MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

July 2, 2014 | Volume 13 Issue 12


TOP STORY: Practical RPG: Using Data Queues, Part 1
FEATURED ARTICLE: The Modify Addressability (MODADR) MI Instruction
NEWS HIGHLIGHT: IBM i User Community invited to request fresh funding via Maxava iFoundation
MC PRESS BOOKSTORE: Top 10 Best-Selling Titles
MC VIDEO PORTAL: Configuring IBM i iSeries Access Server to Use SSL
MC INDUSTRY BLOGS: Possible hackability of Boeing 777 illustrates vulnerability of integrated systems
EVENT: Security Alerts: IBM i

Sponsor - The MC Press Bookstore

101 Dynamite RPG Tips ‘n Techniques! Bob Cozzi provides the solutions to dozens of technical dilemmas, gives you insights into resources formerly available only to a select few, and exposes RPG IV extensions that use his vast knowledge of System i MI instructions. Lift the code right out of the book and into your applications! RPG TnT provides a nearly endless supply of must-have solutions and simple yet powerful RPG tips and tools.

Available in print and eBook. >>


Feature Article - Programming
Practical RPG: Using Data Queues, Part 1


This article moves past the basics of data queues to the practical application of these lightweight communication marvels.


joe plutaWritten by Joe Pluta


In previous articles on data queues and on keyed data queues, I presented the basics of how to create them and how to program for them. I went into some detail about the commands used to manage data queues and the RPG code required to access them. In these next articles, I'm going to go a slightly different direction and present you with the actual business case for using data queues in a robust multi-user (and even multi-platform) architecture.


Sponsor - The MC Press Bookstore

The Long Awaited Update to a Classic! Learning to master subfiles can define a programmer’s career. Over a decade in the making, author Kevin Vandever has completely reworked and updated his best-selling subfiles classic to make use of the latest free-format programming style. It is the ultimate guide to subfiles and one that every programmer working with IBM Power Systems will find indispensible. Now available in eBook format! >>


Feature Article - Programming
The Modify Addressability (MODADR) MI Instruction

Let's experiment with the MODADR MI instruction and see what we discover.

junlei liWritten by Junlei Li

In IBM i and its ancestors, a context (a library at the operating system level) is an MI object that contains addressabilities to other MI objects. An MI object either has its addressability placed in a context object (library) or not. If the addressability to an MI object is contained in a context, the MI object can be addressed symbolically via the Resolve System Pointer (RSLVSP) MI instruction through the context.


Sponsor - The MC Press Bookstore

Now Available in eBook Format: IBM System i APIs at Work, Second Edition: In this latest edition of the best-selling API reference, acclaimed expert Bruce Vining completely rewrites the book on APIs. With over 700 information-packed pages this is the ultimate API guide and a must-have for any professional working with System i (AS/400, i5/iSeries). Get your copy today!


Most Popular MC Press Titles

Top 10 Best-Selling Titles

  1. SQL for eServer i5 and iSeries
  2. System i Disaster Recovery Planning
  3. The Remote System Explorer
  4. Complete CL
  5. RPG TnT
  6. IBM i Security Administration and Compliance
  7. Free-Format RPG
  8. Mastering IBM i
  9. Database Design and SQL for DB2
  10. Control Language Programming for IBM i



In the News

The Latest from IBM

Support MC Press - Visit Our Sponsors

Forums Sponsor



Search Sponsor



MC Video Portal

MC Video Portal

Configuring IBM i iSeries Access Server to Use SSL

In this Webinar security expert Carol Woodbury will discuss that several laws and regulations, including the PCI Data Security Standards require that administrators access the system over an encrypted session. Whether you have to comply with one of these regulations or you want to implement this because it's a good security practice, this session will provide the step-by-step instructions for configuring these encrypted sessions. During this webinar, you'll find out how to configure the IBM i using DCM (Digital Certificate Manager) and the steps to configure the clients.