May 26, 2017

MC TNT Header

Issue Highlights

May 26, 2017 | Volume 14 Issue 10

• LEAD ARTICLE: C# for RPGers: Taking C# Loops for a Spin

• FEATURED ARTICLE: Why, for Most IBM i Shops, DDM Is Their Worst Vulnerability

• NEWS HIGHLIGHT: HelpSystems Introduces Multi-Factor Authentication

• ON-DEMAND WEBCAST: Backup and Recovery Considerations for Security Data and Encrypted Backups

• FEATURED VIDEO: The Art of Threat Hunting

• EVENT: Continuous Quality (CQ): Check the quality of your RPG source code, automatically

• MC VIDEO CENTER: Design an Invoice in 10 Minutes

Lead Article - Programming

C# for RPGers: Taking C# Loops for a Spin

The missing piece to the basic C# language puzzle will be presented here: looping structures. You already know FOR, but there’s more!

Written by Rafael Victoria-Pereira

few TechTips ago, I talked about the FOR loop and how it works in C#. It’s now time to explain the other looping structures that this amazing language has to offer. I’ll be using the exact same test task in all of the code snippets: I’ll print a simple count from 1 to 5 using a loop.

MC Press Bookstore

Introducing the complete guide to building business Web applications! Now programmers of all levels can learn to build Web apps that do real business work. Written by business developers for business developers, Developing Business Applications for the Web bridges the gap between website and business application programming. You'll master the fundamentals of Web development tools and gain all the necessary skills to build Web browser front-end applications that let users interact with business data.

Order your copy today!

MC Press Bookstore

You’ve heard the buzz about open source on IBM i. But what is open source, and how can you use it? You’ll get answers in Open Source Starter Guide for IBM i Developers, the first book that explains open source development in IBM i terms. Join author Pete Helgren in exploring popular tools—PASE, XMLSERVICE, Ruby/Rails, PHP, Python, Node.js, and Apache Tomcat. You’ll take away lots of solid “how-to” information and be stoked to start building your own open source apps. Get your copy today!

MC Press Bookstore

Can’t wait? The wait is over…It’s finally here! The latest update to the classic IBM i security reference is now available. Fully secure your IBM i applications and data with help from security guru Carol Woodbury. Written in a clear, jargon-free style, you’ll learn why it’s vital to develop a security policy and how to implement and maintain such a system. You’ll also get expert advice for tackling today’s security threats. This new release is updated for the latest version of the IBM i operating system. Get your copy today!

Feature Article - Programming

Why, for Most IBM i Shops, DDM Is Their Worst Vulnerability

Most IBM i shops have not secured their DDM implementation. Carol discusses why that’s putting those shops at risk.

Written by Carol Woodbury

Distributed Data Management (DDM) comes in two flavors: an ancient implementation that runs over SNA and one that runs over TCP/IP. The version I’m going to discuss is the implementation over TCP/IP. While the default setting for DDM over TCP/IP is to require a valid user ID and password to make a connection to a target server, most IBM i shops have changed this setting and require only a valid user ID. In other words, when a DDM connection is established, the user making the DDM connection must have the same user profile name on the target server. When that’s the case, the connection is established.

MC Resource Centers

Backup and Recovery Considerations for Security Data and Encrypted Backups

Security expert Carol Woodbury is joined by the newest member of the HelpSystems team: Debbie Saugen.

Debbie is recognized worldwide as an expert on IBM i backup and recovery, disaster recovery, and high availability. For decades, Debbie has helped IBM i shops build and implement effective business continuity plans.

In today’s business climate, business continuity is more important than ever. But 83 percent of organizations are not totally confident in their backup strategy.

During this webinar, Carol and Debbie discuss the importance of a good backup plan, how to ensure you’re backing up your security information, and your options for encrypted back-ups.

Watch Now!

MC Video Showcase
"); loadedTextAds222108[sparkCounter222108] = false; loadTextAd(sparkCounter222108, id222108, setID222108); // ]]>

Support MC Press Online

$

Book Reviews

Resource Center

  •  

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: