as a day-to-day reference for DB2 11 system administration. Written by a member of the IBM Certification Development team, you’ll turn to this go-to DB2 11 book again and again. Order your copy today!
Last month, we looked at three ways you can access data files in PHP: mysql_*, mysqli_*, and the PDO API set. But there is one more option. Bet you can’t wait to see what it is.
Written by Dave Shirey
One of the primary reasons for involving PHP in our otherwise pure RPG ILE /free world is to allow us to develop apps that have a GUI interface yet access data from our DB2 (or whatever) database.
Database access in PHP is done via an API set that contains the commands necessary to connect to your database (remember, PHP runs on the server while your database is probably local or at the very least not on the same server as PHP is running in) and then access and return the required information to the PHP program.
A Step by Step Guide
Active monitoring is one of the most critical and effective security controls that an organization can deploy. Unlike many Windows and Linux server deployments, the IBM i can host a complex mix of back-office applications, web applications, and open source applications and services - leaving millions of security events to actively monitor.
This eBook discusses:
- Real-time security event logging and monitoring
- Security architecture and logging sources on the IBM i
- Creating the IBM security audit journal QAUDJRN
- Enabling IBM security events through system values
- File integrity monitoring (FIM)
- A step by step checklist begin collecting and monitoring IBM i security logs
Plus Choose From The Outstanding Selection in our MC White Paper Center
*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.