MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

April 27, 2009 | Vol 4 Issue 8


In This Issue:

Feature Article - Security
Does It Matter if Your Security Solution Runs Natively on IBM i?

Certainly, you're much too wise to think that a network appliance will protect your data. Or are you?

john_earl.jpgby John Earl

Security solutions are all the same, right? If it runs well on Linux or Windows, it ought to work well on the System i, right?


If you're a dyed-in-the-wool System i professional, you probably don't believe that. You're well aware of the differences between the System i operating systems (IBM i, i5/OS, OS/400) and the popular UNIX flavors. But sometimes you have to convince other IT team members in your organization that the solutions they've deployed on other platforms are not necessarily the best fit for the System i.


Feature Article - Application Software
A Proactive Approach Is Needed to Address IBM's Legacy Solutions

ISVs and enterprises must move forward, while leveraging their existing knowledge and investments.

greg_schottland.jpgBy Greg Schottland

Editor's Note: This article is excerpted from the white paper "The System i Challenge," which is available free from the MC White Paper Center.


The System i (formerly known as iSeries and AS/400) is a midrange platform produced by IBM. In the '90s, the AS/400 platform became one of IBM's greatest success stories. A symbiotic relationship between platforms and independent software vendors (ISVs) proved to be a critical success factor for both the platform and the application providers. The value propositions of the System i platform and the advantage over alternatives led thousands of enterprises and ISVs to develop vertical applications based on System i and to put their trust into and base their future on this environment. It was the golden age of the platform, and new vertical solutions were created one after the other.


Advertorial - Bytware, Inc.
Partner TechTip: Regulations and Guidelines Call for Virus Protection

What is the role of anti-virus software in your regulatory compliance efforts?

By Christopher Jones

It's impossible to use an Internet-connected computer today without being surrounded by threats from viruses, hackers, and malicious code. But exactly which areas of the infrastructure are at risk is an oft-debated topic. Some popular views hold that client PCs are at risk and midrange servers are safe. Other views hold that the transmission process flows from the client PC to the midrange server. The first view is false. In today's interconnected environments, no system is immune to virus infection. The second view is true, but it's only part of the story.


Support MC Press - Visit Our Sponsors


Forums Sponsor


 Popular Forums



   Search Sponsor


 Popular Searches