MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

October 1, 2014 | Volume 13 Issue 18


TOP STORY: Practical Integration: Mounting NFS Drives
FEATURED ARTICLE: Programs Tell the Truth: Retrieve the System Pointer to the PCS Object Associated with an MI Process
NEWS HIGHLIGHT: Enable Application and Database Modernization with Midrange Dynamics Change Management Version 7.2
ON-DEMAND WEBCAST: Coffee with Carol: Encrypting Data with FIELDPROC No Application Changes! with Guest Presenter Patrick Townsend
MC VIDEO PORTAL: Top Ten Security Vulnerabilities of IBM i Security Configuration 
EVENT: The Evolution of IBM i in the Data Center
MC INDUSTRY BLOG: 3 Trends Changing Expectations Inside IBM i 


Sponsor - ASNA

ASNA Mobile RPG (MR) empowers RPG programmers to create IBM i smartphone and tablet apps with ILE RPG. MR doesn’t requiring learning HTML or JavaScript or PHP or any other of the traditional mobile development technologies. Rather, RPG programmers simply use plain ol’ RPG to create smartphone and tablet apps. A Windows-based mobile UI designer is included that features many mobile “widgets” (including maps, charts, signature capture, images and others) for creating the mobile user interface. Learn more now!


Feature Article - Programming
Practical Integration: Mounting NFS Drives

FTP works everywhere, but it's not always the most practical solution; sometimes you just need to mount a drive.

joe plutaWritten by Joe Pluta

The more integrated the IBM i gets, the more ways it needs to touch other systems. Tools abound that allow us to stretch beyond the boundaries of traditional DB2 data into everything from XML to PDF to ZIP files. The IFS affords a wonderful place to store those files, but you can't just create them; eventually you have to share them with others. FTP is an old standby: simple yet extremely flexible. Email is another popular approach. But today we're going to learn about something just a little sleeker. Welcome to the world of Network File System (NFS) files!


Sponsor - Profound Logic Software

TODAY!  Don’t Miss: “See What i Can Do with Mobile Applications”
October 1, 2014 | 10:30-11:30 PDT

San Diego Regional Center (SDRC) needed a more efficient way to support their service coordinators in the field, but wanted to maintain their trusted RPG business application. The answer: mobile applications!

Discover the positive impact mobile applications can have on your workforce! Attend this Webinar and find out how Profound UI helped SDRC:

  • Create intuitive, modern mobile apps
  • Improve IBM i application adoption & reach
  • Support their clients from anywhere
  • Pave the way for future modernization

Save your spot now!


Feature Article - Programming
Programs Tell the Truth: Retrieve the System Pointer to the PCS Object Associated with an MI Process

Learn the technique that enables the operating system programs to achieve this task.

junlei liWritten by Junlei Li

In IBM i and its ancestors, an active job at the operating system level has an associated MI process, which is identified by a Process Control Space (PCS) MI object. The system pointer to a PCS object (with MI type/subtype code hex 1AEF) is used as the operand that identifies an MI process in process management MI instructionsfor example, the Materialize Process Attributes (MATPRATR) instruction. Several other process-related MI instructions also expect a PCS pointer as an operand (or part of an operand) that identifies an MI processfor example, the Materialize Process Locks (MATPRLK) instruction, and the Transfer Object Lock (XFRLOCK) instruction. Thus, to use these MI instructions we need to first obtain a system pointer to the PCS object associated with an MI process.


Sponsor - The MC Press Bookstore

PHP…Just for IBM i. This is the first book to comprehensively address PHP and how it can—and should—be deployed on the IBM i. Learn how to transfer skills from a green screen environment to the Web, become intimately familiar
with PHP’s commonly used features, and help start down the road of highly interactive Web-based application development. Click now to receive a FREE chapter of this best-selling resource! >>


MC Webcast Center


Coffee with Carol: Encrypting Data with FIELDPROC No Application Changes! with Guest Presenter Patrick Townsend

Encryption without application or database changes is now possible using FIELDPROC on IBM i V7R1. Guest Presenter Patrick Townsend will discuss how organizations of all sizes are implementing FIELDPROC encryption, incl. performance impacts, and how to make sure your FIELDPROC encryption solution will pass a compliance audit. Automatic encryption with FIELDPROC is absolutely the easiest, fastest, and most secure way to encrypt data on the IBM i.

Watch the on-demand Webinar now!


Be sure to check out these other useful offerings in the MC Webcast Center. 


5 Steps for Implementing Role-based Access on the IBM i. Presented by Carol Woodbury

5 Tips for Administering Security in the IFS

Affordable, Achievable Query, Reporting and Analytics

Addressing and Automating Audit Requirements for the IBM i

Auditing the IBM i

Automating IBM AIX PCI Compliance Reporting

Automating PCI Compliance Reporting on IBM i

Beyond FTP, Securing and Automating File Transfers

Coffee with Carol - Configuring IBM i (iSeries) Access servers to use SSL

Coffee with Carol: Step by Step Approach to Implementing Object Level Security

Coffee with Carol: Where do I Start with IBM i Security?

Common Configuration Mistakes and How to Correct Them

Create Amazing, Modern Apps With Profound UI

Dynamic Performance Management for the IBM i: Anticipate System Needs before Issues Happen

Get Results with NGS-IQ Business Intelligence

Getting the Most out of Your Audit Journal

IFS Security

Introducing ASNA Wings

Is Your Query Tool Limiting You?

Managing the Security of Your Data to Meet Your Business Needs

Mobile Applications for IBM i

Preparing for and Automating Audit Requirements for AIX

Programming/RPG - Advanced, Integrated RPG with Tom Snyder

Security and Compliance: What are the Issues on IBM AIX and How do they Relate to the IBM i

Security Considerations for IBM i Navigator for the Web

Simplifying IBM i Security Administration Tasks

SkyView Security Compliance Solution featuring Audit Journal Reporter.

The 12 Sections of PCI DSS and How Each Relates to the IBM i Community by Carol Woodbury

The Hidden Jewels of IBM i Security

The State of IBM i Security 2014

The Top Five RPG Open Access Myths....BUSTED!

Top 10 New Features of IBM i Security by Carol Woodbury

Top 10 Security and Compliance Considerations for Cloud Computing

Understanding the Cost of Downtime

Unleash the Power of IBM i

What's New with V6R1 Security

Why Companies Fail PCI audits


*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.

The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card.  Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security,  and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!


Have a On-Demand Webcast you would like to list? click here or call (208) 629-7275 for information.




In the News

The Latest from IBM

Support MC Press - Visit Our Sponsors

Forums Sponsor



Search Sponsor



MC Video Portal

MC Video Portal

Top Ten Security Vulnerabilities of IBM i Security Configuration

In this Webinar:  SkyView Partners has been performing security assessments for the IBM i community for over 12 years. Based on the findings of these assessments, Carol Woodbury will present the Top 10 vulnerabilities found in IBM i security configurations. She will talk about each issue, making sure to describe how the vulnerability poses risk to your data. In addition, her discussion will include the prevalence of these issues, how to assess the risk of these issues as they pertain to your environment and options for addressing the vulnerabilities.