MC Press Online

Saturday, Jun 24th

Last updateFri, 23 Jun 2017 1pm

You are here: Home PUBLICATIONS MC TNT Tips 'n Techniques May 26, 2017

MC TNT Header 2


Lead Article - Programming

C# for RPGers: Taking C# Loops for a Spin

The missing piece to the basic C# language puzzle will be presented here: looping structures. You already know FOR, but there’s more!

Written by Rafael Victoria-Pereira

few TechTips ago, I talked about the FOR loop and how it works in C#. It’s now time to explain the other looping structures that this amazing language has to offer. I’ll be using the exact same test task in all of the code snippets: I’ll print a simple count from 1 to 5 using a loop.

MC Press Bookstore

Introducing the complete guide to building business Web applications! Now programmers of all levels can learn to build Web apps that do real business work. Written by business developers for business developers, Developing Business Applications for the Web bridges the gap between website and business application programming. You'll master the fundamentals of Web development tools and gain all the necessary skills to build Web browser front-end applications that let users interact with business data.

Order your copy today!

MC Press Bookstore

You’ve heard the buzz about open source on IBM i. But what is open source, and how can you use it? You’ll get answers in Open Source Starter Guide for IBM i Developers, the first book that explains open source development in IBM i terms. Join author Pete Helgren in exploring popular tools—PASE, XMLSERVICE, Ruby/Rails, PHP, Python, Node.js, and Apache Tomcat. You’ll take away lots of solid “how-to” information and be stoked to start building your own open source apps. Get your copy today!

MC Press Bookstore

Can’t wait? The wait is over…It’s finally here! The latest update to the classic IBM i security reference is now available. Fully secure your IBM i applications and data with help from security guru Carol Woodbury. Written in a clear, jargon-free style, you’ll learn why it’s vital to develop a security policy and how to implement and maintain such a system. You’ll also get expert advice for tackling today’s security threats. This new release is updated for the latest version of the IBM i operating system. Get your copy today!

Feature Article - Programming

Why, for Most IBM i Shops, DDM Is Their Worst Vulnerability

Most IBM i shops have not secured their DDM implementation. Carol discusses why that’s putting those shops at risk.

Written by Carol Woodbury

Distributed Data Management (DDM) comes in two flavors: an ancient implementation that runs over SNA and one that runs over TCP/IP. The version I’m going to discuss is the implementation over TCP/IP. While the default setting for DDM over TCP/IP is to require a valid user ID and password to make a connection to a target server, most IBM i shops have changed this setting and require only a valid user ID. In other words, when a DDM connection is established, the user making the DDM connection must have the same user profile name on the target server. When that’s the case, the connection is established.

MC Resource Centers

Backup and Recovery Considerations for Security Data and Encrypted Backups

Security expert Carol Woodbury is joined by the newest member of the HelpSystems team: Debbie Saugen.
Debbie is recognized worldwide as an expert on IBM i backup and recovery, disaster recovery, and high availability. For decades, Debbie has helped IBM i shops build and implement effective business continuity plans.
In today’s business climate, business continuity is more important than ever. But 83 percent of organizations are not totally confident in their backup strategy.
During this webinar, Carol and Debbie discuss the importance of a good backup plan, how to ensure you’re backing up your security information, and your options for encrypted back-ups.

Watch Now!

MC Video Showcase