MAGAZINES

MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

July 28, 2014 | Volume 9 Issue 13

ISSUE HIGHLIGHTS

TOP STORY: Understanding DB2 Object Privileges, Part 3
FEATURED ARTICLE: DR Strategy Guide for IBM i
NEWS HIGHLIGHT: Magic Software Launches New Enterprise Mobility Release
WHITE PAPER: Checklists for Checklists on Checklists … Why Not Automate?
MC VIDEO PORTAL: Best Practices for IBM i Security Administration
MC INDUSTRY BLOGS: Possible Hackability of Boeing 777 Illustrates Vulnerability of Integrated Systems
EVENT: IFS Security: Don’t Leave Your Server Vulnerable

Sponsor - The MC Press Bookstore
 

Taking Exam 610? Better brush up! Roger Sanders gives you all the help you need in his new DB2 10.1 Fundamentals: Certification Study Guide. As an exam developer and one of the world’s leading DB2 authors, Sanders walks you through every topic on the test and prepares you with 150 practice questions. Review planning, security, working with databases and database objects, SQL and XQuery, DB2 tables, and more. Arm yourself with this complete guide! Show what you know about DB2 10.1, and ace the exam!


Read More >>

Feature Article - Database
 
Understanding DB2 Object Privileges, Part 3

In the final installment of this three-part series, learn about DB2's system, server, nickname, and variable privileges plus several more.

roger sandersWritten by Roger E. Sanders

Editor's note: This article is an excerpt from the book DB2 10.1 Fundamentals: Certification Study Guide

 

In DB2 for Linux, UNIX, and Windows and DB2 for z/OS, object privileges convey the right to perform certain actions against specific database objects. Part 1 of this series reviewed DB2's authorization ID, buffer pool, table space, storage group, schema, table, view, and index privileges. Part 2 of this series reviewed DB2's sequence, distinct type, function, procedure, routine, collection, package, and plan privileges. In this article, we conclude our discussion of DB2 object privileges by examining the remaining privileges available to control user interactions with DB2 objects.


Read More >>

Sponsor - The MC Press Bookstore
 

Don't miss out! This is the hands-on guide to IBM's strategic language for IBM i. Database Design and SQL for DB2 delivers everything you need to know about database design and SQL. Author Jim Cooper gives you all the tips and techniques you need in one convenient place, whether you’re a beginner or an advanced developer. Includes real-life examples to help you hone your skills. The bonus companion website explains embedded SQL and explores client-side technologies.


Read More >>

Feature Article - System Administration
 
DR Strategy Guide for IBM i

Don't wait for a disaster. Start planning today.

Written by Maxava

Editor's note: This article introduces the white paper DR Strategy Guide for IBM i available free from the MC White Paper Center.

 

Organizations cannot control whether or not they will be affected by a natural disaster, extended power outage or any other unplanned incident. However, they can ensure their business is prepared to respond to and recover from these events with minimal disruption or impact to their customers.

 

These types of events disrupt business operations, and they all have the potential to cripple a business if a supporting contingency plan is not in place.


Read More >>


Sponsor - The MC Press Bookstore
 

System i Disaster Recovery Planning addresses the special disaster recovery planning issues of IBM i. It is your step-by-step guide to developing an effective, workable plan to protect your company's assets should the unthinkable happen. This title is now available in eBook format.

Click for a FREE chapter! >>


Read More >>

In the News

Read More >>
The Latest from IBM

Read More >>
Support MC Press - Visit Our Sponsors

Forums Sponsor

POPULAR FORUMS

Forums

Search Sponsor

POPULAR SEARCHES

Search


Read More >>
MC Video Portal

MC Video Portal

Best Practices for IBM i Security Administration

In this Webinar, based on her just-released e-book on Security Administration, Carol Woodbury, the authority in IBM i Security, discusses the tasks every IBM i Security Administrator should perform.  From system values to managing user profiles, administering authorities and handling IFS security issues, Carol provides guidance for automating tasks as well as tips for simplifying them.


Read More >>
   MC-STORE.COM