May 26, 2017
• LEAD ARTICLE: C# for RPGers: Taking C# Loops for a Spin
• FEATURED ARTICLE: Why, for Most IBM i Shops, DDM Is Their Worst Vulnerability
• NEWS HIGHLIGHT: HelpSystems Introduces Multi-Factor Authentication
• ON-DEMAND WEBCAST: Backup and Recovery Considerations for Security Data and Encrypted Backups
• FEATURED VIDEO: The Art of Threat Hunting
• EVENT: Continuous Quality (CQ): Check the quality of your RPG source code, automatically
• MC VIDEO CENTER: Design an Invoice in 10 Minutes
The missing piece to the basic C# language puzzle will be presented here: looping structures. You already know FOR, but there’s more!
Written by Rafael Victoria-Pereira
A few TechTips ago, I talked about the FOR loop and how it works in C#. It’s now time to explain the other looping structures that this amazing language has to offer. I’ll be using the exact same test task in all of the code snippets: I’ll print a simple count from 1 to 5 using a loop.
Introducing the complete guide to building business Web applications! Now programmers of all levels can learn to build Web apps that do real business work. Written by business developers for business developers, Developing Business Applications for the Web bridges the gap between website and business application programming. You'll master the fundamentals of Web development tools and gain all the necessary skills to build Web browser front-end applications that let users interact with business data.
You’ve heard the buzz about open source on IBM i. But what is open source, and how can you use it? You’ll get answers in Open Source Starter Guide for IBM i Developers, the first book that explains open source development in IBM i terms. Join author Pete Helgren in exploring popular tools—PASE, XMLSERVICE, Ruby/Rails, PHP, Python, Node.js, and Apache Tomcat. You’ll take away lots of solid “how-to” information and be stoked to start building your own open source apps. Get your copy today!
Can’t wait? The wait is over…It’s finally here! The latest update to the classic IBM i security reference is now available. Fully secure your IBM i applications and data with help from security guru Carol Woodbury. Written in a clear, jargon-free style, you’ll learn why it’s vital to develop a security policy and how to implement and maintain such a system. You’ll also get expert advice for tackling today’s security threats. This new release is updated for the latest version of the IBM i operating system. Get your copy today!
Most IBM i shops have not secured their DDM implementation. Carol discusses why that’s putting those shops at risk.
Written by Carol Woodbury
Distributed Data Management (DDM) comes in two flavors: an ancient implementation that runs over SNA and one that runs over TCP/IP. The version I’m going to discuss is the implementation over TCP/IP. While the default setting for DDM over TCP/IP is to require a valid user ID and password to make a connection to a target server, most IBM i shops have changed this setting and require only a valid user ID. In other words, when a DDM connection is established, the user making the DDM connection must have the same user profile name on the target server. When that’s the case, the connection is established.
Security expert Carol Woodbury is joined by the newest member of the HelpSystems team: Debbie Saugen.
Debbie is recognized worldwide as an expert on IBM i backup and recovery, disaster recovery, and high availability. For decades, Debbie has helped IBM i shops build and implement effective business continuity plans.
In today’s business climate, business continuity is more important than ever. But 83 percent of organizations are not totally confident in their backup strategy.
During this webinar, Carol and Debbie discuss the importance of a good backup plan, how to ensure you’re backing up your security information, and your options for encrypted back-ups.