*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.
The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we're all about choice. We're even giving one lucky person the opportunity to choose their own prize in our "It's All About Choice" contest for a $250 Best Buy gift card. Visit the MC Webcast, MC White Paper, and MC Software Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!
Choose one or more of these downloads in our MC Webcast Center |
||||
|
||||
Profound UI: Unlock True Modernization from your IBM i Enterprise Modern, web-based applications can make your Enterprise more efficient, connected and engaged. This session will demonstrate how the Profound UI framework is the best and most native way to convert your existing RPG applications and develop new modern applications for your business. Additionally, you will learn how you can address modernization across your Enterprise, including databases and legacy source code, with Profound Logic. We will demonstrate how Profound UI:
|
||||
|
||||
RECENTLY ADDED |
||||
Implementing Multiple Layers of Defense Your IBM i holds a massive amount of data. In most organizations, that data constitutes a mission-critical and high-value asset. |
||||
|
||||
RECENTLY ADDED |
||||
Take Your Query Tool to the Next Level There’s a better way to run your queries. With an advanced query tool like Sequel, you can deliver IBM i data you need quickly and efficiently—without the hang-ups of a basic query tool. In this session, we address common frustrations with the IBM i basic query tool, discuss major data access and distribution trends, and help you understand what to look for in a more advanced query tool.
|
||||
|
||||
Security Considerations When Implementing and Using Access Client Solutions (ACS) Because IBM i Access is not supported on Windows 10 clients, now is the time to migrate to Access Client Solutions (ACS), the strategic client solution provided by IBM. In this recorded webinar, IBM i security expert Carol Woodbury and her guest, Tim Rowe of IBM, discuss ACS and related security considerations. You'll find out what ACS is and what security considerations you should be aware of during the initial deployment and configuration of ACS. Carol and Tim also discuss:
|
||||
|
||||
RECENTLY ADDED |
||||
Pick Your Path to Better Document Management Is babysitting documents through workflows driving you crazy? Are you tired of manually re-keying data day after day? Or are you simply losing your mind in an endless sea of paper documents?
|
||||
|
||||
Who’s Afraid of Linux on Power, AIX, and VIOS? Not i. This 30-minute recording demystifies Linux on Power, AIX, and VIOS and teaches best practice techniques for maintaining and controlling critical processes and applications running on your Linux, AIX, and VIOS environments. |
||||
|
||||
Data Breaches: Is IBM i Really at Risk? IBM i is known for its security, but this OS could be more vulnerable than you think. Although Power Servers often live inside the safety of the perimeter firewall, the risk of suffering a data leak or data corruption remains high. Watch noted IBM i security expert Robin Tatam as he discusses common ways that this supposedly “secure” operating system may actually be vulnerable and who the culprits might be. |
||||
|
||||
Easy Mobile Development Presenters:
Watch this Webinar Now! |
||||
|
||||
Don't miss the full collection of On-Demand Assets available in the MC Webcast Center |
||||
Interested in IBM Power System White Papers, Webcasts, and Software solutions?
|