November 15, 2019
November 15, 2019 | Volume 14 Issue 41
- LEAD ARTICLE: TechTip: Let’s Have a Date, Part 2
- FEATURED ARTICLE: Why Do We Ignore the Insider Threat?
- FEATURED eCOURSE: AIX Security Basics eCourse
- NEWS HIGHLIGHT: TD/OMS and Gravity “Milestone 1” Enhancements Streamline Efficiency and Advance Application Development Potential for Remain Software Customers
- WEBCAST: Node.js on IBM i Webinar Series Pt. 2: Setting Up Your Development Tools
- MC VIDEO SHOWCASE: Design an Invoice in 10 Minutes
- EVENT: Ask the RDi Experts

TechTip: Let’s Have a Date, Part 2
Date-handling in jQuery is so much easier with moment.js.
By Jan Jorgensen
In the last tip, I showed you the fundamentals of moment.js, and I hope that got you started. This tip will show you some more basics and hopefully increase your interest in the moment.js plugin.
Moment.get ()
Sometimes you need to be able to do something at a specific time. In my first example, I show you a way to do that using the “set” function that moment.js provides. My example defines a simple clock that updates every 1 second, and I want to something different every 15 seconds, in this case change the background color in a <div> box.
IBM Makes Higher Quality Weather Forecasts Available Worldwide
IBM Assists in the Fight Against Human Trafficking

Why Do We Ignore the Insider Threat?
Carol provides insights on why the insider threat is being ignored and why that might not be a wise business decision.
By Carol Woodbury
Whenever I talk to clients or prospective clients and I even mention “insider threat,” I get one of two reactions: either they think I’m crazy (that could never happen because their employees wouldn’t have enough knowledge to do something inappropriate) or they’re offended (because they trust their employees and believe that none of them would ever do something nefarious).
Mobile Computing and the IBM i
Mobile computing is rapidly maturing into a solid platform for delivering enterprise applications. Many IBM i shops today are realizing that integrating their IBM i with mobile applications is the fast path to improved business workflows, better customer relations, and more responsive business reporting. The ROI that mobile applications can produce for your business is substantial.
This ASNA whitepaper takes a look at mobile computing for the IBM i. It discusses the different ways mobile applications may be used within the enterprise and how ASNA products solve the challenges mobile presents. It also presents the case that you already have the mobile programming team your projects need: that team is your existing RPG development team!
Download your copy today!
2019 State of IBM i Modernization
The annual Profound Logic ‘State of IBM i Modernization Survey” takes a look at the trends and attitudes that shape the IBM i modernization market. We reached out to the IBM i community, and the response was outstanding: close to 800 people, nearly 300 more than last year, took the survey. This enthusiasm resulted in very interesting findings for how businesses plan to use and modernize the platform in the coming year.
As you read through each section of the survey, you will see our summary of the results and suggestions for the future. We hope the survey will help your business better understand what is possible for your IBM i platform in the coming year.
IBM i skills depletion is a top concern for IBM i shops around the world. The strategies you discover in this webinar will help you ensure that your system of record—your IBM i—continues to deliver a powerful business advantage, even as staff retires.
During this 30-mintue recorded webinar, our panel of IBM i experts outline strategies that allow your company to cope with IBM i skills depletion by adopting these strategies that allow you to get the job done without deep expertise on the OS:
- Automate IBM i processes
- Use managed services to help fill the gaps
- Secure the system against data loss and viruses
watch now!
Make Modern Apps You'll Love with Profound UI & Profound.js
It's time to make your apps proud to be seen! Whether you have green screens or a drab GUI, your outdated apps can benefit from modern source code, modern GUIs, and modern tools. Alex Roytman and Liam Allan show you how Free-format RPG and Node.js make it possible to deliver apps your business will love.
You'll learn how you can use both Profound UI and Profound.js to: Transform legacy RPG code to modern free-format RPG and Node.js; Deliver truly modern application interfaces with Profound UI; Extend your RPG applications to include Web Services and NPM packages with Node.js.
Comply in 5! Well, actually UNDER 5 minutes!!
TRY the one package that solves all your document design and printing challenges on all your platforms.
Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product.
ACO MONITOR Manages your IBM i 24/7 and Notifies You When Your IBM i Needs Assistance!
ACO MONITOR is a complete systems management solution for your Power Systems running IBM i. ACO MONITOR manages your Power System 24/7, uses advanced technology (like two-way messaging) to notify on-duty support personnel, and responds to complex problems before they reach critical status.
ACO MONITOR is proven technology and is capable of processing thousands of mission-critical events daily. The software is pre-configured, easy to install, scalable, and greatly improves data center (and staff) efficiency.
Try ACO MONITOR FREE for 30 days.

AIX Security Basics eCourse
Intruders and rogue employees alike are able to invisibly exploit weaknesses from the inside out. This online eCourse allows you to browse various AIX security topics to learn how to mitigate common threats to your AIX environment.
By Core Security
Editor's note: This article introduces the AIX Security Basics eCourse, which is On-Demand and available to download and view from the MC White Paper Center.
With thousands of configuration settings and permissions to manage inside of AIX systems, it can seem overwhelming to ensure these systems maintain proper compliance. From users, password services, file, and directory permissions to how file systems are mounted and configured, there are countless elements to be on the lookout for. As you expand this into many different systems and start adding in Linux machines, which have the same compliance rules, and then add in your Windows machines with the same compliance rules, you quickly understand the tremendous scope you are managing, even in a small configuration with a few dozen systems.