MAGAZINES

MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

January 20, 2014 | Volume 9 Issue 2

ISSUE HIGHLIGHTS

TOP STORY: In the Wheelhouse: The "Name." Again. Really.
FEATURED ARTICLE: Technology Focus: Are You Ready for Your Next Audit?
NEWS HIGHLIGHT: Comodo Releases Mobile Security 2.4 for Android with Enhanced Malware Detection
WHITE PAPER: Audit and Compliance White Papers
EVENT: Two Factor Authentication on the IBM i 

Feature Article - Anaysis
 
In the Wheelhouse: The "Name." Again. Really.

When you get old enough for your head to reach over the fence to have a look, that's when people start throwing rocks at it.

steve pitcherWritten by Steve Pitcher

A few points were raised in the comments section, via email, and on Twitter and LinkedIn regarding my last column. While the majority of the comments were positive and the spirit of the article was understood, a few responses should be brought to light. Most of those who had a complaint about the article jumped right to the subject of "the name." Ah, the familiar name issue. No mention of adding content to the blogging world, using the #IBMi hashtag on Twitter, or increasing the visibility and solidarity of a strong base of IBM i customers. Just "the name."


Read More >>

Sponsor - The MC Press Bookstore
 

What are the top 10 reasons IT projects fail? Find out in Fundamentals of Technology Project Management. This is the guide every tech project manager needs to learn vital project and people management skills. Written by certified project manager Colleen Garton, PMP, this book addresses the unique needs of the IT project manager. This second edition teaches you how to use new technologies and social media to help manage projects. Includes document templates for all phases of the project and tips on project scheduling, meeting agendas, cost analyses and more!


Read More >>

Feature Article - Security
 
Technology Focus: Are You Ready for Your Next Audit?

Unless maintaining compliance is a year-round effort in your enterprise, the answer to this question is very likely an emphatic "no!"

john gristWritten by John Ghrist

It's not often that we get to see a trendy new term enter the lexicon while being consciously aware it's happening. However, the recent holiday season may have given us that experience. Perhaps it's too early to tell for sure, but recent events should give additional meaningin the compliance market segment at leastto the term "You've been 'Targeted.' "


Read More >>

Sponsor - The MC Press Bookstore
 

The Essential Guide to Security. In this practical and highly readable guide--an update to her acclaimed IBM i & i5/OS Security & Compliance: A Practical Guide--security expert Carol Woodbury explains IBM i security and the way it functions within IBM i systems. Whether you’re new to IBM i or a seasoned veteran, this book contains the critical information and explanations you need to successfully maintain a secure system. Get your copy today. >>


Read More >>

Audit & Compliance White Papers
 

 Ways to Use IBM i Audit Journal

An IBM i system can be configured to audit security-relevant actions of every profile on the system or just a handful. Or it can be configured to audit the use of objects. The amount of information available in the audit journal is really quite amazing. Unfortunately, it’s one of the system’s best kept secrets! Even when people are aware of the audit journal, they often have no idea of what type of information is available. They assume – incorrectly – that it’s strictly information needed by auditors. Unbeknownst to many system administrators is the vast information in the audit journal that they could use on a daily basis. Even more of a mystery is how one “harvests” or retrieves information out of the audit journal in a readable format.

 

 

PCI DSS Compliance with Managed File Transfer

Leading edge IT shops are rethinking the use of underlying components within its data transfer arsenal, and are arming themselves to meet the ever changing requirements of PCI DSS and other compliance requirements.

This white paper examines how managed file transfer can help companies stay ahead of compliance regulations by keeping data transfers secure while saving time and allowing staff time to be reallocated to other projects.

 

 

 

 

How to Build a Requirements Roadmap for Proactive IBM i System Monitoring

Implementing proactive system monitoring in your IBM i environment begins with planning. The effectiveness of automated monitoring solutions should be evaluated based on the degree of visibility they can offer to potential problems, the time they save, and the flexibility they offer in meeting the specific views and requirements of your existing and developing network.
Your proactive monitoring solution should be able to anticipate repeat issues based on your system demands, applications, throughput, and configuration, as well as provide fast access to information that will pinpoint the cause of unforeseen issues and those that are otherwise difficult to isolate.
For system administrators and managers who are looking for a practical guide to help maximize a new or existing proactive approach to system and message monitoring.
Download this white paper to learn:

  • Information on must-have monitors
  • Shortcuts to greater efficiency
  • Checklists of requirements for a customized roadmap

                                

PCI Compliance for Power Systems Running IBM i

The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes, stores, or transmits credit card data. Read this white paper to learn how the PCI requirements relate to IBM i servers, what you need to be aware of when configuring your IBM i system, and how PowerTech’s security solutions can help you meet PCI compliance guidelines and satisfy auditors.

he Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes, stores, or transmits credit card data. Read this white paper to learn how the PCI requirements relate to IBM i servers, what you need to be aware of when configuring your IBM i system, and how PowerTech’s security solutions can help you meet PCI compliance guidelines and satisfy auditors.

Read More >>

In the News

Read More >>
The Latest from IBM

Read More >>
Support MC Press - Visit Our Sponsors

Forums Sponsor

POPULAR FORUMS

Forums

Search Sponsor

POPULAR SEARCHES

Search


Read More >>
   MC-STORE.COM