www.mcpressonline.com
Open in
urlscan Pro
2606:4700:20::681a:20a
Public Scan
Submitted URL: http://editorial.mcpressonline.com/
Effective URL: https://www.mcpressonline.com//
Submission: On July 06 via api from US — Scanned from DE
Effective URL: https://www.mcpressonline.com//
Submission: On July 06 via api from US — Scanned from DE
Form analysis
3 forms found in the DOMPOST /
<form action="/" method="post" class="form-inline">
<i class="fa fa-search"></i>
<label for="mod-search-searchword" class="element-invisible">Search ...</label> <input name="searchword" id="mod-search-searchword" maxlength="200" class="form-control inputbox search-query" type="text" size="40" value="Search ..."
onblur="if (this.value=='') this.value='Search ...';" onfocus="if (this.value=='Search ...') this.value='';"> <input type="hidden" name="task" value="search">
<input type="hidden" name="option" value="com_search">
<input type="hidden" name="Itemid" value="559">
</form>
POST /
<form action="/" method="post" id="loginForm1134">
<div class="je_pretext">
</div>
<label class="control-label" for="inputEmail1134"></label>
<input placeholder="User Name" class="je_input" id="inputEmail1134" type="text" name="username">
<label class="control-label" for="inputPassword1134"></label>
<input placeholder="Password" class="je_input" id="inputPassword1134" type="password" name="password">
<label class="je_check">
<input id="modlgn-remember" type="checkbox" name="remember" class="" value="yes">Remember Me </label>
<input type="submit" name="Submit" class="je_button je_loginbtn" value="Login">
<input type="hidden" name="option" value="com_users">
<input type="hidden" name="task" value="user.login">
<input type="hidden" name="return" value="aW5kZXgucGhwP0l0ZW1pZD0zNjQw">
<input type="hidden" name="6a465b385a7b4eae858db1e742f8285b" value="1">
<div class="link-options">
<span class="je_pass"><a href="/lost-password/">Forgot your password?</a></span>
<span class="je_user"><a href="/lost-user-name/">Forgot your username?</a></span>
<span class="je_signup"><a href="https://www.mcpressonline.com/create-an-account">Sign Up</a></span>
</div>
</form>
Name: campaign_form — POST https://www.mcpressonline.com/donation-form
<form name="campaign_form" id="campaign_form" method="post" action="https://www.mcpressonline.com/donation-form">
<table cellspacing="0" cellpadding="0" class="table table-striped donate-details">
<tbody>
<tr>
<td valign="top" class="mod_jdonation_amount_header">
<strong>Select Your Contribution Amount</strong>
</td>
</tr>
<tr>
<td class="mod_jdonation_amount">
<label class="amounts radio-label-btn" id="amount0">
<input type="radio" name="rd_amount" value="12"> $ 12.00 </label>
<script type="text/javascript">
jQuery("#amount0").click(function() {
jQuery(".radio-label-btn").removeClass("selected");
jQuery("#amount0").addClass("selected");
});
</script>
<label class="amounts radio-label-btn" id="amount1">
<input type="radio" name="rd_amount" value="24"> $ 24.00 </label>
<script type="text/javascript">
jQuery("#amount1").click(function() {
jQuery(".radio-label-btn").removeClass("selected");
jQuery("#amount1").addClass("selected");
});
</script>
<label class="amounts radio-label-btn" id="amount2">
<input type="radio" name="rd_amount" value="36"> $ 36.00 </label>
<script type="text/javascript">
jQuery("#amount2").click(function() {
jQuery(".radio-label-btn").removeClass("selected");
jQuery("#amount2").addClass("selected");
});
</script>
<label class="amounts radio-label-btn" id="amount3">
<input type="radio" name="rd_amount" value="48"> $ 48.00 </label>
<script type="text/javascript">
jQuery("#amount3").click(function() {
jQuery(".radio-label-btn").removeClass("selected");
jQuery("#amount3").addClass("selected");
});
</script>
<label class="amounts radio-label-btn" id="amount9999">
<span class="symbol" style="padding: 0 5px 0 0;">$</span><input type="text" class="input-small nopadding displayinline" placeholder="Other Amount" value="" name="amount"> <label>
<script type="text/javascript">
jQuery("#amount9999").click(function() {
jQuery(".radio-label-btn").removeClass("selected");
jQuery("#amount9999").addClass("selected");
});
</script>
</label></label>
</td>
</tr>
<tr>
<td class="center" colspan="2">
<div class="donate-details-mod taskbar row-fluid">
<div class="jd-taskbar">
<input type="button" class="button btn btn-primary" name="btnDonate" value="Contribute Now!" onclick="checkDonation(this.form);">
</div>
</div>
</td>
</tr>
</tbody>
</table>
<input type="hidden" name="payment_method" value="os_paypal">
<script type="text/javascript">
var donationType = 2;
var minimumAmount = 10;
var maximumAmount = 1000;
function checkDonation(form) {
var amount = 0;
switch (donationType) {
case 0:
if (!parseFloat(form.amount.value)) {
alert("Please enter a valid donation amount");
form.amount.focus();
return;
}
if (parseFloat(form.amount.value) < minimumAmount) {
alert("Minimum donation amount allowed is : $" + minimumAmount);
form.amount.focus();
return;
}
if ((maximumAmount > 0) && (parseFloat(form.amount.value) > maximumAmount)) {
alert("Maximum donation amount allowed is : $" + maximumAmount);
form.amount.focus();
return;
}
break;
case 1:
var checked = false;
if (form.rd_amount.length) {
for (var i = 0; i < form.rd_amount.length; i++) {
if (form.rd_amount[i].checked) {
checked = true;
amount = form.rd_amount[i].value;
break;
}
}
if (!checked) {
alert("Please choose a donation amount");
return;
}
} else {
if (!form.rd_amount.checked) {
alert("Please choose a donation amount");
return;
} else {
amount = form.rd_amount.value;
}
}
if (parseFloat(amount) < minimumAmount) {
alert("Minimum donation amount allowed is : $" + minimumAmount);
return;
}
if ((maximumAmount > 0) && (parseFloat(amount) > maximumAmount)) {
alert("Maximum donation amount allowed is : $" + maximumAmount);
form.amount.focus();
return;
}
break;
case 2:
var valid = false;
if (form.rd_amount.length) {
for (var i = 0; i < form.rd_amount.length; i++) {
if (form.rd_amount[i].checked) {
valid = true;
amount = form.rd_amount[i].value;
break;
}
}
} else {
if (form.rd_amount.checked) {
valid = true;
amount = form.rd_amount[i].value;
}
}
if (!valid) {
if (!parseFloat(form.amount.value)) {
alert("Please enter a valid donation amount");
return;
} else {
amount = form.amount.value;
}
}
if (parseFloat(amount) < minimumAmount) {
alert("Minimum donation amount allowed is : $" + minimumAmount);
form.amount.focus();
return;
}
if ((maximumAmount > 0) && (parseFloat(amount) > maximumAmount)) {
alert("Maximum donation amount allowed is : $" + maximumAmount);
form.amount.focus();
return;
}
break;
}
if (form.payment_method.value == '') {
alert("Please choose a payment method");
form.payment_method.focus();
return;
}
//All data is valid, submit form for processing
form.submit();
}
</script>
</form>
Text Content
* Resources * MC On-Demand Webcast * MC Trial Software * MC White Papers * BUYER'S GUIDE * Companies * Hardware * Services * Software * Submit Listing * Hardware * Services * Software * EVENTS * Submit New Event * VIDEOS * IBM Analytics * Newest * Popular * IBM Blockchain * Newest * Popular * IBM Cloud * Newest * Popular * IBM Commerce * Newest * Popular * IBM Developer * Newest * Popular * IBM Mobile * Newest * Popular * IBM Security * Newest * Popular * IBM Social * Newest * Popular * IBM Systems * Newest * Popular * IBM Watson * Newest * Popular * MC Press Author Presentations * Newest * Popular * MC Security * Newest * Popular * MC Video News Makers * Newest * Popular * TechTips * Newest * Popular * WDSC Basics * Newest * Popular * FORUMS * Shooting the Breeze * Analysis * Commentary * News * App Software * Collaboration & Messaging * Customer Relationship Management * Document Management * ERP/Financial * General * IBM * Managed Services/SaaS * Microsoft * Career Center * General * Jobs Offered * Resumes * Database * Business Intelligence * DB2 * General * Microsoft Access * MySQL * Oracle * Internet * Application Servers * Commerce * General * Portals * Protocols * Telephony * Networking * Emulation * General * Wireless/Mobile * Op Systems * IBM i (OS/400, i5/OS) * Linux/Open Source * Microsoft * Unix/AIX * Programming * APIs * Business Integration * C, C++, C# * Change Management * CL * COBOL * Dev Tools * General * Java * REXX * RPG * Scripting * SQL * Web Languages * Visual Basic * Security * Compliance/Privacy * General * IBM i (OS/400, i5/OS) * Microsoft * System Admin * General * High Availability/DR * Performance Monitoring & Tuning * Web Site * MC Press Book Downloads & Reviews * MC Press Videos * MC Showcase Buyer's Guide * Archive Threads Pre Jan-2001 * Analysis * Application Software * Database * Hardware * Internet * Management * Networking * Operating Systems * Programming * IGA Catalogue * ARCHIVE * PUBLICATIONS * MC Press Bookstore * Latest Offer * MC Resource Center * MC White Paper Center * MC Webcast Center * MC Software Center * MC RPG Developer * July 6, 2022 * June 1, 2022 * April 6, 2022 * May 4, 2022 * August 4, 2021 * March 2, 2022 * February 2, 2022 * January 5, 2022 * December 1, 2021 * November 3, 2021 * October 6, 2021 * September 1, 2021 * July 7, 2021 * May 5, 2021 * June 2, 2021 * April 7, 2021 * March 3, 2021 * February 3, 2021 * January 6, 2021 * December 2, 2020 * November 4, 2020 * October 7, 2020 * September 2, 2020 * August 5, 2020 * July 1, 2020 * June 3, 2020 * May 6, 2020 * April 1, 2020 * March 4, 2020 * February 5, 2020 * January 8, 2020 * December 4, 2019 * November 6, 2019 * October 2, 2019 * September 4, 2019 * August 7, 2019 * July 3, 2019 * June 5, 2019 * May 1, 2019 * March 6, 2019 * April 3, 2019 * February 6, 2019 * January 9, 2019 * December 5, 2018 * November 7, 2018 * October 3, 2018 * September 5, 2018 * August 1, 2018 * July 11, 2018 * June 6, 2018 * May 2, 2018 * April 4, 2018 * March 7, 2018 * February 7, 2018 * January 3, 2018 * December 6, 2017 * November 1, 2017 * October 4, 2017 * September 6, 2017 * August 2, 2017 * July 5, 2017 * JUNE 7, 2017 * MAY 17, 2017 * MAY 3, 2017 * April 19, 2017 * April 5, 2017 * March 15, 2017 * March 1, 2017 * February 15, 2017 * February 1, 2017 * January 4, 2017 * January 18, 2017 * MC Systems Insight * June 15, 2022 * May 18, 2022 * April 20, 2022 * March 16, 2022 * February 16, 2022 * January 19, 2022 * December 15, 2021 * September 15, 2021 * November 17, 2021 * October 20, 2021 * July 21, 2021 * August 18, 2021 * June 16, 2021 * May 19, 2021 * March 17, 2021 * April 21, 2021 * February 17, 2021 * January 20, 2021 * November 18, 2020 * December 16, 2020 * September 16, 2020 * October 21, 2020 * August 19, 2020 * July 15, 2020 * April 15, 2020 * June 17, 2020 * May 20, 2020 * March 18, 2020 * January 22, 2020 * February 19, 2020 * December 18, 2019 * November 20, 2019 * October 16, 2019 * September 18, 2019 * August 21, 2019 * July 17, 2019 * June 19, 2019 * May 15, 2019 * April 17, 2019 * March 20, 2019 * February 20, 2019 * January 23, 2019 * December 19, 2018 * November 21, 2018 * October 17, 2018 * September 19, 2018 * August 15, 2018 * July 25, 2018 * June 20, 2018 * May 16, 2018 * April 18, 2018 * March 21, 2018 * February 21, 2018 * January 17, 2018 * December 20, 2017 * November 15, 2017 * October 18, 2017 * August 16, 2017 * September 20, 2017 * July 19, 2017 * June 21, 2017 * May 15, 2017 * May 1, 2017 * April 17, 2017 * March 20, 2017 * April 3, 2017 * March 6, 2017 * February 6, 2017 * January 16, 2017 * December 19, 2016 * December 5, 2016 * November 21, 2016 * November 7, 2016 * MC TNT Tips 'n Techniques * June 10, 2022 * May 13, 2022 * April 15, 2022 * March 11, 2022 * January 14, 2022 * February 11, 2022 * October 15, 2021 * December 10, 2021 * November 12, 2021 * August 13, 2021 * September 10, 2021 * July 16, 2021 * June 11, 2021 * March 12, 2021 * May 14, 2021 * April 16, 2021 * February 12, 2021 * January 15, 2021 * December 11, 2020 * November 13, 2020 * October 16, 2020 * September 11, 2020 * August 14, 2020 * April 10, 2020 * July 10, 2020 * June 12, 2020 * May 15, 2020 * March 13, 2020 * February 14, 2020 * January 17, 2020 * December 13, 2019 * November 15, 2019 * October 11, 2019 * September 13, 2019 * August 16, 2019 * July 12, 2019 * June 14, 2019 * May 10, 2019 * April 12, 2019 * March 15, 2019 * February 15, 2019 * January 18, 2019 * December 14, 2018 * November 16, 2018 * October 12, 2018 * September 14, 2018 * August 10, 2018 * July 20, 2018 * June 15, 2018 * May 11, 2018 * April 13, 2018 * March 16, 2018 * February 16, 2018 * January 12, 2018 * BOOKSTORE * Application Development * Cloud Computing * Rational * WebSphere * Certification * Database * Analytics * Data Governance * DB2 * Informix * SQL * Management and Career * Career * Project Management * Operating Systems * AIX * IBM i * Programming * APIs * CL * EGL * HTML * Java * Scripting * PHP * RPG * System Administration * Disaster Recovery * Networking * Security Search ... * MORE INFO * About MC Press * Contact Us * Online Media Kit * Write for MC Press * Site Help * Sitemap Members Remember Me Forgot your password? Forgot your username? Sign Up drop down joomla login module SIDEBAR × HOME * Analytics & Cognitive * Business Intelligence * DB2 * Document Management * Analytics & Cognitive - Other * Career * General * Cloud * High Availability / Disaster Recovery * Managed Services / SaaS / PaaS / IaaS * Cloud - Other * Commerce * Customer Relationship Management * Enterprise Resource Planning / Financial * Commerce - Other * Internet of Things * RFID * Sensor Technology * Internet of Things - Other * IT Infrastructure * Operating Systems * IBM i (OS/400, i5/OS) * Linux / Open Source * Microsoft * UNIX / AIX * System Administration * IT Infrastructure - Other * Application Servers * Emulation * General * Networking * Mobile * Development Tools / Utilities * Mobile Languages * Mobile - Other * Programming * APIs * RPG * Scripting * SQL * Web Languages * Programming - Other * Change Management * CL * Development Tools * General * Java * Microsoft * Visual Basic * Security * Compliance/Privacy * IBM i (OS/400, i5/OS) * Security - Other * Social * Collaboration & Messaging * Collaboration - Other * NEWS * Analytics & Cognitive News * Cloud News * Commerce News * Industry News * IT Infrastructure News * Mobile News * Programming News * Security News * Resources * MC On-Demand Webcast * MC Trial Software * MC White Papers * BUYER'S GUIDE * Hardware * Services * Software * EVENTS * FORUMS * Shooting the Breeze * Analysis * Commentary * News * App Software * Collaboration & Messaging * Customer Relationship Management * Document Management * ERP/Financial * General * IBM * Managed Services/SaaS * Microsoft * Career Center * General * Jobs Offered * Resumes * Database * Business Intelligence * DB2 * General * Microsoft Access * MySQL * Oracle * Internet * Application Servers * Commerce * General * Portals * Protocols * Telephony * Networking * Emulation * General * Wireless/Mobile * Op Systems * IBM i (OS/400, i5/OS) * Linux/Open Source * Microsoft * Unix/AIX * Programming * APIs * Business Integration * C, C++, C# * Change Management * CL * COBOL * Dev Tools * General * Java * REXX * RPG * Scripting * SQL * Web Languages * Visual Basic * Security * Compliance/Privacy * General * IBM i (OS/400, i5/OS) * Microsoft * System Admin * General * High Availability/DR * Performance Monitoring & Tuning * Web Site * MC Press Book Downloads & Reviews * MC Press Videos * MC Showcase Buyer's Guide * Archive Threads Pre Jan-2001 * Analysis * Application Software * Database * Hardware * Internet * Management * Networking * Operating Systems * Programming * ARCHIVE * PUBLICATIONS * MC Mobile on Power * March 8, 2017 * February 8, 2017 * January 11, 2017 * December 14, 2016 * November 9, 2016 * October 12, 2016 * MC Press Bookstore * February 9, 2017 * February 7, 2017 * February 2, 2017 * MC Resource Center * MC White Paper Center * MC RPG Developer * March 15, 2017 * March 1, 2017 * February 15, 2017 * February 1, 2017 * January 18, 2017 * January 4, 2017 * December 21, 2016 * November 16, 2016 * November 2, 2016 * October 19, 2016 * October 5, 2016 * MC Systems Insight * March 6, 2017 * February 6, 2017 * January 16, 2017 * November 21, 2016 * November 7, 2016 * October 17, 2016 * October 3, 2016 * MC TNT Tips 'n Techniques * March 3, 2017 * February 17, 2017 * February 3, 2017 * January 27, 2017 * January 13, 2017 * December 16, 2016 * December 9, 2016 * December 2, 2016 * November 18, 2016 * November 11, 2016 * November 4, 2016 * October 21, 2016 * October 28, 2016 * October 14, 2016 * October 7, 2016 * September 23, 2016 * MC Special Announcement * February 14, 2017 * BOOKSTORE * Application Development * Cloud Computing * Rational * WebSphere * Certification * Database * Analytics * Data Governance * DB2 * Informix * SQL * Management and Career * Career * Project Management * Operating Systems * AIX * IBM i * Programming * APIs * CL * EGL * HTML * Java * Scripting * PHP * RPG * System Administration * Disaster Recovery * Networking * Security * VIDEOS * IBM Analytics * Popular * Newest * IBM Cloud * Popular * Newest * IBM Commerce * Popular * Newest * IBM Developer * Popular * Newest * IBM Mobile * Popular * Newest * IBM Security * Popular * Newest * IBM Social * Popular * Newest * IBM Systems * Popular * Newest * MC Press Author Presentations * Popular * Newest * MC Video News Makers * Popular * Newest * TechTips * Popular * Newest * WDSC Basics * Popular * Newest * MC Security * Popular * Newest MC Press Online Resource Center: On-Demand Webcast Details POWER10 POWER HOUR Resource Center: White Papers Details WHY MIGRATE WHEN YOU CAN MODERNIZE? Resource Center: On-Demand Webcast Details LESSONS LEARNED FROM IBM I CYBER ATTACKS Resource Center: On-Demand Webcast Details IBM I TRANSFORMATION RISKS EVERY BUSINESS LEADER SHOULD KNOW Resource Center: White Papers Details IBM I CLOUD MIGRATION CONSIDERATIONS MC Press Bookstore Details Book Promo FREE-FORMAT RPG IV: THIRD EDITION MC Press Bookstore Details Book Promo 21ST CENTURY RPG: /FREE, ILE, AND MVC 7 New Articles 06 Wed, Jul 7 New Articles * . * Analytics & Cognitive * Business Intelligence * DB2 * Document Management * Watson * Analytics & Cognitive - Other * Career * General * Cloud * Blockchain * High Availability / Disaster Recovery * Managed Services / SaaS / PaaS / IaaS * Cloud - Other * Commentary * Analysis of News Events * Commentary * Current Events & Commentary - Other * Case Studies * Product Reviews * Commerce * Customer Relationship Management * Enterprise Resource Planning / Financial * Commerce - Other * Internet of Things * RFID * Sensor Technology * Internet of Things - Other * IT Infrastructure * Operating Systems * IBM i (OS/400, i5/OS) * Linux / Open Source * Microsoft * UNIX / AIX * System Administration * IT Infrastructure - Other * Application Servers * Emulation * General * Networking * Walgreens Weekly Ad * Mobile * Development Tools / Utilities * Mobile Languages * Mobile - Other * News * Analytics & Cognitive News * Cloud News * Commerce News * Industry News * IT Infrastructure News * Mobile News * Programming News * Security News * Programming * APIs * RPG * Scripting * SQL * Web Languages * Programming - Other * Change Management * CL * Development Tools * General * Java * Microsoft * Visual Basic * Weekly Ads * Security * Compliance/Privacy * IBM i (OS/400, i5/OS) * Security - Other * Social * Collaboration & Messaging * Collaboration - Other IN THE SPOTLIGHT SQL SQL 101 – DML RECAP – BETWEEN AND IN PREDICATES Details Rafael Victoria-Pereira 05 July 2022 It’s now time to do a Data Manipulation Language (DML) statements recap and use the sample UMADB database, presented in the previous two articles, in all the coming examples. By Rafael Victória-Pereira It will go over the SELECT, INSERT, UPDATE, and DELETE statements. However, this chapter won’t discuss the syntax of these statements. Here we will explain how you can write shorter and clearer statements by resorting to a few keywords that you might not be aware of. If you want to play around with the examples, be sure to restore the UMADB library. SQL 101 48 - UMADB.zip. I’m going to assume that you’re familiar with the most commonly used DML statements and will not explain their syntax in depth, as they were previously covered in this series, starting here. Instead, I’ll focus on some details that can simplify the statements—for instance, shorter “implementations” of concepts. Having said that, let’s start with two of my personal favorites: BETWEEN and IN. RPG INTRODUCING FREE-FORMAT RPG IV, PART 3 Details Jim Martin 05 July 2022 Programming Style Issues By Jim Martin Editor's Note: This article is excerpted from chapter 4 of Free-Format RPG IV: Third Edition, by Jim Martin. Many books and articles have covered the subject of programming with style. RPG hasn’t played much of a role in style discussions, due mainly to the fixed-format nature of its calculations. Now, with free format, RPG programmers can, and should, pay attention to matters of style. With that goal in mind, here are some points to remember as you get started coding in free-format RPG IV. IBM i (OS/400, i5/OS) CAROL’S TOP FIVE FAVORITE SECURITY ENHANCEMENTS IN IBM I 7.5 AND 7.4 TR6 Details Carol Woodbury 14 June 2022 The latest announcements from IBM contained many security enhancements and changes. Carol describes her faves. By Carol Woodbury An IBM announcement hasn’t contained this many security enhancements and changes to IBM i security in many years. You can find information on all enhancements and previous supported releases here. Web Languages BUSINESS WEB APPLICATION DEVELOPMENT - USING CASCADING STYLE SHEETS, PART 1 Details Laura Ubelhor 09 June 2022 Cascading Style Sheets (CSS) provide a flexible way to control the look or presentation of your Web pages. Small changes to a single CSS style sheet can dramatically change the appearance of many Web pages. by Laura Ubelhor and Christian Hur Editor’s note: This article is excerpted from chapter 3 of Developing Business Applications for the Web: With HTML, CSS, JSP, PHP, ASP.NET, and JavaScript, by Laura Ubelhor and Christian Hur. This easy method for controlling the design of your pages allows you to rapidly implement changes to the look and feel of your website. The CSS elements are often called style rules and can be inserted directly in a Web page or separately in an external file. 1 of 4 Previous Next DB2 TECHTIP: SSIS TOOLBOX - CONFIGURATIONS AND PARAMETERS PLUS CONVERTING A PROJECT Details Thomas Snyder 09 June 2022 Career TECH PROJECT MANAGEMENT - PROJECT CONCEPTION Details Colleen Garton 09 June 2022 Mergers / Acquisitions IBM TACKLES GROWING ATTACK SURFACE RISKS WITH PLANS TO ACQUIRE RANDORI Details IBM Corporation 07 June 2022 MORE ARTICLES CL Details 31 May 2022 Hits: 1126 TECHTIP: DATE ARITHMETIC IN CL PROGRAMS RPG Details 31 May 2022 Hits: 859 INTRODUCING FREE-FORMAT RPG IV, PART 2 Security News Details 31 May 2022 Hits: 789 IBM TO GRANT $5 MILLION IN-KIND FOR PUBLIC SCHOOLS GLOBALLY TO BETTER PREPARE FOR GROWING RANSOMWARE THREAT Industry News Details 31 May 2022 Hits: 456 EY AND IBM EXPAND ALLIANCE TO HELP ORGANIZATIONS ADDRESS TALENT CHALLENGES HOT VIDEOS * WHAT IS HYBRID CLOUD IN 2022? * HUMANS VS. AI: WHO MAKES THE BEST DECISIONS? * CYBERSECURITY AND ZERO TRUST * WHAT IS A VIRTUAL SERVER? View as: Grid List ANALYTICS & COGNITIVE DB2 TECHTIP: SSIS TOOLBOX - CONFIGURATIONS AND PARAMETERS PLUS CONVERTING A PROJECT Details Thomas Snyder Analytics & Cognitive 09 June 2022 Once you know the SSI Toolbox, it is time for configurations and parameters, and to convert a project. By Tom Snyder Editor’s Note: This article is excerpted from chapter 3 of Extract, Transform, and Load with SQL Server Integration Services--with Microsoft SQL Server, Oracle, and IBM DB2, by Thomas Snyder and Vedish Shah. Configurations and Parameters Depending on the type of deployment model you choose, you can use either configuration files or parameters. The legacy model lets you create configuration files that are separate from your packages, whereas the default model lets you create parameters, project- or package-level, which are part of the entire project. Analytics & Cognitive Details John Ghrist 17 May 2022 AI APPS THAT CONTROL CORPORATE COMPUTER OPS Analytics & Cognitive Details IBM Corporation 13 April 2022 IBM UNVEILS ITS NEW REPORTING FRAMEWORK AND REPORT FOR ENVIRONMENTAL, SOCIAL, AND GOVERNANCE (ESG) Analytics & Cognitive - Other Details John Ghrist Analytics & Cognitive 15 March 2022 DISPELLING SOME FOG ABOUT EDGE COMPUTING CLOUD Cloud PARSING DATA SECURITY AND PRIVACY CONCERNS IN THE CLOUD Details John Ghrist 16 November 2021 Data security and data privacy are terms that often appear in the same sentence. Although some of the means of securing both are identical, there are also critical distinctions between them that mustn't be overlooked when considering service providers. By John Ghrist We've likely all heard for many years now about how globalized the world is becoming. In the Internet Age, many points on the planet now communicate and share information instantaneously, and the practice of direct buying and selling of goods across borders has gone from an almost exotic happenstance to a commonplace goal of a majority of U.S. business enterprises in the last two decades. Hand in hand with that has been the need to secure data needed to handle business transactions: customer contact information, credit card and bank account numbers, and routing information are obvious examples. Everyone agrees such things must be kept securely confidential. Yes, we've seen this movie before. Managed Services / SaaS / PaaS / IaaS Details John Ghrist Cloud 20 July 2021 HOW THE CLOUD IS BRINGING SHADOW IT BACK FROM THE DEAD Managed Services / SaaS / PaaS / IaaS Details John Ghrist Cloud 16 March 2021 TIPS FOR AVOIDING CLOUD COMPUTING VENDOR LOCK-IN Cloud Details Help Systems, LLC 16 June 2020 IBM I CLOUD MIGRATION CONSIDERATIONS CURRENT EVENTS & COMMENTARY Commentary IBM I SHOPS PIVOT TO BATTLE COVID-19 Details Steve Pitcher Current Events & Commentary 20 October 2020 Maybe these companies were able to pivot easily because IBM i doesn’t require the daily hand-holding required to keep other platforms working. By Steve Pitcher It’s easy to look at the year 2020 with contempt. I’ve done it. Most all of us probably have. There’s no reason to do a recap of 2020. It started with a near-miss war with Iran, and it hasn’t let up since. I was joking the other week that the only thing we’re missing in 2020 is the equivalent of the Ten Plagues of Egypt. And we still have a couple of months for that to unfold. Current Events & Commentary Details Fresche Solutions 05 May 2020 HOW 2020 IS CHANGING THE WAY THAT COMPANIES APPROACH DIGITAL TRANSFORMATION Analysis of News Events Details Steve Pitcher Current Events & Commentary 17 March 2020 THE EFFECTS OF COVID-19 ON THE IBM I ECOSYSTEM Analysis of News Events Details Steve Pitcher Current Events & Commentary 18 February 2020 DISSECTING THE HELPSYSTEMS IBM I MARKETPLACE SURVEY PROGRAMMING SQL SQL 101 – DML RECAP – BETWEEN AND IN PREDICATES Details Rafael Victoria-Pereira Programming 05 July 2022 It’s now time to do a Data Manipulation Language (DML) statements recap and use the sample UMADB database, presented in the previous two articles, in all the coming examples. By Rafael Victória-Pereira It will go over the SELECT, INSERT, UPDATE, and DELETE statements. However, this chapter won’t discuss the syntax of these statements. Here we will explain how you can write shorter and clearer statements by resorting to a few keywords that you might not be aware of. If you want to play around with the examples, be sure to restore the UMADB library. SQL 101 48 - UMADB.zip. I’m going to assume that you’re familiar with the most commonly used DML statements and will not explain their syntax in depth, as they were previously covered in this series, starting here. Instead, I’ll focus on some details that can simplify the statements—for instance, shorter “implementations” of concepts. Having said that, let’s start with two of my personal favorites: BETWEEN and IN. RPG Details Jim Martin Programming 05 July 2022 INTRODUCING FREE-FORMAT RPG IV, PART 3 Web Languages Details Laura Ubelhor Programming 09 June 2022 BUSINESS WEB APPLICATION DEVELOPMENT - USING CASCADING STYLE SHEETS, PART 1 CL Details Sam Lennon Programming - Other 31 May 2022 TECHTIP: DATE ARITHMETIC IN CL PROGRAMS MOBILE Development Tools / Utilities TECHTIP: A PRIMER TO BOOTSTRAP 4, PART 2 Details Jan Jorgensen Mobile 13 September 2018 In this second and final part of this short series about mobile app dev, let’s talk about grids and glyphicons. By Jan Jorgensen In a previous article, I covered how the grid system in Bootstrap works, so in order not to bore you I will try not to repeat myself. The grid system in version 4 is still based on a maximum of 12 columns! But even though the grid system seems the same from version 3 to 4, something has changed under the hood. In Bootstrap 3, the grid system was based on floats, but that changed in Bootstrap 4; it is now based on flexbox. Development Tools / Utilities Details Jan Jorgensen Mobile 09 August 2018 TECHTIP: A PRIMER TO BOOTSTRAP 4, PART 1 Development Tools / Utilities Details John Ghrist Mobile 15 February 2018 A HAND-HOLDING APP BUILDER FOR HANDHELD DEVICES Mobile - Other Details John Ghrist Mobile 09 November 2017 KEY CONSIDERATIONS FOR ESTABLISHING A BYOD POLICY SECURITY IBM i (OS/400, i5/OS) CAROL’S TOP FIVE FAVORITE SECURITY ENHANCEMENTS IN IBM I 7.5 AND 7.4 TR6 Details Carol Woodbury Security 14 June 2022 The latest announcements from IBM contained many security enhancements and changes. Carol describes her faves. By Carol Woodbury An IBM announcement hasn’t contained this many security enhancements and changes to IBM i security in many years. You can find information on all enhancements and previous supported releases here. IBM i (OS/400, i5/OS) Details Carol Woodbury Security 19 April 2022 DO YOU KNOW WHAT END USERS CAN DO WITH IBM I ACCESS CLIENT SOLUTIONS? IBM i (OS/400, i5/OS) Details Help Systems, LLC Security 19 April 2022 THE STATE OF IBM I SECURITY IN 2022: 3 KEY TAKEAWAYS IBM i (OS/400, i5/OS) Details Carol Woodbury Security 15 February 2022 USING IBM I SERVICES TO MANAGE OWNED OBJECTS LATEST COMMENTS MC PRESS ONLINE Follow * Latest Discussions * Top Commenters * Sam J Lennon There's a version on Github here:... Centering a String of Text · 2 months ago * Sam J Lennon Seems like older articles no longer format correctly. However... If you want a... Centering a String of Text · 2 months ago * Glenn Gundy I don't see the code that does the actual centering. Where can I find this? Centering a String of Text · 2 months ago * Glenn Gundermann I've seen some programs where the PREPARE is before the DECLARE and some programs... TechTip: PREPARE to DECLARE · 2 months ago SUPPORT MC PRESS ONLINE Select Your Contribution Amount $ 12.00 $ 24.00 $ 36.00 $ 48.00 $ CURRENT EVENTS ALL EVENTS OCEAN TECHCON22 WILL BE TAKING PLACE JULY 21-23, 2022! Three Days of Inspiration & Innovation! Save the dates July 21, 22, 23, 2022 Technically, We’re passionate about continuing education on the IBM Power Systems platform! Register Now #OceanTechCon22 2022 Innovate & Thrive with IBM i - Online-Only Day Thursday, July 21, 2022 8:30 AM - 4:30 PM Online Focusing on how to Innovate & Thrive with IBM i. Technical Conference Friday, July 22, 2022 8:00 AM - 5:00 PM Crowne Plaza Hotel - Costa Mesa Full day of technical presentations focusing on all aspects of IT from strategic directions to drilling down into today’s latest technologies plus the Vendor Solutions Expo. Workshops Saturday, July 23, 2022 8:30 AM - 5:00 PM Mission Viejo Community Center Workshops & Hands-on learning to tune up your skill sets. Lunch is included. OCEAN TechCon22 IBM i Technical Conference July 21–23, 2022 Register Now Contact: Margaret Matthews - margaret@oceanusergroup.org * 21 July 2022 - 23 July 2022 * * View as: Grid List EDITOR'S LETTER Editor's Letter THERE’S NOTHING TO BE SCARED OF…OR IS THERE? Details Victoria Mack MC Press Magazine 30 October 2017 Ghosts and witches—they’re kid stuff. But there really are other things to be afraid of. By Victoria Mack This being October, Steve Pitcher has a bit of a Halloween scare for you. But this goblin isn’t a fantasy. It’s real. IBM has announced end of support for the exceptionally popular POWER7 machines. Will IBM offer extended hardware maintenance? Who knows? It hasn’t happened yet. Read Steve’s article to see his perceptions of what some may consider a truly horrifying announcement. Editor's Letter Details Victoria Mack MC Press Magazine 28 September 2017 IT’S SEPTEMBER. WHAT HAS YOUR ATTENTION? Editor's Letter Details Victoria Mack MC Press Magazine 30 August 2017 THINKING ANALYTICALLY Editor's Letter Details Victoria Mack MC Press Magazine 30 July 2017 CH-CH-CH-CHANGES CAREER Career TECH PROJECT MANAGEMENT - PROJECT CONCEPTION Details Colleen Garton 09 June 2022 A project concept can be implemented in a matter of weeks, or it can be a complex concept that will require a monumental engineering feat and a few years to accomplish. The concept describes either a problem that needs to be solved or a solution to a problem. By Colleen Garton and Erika McCulloch Editor's Note: This article is excerpted from chapter 3 of Fundamentals of Technology Project Management, by Colleen Garton and Erika McCulloch. The concept may be presented verbally or as a Project Concept Document. In some companies, the concept is considered part of the Project Proposal process while in others it is a separate step, with a formal document, which is used to attain initial approval prior to creating a Project Proposal. Career Details Colleen Garton 17 May 2022 TECH PROJECT MANAGEMENT - PLANNING YOUR PROJECT Career Details Colleen Garton 15 March 2022 PROJECT LIFECYCLE, METHODOLOGIES, AND STANDARDS - PROJECT MANAGEMENT AND QUALITY MANAGEMENT STANDARDS Career Details Colleen Garton 15 February 2022 PROJECT LIFECYCLE, METHODOLOGIES, AND STANDARDS - MANAGING EACH STEP OF THE PROJECT LIFECYCLE COMMERCE Customer Relationship Management TO MAKE SHOPPING EXPERIENCES EXCEPTIONAL, BRICK AND CLICK RETAILERS MUST INNOVATE Details Vish Ganapathy Commerce 31 July 2016 These days, consumers expect retailers to provide information tailored personally just for them. In the industry’s current disruptive environment, retail and consumer product companies are competing with new business models and being forced to refresh their consumer experiences and brand engagements to be more relevant. A new IBM study finds retailers' current strategies to deliver engaging brand experiences are not keeping pace with what customers’ expect and want out of their brick and click shopping experiences. Enterprise Resource Planning / Financial Details Robert Vormittag Commerce 21 March 2016 ERP IMPLEMENTATION STRATEGIES THAT YIELD ULTIMATE ROI Enterprise Resource Planning / Financial Details Ross Freeman Commerce 13 July 2015 9 THINGS TO CONSIDER WHEN CHOOSING AN ERP PACKAGE ON IBM I Enterprise Resource Planning / Financial Details John Ghrist Commerce 15 June 2015 TECHNOLOGY FOCUS: IBM I ACCOUNTING APPLICATIONS STAY ON THE MONEY INTERNET OF THINGS Internet of Things - Other THE INTERNET OF THINGS: YOU'RE ALREADY A PART OF IT Details Jan Jorgensen Internet of Things 28 September 2017 Do you realize how many of your personal or business devices are connected to the Internet? Let's talk about that. By Jan Jorgensen The Internet of Things (IoT): You've heard somebody talk about it; or you've read about it in a newspaper, in a tech magazine, or on a website; or you've attended a seminar or conference where somebody told you about the next big thing. Internet of Things - Other Details Graham Williamson Internet of Things 19 March 2017 INTERNET OF THINGS: YOU CAN’T AVOID THE INEVITABLE Internet of Things - Other Details Joydip Kanjilal Internet of Things 02 October 2016 INTERNET OF THINGS: CREATING A CONNECTED, SMARTER WORLD RFID Details Bill Rice Internet of Things 12 December 2004 RFID: THE NEXT WAVE OF SUPPLY CHAIN TECHNOLOGY IT INFRASTRUCTURE IBM i (OS/400, i5/OS) 2022 IBM I MARKETPLACE SURVEY RESULTS Details Help Systems, LLC Operating Systems 10 February 2022 SURVEY HIGHLIGHTS By HelpSystems Editor's note: This article introduces the February 2022 Report: 2022 IBM i Marketplace Survey Results, which is available to download from the MC White Paper Center. Cybersecurity continues to top the charts as the main concern when planning an IT environment. Perhaps the most consistent data point in the IBM i Marketplace Survey Results is the ongoing cybersecurity threat. Over the past six years, cybersecurity has been the main concern for people planning their IT environment, and this year was no exception. Although it has decreased since last year’s results, 62% of respondents still said this was their number one concern. And although organizations prioritizing security seem to be implementing multiple solutions, it is still alarming that, on average, almost 30% of respondents do not plan to implement each of the surveyed cybersecurity solutions. If your organization has concerns over IBM i cybersecurity skills, managed security services could be a way of filling in any holes. IT Infrastructure Details Help Systems, LLC 19 October 2021 POWER10 POWER HOUR Linux / Open Source Details Joe Pluta Operating Systems 06 April 2021 PRACTICAL OSS: MKDOCS FOR THE IBM I, PART 2 IT Infrastructure - Other Details Steve Pitcher IT Infrastructure 16 February 2021 IBM I 7.2: THE CARROT VERSUS THE STICK SOCIAL Collaboration & Messaging WHAT DOES DOMINO 10 REALLY MEAN? Details Steve Pitcher Social 14 November 2017 IBM Notes Domino gets a new future with HCL Technologies. By Steve Pitcher On October 25, 2017, IBM announced (well, they blogged it) that they were entering into a strategic partnership with HCL Technologies to give the following products a new lease on development life: Collaboration & Messaging Details Steve Pitcher Social 31 July 2016 THE DOMINO 9.0.2 WAITING GAME Collaboration & Messaging Details John Ghrist Social 18 January 2015 TECHNOLOGY FOCUS: EMPLOYEE AIDS FOR INTERNAL COMMUNICATIONS Collaboration & Messaging Details Serge Charbit Social 25 November 2014 TECHTIP: 24/7 NOTIFICATIONS FROM YOUR IBM I RESOURCE CENTER * WHITE PAPERS * WEBCAST * TRIAL SOFTWARE * MOBILE COMPUTING AND THE IBM I Mobile computing is rapidly maturing into a solid platform for delivering enterprise applications. Many IBM i shops today are realizing that integrating their IBM i with mobile applications is the fast path to improved business workflows, better customer relations, and more responsive business reporting. This ASNA whitepaper takes a look at mobile computing for the IBM i. It discusses the different ways mobile applications may be used within the enterprise and how ASNA products solve the challenges mobile presents. It also presents the case that you already have the mobile programming team your projects need: that team is your existing RPG development team! Get your copy today! * AUTOMATE IBM I OPERATIONS USING WIRELESS DEVICES Download the technical whitepaper on MANAGING YOUR IBM i WIRELESSLY and (optionally) register to download an absolutely FREE software trail. This whitepaper provides an in-depth review of the native IBM i technology and ACO MONITOR's advanced two-way messaging features to remotely manage your IBM i while in or away from the office. Notify on-duty personnel of system events and remotely respond to complex problems (via your Smartphone) before they become critical-24/7. Problem solved! Order your copy here. * DR STRATEGY GUIDE FROM MAXAVA: BRAND NEW EDITION - NOW FULLY UPDATED TO INCLUDE CLOUD! PRACTICAL TOOLS TO IMPLEMENT DISASTER RECOVERY IN YOUR IBM i ENVIRONMENT CLOUD VS. ON-PREMISE? - COMPREHENSIVE CHECKLISTS - RISK COST CALCULATIONS - BUSINESS CASE FRAMEWORK - DR SOLUTIONS OVERVIEW - RFP BUILDER Download your free copy of DR Strategy Guide for IBM i from Maxava today. * WHITE PAPER: NODE.JS FOR ENTERPRISE IBM I MODERNIZATION If your business is thinking about modernizing your legacy IBM i (also known as AS/400 or iSeries) applications, you will want to read this white paper first! Download this paper and learn how Node.js can ensure that you: - Modernize on-time and budget - no more lengthy, costly, disruptive app rewrites! - Retain your IBM i systems of record - Find and hire new development talent - Integrate new Node.js applications with your existing RPG, Java, .Net, and PHP apps - Extend your IBM i capabilties to include Watson API, Cloud, and Internet of Things Read Node.js for Enterprise IBM i Modernization Now! * 2020 IBM I MARKETPLACE SURVEY RESULTS This year marks the sixth edition of the popular IBM i Marketplace Survey Results. Each year, HelpSystems sets out to gather data about how businesses use the IBM i platform and the IT initiatives it supports. Year over year, the survey has begun to reveal long-term trends that give insight into the future of this trusted technology. More than 500 IBM i users from around the globe participated in this year’s survey, and we’re so happy to share the results with you. We hope you’ll find the information interesting and useful as you evaluate your own IT projects. * AIX SECURITY BASICS ECOURSE With so many organizations depending on AIX day to day, ensuring proper security and configuration is critical to ensure the safety of your environment. Don’t let common threats put your critical AIX servers at risk. Avoid simple mistakes and start to build a long-term plan with this AIX Security eCourse. Enroll today to get easy to follow instructions on topics like: * Removing extraneous files * Patching systems efficiently * Setting and validating permissions * Managing service considerations * Getting overall visibility into your networks * DEVELOPER KIT: MAKING A BUSINESS CASE FOR MODERNIZATION AND BEYOND Having trouble getting management approval for modernization projects? The problem may be you're not speaking enough "business" to them. This Developer Kit provides you study-backed data and a ready-to-use business case template to help get your very next development project approved! * WHAT TO DO WHEN YOUR AS/400 TALENT RETIRES IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators is small. This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: * Why IBM i skills depletion is a top concern * How leading organizations are coping * Where automation will make the biggest impact Next Previous * IBM I RESOURCES RETIRING? Let’s face it: IBM i experts and RPG programmers are retiring from the workforce. Are you prepared to handle their departure? Our panel of IBM i experts—Chuck Losinski, Robin Tatam, Richard Schoen, and Tom Huntington—will outline strategies that allow your company to cope with IBM i skills depletion by adopting these strategies that allow you to get the job done without deep expertise on the OS: - Automate IBM i processes - Use managed services to help fill the gaps - Secure the system against data loss and viruses The strategies you discover in this webinar will help you ensure that your system of record—your IBM i—continues to deliver a powerful business advantage, even as staff retires. * BACKUP AND RECOVERY CONSIDERATIONS FOR SECURITY DATA AND ENCRYPTED BACKUPS Security expert Carol Woodbury is joined by Debbie Saugen. Debbie is an expert on IBM i backup and recovery, disaster recovery, and high availability, helping IBM i shops build and implement effective business continuity plans. In today’s business climate, business continuity is more important than ever. But 83 percent of organizations are not totally confident in their backup strategy. During this webinar, Carol and Debbie discuss the importance of a good backup plan, how to ensure you’re backing up your security information, and your options for encrypted back-ups. * PROFOUND.JS: THE AGILE APPROACH TO LEGACY MODERNIZATION In this presentation, Alex Roytman and Liam Allan will unveil a completely new and unique way to modernize your legacy applications. Learn how Agile Modernization: - Uses the power of Node.js in place of costly system re-writes and migrations - Enables you to modernize legacy systems in an iterative, low-risk manner - Makes it easier to hire developers for your modernization efforts - Integrates with Profound UI (GUI modernization) for a seamless, end-to-end legacy modernization solution * DATA BREACHES: IS IBM I REALLY AT RISK? IBM i is known for its security, but this OS could be more vulnerable than you think. Although Power Servers often live inside the safety of the perimeter firewall, the risk of suffering a data leak or data corruption remains high. Watch noted IBM i security expert Robin Tatam as he discusses common ways that this supposedly “secure” operating system may actually be vulnerable and who the culprits might be. Watch the webinar today! * EASY MOBILE DEVELOPMENT Watch this on-demand webinar and learn how to rapidly and easily deploy mobile apps to your organization – even when working with legacy RPG code! IBM Champion Scott Klement will demonstrate how to: - Develop RPG applications without mobile development experience - Deploy secure applications for any mobile device - Build one application for all platforms, including Apple and Android - Extend the life and reach of your IBM i (aka iSeries, AS400) platform You’ll see examples from customers who have used our products and services to deliver the mobile applications of their dreams, faster and easier than they ever thought possible! * PROFOUND UI: UNLOCK TRUE MODERNIZATION FROM YOUR IBM I ENTERPRISE Modern, web-based applications can make your Enterprise more efficient, connected and engaged. This session will demonstrate how the Profound UI framework is the best and most native way to convert your existing RPG applications and develop new modern applications for your business. Additionally, you will learn how you can address modernization across your Enterprise, including databases and legacy source code, with Profound Logic. * NODE WEBINAR SERIES PT. 1: THE WORLD OF NODE.JS ON IBM I Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. Part 1 will teach you what Node.js is, why it's a great option for IBM i shops, and how to take advantage of the ecosystem surrounding Node. In addition to background information, our Director of Product Development Scott Klement will demonstrate applications that take advantage of the Node Package Manager (npm). * 5 NEW AND UNIQUE WAYS TO USE THE IBM I AUDIT JOURNAL You must be asking yourself: am I doing everything I can to protect my organization’s data? Tune in as our panel of IBM i high availability experts discuss: - Why companies don’t test role swaps when they know they should - Whether high availability in the cloud makes sense for IBM i users - Why some organizations don’t have high availability yet - How to get high availability up and running at your organization - High availability considerations for today’s security concerns * PROFOUND.JS 2.0: EXTEND THE POWER OF NODE TO YOUR IBM I APPLICATIONS In this Webinar, we'll demonstrate how Profound.js 2.0 enables you to easily adopt Node.js in your business, and to take advantage of the many benefits of Node, including access to a much larger pool of developers for IBM i and access to countless reusable open source code packages on npm (Node Package Manager). You will see how Profound.js 2.0 allows you to: * Provide RPG-like capabilities for server-side JavaScript. * Easily create web and mobile application interfaces for Node on IBM i. * Let existing RPG programs call Node.js modules directly, and vice versa. * Automatically generate code for Node.js. * Automatically converts existing RPGLE code into clean, simplified Node.js code. Download and watch today! * MAKE MODERN APPS YOU'LL LOVE WITH PROFOUND UI & PROFOUND.JS Whether you have green screens or a drab GUI, your outdated apps can benefit from modern source code, modern GUIs, and modern tools. Profound Logic's Alex Roytman and Liam Allan are here to show you how Free-format RPG and Node.js make it possible to deliver applications your whole business will love: * Transform legacy RPG code to modern free-format RPG and Node.js * Deliver truly modern application interfaces with Profound UI * Extend your RPG applications to include Web Services and NPM packages with Node.js * ACCELERATING PROGRAMMER PRODUCTIVITY WITH SEQUEL Most business intelligence tools are just that: tools, a means to an end but not an accelerator. Yours could even be slowing you down. But what if your BI tool didn't just give you a platform for query-writing but also improved programmer productivity? Watch the recorded webinar to see how Sequel: * Makes creating complex results simple * Eliminates barriers to data sources * Increases flexibility with data usage and distribution Accelerated productivity makes everyone happy, from programmer to business user. * BUSINESS INTELLIGENCE IS CHANGING: MAKE YOUR GAME PLAN It’s time to develop a strategy that will help you meet your informational challenges head-on. Watch the webinar to learn how to set your IT department up for business intelligence success. You’ll learn how the right data access tool will help you: * Access IBM i data faster * Deliver useful information to executives and business users * Empower users with secure data access Ready to make your game plan and finally keep up with your data access requests? * CONTROLLING INSIDER THREATS ON IBM I Let’s face facts: servers don’t hack other servers. Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders. User profiles are often duplicated or restored and are rarely reviewed for the appropriateness of their current configuration. This increases the risk of the profile being able to access data without the intended authority or having privileges that should be reserved for administrators. Watch security expert Robin Tatam as he discusses a new approach for onboarding new users on IBM i and best-practices techniques for managing and monitoring activities after they sign on. * DON'T JUST SETTLE FOR QUERY/400... While introducing Sequel Data Access, we’ll address common frustrations with Query/400, discuss major data access, distribution trends, and more advanced query tools. Plus, you’ll learn how a tool like Sequel lightens IT’s load by: - Accessing real-time data, so you can make real-time decisions - Providing run-time prompts, so users can help themselves - Delivering instant results in Microsoft Excel and PDF, without the wait - Automating the query process with on-demand data, dashboards, and scheduled jobs * HOW TO MANAGE DOCUMENTS THE EASY WAY What happens when your company depends on an outdated document management strategy? Everything is harder. You don’t need to stick with status quo anymore. Watch the webinar to learn how to put effective document management into practice and: * Capture documents faster, instead of wasting everyone’s time * Manage documents easily, so you can always find them * Distribute documents automatically, and move on to the next task * LESSONS LEARNED FROM THE AS/400 BREACH Get actionable info to avoid becoming the next cyberattack victim. In “Data breach digest—Scenarios from the field,” Verizon documented an AS/400 security breach. Whether you call it AS/400, iSeries, or IBM i, you now have proof that the system has been breached. Watch IBM i security expert Robin Tatam give an insightful discussion of the issues surrounding this specific scenario. Robin will also draw on his extensive cybersecurity experience to discuss policies, processes, and configuration details that you can implement to help reduce the risk of your system being the next victim of an attack. * OVERWHELMED BY OPERATING SYSTEMS? In this 30-minute recorded webinar, our experts demonstrate how you can: * Manage multiple platforms from a central location * View monitoring results in a single pane of glass on your desktop or mobile device * Take advantage of best practice, plug-and-play monitoring templates * Create rules to automate daily checks across your entire infrastructure * Receive notification if something is wrong or about to go wrong This presentation includes a live demo of Network Server Suite. * REAL-TIME DISK MONITORING WITH ROBOT MONITOR You need to know when IBM i disk space starts to disappear and where it has gone before system performance and productivity start to suffer. Our experts will show you how Robot Monitor can help you pinpoint exactly when your auxiliary storage starts to disappear and why, so you can start taking a proactive approach to disk monitoring and analysis. You’ll also get insight into: * The main sources of disk consumption * How to monitor temporary storage and QTEMP objects in real time * How to monitor objects and libraries in real time and near-real time * How to track long-term disk trends * STOP RE-KEYING DATA BETWEEN IBM I AND OTHER APPLICATIONS Many business still depend on RPG for their daily business processes and report generation.Wouldn’t it be nice if you could stop re-keying data between IBM i and other applications? Or if you could stop replicating data and start processing orders faster? Or what if you could automatically extract data from existing reports instead of re-keying? It’s all possible. Watch this webinar to learn about: * The data dilemma * 3 ways to stop re-keying data * Data automation in practice Plus, see how HelpSystems data automation software will help you stop re-keying data. * THE TOP FIVE RPG OPEN ACCESS MYTHS....BUSTED! When it comes to IBM Rational Open Access: RPG Edition, there are still many misconceptions - especially where application modernization is concerned! In this Webinar, we'll address some of the biggest myths about RPG Open Access, including: * Modernizing with RPG OA requires significant changes to the source code * The RPG language is outdated and impractical for modernizing applications * Modernizing with RPG OA is the equivalent to "screen scraping" * TIME TO REMOVE THE PAPER FROM YOUR DESK AND BECOME MORE EFFICIENT Too much paper is wasted. Attempts to locate documents in endless filing cabinets.And distributing documents is expensive and takes up far too much time. These are just three common reasons why it might be time for your company to implement a paperless document management system. Watch the webinar to learn more and discover how easy it can be to: * Capture * Manage * And distribute documents digitally * IBM I: IT’S NOT JUST AS/400 IBM’s Steve Will talks AS/400, POWER9, cognitive systems, and everything in between Are there still companies that use AS400? Of course! IBM i was built on the same foundation. Watch this recorded webinar with IBM i Chief Architect Steve Will and IBM Power Champion Tom Huntington to gain a unique perspective on the direction of this platform, including: * IBM i development strategies in progress at IBM * Ways that Watson will shake hands with IBM i * Key takeaways from the AS/400 days * ASK THE RDI EXPERTS Watch this recording where Jim Buck, Susan Gantner, and Charlie Guarino answered your questions, including: * What are the “hidden gems” in RDi that can make me more productive? * What makes RDi Debug better than the STRDBG green screen debugger? * How can RDi help me find out if I’ve tested all lines of a program? * What’s the best way to transition from PDM to RDi? * How do I convince my long-term developers to use RDi? This is a unique, online opportunity to hear how you can get more out of RDi. * NODE.JS ON IBM I WEBINAR SERIES PT. 2: SETTING UP YOUR DEVELOPMENT TOOLS Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. In Part 2, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Attend this webinar to learn: * Different tools to develop Node.js applications on IBM i * Debugging Node.js * The basics of Git and tools to help those new to it * Using NodeRun.com as a pre-built development environment * INSIDE THE INTEGRATED FILE SYSTEM (IFS) During this webinar, you’ll learn basic tips, helpful tools, and integrated file system commands—including WRKLNK—for managing your IFS directories and Access Client Solutions (ACS). We’ll answer your most pressing IFS questions, including: * What is stored inside my IFS directories? * How do I monitor the IFS? * How do I replicate the IFS or back it up? * How do I secure the IFS? Understanding what the integrated file system is and how to work with it must be a critical part of your systems management plans for IBM i. * EXPERT TIPS FOR IBM I SECURITY: BEYOND THE BASICS In this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level. Robin will cover: * Reducing the risk posed by special authorities * Establishing object-level security * Overseeing user actions and data access Don't miss this chance to take your knowledge of IBM i security beyond the basics. * 5 IBM I SECURITY QUICK WINS In today’s threat landscape, upper management is laser-focused on cybersecurity. You need to make progress in securing your systems—and make it fast. There’s no shortage of actions you could take, but what tactics will actually deliver the results you need? And how can you find a security strategy that fits your budget and time constraints? Join top IBM i security expert Robin Tatam as he outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year. Your system didn’t become unsecure overnight and you won’t be able to turn it around overnight either. But quick wins are possible with IBM i security, and Robin Tatam will show you how to achieve them. * HOW TO MEET THE NEWEST ENCRYPTION REQUIREMENTS ON IBM I A growing number of compliance mandates require sensitive data to be encrypted. But what kind of encryption solution will satisfy an auditor and how can you implement encryption on IBM i? Watch this on-demand webinar to find out how to meet today’s most common encryption requirements on IBM i. You’ll also learn: * Why disk encryption isn’t enough * What sets strong encryption apart from other solutions * Important considerations before implementing encryption * SECURITY BULLETIN: MALWARE INFECTION DISCOVERED ON IBM I SERVER! Malicious programs can bring entire businesses to their knees—and IBM i shops are not immune. It’s critical to grasp the true impact malware can have on IBM i and the network that connects to it. Attend this webinar to gain a thorough understanding of the relationships between: * Viruses, native objects, and the integrated file system (IFS) * Power Systems and Windows-based viruses and malware * PC-based anti-virus scanning versus native IBM i scanning There are a number of ways you can minimize your exposure to viruses. IBM i security expert Sandi Moore explains the facts, including how to ensure you're fully protected and compliant with regulations such as PCI. * FIGHT CYBER THREATS WITH IBM I ENCRYPTION Cyber attacks often target mission-critical servers, and those attack strategies are constantly changing. To stay on top of these threats, your cybersecurity strategies must evolve, too. In this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level. Robin will cover: * Reducing the risk posed by special authorities * Establishing object-level security * Overseeing user actions and data access * 10 PRACTICAL IBM I SECURITY TIPS FOR SURVIVING COVID-19 AND WORKING FROM HOME Now that many organizations have moved to a work from home model, security concerns have risen. During this session Carol Woodbury will discuss the issues that the world is currently seeing such as increased malware attacks and then provide practical actions you can take to both monitor and protect your IBM i during this challenging time. * HOW TO TRANSFER IBM I DATA TO MICROSOFT EXCEL 3 easy ways to get IBM i data into Excel every time There’s an easy, more reliable way to import your IBM i data to Excel? It’s called Sequel. During this webinar, our data access experts demonstrate how you can simplify the process of getting data from multiple sources—including Db2 for i—into Excel. Watch to learn how to: * Download your IBM i data to Excel in a single step * Deliver data to business users in Excel via email or a scheduled job * Access IBM i data directly using the Excel add-in in Sequel Make 2020 the year you finally see your data clearly, quickly, and securely. Start by giving business users the ability to access crucial business data from IBM i the way they want it—in Microsoft Excel. * HA ALTERNATIVES: MIMIX IS NOT YOUR ONLY OPTION ON IBM I In this recorded webinar, our experts introduce you to the new HA transition technology available with our Robot HA software. You’ll learn how to: * Transition your rules from MIMIX (if you’re happy with them) * Simplify your day-to-day activities around high availability * Gain back time in your work week * Make your CEO happy about reducing IT costs Don’t stick with a legacy high availability solution that makes you uncomfortable when transitioning to something better can be simple, safe, and cost-effective. * NODE WEBINAR SERIES PT. 1: THE WORLD OF NODE.JS ON IBM I Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. Part 1 will teach you what Node.js is, why it's a great option for IBM i shops, and how to take advantage of the ecosystem surrounding Node. In addition to background information, our Director of Product Development Scott Klement will demonstrate applications that take advantage of the Node Package Manager (npm). Watch Now. * THE BIGGEST MISTAKES IN IBM I SECURITY The Biggest Mistakes in IBM i Security Here’s the harsh reality: cybersecurity pros have to get their jobs right every single day, while an attacker only has to succeed once to do incredible damage. Whether that’s thousands of exposed records, millions of dollars in fines and legal fees, or diminished share value, it’s easy to judge organizations that fall victim. IBM i enjoys an enviable reputation for security, but no system is impervious to mistakes. Join this webinar to learn about the biggest errors made when securing a Power Systems server. This knowledge is critical for ensuring integrity of your application data and preventing you from becoming the next Equifax. It’s also essential for complying with all formal regulations, including SOX, PCI, GDPR, and HIPAA Watch Now. Next Previous * COMPLY IN 5! WELL, ACTUALLY UNDER 5 MINUTES!! TRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Request your trial now! * BACKUP AND RECOVERY ON IBM I: YOUR STRATEGY FOR THE UNEXPECTED Robot automates the routine tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include: - Simplified backup procedures - Easy data encryption - Save media management - Guided restoration - Seamless product integration Make sure your data survives when catastrophe hits. Try the Robot Backup and Recovery Solution FREE for 30 days. * MANAGE IBM I MESSAGES BY EXCEPTION WITH ROBOT Managing messages on your IBM i can be more than a full-time job if you have to do it manually. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include: - Automated message management - Tailored notifications and automatic escalation - System-wide control of your IBM i partitions - Two-way system notifications from your mobile device - Seamless product integration Try the Robot Message Management Solution FREE for 30 days. * EASIEST WAY TO SAVE MONEY? STOP PRINTING IBM I REPORTS Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include: - Automated report distribution - View online without delay - Browser interface to make notes - Custom retention capabilities - Seamless product integration Rerun another report? Never again. Try the Robot Report Management Solution FREE for 30 days. * HASSLE-FREE IBM I OPERATIONS AROUND THE CLOCK For over 30 years, Robot has been a leader in systems management for IBM i. Manage your job schedule with the Robot Job Scheduling Solution. Key features include: - Automated batch, interactive, and cross-platform scheduling - Event-driven dependency processing - Centralized monitoring and reporting - Audit log and ready-to-use reports - Seamless product integration Scale your software, not your staff. Try the Robot Job Scheduling Solution FREE for 30 days. * ACO MONITOR MANAGES YOUR IBM I 24/7 AND NOTIFIES YOU WHEN YOUR IBM I NEEDS ASSISTANCE! More than a paging system - ACO MONITOR is a complete systems management solution for your Power Systems running IBM i. ACO MONITOR manages your Power System 24/7, uses advanced technology (like two-way messaging) to notify on-duty support personnel, and responds to complex problems before they reach critical status. ACO MONITOR is proven technology and is capable of processing thousands of mission-critical events daily. The software is pre-configured, easy to install, scalable, and greatly improves data center efficiency. Next Previous BOOK REVIEWS * BOOK REVIEW: THE MODERN RPG IV LANGUAGE, FOURTH EDITION This book isn't a training manual; it's a reference book. The Modern RPG IV Language, Fourth Edition by Robert Cozzi, Jr. is the latest version of a book that has enjoyed a long history of popularity in the RPG community. With this book, MC Press continues its tradition of providing relevant and timely materials in a quality book format. * BOOK REVIEW: DB2 9 FUNDAMENTALS Whether you want to obtain an IBM certified DB2 professional certification or simply become well-rounded in the fundamental concepts of DB2 and general database theory, this is your book. Roger E. Sanders has created one of today's greatest technical certification books, DB2 9 Fundamentals, to prepare you for everything you need to know to become DB2 9 certified per IBM's standards. Sanders kicks things off with a chapter dedicated to identifying the various types of DB2 professional certifications that are available and the professional roles at which each is aimed. He also walks you through the complete process of obtaining your certification, first taking you through the steps to register for the exam and then providing examples of what to expect on the exam in terms of its format. If you were at all wondering what to expect, then wonder no more: It's all clearly spelled out in his opening dialog! * BOOK REVIEW: SOA FOR THE BUSINESS DEVELOPER If you want to know how SOA works in the real world, this is your book. By Phil Law There's a lot of hype and fanfare surrounding service-oriented architecture (SOA), but the authors of SOA for the Business Developer have obviously gotten their hands dirty participating in real-world SOA projects. The content of their book reflects that experience. They begin by pointing out the simple truth that "SOA includes ideas that have been around for decades." Comparing and contrasting new concepts with old, familiar software design principles quickly brings the reader up to speed with the overarching principles of SOA. * BOOK REVIEW: JAVASCRIPT FOR THE BUSINESS DEVELOPER There's no faster, easier way to become proficient in JavaScript. By Jan Jorgensen This book landed on my desk just before my holiday in Greece. I looked at it and thought, "How can anybody cover such a large subject in just 160 pages? That's not possible." But it is possible, and that's the strongest force about this book: It's short, it's down to business, it's concise, and most important, it's full of great and useful examples and sample code that you can download. * BOOK REVIEW: THE IBM I PROGRAMMER'S GUIDE TO PHP Both a primer and a reference, this book is a must-have for anyone who wants to program in PHP. By Mike Pavlak After developing Web solutions for the iSeries in Net.Data and then getting a sour taste from Java, I wanted something better. PHP was certainly the right choice, but making it run on an iSeries at the time was no small feat. Then Zend came to the table, and the rest, as they say, is history. There is no way any of us on the ground floor of this amazing union could have anticipated this level of excitement and interest. We continue to see huge numbers being drawn to PHP on IBM i as well as Linux, UNIX, and Windows. And this book