MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

August 25, 2014 | Volume 9 Issue 15


TOP STORY: Tackling IBM i Enterprise Key Management
FEATURED ARTICLE: Environmental Hazards to Peak Performance
NEWS HIGHLIGHT: Susan Gantner Shares New "Favorite RSE Keyboard Shortcuts" Tip Sheet
WHITE PAPER: Environmental Hazards to Peak Performance
MC VIDEO PORTAL:  Step by Step Approach to Implementing Object Level Security
MC INDUSTRY BLOGS:Possible Hackability of Boeing 777 Illustrates Vulnerability of Integrated Systems
EVENT: Why You Shouldn’t Worry about Hackers

Sponsor - The MC Press Bookstore

The Essential Guide to Security. In this practical and highly readable guide--an update to her acclaimed IBM i & i5/OS Security & Compliance: A Practical Guide--security expert Carol Woodbury explains IBM i security and the way it functions within IBM i systems. Whether you’re new to IBM i or a seasoned veteran, this book contains the critical information and explanations you need to successfully maintain a secure system. Get your copy today. >>


Feature Article - Security
Tackling IBM i Enterprise Key Management

The hardest part of security is encryption, and the hardest part of encryption is key management.

patrick townsendWritten by Patrick Townsend

For a variety of reasons, IBM i customers struggle when implementing the encryption of sensitive information. There is wide acceptance and knowledge that sensitive information should be encrypted, but there is also a large amount of fear about its implementation, especially around encryption key management. Concerns about performance, business continuity, and systems management are common in IBM i shops. In fairness, these are also concerns for users of other server platforms and operating systems, such as Microsoft Windows Server, Linux, and IBM System z mainframe.


Sponsor - The MC Press Bookstore

Deliver Business Value with Virtualization: This Book Shows You How

Organizations around the world have embraced virtualization in their quest to meet the ever-expanding demand for IT computing infrastructure resources. Yet virtualization technologies often fail to provide business value that resonates with the organization’s lines of business. IT Virtualization Best Practices guides you toward a “lean” virtualization implementation using service patterns and teaches you how to manage IT infrastructures to provide compelling business value. Get your copy today.


Feature Article - System Administration
Environmental Hazards to Peak Performance

Find out why network monitoring is so important for IBM i managers.

Written by CCSS

Editor's note: This article introduces the white paper "Environmental Hazards to Peak Performance" available free from the MC White Paper Center.


A professional athlete must consider several factors in order to deliver his best performance. The food he eats, the way he physically trains and mentally prepares, as well as his strategy and technique all play a part in deriving the best result. Imagine that athlete was completely prepared when he started the race of his life, having attended to all these things, only to have his performance ruined when he was struck by lightning. Unfortunate, some would say, but that's life.


Sponsor - The MC Press Bookstore

The Book Every Leader Should Read

Do you aspire to become a leader, want to improve your leadership skills, or simply enjoy good stories? Then this book is for you. Leadership in My Rearview Mirror shares the leadership insights of a man who rose from reluctant draftee to decorated Army colonel, helped build the Department of Behavioral Sciences and Leadership at the U.S. Military Academy at West Point, and now works to develop IBM's most senior leaders. Using concise and highly entertaining anecdotal chapters, Jack Beach reveals what it takes to be a superior leader, demonstrating that the primary task of leaders, especially those in senior positions, is to create an organizational climate characterized by 360 degrees of trust and deep engagement. Buy your copy today.


In the News

The Latest from IBM

Support MC Press - Visit Our Sponsors

Forums Sponsor



Search Sponsor



MC Video Portal

MC Video Portal

Step by Step Approach to Implementing Object Level Security

In this Webinar:  More organizations are realizing the need for implementing object level security -- especially for database files that contain information which must comply with various laws or regulations. But the question many administrators have is, how do you secure files without breaking the application or other processes? During this presentation, security expert Carol Woodbury will discuss how. Configuration options, testing steps, "gotchas" to avoid, along with real-life examples will be presented.