MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

July 28, 2014 | Volume 9 Issue 13


TOP STORY: Understanding DB2 Object Privileges, Part 3
FEATURED ARTICLE: DR Strategy Guide for IBM i
NEWS HIGHLIGHT: Magic Software Launches New Enterprise Mobility Release
WHITE PAPER: Checklists for Checklists on Checklists … Why Not Automate?
MC VIDEO PORTAL: Best Practices for IBM i Security Administration
MC INDUSTRY BLOGS: Possible Hackability of Boeing 777 Illustrates Vulnerability of Integrated Systems
EVENT: IFS Security: Don’t Leave Your Server Vulnerable

Sponsor - The MC Press Bookstore

Taking Exam 610? Better brush up! Roger Sanders gives you all the help you need in his new DB2 10.1 Fundamentals: Certification Study Guide. As an exam developer and one of the world’s leading DB2 authors, Sanders walks you through every topic on the test and prepares you with 150 practice questions. Review planning, security, working with databases and database objects, SQL and XQuery, DB2 tables, and more. Arm yourself with this complete guide! Show what you know about DB2 10.1, and ace the exam!


Feature Article - Database
Understanding DB2 Object Privileges, Part 3

In the final installment of this three-part series, learn about DB2's system, server, nickname, and variable privileges plus several more.

roger sandersWritten by Roger E. Sanders

Editor's note: This article is an excerpt from the book DB2 10.1 Fundamentals: Certification Study Guide


In DB2 for Linux, UNIX, and Windows and DB2 for z/OS, object privileges convey the right to perform certain actions against specific database objects. Part 1 of this series reviewed DB2's authorization ID, buffer pool, table space, storage group, schema, table, view, and index privileges. Part 2 of this series reviewed DB2's sequence, distinct type, function, procedure, routine, collection, package, and plan privileges. In this article, we conclude our discussion of DB2 object privileges by examining the remaining privileges available to control user interactions with DB2 objects.


Sponsor - The MC Press Bookstore

Don't miss out! This is the hands-on guide to IBM's strategic language for IBM i. Database Design and SQL for DB2 delivers everything you need to know about database design and SQL. Author Jim Cooper gives you all the tips and techniques you need in one convenient place, whether you’re a beginner or an advanced developer. Includes real-life examples to help you hone your skills. The bonus companion website explains embedded SQL and explores client-side technologies.


Feature Article - System Administration
DR Strategy Guide for IBM i

Don't wait for a disaster. Start planning today.

Written by Maxava

Editor's note: This article introduces the white paper DR Strategy Guide for IBM i available free from the MC White Paper Center.


Organizations cannot control whether or not they will be affected by a natural disaster, extended power outage or any other unplanned incident. However, they can ensure their business is prepared to respond to and recover from these events with minimal disruption or impact to their customers.


These types of events disrupt business operations, and they all have the potential to cripple a business if a supporting contingency plan is not in place.


Sponsor - The MC Press Bookstore

System i Disaster Recovery Planning addresses the special disaster recovery planning issues of IBM i. It is your step-by-step guide to developing an effective, workable plan to protect your company's assets should the unthinkable happen. This title is now available in eBook format.

Click for a FREE chapter! >>


In the News

The Latest from IBM

Support MC Press - Visit Our Sponsors

Forums Sponsor



Search Sponsor



MC Video Portal

MC Video Portal

Best Practices for IBM i Security Administration

In this Webinar, based on her just-released e-book on Security Administration, Carol Woodbury, the authority in IBM i Security, discusses the tasks every IBM i Security Administrator should perform.  From system values to managing user profiles, administering authorities and handling IFS security issues, Carol provides guidance for automating tasks as well as tips for simplifying them.