MAGAZINES

MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

October 6, 2014 | Volume 9 Issue 17

ISSUE HIGHLIGHTS

TOP STORY: In the Wheelhouse: Heavy Metal for Halloween
FEATURED NEWS:  Record Number of IBM i User Community Applicants Awarded Funding from Maxava iFoundation
NEWS HIGHLIGHT: HelpSystems Announces Browser Interface, Dashboards, Enhanced Filtering in Security Software Update
MC PRESS BOOKSTORE: Top 10 Best-Selling Titles 
MC VIDEO PORTAL:Top Ten Security Vulnerabilities of IBM i Security Configuration 
EVENT:IBM i (iSeries AS/400) Expanded Operations Workshop

 

Sponsor - Computer Keyes
 

New! Mobile Access to IFS

kLink is a mobile application server running on your IBM i providing user initiated secure document retrieval from your IFS to mobile devices. This allows your users to login and view documents that you make available to them. kLink has built in security to prevent hacking and to quickly deliver private content only to the appropriate authorized end user. Safe and efficient distribution of public and private content to any browser or mobile device.

Free Live Trial www.computerkeyes.com or call 800 356 0203.


Read More >>

Feature Article - Analysis
 
In the Wheelhouse: Heavy Metal for Halloween

IBM announces smokin' new hardware plus Technology Refreshes for IBM i 7.1 and 7.2.

steve pitcherWritten by Steve Pitcher

Today's set of announcements for both IBM i 7.1 Technology Refresh 9 and IBM i 7.2 Technology Refresh 1 are pretty cool. What you have to remember is that most updates for IBM i 7.2 TR1 are included in IBM i 7.1 TR9. More details will follow. From what I understand, everything I'm writing about today is included in both TRs.


Read More >>

Sponsor - Maxava
 

Real-time Replication for IBM I with Data Recovery Measured in Minutes

Excellence as Standard

Unequalled performance (come to us first – Maxava delivers where others fail); guaranteed implementation success; simple management in minutes per day, backed-up by 24x7 expert support; local and mobile GUI interfaces; continuous software enhancement; honest and transparent pricing, upgrades and license transfers.  PLUS remote monitoring & management and fully supported Cloud DR options.

Find out more...

 


Read More >>

Featured News
 
Record Number of IBM i User Community Applicants Awarded Funding from Maxava iFoundation

Maxava is delighted to report a record number of applicants to its 2014-15 Maxava iFoundation program, announced earlier this year.


Read More >>

Sponsor - The MC Press Bookstore
 

An old dog can learn new tricks! Flexible Input, Dazzling Output with IBM i is full of clever ways to get data into your IBM i system, as well as new techniques to export and present this data in a modern, business-friendly manner. No more boring spreadsheets or ugly printouts! Your DB2 data will look great in program-generated spreadsheets and browser-based, interactive charts. Whether you’re an old dog or not, you’ll get the most out of your ILE RPG programs with the open source, free tools in this smart new release! Order your copy today!


Read More >>

Most Popular MC Press Books
 

Top 10 Best-Selling Titles

  1. Flexible Input, Dazzling Output with IBM i
  2. RPG TnT
  3. Subfiles in Free-Format RPG
  4. DB2 10.1 Fundamentals (Exam 610)
  5. The Remote System Explorer
  6. Advanced, Integrated RPG
  7. Advanced Guide to PHP on IBM i
  8. Database Design and SQL for DB2
  9. DB2 10 for z/OS Database Administration (Exam 612)
  10. Big Data Analytics

 


Read More >>

MC Video Portal
 

MC Video Portal

Top Ten Security Vulnerabilities of IBM i Security Configuration

In this Webinar:  SkyView Partners has been performing security assessments for the IBM i community for over 12 years. Based on the findings of these assessments, Carol Woodbury will present the Top 10 vulnerabilities found in IBM i security configurations. She will talk about each issue, making sure to describe how the vulnerability poses risk to your data. In addition, her discussion will include the prevalence of these issues, how to assess the risk of these issues as they pertain to your environment and options for addressing the vulnerabilities.


Read More >>

In the News

Read More >>
The Latest from IBM

Read More >>
Support MC Press - Visit Our Sponsors

Forums Sponsor

POPULAR FORUMS

Forums

Search Sponsor

POPULAR SEARCHES

Search


Read More >>
   MC-STORE.COM