MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power
This Week @ the MC Press Bookstore

September 17, 2014 | Volume 13 Issue 17


TOP STORY: Installing Zend Server on the i: How and Why
FEATURED ARTICLE: The CL Corner: True and False Conditions
NEWS HIGHLIGHT: Merger Gives IBM i Market a Fresche Look  
MC INDUSTRY BLOGS: 3 Trends Changing Expectations Inside IBM i
MC VIDEO PORTAL: Top Ten Security Vulnerabilities of IBM i Security Configuration 
EVENT: User-Friendly, Real-Time Business Intelligence for IBM i with Business i

Sponsor - T.L. Ashford & Associates


Barcode400 Labeling Software makes it easy for IBM i users to design and print labels in minutes.

T.L. Ashford has over 30 years of experience in software development and backs that commitment with a highly qualified technical support team.

You can count on T.L. Ashford for your bar code, compliance and RFID labeling needs. Watch our video to see what Barcode400 Software can do for you. Call 800-541-4893 or use the Live Chat feature at


Feature Article - Programming
Installing Zend Server on the i: How and Why

Want to get started with PHP on the i? Well, the first step is to download the products that are available on the i from Zend. And the first part of that is to download the Zend Server. But how? And why?

david shireyWritten by David Shirey

PHP on the i. Why am I bothering to write about this? Mostly because I think we have reached a point where every RPGer and every IBM i should have some capability to do web-oriented languages. You might use Ruby or CGIDEV or even Java, but I'm a PHP fan.


Sponsor - Profound Logic Software

Don’t Miss: “See What i Can Do with Mobile Applications”
October 1, 2014 | 10:30-11:30 PDT

San Diego Regional Center (SDRC) needed a more efficient way to support their service coordinators in the field, but wanted to maintain their trusted RPG business application. The answer: mobile applications!

Discover the positive impact mobile applications can have on your workforce! Attend this Webinar and find out how Profound UI helped SDRC:

  • Create intuitive, modern mobile apps
  • Improve IBM i application adoption & reach
  • Support their clients from anywhere
  • Pave the way for future modernization

Save your spot now!


Feature Article - Programming
The CL Corner: True and False Conditions

Let's take a look at using logical variables.

bruce viningWritten by Bruce Vining

Recently, on TechTarget's IT Knowledge Exchange site, SundarNVS entered the following request:


"Hi! I have an iSeries [sic] database table that has a column name JOBQ. I want to update all records with JOBQ value QBATCH into 2 different jobq names for alternate records. I'm a CL programmer and looking for an example of updating a column via SQL that I can call from my CL in a loop."


Sponsor - The MC Press Bookstore

PHP…Just for IBM i. This is the first book to comprehensively address PHP and how it can—and should—be deployed on the IBM i. Learn how to transfer skills from a green screen environment to the Web, become intimately familiar
with PHP’s commonly used features, and help start down the road of highly interactive Web-based application development. Click now to receive a FREE chapter of this best-selling resource! >>


In the News

The Latest from IBM

Support MC Press - Visit Our Sponsors

Forums Sponsor



Search Sponsor



MC Video Portal

MC Video Portal

Top Ten Security Vulnerabilities of IBM i Security Configuration

In this Webinar:  SkyView Partners has been performing security assessments for the IBM i community for over 12 years. Based on the findings of these assessments, Carol Woodbury will present the Top 10 vulnerabilities found in IBM i security configurations. She will talk about each issue, making sure to describe how the vulnerability poses risk to your data. In addition, her discussion will include the prevalence of these issues, how to assess the risk of these issues as they pertain to your environment and options for addressing the vulnerabilities.