November 7, 2016
November 7, 2016 | Volume 11 Issue 18
• LEAD ARTICLE: Hardening Your IBM i Ciphers
• FEATURED ARTICLE: Eye on the i World: HelpSystems Sees IBM i Vendor Consolidation as Healthy for the Market
• NEWS HIGHLIGHT: Sycomp Named 2016 Systems Specialty Partner
• WHITE PAPER: IBM i Security: Event Logging & Active Monitoring
• EVENT: Strategic Modernization with PHP - Webinar
Happy Halloween with IBM i 7.3 Technology Refresh 1
IBM announces a new cloud storage product inside IBM i 7.3 TR 1.
Written by Steve Pitcher
It’s October and that means two very important things:
One, I get to impose my yearly Sheriff of Nottingham-style 10 percent candy tax on my three kids after Halloween. And two, IBM has released its fall announcement for IBM i, in this case the news that IBM i 7.3 Technology Refresh 1 and 7.2 Technology Refresh 5 have been announced.
New! Mobile Access to IFS
kLink is a mobile application server running on your IBM i providing user initiated secure document retrieval from your IFS to mobile devices. This allows your users to login and view documents that you make available to them. kLink has built in security to prevent hacking and to quickly deliver private content only to the appropriate authorized end user. Safe and efficient distribution of public and private content to any browser or mobile device.
Free Live Trial www.computerkeyes.com or call 800 356 0203
Take the next step with PHP! Expand your knowledge and understanding of this essential programming language with the latest book from PHP guru Kevin Schroeder: Advanced Guide to PHP on IBM i. Master important PHP topics such as debugging, test-driven development, web-based development, advanced object-oriented programming, and web security. You’ll also get an in-depth look at the new PHP Toolkit for IBM i provided by Zend Technologies. Don’t delay; get started today on building your understanding and skill level with this example-packed, accessible book. Order today!
Save 35% off the Sale Price Enter Promo Code "2-Day-5149" at Checkout
Promo Code valid 11/08/2016 from 12:01am till 11/09/16 at 11:59 pm MDT Only
Become a CL Master. Whether you are a novice programmer who needs to get up to speed on the ins and outs of CL or an experienced professional looking for a daily CL reference, this comprehensive book is the guide you need. Available in both hard copy and eBook formats. Click now for a free chapter or to learn more. >>
Save 35% off the Sale Price Enter Promo Code "2-Day-5507" at Checkout
Promo Code valid 11/10/2016 from 12:01am till 11/11/16 at 11:59 pm MDT Only
Book Review: Database Design and SQL for DB2
If you have time for just one book to begin your journey into SQL on the IBM i, this is that book.
Reviewed by Joe Pluta
Writing technical books is always a juggling act between depth and breadth. Unless you're writing a 2,000-page Microsoft tome, there's no way you can provide both complete coverage and enough detail to be a complete reference. This is particularly true of books written for the IBM i, which have to serve the dual purpose of educating on the basic topic as well as addressing the nuances specific to the midrange platform. The best you can hope to do is to address the critical areas with enough depth to make someone productive.
Happily, James Cooper's book Database Design and SQL for DB2 manages to do exactly that.
New Ebook from Townsend Security available now.
IBM i Security: Event Logging & Active Monitoring
A Step by Step Guide
Active monitoring is one of the most critical and effective security controls that an organization can deploy. Unlike many Windows and Linux server deployments, the IBM i can host a complex mix of back-office applications, web applications, and open source applications and services - leaving millions of security events to actively monitor.
This eBook discusses:
- Real-time security event logging and monitoring
- Security architecture and logging sources on the IBM i
- Creating the IBM security audit journal QAUDJRN
- Enabling IBM security events through system values
- File integrity monitoring (FIM)
- A step by step checklist begin collecting and monitoring IBM i security logs
Download your copy today from the MC White Paper Center
Plus Choose From The Outstanding Selection in our MC White Paper Center
*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.