MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

January 23, 2015 | Volume 12 Issue 3


TOP STORY: Start Thinking About Security in New Ways
FEATURED ARTICLE: What Happened to the "RPG Academy" Column?
NEWS HIGHLIGHT:  Profound Logic and ARCAD Partner to Offer Businesses a Comprehensive IBM i Modernization Solution
MC PRESS BOOKSTORE:  New Year's Sale: EXTRA 15% OFF the Top 15 Bestsellers for 2014
EVENT:  SkyView Deep Dive Security Training for IBM i
MC VIDEO PORTAL: Using the Newer Clients for Accessing IBM i – Good for Security or Not

Sponsor - NEUGC

25th Annual Northeast IBM i User Groups Conference

March 30 – April 1, Framingham, MA

The Power of i

- Super Charge Developer Productivity

- Empower User Data Access

- Modernize Your Apps and Database

- Enhance Your Skills

70+ sessions; NEW topics for 2015; top industry speakers; in-depth seminars; vendor expo

Register before February 27 and save

Only $550 WITH Monday seminar! View Conference Brochure


Feature Article - Security
Start Thinking About Security in New Ways

Are you heads down, focused on the tasks in front of you? If so, you may be missing something. In this article, Carol discusses the need to stop, take time, and see if you need to think about things differently.

carol woodburyWritten by Carol Woodbury

At this time of year, I try to get away for a few days to relax and stop thinking about work. I've found that when I'm constantly heads down on work, I don't pick up on things around me that have changed. I tend to always do things the same way, but when I get away I may realize there's an easier or better way to do something. If I don't take a break, I'm unlikely to realize what I'm missing—as in new topics that I should be paying attention to or researching or new business opportunities that are right in front of my face but I couldn't "see" because I was too busy with other things. In this article, I'll encourage you to step back from your normal routine and see what you might be missing.


Sponsor - The MC Press Bookstore

The Essential Guide to Security. In this practical and highly readable guide--an update to her acclaimed IBM i & i5/OS Security & Compliance: A Practical Guide--security expert Carol Woodbury explains IBM i security and the way it functions within IBM i systems. Whether you’re new to IBM i or a seasoned veteran, this book contains the critical information and explanations you need to successfully maintain a secure system. Get your copy today. >>


Feature Article - Programming
What Happened to the "RPG Academy" Column?

It's missing! Find out where it went.


Have you been feeling lost without the very-popular "RPG Academy" column that used to be here in MC TNT Tips 'n Techniques? Don't worry! It's not gone. It just changed locations.


Most Popular MC Press Titles

Top 15 Best-Selling Titles for 2014

  1. Free-Format RPG IV
  2. IBM i Security Administration and Compliance
  3. Subfiles in Free-Format RPG
  4. Flexible Input, Dazzling Output with IBM i
  5. Advanced Guide to PHP on IBM i
  6. Database Design and SQL for DB2
  7. IBM System i APIs at Work
  8. Advanced, Integrated RPG
  9. The Remote System Explorer
  10. The IBM i Programmer's Guide to PHP
  11. Programming in RPG IV
  12. The Modern RPG IV Language
  13. Mastering IBM i
  14. DB2 10 for z/OS Database Administration (Exam 612)
  15. RPG TnT


In the News

Vendors:  Have a press release to share?  send it to MC Press

The Latest from IBM

Support MC Press - Visit Our Sponsors



Search Sponsor



MC Video Portal

MC Video Portal

Using the Newer Clients for Accessing IBM i – Good for Security or Not


In this session, Carol is pleased to be joined by long-time friend Tim Rowe – Business Architect for Systems Management and Application Development - from IBM in Rochester, MN. Tim and Carol will be discussing the security ‘pros and cons’ of the newer strategic clients that are available for accessing IBM i – including mobile, IBM i Access Client Solutions and i Access for the Web as well as a discussion on recently discovered vulnerabilities and exploits that may – or may not - affect these clients.