April 28, 2017
• LEAD ARTICLE: TechTip: C# for RPGers: Making Stuff Happen, Part 2 - More Flow Control Structures
• FEATURED ARTICLE: The Importance of Staying Current
• NEWS HIGHLIGHT: ARCAD strengthens IBM’s modernization portfolio with ARCAD RPG Converter for IBM i and ARCAD Observer for IBM i
• WHITE PAPER: IBM i Security: Event Logging & Active Monitoring
• FEATURED VIDEO: The Art of Threat Hunting
• EVENT: 2017 Annual Meeting and Exposition May 7-10 | Orlando, Florida
• MC VIDEO SHOWCASE: New - Design an Invoice in 10 Minutes
Last time around, I explained the IF statement. Now it’s time to get to know a couple more C# flow control structures.
Written by Rafael Victória-Pereira
If you read the previous TechTip of this series, you already know that the IF statement in C# is similar to its RPG counterpart. It’s true that there are differences, but in general they’re pretty much alike. Even though I didn’t mention it in the previous TechTip, you can create IF-ELSE-IF structures in C# just like you do in RPG. As you know, abusing this facility usually leads to a stairwell-like structure (if you’re using RPG /free and proper indentation) or a Find-The-Right-EndIf game (similar to Where’s Wally, but not so fun). To avoid these pitfalls, a sensible programmer uses a Select-When structure instead of nested IF-ELSE-IF blocks. There’s also a similar control flow structure in C#, under a different name: Switch-Case.
Valence 5.1 is on the Launch Pad!
Since 2008, RPG developers around the world have been using Valence to create stunning IBM i-based web and mobile apps. Whether you’re looking to create executive dashboards with download-to-Excel features, file maintenance utilities, custom web services or even intricate order entry apps, Valence has a solution for you — in many cases with no programming required!
Download Valence 5.0 today for a free test drive on your IBM i system and receive a 10% discount coupon for the forthcoming Valence 5.1 release. Hurry! Offer ends May 9.
Introducing the complete guide to building business Web applications! Now programmers of all levels can learn to build Web apps that do real business work. Written by business developers for business developers, Developing Business Applications for the Web bridges the gap between website and business application programming. You'll master the fundamentals of Web development tools and gain all the necessary skills to build Web browser front-end applications that let users interact with business data.
Confused About Identity Management? Get expert help in this latest release from MC Press. Author Graham Williamson explains identity management for business people. Business managers and CIOs will learn how to manage today's identity challenges relating to access control, the cloud, consumers, data security, and the Internet of Things. If you are tasked with fitting identity management into your business strategy, then Identity Management: A Business Perspective is the perfect guide for you!
Carol discusses why and how staying up to date reduces your company’s security risk.
Written by Carol Woodbury
You might wonder why I decided to discuss this particular issue. I chose this topic because, as I read about how breaches occur—that is, how hackers are able to penetrate organizations—in many instances, it’s due to organizations not staying current.
Equipment remains with default credentials or is running an old operating system or is left unpatched—even when there are known vulnerabilities. Hackers will “drive by” or may go explicitly looking to exploit servers with known vulnerabilities.
A Step by Step Guide
Active monitoring is one of the most critical and effective security controls that an organization can deploy. Unlike many Windows and Linux server deployments, the IBM i can host a complex mix of back-office applications, web applications, and open source applications and services - leaving millions of security events to actively monitor.
This eBook discusses:
- Real-time security event logging and monitoring
- Security architecture and logging sources on the IBM i
- Creating the IBM security audit journal QAUDJRN
- Enabling IBM security events through system values
- File integrity monitoring (FIM)
- A step by step checklist begin collecting and monitoring IBM i security logs
Plus Choose From The Outstanding Selection in our MC White Paper Center
*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.