MC Press Online

Friday, Mar 24th

Last updateFri, 17 Mar 2017 12pm

You are here: Home PUBLICATIONS MC TNT Tips 'n Techniques March 17, 2017
Lead Article - Security

Why IBM i Organizations Should Pay Attention to What Happens in New York

Carol discusses how the cybersecurity law in New York will affect organizations running IBM i and how it provides guidance for organizations—even those outside of New York.

Written by Carol Woodbury

The State of New York passed a cybersecurity law that went into effect March 1, 2017. It’s one law in one state. So why should organizations outside of the control of the New York State Department of Finance be concerned about this law? Because it’s yet another indication that governments are getting serious about security.

T. L. Ashford

Barcode400 Labeling Software for the IBM i

All Data and Software Resides on the IBM i: Everything is centralized and secure.
Graphical Designer: Design labels in minutes.
Integrate and Print with Existing Apps: Call from RPG, COBOL, CLP and JAVA programs.
Compliance Labels Provided: Extensive library of predesigned label templates.
Supply Chain Solution: Easily integrated into any IBM i ERP or WMS solution.

Learn about new Features here, or watch a quick video on 4.0 features here. Download a 30-day trial here!

TL Ashford - Since 1983

MC Press Bookstore

Confused About Identity Management? Get expert help in this latest release from MC Press. Author Graham Williamson explains identity management for business people. Business managers and CIOs will learn how to manage today's identity challenges relating to access control, the cloud, consumers, data security, and the Internet of Things. If you are tasked with fitting identity management into your business strategy, then Identity Management: A Business Perspective is the perfect guide for you!

Order your copy today!

MC Press Bookstore

Can’t wait? The wait is over…It’s finally here! The latest update to the classic IBM i security reference is now available. Fully secure your IBM i applications and data with help from security guru Carol Woodbury. Written in a clear, jargon-free style, you’ll learn why it’s vital to develop a security policy and how to implement and maintain such a system. You’ll also get expert advice for tackling today’s security threats. This new release is updated for the latest version of the IBM i operating system. Get your copy today!

Feature Article - Programming

C# for RPGers: Making Stuff Happen, Part 1 - Introducing Flow Control in C#

Now that you know a few things about declaring variables and using methods, let’s see how to make decisions in C#, using logical operators and the IF statement.

Written by Rafael Victória-Pereira

It’s time to move to a new topic: decision making. In order to do that, you’ll need to know how to declare variables and use methods in C#. If you’re not entirely sure how to do that, go back a few TechTips to get comfortable with these things.

MC Press Latest Book

New from MC Press: Identity Management: A Business Perspective

Technology advances like cloud, mobile, and Internet of Things have made identity and access management more important than ever, and also more complex. How can business leaders get a handle on their evolving identity needs?

by Anne Grubb

By making identity management a core part of business strategy, says Graham Williamson in his latest book, Identity Management: A Business Perspective. Williamson, a consultant whose expertise includes identity and access management (IAM), has written the book to help senior-level technology managers understand IAM, so they can mitigate risks and implement robust, secure identity strategies in their organizations.

MC Resource Centers

IBM i Security: Event Logging & Active Monitoring

A Step by Step Guide
Active monitoring is one of the most critical and effective security controls that an organization can deploy. Unlike many Windows and Linux server deployments, the IBM i can host a complex mix of back-office applications, web applications, and open source applications and services - leaving millions of security events to actively monitor.
This eBook discusses:

  • Real-time security event logging and monitoring
  • Security architecture and logging sources on the IBM i
  • Creating the IBM security audit journal QAUDJRN
  • Enabling IBM security events through system values
  • File integrity monitoring (FIM)
  • A step by step checklist begin collecting and monitoring IBM i security logs

Download your copy today from the MC White Paper Center
Element Break
Plus Choose From The Outstanding Selection in our MC White Paper Center

*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.