24
Tue, Dec
1 New Articles

The Linux Letter: Coming to a Network Near You

Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

This month, MC Mag Online focuses on the Internet--what's old and what's new. There's a lot to be excited about (and almost too much to keep up with) with many new technologies being created on what seems like a daily basis. There is one technology, however, that has been in development for over a decade and will eventually affect all of the others. It isn't new, really. It's the evolution of the technology on which the Internet is currently based. What is it? It's called "IPng," and in this article, we'll take an introductory look at what is also known as "Internet Protocol: Next Generation."

The current Internet Protocol (IP Version 4, or simply IPv4) is roughly 20 years old. Twenty computer years compared to 20 human years is an even bigger contrast than that of 20 dog years to 20 human years (which seems to be the de facto comparison of aging).

Consider that when IPv4 was designed there was but a fraction of the number of networks and networked devices that exist today. Streaming video, streaming audio, and the other bandwidth pigs that now comprise modern network traffic weren't present then (when virtually everything was text-based), so network segments weren't so stressed. To top it all off, denizens of the Internet's early years were more civilized and trustworthy, so security wasn't such a high priority. Twenty years later, we have devices connecting to our networks that were unimagined back then. Multimedia sites are consuming huge amounts of network resources (to the chagrin of IT departments everywhere), and you can't open a trade journal (or The Wall Street Journal) without reading about some miscreant's deeds.

It is a testament to the IPv4 designers that the protocol is still holding up so well under the strain. However, IPv4 does show some signs of buckling under the load. Let's investigate the changes that are morphing IPv4 into IPng, also known as IPv6.

More Addresses

Arguably the biggest problem associated with IPv4 is unique IP addresses. When IPv4 was designed, 32-bit addressing may have seemed sufficient. The truth is that we're rapidly running out. While there are some clever hacks created to ameliorate this problem (private networks and network address translation being the most obvious), they are simply delaying the inevitable.

IPv6 uses a 128-bit addressing scheme, four times that of IPv4. To put that in perspective, that's 4 billion x 4 billion x 4 billion ( 2^96) times the number of bits in IPv4 (2^32). Christian Huitema, author of the book IPv6: The New Internet Protocol, calculated that an address space of that size would allow for between 8x10^17 and 2x10^33 nodes (assuming efficiency in the same range as the American and French phone systems and the current IPv4 standard), which would yield approximately 1,524 addresses per square meter of the earth's surface. That was his pessimistic estimate. His optimistic estimate would allow for 3,911,873,538,269,506 addresses per square meter. The huge disparity between the two estimates is because the final addressing scheme to be used wasn't decided at the time he did his calculations. But even his pessimistic calculation seems to indicate that IPv6 will provide a virtually inexhaustible supply of addresses. Being a pessimist myself (a pessimist is an optimist with practical experience), I envision a ton of email arriving in my box 20 years from now, chiding me for that last statement. But I can't imagine how we can shove 1,524 networked devices into a square meter of space. We'll have to wait and see.

What does a fit-for-human-consumption IPv6 address look like? Addresses that have the potential to be up to 39 digits long (decimal) would be inconvenient for humans to handle, so hexidecimal notation is used instead. This reduces IPv6 addresses to a maximum of 32 characters. The designers then chose to break these into eight groups of four characters each, separated by colons. Thus, the highest address would be shown as ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff. This form isn't as bad as a 39 digit number, but it still isn't great either. Further reductions can be performed to make the addresses more user-friendly.

The first reduction allows for leading zeros within a group to be omitted. Thus, the address 3ffe:ffff:0100:f101:0210:a4ff:f334:9566 can be reduced to 3ffe:ffff:100:f101:210:a4ff:f334:9566. No great shakes there.

The second reduction is more effective in that it allows the first instance of contiguous zero-groups to be omitted. So an address like 3ffe:ffff:0100:f101:0000:0000:0000:0005 can be reduced to: 3ffe:ffff:0100:f101::5. The most pronounced example of this is the IPv6 localhost address 0000:0000:0000:0000:0000:0000:0000:0001, which reduces simply to ::1.

As you may well have guessed, these addresses aren't pulled out of thin air. There is a scheme to IPv6 just like there was with IPv4. With IPv4, the now-broken standard defined Class A, B, and C networks, which grouped address ranges by which part of the address defined the network address and which part defined the host address. IPv6 does the same thing, allocating the upper 64 bits for the network part of the address and the lower 64 bits for the host part. Unlike v4, IPv6 codifies some special prefixes to embed some intelligence into the address. I won't discuss these in this article because of space considerations, but later I will point you to some reference material that you can read if you really want to know what's going on.

More Security

Another obvious flaw with the current IPv4 implementation is that of security. There's nothing built into the protocol that enables any kind of privacy or authentication, so it's easy to fall victim to attacks such as IP spoofing. As a result, all means of securing your networks and communications must be done at the application level.

IPv6 remedies this deficiency by adding two header extensions to the protocol. The first is called the "IPng Authentication Header," which can be used to guarantee the authenticity (you know where it came from) and integrity (you know that it is unadulterated) of an IP datagram. The second, called the "IPng Encapsulating Security Header," provides for confidentiality (encryption) of the packet. These additions to the protocols will allow security to happen below the application level, where it will be more effective.

As an analogy, consider the difference between trying to enforce security via your RPG programs (the application layer) versus enforcing security using the features of OS/400 (i5/OS), and you'll get an idea as to the magnitude of improvement that IPv6 provides over its older brethren.

More Features

A larger address space isn't the only improvement. Anyone who has tried Voice over IP (VoIP) knows that IPv4 leaves a lot to be desired, since packet delivery delays can cause unnatural-sounding audio. If you haven't experienced VoIP, you've probably at least experienced the same sort of problems with streaming audio or video applications. And if not that, then I'm sure that you have experienced the delays in surfing the Web that come when your users start large downloads.

The solution to these problems is called Quality of Service (QoS), which basically manipulates and orders packets so that services that require priority get it. Until v6, QoS has been implemented in routers with much manual configuration. Now, additional v6 packet headers are available that can be used to identify packets that require special handling. Routers can use this information to dynamically adjust their behavior, relieving the administrators from a lot of tedious tuning and tweaking of router configurations.

Along the same line, a priority field is included in the header that allows priority to be given to specific packets over others. So when your users decide to start a huge download during peak times of the day, your other users won't notice a performance hit. The FTP downloads can be given a lower priority, and routers will automatically adjust the packet flow.

Other improvements to the protocol include support for provider selection (your packets can be set up to choose their path from source to destination), auto-configuration and auto-reconfiguration (which currently is attempted on IPv4 with zeroconf), and host mobility (so your computer never gets lost changing IP addresses as it goes from your home to your car, from your car to your office, from your office to the coffee shop, etc.).

Investigation Through Linux

I don't currently use IPv6 for anything more than some experimentation. On Linux, it is relatively easy to get started. Most modern distributions of Linux are IPv6-aware. I use Fedora Core 1 on my laptop, and getting IPv6 running was as simple as typing this:

modprobe ipv6  

As a quick check, I added an IP address to my Ethernet card:

ip addr add 2001:08B0:0050:0001:0202:e3ff:fe20:5811/128 dev eth1

Then, I checked to ensure that the address was active:

ip addr show dev eth1


4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000

    link/ether 00:02:2d:9d:eb:ea brd ff:ff:ff:ff:ff:ff     

    inet 192.168.1.100/24 brd 192.168.1.255 scope global eth1     

    inet6 fe80::202:2dff:fe9d:ebea/64 scope link     

    inet6 2001:8b0:50:1:202:e3ff:fe20:5811/128 scope global

Finally, I did my first IPv6 test:

ping6 2001:08B0:0050:0001:0202:e3ff:fe20:5811
 

PING 

2001:08B0:0050:0001:0202:e3ff:fe20:5811(2001:8b0:50:1:202:e3ff:fe20:5811

) 56 data bytes 

64 bytes from 2001:8b0:50:1:202:e3ff:fe20:5811: icmp_seq=0 ttl=64 

time=0.039 ms 

64 bytes from 2001:8b0:50:1:202:e3ff:fe20:5811: icmp_seq=1 ttl=64 

time=0.031 ms 

64 bytes from 2001:8b0:50:1:202:e3ff:fe20:5811: icmp_seq=2 ttl=64 

time=0.034 ms 

64 bytes from 2001:8b0:50:1:202:e3ff:fe20:5811: icmp_seq=3 ttl=64 

time=0.031 ms
 
--- 2001:08B0:0050:0001:0202:e3ff:fe20:5811 ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3018ms

I was up and running! The official Linux IPv6 HOWTO contains a wealth of information about the current state of the IPv6 Linux implementation. Those who are curious can go there for further information. It's nice to know that in Linux you have the tools to get a leg up on this new protocol.

When Will We Make the Switch?

So the big question on your mind must be, "When will we have to cut over to IPv4?" One of the best features of IPv6 is that it's designed to interoperate with IPv4. So the answer to the question is, "Whenever you want." Actually, IPv6 is still a work in progress, and the standard continues to evolve. So you may not want to switch completely right now, even if you can. If you want to start experimenting with the protocol, point your browser to 6bone.net and check out the documentation there. If your interest in IPv6 is purely academic, then check out this document at Laynetworks. It is an excellent (and relatively short) introduction to IPv6.

That's all for this month. I hope all of you have an enjoyable holiday season, and I'll "see you" next year!

Barry L. Kline is a consultant and has been developing software on various DEC and IBM midrange platforms for over 21 years. Barry discovered Linux back in the days when it was necessary to download diskette images and source code from the Internet. Since then, he has installed Linux on hundreds of machines, where it functions as servers and workstations in iSeries and Windows networks. He co-authored the book Understanding Linux Web Hosting with Don Denoncourt. Barry can be reached at This email address is being protected from spambots. You need JavaScript enabled to view it..

s on the Internet--what's old and what's new. There's a lot to be excited about (and almost too much to keep up with) with many new technologies being created on what seems like a daily basis. There is one technology, however, that has been in development for over a decade and will eventually affect all of the others. It isn't new, really. It's the evolution of the technology on which the Internet is currently based. What is it? It's called "IPng," and in this article, we'll take an introductory look at what is also known as "Internet Protocol: Next Generation."

The current Internet Protocol (IP Version 4, or simply IPv4) is roughly 20 years old. Twenty computer years compared to 20 human years is an even bigger contrast than that of 20 dog years to 20 human years (which seems to be the de facto comparison of aging).

Consider that when IPv4 was designed there was but a fraction of the number of networks and networked devices that exist today. Streaming video, streaming audio, and the other bandwidth pigs that now comprise modern network traffic weren't present then (when virtually everything was text-based), so network segments weren't so stressed. To top it all off, denizens of the Internet's early years were more civilized and trustworthy, so security wasn't such a high priority. Twenty years later, we have devices connecting to our networks that were unimagined back then. Multimedia sites are consuming huge amounts of network resources (to the chagrin of IT departments everywhere), and you can't open a trade journal (or The Wall Street Journal) without reading about some miscreant's deeds.

It is a testament to the IPv4 designers that the protocol is still holding up so well under the strain. However, IPv4 does show some signs of buckling under the load. Let's investigate the changes that are morphing IPv4 into IPng, also known as IPv6.

More Addresses

Arguably the biggest problem associated with IPv4 is unique IP addresses. When IPv4 was designed, 32-bit addressing may have seemed sufficient. The truth is that we're rapidly running out. While there are some clever hacks created to ameliorate this problem (private networks and network address translation being the most obvious), they are simply delaying the inevitable.

IPv6 uses a 128-bit addressing scheme, four times that of IPv4. To put that in perspective, that's 4 billion x 4 billion x 4 billion ( 2^96) times the number of bits in IPv4 (2^32). Christian Huitema, author of the book IPv6: The New Internet Protocol, calculated that an address space of that size would allow for between 8x10^17 and 2x10^33 nodes (assuming efficiency in the same range as the American and French phone systems and the current IPv4 standard), which would yield approximately 1,524 addresses per square meter of the earth's surface. That was his pessimistic estimate. His optimistic estimate would allow for 3,911,873,538,269,506 addresses per square meter. The huge disparity between the two estimates is because the final addressing scheme to be used wasn't decided at the time he did his calculations. But even his pessimistic calculation seems to indicate that IPv6 will provide a virtually inexhaustible supply of addresses. Being a pessimist myself (a pessimist is an optimist with practical experience), I envision a ton of email arriving in my box 20 years from now, chiding me for that last statement. But I can't imagine how we can shove 1,524 networked devices into a square meter of space. We'll have to wait and see.

What does a fit-for-human-consumption IPv6 address look like? Addresses that have the potential to be up to 39 digits long (decimal) would be inconvenient for humans to handle, so hexidecimal notation is used instead. This reduces IPv6 addresses to a maximum of 32 characters. The designers then chose to break these into eight groups of four characters each, separated by colons. Thus, the highest address would be shown as ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff. This form isn't as bad as a 39 digit number, but it still isn't great either. Further reductions can be performed to make the addresses more user-friendly.

The first reduction allows for leading zeros within a group to be omitted. Thus, the address 3ffe:ffff:0100:f101:0210:a4ff:f334:9566 can be reduced to 3ffe:ffff:100:f101:210:a4ff:f334:9566. No great shakes there.

The second reduction is more effective in that it allows the first instance of contiguous zero-groups to be omitted. So an address like 3ffe:ffff:0100:f101:0000:0000:0000:0005 can be reduced to: 3ffe:ffff:0100:f101::5. The most pronounced example of this is the IPv6 localhost address 0000:0000:0000:0000:0000:0000:0000:0001, which reduces simply to ::1.

As you may well have guessed, these addresses aren't pulled out of thin air. There is a scheme to IPv6 just like there was with IPv4. With IPv4, the now-broken standard defined Class A, B, and C networks, which grouped address ranges by which part of the address defined the network address and which part defined the host address. IPv6 does the same thing, allocating the upper 64 bits for the network part of the address and the lower 64 bits for the host part. Unlike v4, IPv6 codifies some special prefixes to embed some intelligence into the address. I won't discuss these in this article because of space considerations, but later I will point you to some reference material that you can read if you really want to know what's going on.

More Security

Another obvious flaw with the current IPv4 implementation is that of security. There's nothing built into the protocol that enables any kind of privacy or authentication, so it's easy to fall victim to attacks such as IP spoofing. As a result, all means of securing your networks and communications must be done at the application level.

IPv6 remedies this deficiency by adding two header extensions to the protocol. The first is called the "IPng Authentication Header," which can be used to guarantee the authenticity (you know where it came from) and integrity (you know that it is unadulterated) of an IP datagram. The second, called the "IPng Encapsulating Security Header," provides for confidentiality (encryption) of the packet. These additions to the protocols will allow security to happen below the application level, where it will be more effective.

As an analogy, consider the difference between trying to enforce security via your RPG programs (the application layer) versus enforcing security using the features of OS/400 (i5/OS), and you'll get an idea as to the magnitude of improvement that IPv6 provides over its older brethren.

More Features

A larger address space isn't the only improvement. Anyone who has tried Voice over IP (VoIP) knows that IPv4 leaves a lot to be desired, since packet delivery delays can cause unnatural-sounding audio. If you haven't experienced VoIP, you've probably at least experienced the same sort of problems with streaming audio or video applications. And if not that, then I'm sure that you have experienced the delays in surfing the Web that come when your users start large downloads.

The solution to these problems is called Quality of Service (QoS), which basically manipulates and orders packets so that services that require priority get it. Until v6, QoS has been implemented in routers with much manual configuration. Now, additional v6 packet headers are available that can be used to identify packets that require special handling. Routers can use this information to dynamically adjust their behavior, relieving the administrators from a lot of tedious tuning and tweaking of router configurations.

Along the same line, a priority field is included in the header that allows priority to be given to specific packets over others. So when your users decide to start a huge download during peak times of the day, your other users won't notice a performance hit. The FTP downloads can be given a lower priority, and routers will automatically adjust the packet flow.

Other improvements to the protocol include support for provider selection (your packets can be set up to choose their path from source to destination), auto-configuration and auto-reconfiguration (which currently is attempted on IPv4 with zeroconf), and host mobility (so your computer never gets lost changing IP addresses as it goes from your home to your car, from your car to your office, from your office to the coffee shop, etc.).

Investigation Through Linux

I don't currently use IPv6 for anything more than some experimentation. On Linux, it is relatively easy to get started. Most modern distributions of Linux are IPv6-aware. I use Fedora Core 1 on my laptop, and getting IPv6 running was as simple as typing this:

modprobe ipv6  

As a quick check, I added an IP address to my Ethernet card:

ip addr add 2001:08B0:0050:0001:0202:e3ff:fe20:5811/128 dev eth1

Then, I checked to ensure that the address was active:

ip addr show dev eth1


4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000

    link/ether 00:02:2d:9d:eb:ea brd ff:ff:ff:ff:ff:ff     

    inet 192.168.1.100/24 brd 192.168.1.255 scope global eth1     

    inet6 fe80::202:2dff:fe9d:ebea/64 scope link     

    inet6 2001:8b0:50:1:202:e3ff:fe20:5811/128 scope global

Finally, I did my first IPv6 test:

ping6 2001:08B0:0050:0001:0202:e3ff:fe20:5811
 

PING 

2001:08B0:0050:0001:0202:e3ff:fe20:5811(2001:8b0:50:1:202:e3ff:fe20:5811

) 56 data bytes 

64 bytes from 2001:8b0:50:1:202:e3ff:fe20:5811: icmp_seq=0 ttl=64 

time=0.039 ms 

64 bytes from 2001:8b0:50:1:202:e3ff:fe20:5811: icmp_seq=1 ttl=64 

time=0.031 ms 

64 bytes from 2001:8b0:50:1:202:e3ff:fe20:5811: icmp_seq=2 ttl=64 

time=0.034 ms 

64 bytes from 2001:8b0:50:1:202:e3ff:fe20:5811: icmp_seq=3 ttl=64 

time=0.031 ms
 
--- 2001:08B0:0050:0001:0202:e3ff:fe20:5811 ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3018ms

I was up and running! The official Linux IPv6 HOWTO contains a wealth of information about the current state of the IPv6 Linux implementation. Those who are curious can go there for further information. It's nice to know that in Linux you have the tools to get a leg up on this new protocol.

When Will We Make the Switch?

So the big question on your mind must be, "When will we have to cut over to IPv4?" One of the best features of IPv6 is that it's designed to interoperate with IPv4. So the answer to the question is, "Whenever you want." Actually, IPv6 is still a work in progress, and the standard continues to evolve. So you may not want to switch completely right now, even if you can. If you want to start experimenting with the protocol, point your browser to 6bone.net and check out the documentation there. If your interest in IPv6 is purely academic, then check out this document at Laynetworks. It is an excellent (and relatively short) introduction to IPv6.

That's all for this month. I hope all of you have an enjoyable holiday season, and I'll "see you" next year!

Barry L. Kline is a consultant and has been developing software on various DEC and IBM midrange platforms for over 21 years. Barry discovered Linux back in the days when it was necessary to download diskette images and source code from the Internet. Since then, he has installed Linux on hundreds of machines, where it functions as servers and workstations in iSeries and Windows networks. He co-authored the book Understanding Linux Web Hosting with Don Denoncourt. Barry can be reached at This email address is being protected from spambots. You need JavaScript enabled to view it..

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: