MAGAZINES

MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

September 10, 2010 | Volume 7 Issue 36

ISSUE HIGHLIGHTS

TOP STORY: TechTip: 7.1 Offers Encrypted Debug Views
FEATURED ARTICLE: Are Your Employees Traveling with (and Putting at Risk) Sensitive Company Information?
NEWS HIGHLIGHT: IBM Extends x86 Server Lineup with AMD Processors
FORUM: Printing PDFs from IFS
MC STORE: Top 10 Best-Selling Titles for August 2010
BLOG: System i Management Tips

Manage Subscription | Contact Us

Sponsor - Maxava
 

Maximum Availability Rolls-out Major Rebranding

Maximum Availability, a global leader in IBM i high availability (HA) software, announced this week that it has completed a major rebranding of both the Company and its suite of High Availability Products. The company has now formally embraced the trading name “Maxava,” and has rebranded its *noMAX product line as the new Maxava HA™ Suite.


Read More >>

Feature Article - TechTip
 
TechTip: 7.1 Offers Encrypted Debug Views

Thanks to the new DBGENCKEY parameter, you can now debug your customers' code while protecting your source.

gina_whitneyWritten by Gina Whitney

If you stop and think about what some of your most important assets to your company are, your source code would most likely be on that list. Protecting your code is essential. Unfortunately, there are times when one of your customers encounters a problem. The easiest way to figure out the problem would be to put a debuggable version of your code onto the system. But now, your code isn't protected anymore. So you either expose your code or figure out another way to diagnose the problem. Wouldn't it be nice to just ship a debuggable version of your code and have it secure? In 7.1, the ILE compilers (RPG, COBOL, CL, C, and C++) and precompilers have a new parameter that allows you to encrypt your debug views. This means that you can ship debuggable code and know that your code is not exposed.


Read More >>

Feature Article - Security
 
Are Your Employees Traveling with (and Putting at Risk) Sensitive Company Information?

The chances of travelers losing sensitive data riding on laptops, mobile devices, or USB drives are running high today for anyone who doesn't effectively encrypt their data.

chris_smithWritten by Chris Smith

Editor's Note: Chris Smith is on vacation this week, so we have revived one of his more popular columns pertaining to laptop and flash-drive security and data encryption that first appeared in June 2008 as "Hardware Encryption Offers Benefits over Software Encryption." The topic has as much relevance today as it did then.

 

We usually think of encrypting data as a way to protect it from hackers and criminals, but did you ever consider that the U.S. federal government can now search your laptop without probable cause?


Read More >>

Most Popular MC Press Books
 

Top 10 Best-Selling Titles for August 2010

  1. You Want To Do WHAT with PHP?
  2. The IBM i Programmer's Guide to PHP
  3. Advanced, Integrated RPG
  4. Functions in Free-Format RPG IV
  5. SQL for eServer i5 and iSeries
  6. The Remote System Explorer
  7. Free-Format RPG IV
  8. Programming in RPG IV, Fourth Edition
  9. HTML for the Business Developer
  10. The Modern RPG IV Language, Fourth Edition

 

 

 


Read More >>

In the News

Read More >>
Support MC Press - Visit Our Sponsors

 

Forums Sponsor

POPULAR FORUMS

Forums

 

 

Search Sponsor

 

Search

 


Read More >>
MC Industry Blog

BLOG: System i Management Tips from Vision Solutions, Inc.

 

Latest Posting: 3/26/10 Additional ways to see the contents of a user space (*USRSPC)

 

01/29/10 How to determine the jobs or objects responsible for generating journal entries in a journal receiver?


12/17/09 How to search for text in a file at the member level


11/20/09 Simplify replication of devices between two systems by matching hardware resource names


10/21/09 Know the impact of using the ENDJOBABN command


10/2/09 How to rapidly set up a network printer using IBM Personal Communications


Read More >>
   MC-STORE.COM