MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

July 23, 2014 | Volume 3 Issue 4


TOP STORY: Is 2014 the Internet's Last Good Year?
FEATURED ARTICLE: ACO MONITOR: Managing Your IBM i Using Wireless Devices
NEWS HIGHLIGHT: RPG Can Now Directly Access Mobile Device Functionality Using LANSA's aXes Mobile App
TRIAL SOFTWARE: ACO MONITOR manages your IBM i 24-hours a day and notifies you immediately when your IBM i needs assistance!
MC VIDEO PORTAL: Best Practices for IBM i Security Administration
MC INDUSTRY BLOGS:3 Trends Changing Expectations Inside IBM i Shops
EVENT: 5 Ways to Secure Your IBM i Today from Cyber Attacks

Sponsor - ASNA

ASNA Mobile RPG (MR) empowers RPG programmers to create IBM i smartphone and tablet apps with ILE RPG. MR doesn’t requiring learning HTML or JavaScript or PHP or any other of the traditional mobile development technologies. Rather, RPG programmers simply use plain ol’ RPG to create smartphone and tablet apps. A Windows-based mobile UI designer is included that features many mobile “widgets” (including maps, charts, signature capture, images and others) for creating the mobile user interface.  Click for more info and free webcast schedule.


Feature Article - Networking
Is 2014 the Internet's Last Good Year?

Without our input, the Internet's fate is left to the whim of career politicians, lobbyists, and marketing departments.

roger penceWritten by Roger Pence

The destiny of the Internet as we know it today hangs on the fate of Net neutrality. I'll dig into some of the basics of Net neutrality in this article (with mostly fact but a few closing opinions), but before that, let's go back in time.


Sponsor - The MC Press Bookstore

PHP…Just for IBM i. This is the first book to comprehensively address PHP and how it can—and should—be deployed on the IBM i. Learn how to transfer skills from a green screen environment to the Web, become intimately familiar
with PHP’s commonly used features, and help start down the road of highly interactive Web-based application development. Click now to receive a FREE chapter of this best-selling resource! >>


Feature Article - Networking
ACO MONITOR: Managing Your IBM i Using Wireless Devices

Read on for an in-depth review of the native IBM i technology and ACO MONITOR's advanced two-way messaging features to remotely manage your IBM i while in or away from the office.

Written by DDL Systems, Inc.

Editor's Note: This article introduces the white paper "Automate IBM i Operations Using Wireless Devices" available free from the MC White Paper Center.


Managing the complexities of today's operating systems, business applications, and networks challenges even the most knowledgeable IT professionals. The cost to an enterprise of unplanned downtime, loss of human expertise during sick leave or vacation, and system/application or environmental failure can be devastating. Today's systems management applications monitor all critical tasks and make increasing use of your existing expertise and technology to maximize system availability, improve productivity, and increase customer service.


Sponsor - The MC Press Bookstore

The Remote System Explorer (RSE) is the most widely used tool within Rational Developer for System i and WebSphere Development Studio Client (WDSC). Focused exclusively on the RSE within Rational Developer for System i and WDSC, this book covers topics such as getting started, installation, understanding the Workbench, managing your i5/OS objects and members, editing, compiling, debugging, and much, much more. Click now to receive a FREE chapter of this best-selling developer resource! >>


In the News

The Latest from IBM

Support MC Press - Visit Our Sponsors

Forums Sponsor



Search Sponsor



MC Video Portal

MC Video Portal

Best Practices for IBM i Security Administration

In this Webinar, based on her just-released e-book on Security Administration, Carol Woodbury, the authority in IBM i Security, discusses the tasks every IBM i Security Administrator should perform.  From system values to managing user profiles, administering authorities and handling IFS security issues, Carol provides guidance for automating tasks as well as tips for simplifying them.