MAGAZINES

MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

February 2, 2015 | Volume 10 Issue 3

ISSUE HIGHLIGHTS

TOP STORY: In the Wheelhouse: Thoughts on IBM's Latest Resource Action
FEATURED NEWS: IBM Connections Files Cloud Makes Sharing Files Easy, Safe, and Secure for Your Company
NEWS HIGHLIGHT:  IBM Layoffs 2015: Here's What You Need To Know
• ON-DEMAND WEBCAST: The Explosion of Security Vulnerabilities Requires Diligent Act with Carol Woodbury & special guest Jeff Uehling
EVENT: How to Upgrade to IBM i 7.2
MC VIDEO PORTAL: Using the Newer Clients for Accessing IBM i – Good for Security or Not

 

Sponsor - Computer Keyes
 

New! Mobile Access to IFS

kLink is a mobile application server running on your IBM i providing user initiated secure document retrieval from your IFS to mobile devices. This allows your users to login and view documents that you make available to them. kLink has built in security to prevent hacking and to quickly deliver private content only to the appropriate authorized end user. Safe and efficient distribution of public and private content to any browser or mobile device.

Free Live Trial www.computerkeyes.com or call 800 356 0203.


Read More >>

Feature Article - Analysis
 
In the Wheelhouse: Thoughts on IBM's Latest Resource Action

There is no upside or silver lining when good people lose their jobs.

steve pitcherWritten by Steve Pitcher

On January 19, Forbes contributor Robert X. Cringely wrote a piece on a forthcoming "hell week" in which IBM would begin a 26% "resource action" (RA) that would cost potentially 110,000 employees their jobs. This downsizing is called Project Chrome.

 

IBM Hong Kong's blog stated on January 26 that "IBM does not comment on rumors or speculation. However, we'll make an exception when the speculation is stupid. That's the case here, where an industry gadfly is trying to make noise about how IBM is about to lay off 26 percent of its workforce. That's over 100,000 people, which is totally ludicrous.


Read More >>

Sponsor - Profound Logic Software
 

February 25, 2015 | 8:30 PST/11:30 EST
Make 2015 the year of modernization in your company! It’s easy with tools from ARCAD Software and Profound Logic Software.

ARCAD and Profound Logic have partnered to provide the most comprehensive solutions for database, code and application modernization.

Attend their February 25 Webinar and learn how modernization will help you:

  • Reduce Costs
  • Minimize Risks
  • Future-Proof Technology
  • Improve User Satisfaction

Register for the Webinar now!


Read More >>

Featured News
 
IBM Connections Files Cloud Makes Sharing Files Easy, Safe, and Secure for Your Company

IBM Connections Cloud provides cloud-delivered online technologies for businesses that combine social networking and online collaboration, messaging, and web conference tools.


Read More >>

Sponsor - NEUGC
 

25th Annual Northeast IBM i User Groups Conference

March 30 – April 1, Framingham, MA

The Power of i

- Super Charge Developer Productivity

- Empower User Data Access

- Modernize Your Apps and Database

- Enhance Your Skills

70+ sessions; NEW topics for 2015; top industry speakers; in-depth seminars; vendor expo

Register before February 27 and save

Only $550 WITH Monday seminar! View Conference Brochure


Read More >>

MC Webcast Center
 

Don't miss these Featured On-Demand Webcasts:

 

Affordable Query Tool for Software Developers

NGS’ Software Developer Kit (SDK) gives IBM i developers comprehensive query, dynamic mobile reporting, analytics and Web report design features at an affordable cost. Install and create meaningful outputs for managers in one day! Web page and portal integration, email, FTP are included.

The $895* SDK includes a one user license, online training, user manuals, one year of software maintenance; toll-free support and online incident reporting.

If you….

want to modernize beyond Query/400 and PC files transfers

need a Web reporting solution without the learning curve and overhead of DB2 Web Query

have many reporting needs, but a tight budget and small staff

 

view a demo; then order a Free Trial of the SDK.

* Limited time offer.

 

Element Break

The Explosion of Security Vulnerabilities Requires Diligent Act with Carol Woodbury & special guest Jeff Uehling

Carol is pleased to be joined for this Coffee with Carol by friend and former colleague Jeff Uehling, current Chief Security Architect for IBM i.  Jeff and Carol will be discussing a number of the recent Security Vulnerabilities which have had a huge, industry-wide impact on both hardware and software vendors - including IBM and the IBM i development groups. These security vulnerabilities include well-publicized ones such as Heartbleed, Bash/Shellshock and Poodle as well as numerous vulnerabilities that haven’t hit the media. These vulnerabilities exist in areas such as Java, OpenSSL and many networking areas of your systems.

 

IBM i has long been known as a secure platform on which you can run your business critical applications. However, securing the system requires careful attention to the system-wide security configuration options, managing the authority settings on your data objects which contain your business critical data (corporate assets), and - as importantly - staying current with your enterprise-wide maintenance and ensure the latest PTFs/Fixes are installed in order to close "real" or "potential" security holes.

 

Element Break

Take IBM i Everywhere with Mobile Apps – Watch the Webinar!

Is mobile an initiative for your business? Find out how you can go beyond Web applications to create applications with native device capabilities, such as Camera… even if you’ve never created a mobile application!
Watch this on-demand Webinar with IBM’s Tim Rowe and Profound Logic’s Scott Klement and Alex Roytman, and discover how you can create high-quality mobile applications using your existing RPG knowledge and the right tools.

You’ll learn:

  • How the IBM i platform supports mobile development
  • Why hybrid applications are a great option to deliver mobile apps with more functionality than Web apps can offer
  • How to develop mobile apps with native capabilities without becoming an Obj-C and Java expert, or using overly complicated tools

Element Break

Introduction to Configuring iAccess Servers to use SSL Presented by Carol Woodbury

Due to popular demand, Carol has updated her presentation on configuring iAccess to use SSL sessions to include, not just the step-by-step configuration guidance but also a discussion on the benefits and challenges of using certificates from a well-known CA (Certificate Authority) vs a self-signed certificate as well as practical tips for enterprise implementation.

Element Break

 

 


Plus choose from the Complete Collection in the MC Press Webcast Center

 

*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.

 

The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card.  Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security,  and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!

 

Have a Webcast you would like to list? click here or call (208) 629-7275 Ext.504 for information.

 

 


Read More >>

In the News

Vendors:  Have a press release to share?  send it to MC Press


Read More >>
The Latest from IBM

Read More >>
Support MC Press - Visit Our Sponsors

Forums Sponsor

POPULAR FORUMS

Forums

Search Sponsor

POPULAR SEARCHES

Search


Read More >>
MC Video Portal

MC Video Portal

Using the Newer Clients for Accessing IBM i – Good for Security or Not

 

In this session, Carol is pleased to be joined by long-time friend Tim Rowe – Business Architect for Systems Management and Application Development - from IBM in Rochester, MN. Tim and Carol will be discussing the security ‘pros and cons’ of the newer strategic clients that are available for accessing IBM i – including mobile, IBM i Access Client Solutions and i Access for the Web as well as a discussion on recently discovered vulnerabilities and exploits that may – or may not - affect these clients.


Read More >>
   MC-STORE.COM