www.mcpressonline.com Open in urlscan Pro
2606:4700:20::ac43:49d1  Public Scan

URL: https://www.mcpressonline.com/
Submission: On July 06 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

POST /

<form action="/" method="post" class="form-inline">
  <i class="fa fa-search"></i>
  <label for="mod-search-searchword" class="element-invisible">Search ...</label> <input name="searchword" id="mod-search-searchword" maxlength="200" class="form-control inputbox search-query" type="text" size="40" value="Search ..."
    onblur="if (this.value=='') this.value='Search ...';" onfocus="if (this.value=='Search ...') this.value='';"> <input type="hidden" name="task" value="search">
  <input type="hidden" name="option" value="com_search">
  <input type="hidden" name="Itemid" value="559">
</form>

POST /

<form action="/" method="post" id="loginForm1134">
  <div class="je_pretext">
  </div>
  <label class="control-label" for="inputEmail1134"></label>
  <input placeholder="User Name" class="je_input" id="inputEmail1134" type="text" name="username">
  <label class="control-label" for="inputPassword1134"></label>
  <input placeholder="Password" class="je_input" id="inputPassword1134" type="password" name="password">
  <label class="je_check">
    <input id="modlgn-remember" type="checkbox" name="remember" class="" value="yes">Remember Me </label>
  <input type="submit" name="Submit" class="je_button je_loginbtn" value="Login">
  <input type="hidden" name="option" value="com_users">
  <input type="hidden" name="task" value="user.login">
  <input type="hidden" name="return" value="aW5kZXgucGhwP0l0ZW1pZD0zNjQw">
  <input type="hidden" name="e64627bd4b037104cffe17258571b18f" value="1">
  <div class="link-options">
    <span class="je_pass"><a href="/lost-password/">Forgot your password?</a></span>
    <span class="je_user"><a href="/lost-user-name/">Forgot your username?</a></span>
    <span class="je_signup"><a href="https://www.mcpressonline.com/create-an-account">Sign Up</a></span>
  </div>
</form>

Name: campaign_formPOST https://www.mcpressonline.com/donation-form

<form name="campaign_form" id="campaign_form" method="post" action="https://www.mcpressonline.com/donation-form">
  <table cellspacing="0" cellpadding="0" class="table table-striped donate-details">
    <tbody>
      <tr>
        <td valign="top" class="mod_jdonation_amount_header">
          <strong>Select Your Contribution Amount</strong>
        </td>
      </tr>
      <tr>
        <td class="mod_jdonation_amount">
          <label class="amounts radio-label-btn" id="amount0">
            <input type="radio" name="rd_amount" value="12"> $ 12.00 </label>
          <script type="text/javascript">
            jQuery("#amount0").click(function() {
              jQuery(".radio-label-btn").removeClass("selected");
              jQuery("#amount0").addClass("selected");
            });
          </script>
          <label class="amounts radio-label-btn" id="amount1">
            <input type="radio" name="rd_amount" value="24"> $ 24.00 </label>
          <script type="text/javascript">
            jQuery("#amount1").click(function() {
              jQuery(".radio-label-btn").removeClass("selected");
              jQuery("#amount1").addClass("selected");
            });
          </script>
          <label class="amounts radio-label-btn" id="amount2">
            <input type="radio" name="rd_amount" value="36"> $ 36.00 </label>
          <script type="text/javascript">
            jQuery("#amount2").click(function() {
              jQuery(".radio-label-btn").removeClass("selected");
              jQuery("#amount2").addClass("selected");
            });
          </script>
          <label class="amounts radio-label-btn" id="amount3">
            <input type="radio" name="rd_amount" value="48"> $ 48.00 </label>
          <script type="text/javascript">
            jQuery("#amount3").click(function() {
              jQuery(".radio-label-btn").removeClass("selected");
              jQuery("#amount3").addClass("selected");
            });
          </script>
          <label class="amounts radio-label-btn" id="amount9999">
            <span class="symbol" style="padding: 0 5px 0 0;">$</span><input type="text" class="input-small nopadding displayinline" placeholder="Other Amount" value="" name="amount"> <label>
              <script type="text/javascript">
                jQuery("#amount9999").click(function() {
                  jQuery(".radio-label-btn").removeClass("selected");
                  jQuery("#amount9999").addClass("selected");
                });
              </script>
            </label></label>
        </td>
      </tr>
      <tr>
        <td class="center" colspan="2">
          <div class="donate-details-mod taskbar row-fluid">
            <div class="jd-taskbar">
              <input type="button" class="button btn btn-primary" name="btnDonate" value="Contribute Now!" onclick="checkDonation(this.form);">
            </div>
          </div>
        </td>
      </tr>
    </tbody>
  </table>
  <input type="hidden" name="payment_method" value="os_paypal">
  <script type="text/javascript">
    var donationType = 2;
    var minimumAmount = 10;
    var maximumAmount = 1000;

    function checkDonation(form) {
      var amount = 0;
      switch (donationType) {
        case 0:
          if (!parseFloat(form.amount.value)) {
            alert("Please enter a valid donation amount");
            form.amount.focus();
            return;
          }
          if (parseFloat(form.amount.value) < minimumAmount) {
            alert("Minimum donation amount allowed is : $" + minimumAmount);
            form.amount.focus();
            return;
          }
          if ((maximumAmount > 0) && (parseFloat(form.amount.value) > maximumAmount)) {
            alert("Maximum donation amount allowed is : $" + maximumAmount);
            form.amount.focus();
            return;
          }
          break;
        case 1:
          var checked = false;
          if (form.rd_amount.length) {
            for (var i = 0; i < form.rd_amount.length; i++) {
              if (form.rd_amount[i].checked) {
                checked = true;
                amount = form.rd_amount[i].value;
                break;
              }
            }
            if (!checked) {
              alert("Please choose a donation amount");
              return;
            }
          } else {
            if (!form.rd_amount.checked) {
              alert("Please choose a donation amount");
              return;
            } else {
              amount = form.rd_amount.value;
            }
          }
          if (parseFloat(amount) < minimumAmount) {
            alert("Minimum donation amount allowed is : $" + minimumAmount);
            return;
          }
          if ((maximumAmount > 0) && (parseFloat(amount) > maximumAmount)) {
            alert("Maximum donation amount allowed is : $" + maximumAmount);
            form.amount.focus();
            return;
          }
          break;
        case 2:
          var valid = false;
          if (form.rd_amount.length) {
            for (var i = 0; i < form.rd_amount.length; i++) {
              if (form.rd_amount[i].checked) {
                valid = true;
                amount = form.rd_amount[i].value;
                break;
              }
            }
          } else {
            if (form.rd_amount.checked) {
              valid = true;
              amount = form.rd_amount[i].value;
            }
          }
          if (!valid) {
            if (!parseFloat(form.amount.value)) {
              alert("Please enter a valid donation amount");
              return;
            } else {
              amount = form.amount.value;
            }
          }
          if (parseFloat(amount) < minimumAmount) {
            alert("Minimum donation amount allowed is : $" + minimumAmount);
            form.amount.focus();
            return;
          }
          if ((maximumAmount > 0) && (parseFloat(amount) > maximumAmount)) {
            alert("Maximum donation amount allowed is : $" + maximumAmount);
            form.amount.focus();
            return;
          }
          break;
      }
      if (form.payment_method.value == '') {
        alert("Please choose a payment method");
        form.payment_method.focus();
        return;
      }
      //All data is valid, submit form for processing
      form.submit();
    }
  </script>
</form>

Text Content

SIDEBAR

×


HOME

 * Analytics & Cognitive
   * Business Intelligence
   * DB2
   * Document Management
   * Analytics & Cognitive - Other
 * Career
   * General
 * Cloud
   * High Availability / Disaster Recovery
   * Managed Services / SaaS / PaaS / IaaS
   * Cloud - Other
 * Commerce
   * Customer Relationship Management
   * Enterprise Resource Planning / Financial
   * Commerce - Other
 * Internet of Things
   * RFID
   * Sensor Technology
   * Internet of Things - Other
 * IT Infrastructure
   * Operating Systems
     * IBM i (OS/400, i5/OS)
     * Linux / Open Source
     * Microsoft
     * UNIX / AIX
   * System Administration
   * IT Infrastructure - Other
     * Application Servers
     * Emulation
     * General
     * Networking
 * Mobile
   * Development Tools / Utilities
   * Mobile Languages
   * Mobile - Other
 * Programming
   * APIs
   * RPG
   * Scripting
   * SQL
   * Web Languages
   * Programming - Other
     * Change Management
     * CL
     * Development Tools
     * General
     * Java
     * Microsoft
     * Visual Basic
 * Security
   * Compliance/Privacy
   * IBM i (OS/400, i5/OS)
   * Security - Other
 * Social
   * Collaboration & Messaging
   * Collaboration - Other

 * NEWS
   * Analytics & Cognitive News
   * Cloud News
   * Commerce News
   * Industry News
   * IT Infrastructure News
   * Mobile News
   * Programming News
   * Security News
 * Resources
   * MC On-Demand Webcast
   * MC Trial Software
   * MC White Papers
 * BUYER'S GUIDE
   * Hardware
   * Services
   * Software
 * EVENTS
 * FORUMS
   * Shooting the Breeze
   * Analysis
     * Commentary
     * News
   * App Software
     * Collaboration & Messaging
     * Customer Relationship Management
     * Document Management
     * ERP/Financial
     * General
     * IBM
     * Managed Services/SaaS
     * Microsoft
   * Career Center
     * General
     * Jobs Offered
     * Resumes
   * Database
     * Business Intelligence
     * DB2
     * General
     * Microsoft Access
     * MySQL
     * Oracle
   * Internet
     * Application Servers
     * Commerce
     * General
     * Portals
     * Protocols
     * Telephony
   * Networking
     * Emulation
     * General
     * Wireless/Mobile
   * Op Systems
     * IBM i (OS/400, i5/OS)
     * Linux/Open Source
     * Microsoft
     * Unix/AIX
   * Programming
     * APIs
     * Business Integration
     * C, C++, C#
     * Change Management
     * CL
     * COBOL
     * Dev Tools
     * General
     * Java
     * REXX
     * RPG
     * Scripting
     * SQL
     * Web Languages
     * Visual Basic
   * Security
     * Compliance/Privacy
     * General
     * IBM i (OS/400, i5/OS)
     * Microsoft
   * System Admin
     * General
     * High Availability/DR
     * Performance Monitoring & Tuning
   * Web Site
     * MC Press Book Downloads & Reviews
     * MC Press Videos
     * MC Showcase Buyer's Guide
   * Archive Threads Pre Jan-2001
     * Analysis
     * Application Software
     * Database
     * Hardware
     * Internet
     * Management
     * Networking
     * Operating Systems
     * Programming
 * ARCHIVE
 * PUBLICATIONS
   * MC Mobile on Power
     * March 8, 2017
     * February 8, 2017
     * January 11, 2017
     * December 14, 2016
     * November 9, 2016
     * October 12, 2016
   * MC Press Bookstore
     * February 9, 2017
     * February 7, 2017
     * February 2, 2017
   * MC Resource Center
     * MC White Paper Center
   * MC RPG Developer
     * March 15, 2017
     * March 1, 2017
     * February 15, 2017
     * February 1, 2017
     * January 18, 2017
     * January 4, 2017
     * December 21, 2016
     * November 16, 2016
     * November 2, 2016
     * October 19, 2016
     * October 5, 2016
   * MC Systems Insight
     * March 6, 2017
     * February 6, 2017
     * January 16, 2017
     * November 21, 2016
     * November 7, 2016
     * October 17, 2016
     * October 3, 2016
   * MC TNT Tips 'n Techniques
     * March 3, 2017
     * February 17, 2017
     * February 3, 2017
     * January 27, 2017
     * January 13, 2017
     * December 16, 2016
     * December 9, 2016
     * December 2, 2016
     * November 18, 2016
     * November 11, 2016
     * November 4, 2016
     * October 21, 2016
     * October 28, 2016
     * October 14, 2016
     * October 7, 2016
     * September 23, 2016
   * MC Special Announcement
     * February 14, 2017
 * BOOKSTORE
   * Application Development
     * Cloud Computing
     * Rational
     * WebSphere
   * Certification
   * Database
     * Analytics
     * Data Governance
     * DB2
     * Informix
     * SQL
   * Management and Career
     * Career
     * Project Management
   * Operating Systems
     * AIX
     * IBM i
   * Programming
     * APIs
     * CL
     * EGL
     * HTML
     * Java
     * Scripting
     * PHP
     * RPG
   * System Administration
     * Disaster Recovery
     * Networking
     * Security
 * VIDEOS
   * IBM Analytics
     * Popular
     * Newest
   * IBM Cloud
     * Popular
     * Newest
   * IBM Commerce
     * Popular
     * Newest
   * IBM Developer
     * Popular
     * Newest
   * IBM Mobile
     * Popular
     * Newest
   * IBM Security
     * Popular
     * Newest
   * IBM Social
     * Popular
     * Newest
   * IBM Systems
     * Popular
     * Newest
   * MC Press Author Presentations
     * Popular
     * Newest
   * MC Video News Makers
     * Popular
     * Newest
   * TechTips
     * Popular
     * Newest
   * WDSC Basics
     * Popular
     * Newest
   * MC Security
     * Popular
     * Newest

 * Resources
   * MC On-Demand Webcast
   * MC Trial Software
   * MC White Papers
 * BUYER'S GUIDE
   * Companies
   * Hardware
   * Services
   * Software
   * Submit Listing
     * Hardware
     * Services
     * Software
 * EVENTS
   * Submit New Event
 * VIDEOS
   * IBM Analytics
     * Newest
     * Popular
   * IBM Blockchain
     * Newest
     * Popular
   * IBM Cloud
     * Newest
     * Popular
   * IBM Commerce
     * Newest
     * Popular
   * IBM Developer
     * Newest
     * Popular
   * IBM Mobile
     * Newest
     * Popular
   * IBM Security
     * Newest
     * Popular
   * IBM Social
     * Newest
     * Popular
   * IBM Systems
     * Newest
     * Popular
   * IBM Watson
     * Newest
     * Popular
   * MC Press Author Presentations
     * Newest
     * Popular
   * MC Security
     * Newest
     * Popular
   * MC Video News Makers
     * Newest
     * Popular
   * TechTips
     * Newest
     * Popular
   * WDSC Basics
     * Newest
     * Popular
 * FORUMS
   * Shooting the Breeze
   * Analysis
     * Commentary
     * News
   * App Software
     * Collaboration & Messaging
     * Customer Relationship Management
     * Document Management
     * ERP/Financial
     * General
     * IBM
     * Managed Services/SaaS
     * Microsoft
   * Career Center
     * General
     * Jobs Offered
     * Resumes
   * Database
     * Business Intelligence
     * DB2
     * General
     * Microsoft Access
     * MySQL
     * Oracle
   * Internet
     * Application Servers
     * Commerce
     * General
     * Portals
     * Protocols
     * Telephony
   * Networking
     * Emulation
     * General
     * Wireless/Mobile
   * Op Systems
     * IBM i (OS/400, i5/OS)
     * Linux/Open Source
     * Microsoft
     * Unix/AIX
   * Programming
     * APIs
     * Business Integration
     * C, C++, C#
     * Change Management
     * CL
     * COBOL
     * Dev Tools
     * General
     * Java
     * REXX
     * RPG
     * Scripting
     * SQL
     * Web Languages
     * Visual Basic
   * Security
     * Compliance/Privacy
     * General
     * IBM i (OS/400, i5/OS)
     * Microsoft
   * System Admin
     * General
     * High Availability/DR
     * Performance Monitoring & Tuning
   * Web Site
     * MC Press Book Downloads & Reviews
     * MC Press Videos
     * MC Showcase Buyer's Guide
   * Archive Threads Pre Jan-2001
     * Analysis
     * Application Software
     * Database
     * Hardware
     * Internet
     * Management
     * Networking
     * Operating Systems
     * Programming
       * IGA Catalogue
 * ARCHIVE
 * PUBLICATIONS
   * MC Press Bookstore
     * Latest Offer
   * MC Resource Center
     * MC White Paper Center
     * MC Webcast Center
     * MC Software Center
   * MC RPG Developer
     * July 6, 2022
     * June 1, 2022
     * April 6, 2022
     * May 4, 2022
     * August 4, 2021
     * March 2, 2022
     * February 2, 2022
     * January 5, 2022
     * December 1, 2021
     * November 3, 2021
     * October 6, 2021
     * September 1, 2021
     * July 7, 2021
     * May 5, 2021
     * June 2, 2021
     * April 7, 2021
     * March 3, 2021
     * February 3, 2021
     * January 6, 2021
     * December 2, 2020
     * November 4, 2020
     * October 7, 2020
     * September 2, 2020
     * August 5, 2020
     * July 1, 2020
     * June 3, 2020
     * May 6, 2020
     * April 1, 2020
     * March 4, 2020
     * February 5, 2020
     * January 8, 2020
     * December 4, 2019
     * November 6, 2019
     * October 2, 2019
     * September 4, 2019
     * August 7, 2019
     * July 3, 2019
     * June 5, 2019
     * May 1, 2019
     * March 6, 2019
     * April 3, 2019
     * February 6, 2019
     * January 9, 2019
     * December 5, 2018
     * November 7, 2018
     * October 3, 2018
     * September 5, 2018
     * August 1, 2018
     * July 11, 2018
     * June 6, 2018
     * May 2, 2018
     * April 4, 2018
     * March 7, 2018
     * February 7, 2018
     * January 3, 2018
     * December 6, 2017
     * November 1, 2017
     * October 4, 2017
     * September 6, 2017
     * August 2, 2017
     * July 5, 2017
     * JUNE 7, 2017
     * MAY 17, 2017
     * MAY 3, 2017
     * April 19, 2017
     * April 5, 2017
     * March 15, 2017
     * March 1, 2017
     * February 15, 2017
     * February 1, 2017
     * January 4, 2017
     * January 18, 2017
   * MC Systems Insight
     * June 15, 2022
     * May 18, 2022
     * April 20, 2022
     * March 16, 2022
     * February 16, 2022
     * January 19, 2022
     * December 15, 2021
     * September 15, 2021
     * November 17, 2021
     * October 20, 2021
     * July 21, 2021
     * August 18, 2021
     * June 16, 2021
     * May 19, 2021
     * March 17, 2021
     * April 21, 2021
     * February 17, 2021
     * January 20, 2021
     * November 18, 2020
     * December 16, 2020
     * September 16, 2020
     * October 21, 2020
     * August 19, 2020
     * July 15, 2020
     * April 15, 2020
     * June 17, 2020
     * May 20, 2020
     * March 18, 2020
     * January 22, 2020
     * February 19, 2020
     * December 18, 2019
     * November 20, 2019
     * October 16, 2019
     * September 18, 2019
     * August 21, 2019
     * July 17, 2019
     * June 19, 2019
     * May 15, 2019
     * April 17, 2019
     * March 20, 2019
     * February 20, 2019
     * January 23, 2019
     * December 19, 2018
     * November 21, 2018
     * October 17, 2018
     * September 19, 2018
     * August 15, 2018
     * July 25, 2018
     * June 20, 2018
     * May 16, 2018
     * April 18, 2018
     * March 21, 2018
     * February 21, 2018
     * January 17, 2018
     * December 20, 2017
     * November 15, 2017
     * October 18, 2017
     * August 16, 2017
     * September 20, 2017
     * July 19, 2017
     * June 21, 2017
     * May 15, 2017
     * May 1, 2017
     * April 17, 2017
     * March 20, 2017
     * April 3, 2017
     * March 6, 2017
     * February 6, 2017
     * January 16, 2017
     * December 19, 2016
     * December 5, 2016
     * November 21, 2016
     * November 7, 2016
   * MC TNT Tips 'n Techniques
     * June 10, 2022
     * May 13, 2022
     * April 15, 2022
     * March 11, 2022
     * January 14, 2022
     * February 11, 2022
     * October 15, 2021
     * December 10, 2021
     * November 12, 2021
     * August 13, 2021
     * September 10, 2021
     * July 16, 2021
     * June 11, 2021
     * March 12, 2021
     * May 14, 2021
     * April 16, 2021
     * February 12, 2021
     * January 15, 2021
     * December 11, 2020
     * November 13, 2020
     * October 16, 2020
     * September 11, 2020
     * August 14, 2020
     * April 10, 2020
     * July 10, 2020
     * June 12, 2020
     * May 15, 2020
     * March 13, 2020
     * February 14, 2020
     * January 17, 2020
     * December 13, 2019
     * November 15, 2019
     * October 11, 2019
     * September 13, 2019
     * August 16, 2019
     * July 12, 2019
     * June 14, 2019
     * May 10, 2019
     * April 12, 2019
     * March 15, 2019
     * February 15, 2019
     * January 18, 2019
     * December 14, 2018
     * November 16, 2018
     * October 12, 2018
     * September 14, 2018
     * August 10, 2018
     * July 20, 2018
     * June 15, 2018
     * May 11, 2018
     * April 13, 2018
     * March 16, 2018
     * February 16, 2018
     * January 12, 2018
 * BOOKSTORE
   * Application Development
     * Cloud Computing
     * Rational
     * WebSphere
   * Certification
   * Database
     * Analytics
     * Data Governance
     * DB2
     * Informix
     * SQL
   * Management and Career
     * Career
     * Project Management
   * Operating Systems
     * AIX
     * IBM i
   * Programming
     * APIs
     * CL
     * EGL
     * HTML
     * Java
     * Scripting
     * PHP
     * RPG
   * System Administration
     * Disaster Recovery
     * Networking
     * Security

Search ...
 * MORE INFO
   * About MC Press
   * Contact Us
   * Online Media Kit
   * Write for MC Press
   * Site Help
   * Sitemap

Members

Remember Me
Forgot your password? Forgot your username? Sign Up
drop down joomla login module
MC Press Online
Resource Center: On-Demand Webcast Details



POWER10 POWER HOUR

Resource Center: White Papers Details



WHY MIGRATE WHEN YOU CAN MODERNIZE?

Resource Center: On-Demand Webcast Details



LESSONS LEARNED FROM IBM I CYBER ATTACKS

Resource Center: On-Demand Webcast Details



IBM I TRANSFORMATION RISKS EVERY BUSINESS LEADER SHOULD KNOW

Resource Center: White Papers Details



IBM I CLOUD MIGRATION CONSIDERATIONS

MC Press Bookstore Details
Book Promo


FREE-FORMAT RPG IV: THIRD EDITION

MC Press Bookstore Details
Book Promo


21ST CENTURY RPG: /FREE, ILE, AND MVC

7 New Articles
06
Wed, Jul
7 New Articles
 * .
 * Analytics & Cognitive
   * Business Intelligence
   * DB2
   * Document Management
   * Watson
   * Analytics & Cognitive - Other
 * Career
   * General
 * Cloud
   * Blockchain
   * High Availability / Disaster Recovery
   * Managed Services / SaaS / PaaS / IaaS
   * Cloud - Other
 * Commentary
   * Analysis of News Events
   * Commentary
   * Current Events & Commentary - Other
     * Case Studies
     * Product Reviews
 * Commerce
   * Customer Relationship Management
   * Enterprise Resource Planning / Financial
   * Commerce - Other
 * Internet of Things
   * RFID
   * Sensor Technology
   * Internet of Things - Other
 * IT Infrastructure
   * Operating Systems
     * IBM i (OS/400, i5/OS)
     * Linux / Open Source
     * Microsoft
     * UNIX / AIX
   * System Administration
   * IT Infrastructure - Other
     * Application Servers
     * Emulation
     * General
     * Networking
     * Walgreens Weekly Ad
 * Mobile
   * Development Tools / Utilities
   * Mobile Languages
   * Mobile - Other
 * News
   * Analytics & Cognitive News
   * Cloud News
   * Commerce News
   * Industry News
   * IT Infrastructure News
   * Mobile News
   * Programming News
   * Security News
 * Programming
   * APIs
   * RPG
   * Scripting
   * SQL
   * Web Languages
   * Programming - Other
     * Change Management
     * CL
     * Development Tools
     * General
     * Java
     * Microsoft
     * Visual Basic
     * Weekly Ads
 * Security
   * Compliance/Privacy
   * IBM i (OS/400, i5/OS)
   * Security - Other
 * Social
   * Collaboration & Messaging
   * Collaboration - Other

IN THE SPOTLIGHT


SQL


SQL 101 – DML RECAP – BETWEEN AND IN PREDICATES

Details Rafael Victoria-Pereira 05 July 2022


It’s now time to do a Data Manipulation Language (DML) statements recap and use
the sample UMADB database, presented in the previous two articles, in all the
coming examples.

By Rafael Victória-Pereira

It will go over the SELECT, INSERT, UPDATE, and DELETE statements. However, this
chapter won’t discuss the syntax of these statements. Here we will explain how
you can write shorter and clearer statements by resorting to a few keywords that
you might not be aware of. If you want to play around with the examples, be sure
to restore the UMADB library. SQL 101 48 - UMADB.zip.

I’m going to assume that you’re familiar with the most commonly used DML
statements and will not explain their syntax in depth, as they were previously
covered in this series, starting here. Instead, I’ll focus on some details that
can simplify the statements—for instance, shorter “implementations” of concepts.
Having said that, let’s start with two of my personal favorites: BETWEEN and IN.

0 Comments

RPG


INTRODUCING FREE-FORMAT RPG IV, PART 3

Details Jim Martin 05 July 2022


Programming Style Issues

By Jim Martin

Editor's Note: This article is excerpted from chapter 4 of Free-Format RPG IV:
Third Edition, by Jim Martin.

Many books and articles have covered the subject of programming with style. RPG
hasn’t played much of a role in style discussions, due mainly to the
fixed-format nature of its calculations. Now, with free format, RPG programmers
can, and should, pay attention to matters of style. With that goal in mind, here
are some points to remember as you get started coding in free-format RPG IV.

0 Comments

IBM i (OS/400, i5/OS)


CAROL’S TOP FIVE FAVORITE SECURITY ENHANCEMENTS IN IBM I 7.5 AND 7.4 TR6

Details Carol Woodbury 14 June 2022


The latest announcements from IBM contained many security enhancements and
changes. Carol describes her faves.

By Carol Woodbury

An IBM announcement hasn’t contained this many security enhancements and changes
to IBM i security in many years. You can find information on all enhancements
and previous supported releases here.

0 Comments

Web Languages


BUSINESS WEB APPLICATION DEVELOPMENT - USING CASCADING STYLE SHEETS, PART 1

Details Laura Ubelhor 09 June 2022


Cascading Style Sheets (CSS) provide a flexible way to control the look or
presentation of your Web pages. Small changes to a single CSS style sheet can
dramatically change the appearance of many Web pages.


by Laura Ubelhor and Christian Hur

Editor’s note: This article is excerpted from chapter 3 of Developing Business
Applications for the Web: With HTML, CSS, JSP, PHP, ASP.NET, and JavaScript, by
Laura Ubelhor and Christian Hur.

This easy method for controlling the design of your pages allows you to rapidly
implement changes to the look and feel of your website. The CSS elements are
often called style rules and can be inserted directly in a Web page or
separately in an external file. 

0 Comments
1  of  4 Previous Next

DB2


TECHTIP: SSIS TOOLBOX - CONFIGURATIONS AND PARAMETERS PLUS CONVERTING A PROJECT

Details Thomas Snyder 09 June 2022

0 Comments

Career


TECH PROJECT MANAGEMENT - PROJECT CONCEPTION

Details Colleen Garton 09 June 2022

0 Comments

Mergers / Acquisitions


IBM TACKLES GROWING ATTACK SURFACE RISKS WITH PLANS TO ACQUIRE RANDORI

Details IBM Corporation 07 June 2022

0 Comments

MORE ARTICLES

CL Details 31 May 2022

Hits: 1126


TECHTIP: DATE ARITHMETIC IN CL PROGRAMS

RPG Details 31 May 2022

Hits: 859


INTRODUCING FREE-FORMAT RPG IV, PART 2

Security News Details 31 May 2022

Hits: 789


IBM TO GRANT $5 MILLION IN-KIND FOR PUBLIC SCHOOLS GLOBALLY TO BETTER PREPARE
FOR GROWING RANSOMWARE THREAT

Industry News Details 31 May 2022

Hits: 456


EY AND IBM EXPAND ALLIANCE TO HELP ORGANIZATIONS ADDRESS TALENT CHALLENGES



HOT VIDEOS




 * WHAT IS HYBRID CLOUD IN 2022?
   
   0 Comments


 * HUMANS VS. AI: WHO MAKES THE BEST DECISIONS?
   
   0 Comments


 * CYBERSECURITY AND ZERO TRUST
   
   0 Comments


 * WHAT IS A VIRTUAL SERVER?
   
   0 Comments

View as: Grid List


ANALYTICS & COGNITIVE


DB2


TECHTIP: SSIS TOOLBOX - CONFIGURATIONS AND PARAMETERS PLUS CONVERTING A PROJECT

Details Thomas Snyder Analytics & Cognitive 09 June 2022


Once you know the SSI Toolbox, it is time for configurations and parameters, and
to convert a project.


By Tom Snyder

Editor’s Note: This article is excerpted from chapter 3 of Extract, Transform,
and Load with SQL Server Integration Services--with Microsoft SQL Server,
Oracle, and IBM DB2, by Thomas Snyder and Vedish Shah.

Configurations and Parameters

Depending on the type of deployment model you choose, you can use either
configuration files or parameters. The legacy model lets you create
configuration files that are separate from your packages, whereas the default
model lets you create parameters, project- or package-level, which are part of
the entire project.

0 Comments
Analytics & Cognitive Details John Ghrist 17 May 2022



AI APPS THAT CONTROL CORPORATE COMPUTER OPS

Analytics & Cognitive Details IBM Corporation 13 April 2022



IBM UNVEILS ITS NEW REPORTING FRAMEWORK AND REPORT FOR ENVIRONMENTAL, SOCIAL,
AND GOVERNANCE (ESG)

Analytics & Cognitive - Other Details John Ghrist Analytics & Cognitive 15 March
2022



DISPELLING SOME FOG ABOUT EDGE COMPUTING


CLOUD


Cloud


PARSING DATA SECURITY AND PRIVACY CONCERNS IN THE CLOUD

Details John Ghrist 16 November 2021


Data security and data privacy are terms that often appear in the same sentence.
Although some of the means of securing both are identical, there are also
critical distinctions between them that mustn't be overlooked when considering
service providers.

By John Ghrist

We've likely all heard for many years now about how globalized the world is
becoming. In the Internet Age, many points on the planet now communicate and
share information instantaneously, and the practice of direct buying and selling
of goods across borders has gone from an almost exotic happenstance to a
commonplace goal of a majority of U.S. business enterprises in the last two
decades. Hand in hand with that has been the need to secure data needed to
handle business transactions: customer contact information, credit card and bank
account numbers, and routing information are obvious examples. Everyone agrees
such things must be kept securely confidential. Yes, we've seen this movie
before.

0 Comments
Managed Services / SaaS / PaaS / IaaS Details John Ghrist Cloud 20 July 2021



HOW THE CLOUD IS BRINGING SHADOW IT BACK FROM THE DEAD

Managed Services / SaaS / PaaS / IaaS Details John Ghrist Cloud 16 March 2021



TIPS FOR AVOIDING CLOUD COMPUTING VENDOR LOCK-IN

Cloud Details Help Systems, LLC 16 June 2020



IBM I CLOUD MIGRATION CONSIDERATIONS


CURRENT EVENTS & COMMENTARY


Commentary


IBM I SHOPS PIVOT TO BATTLE COVID-19

Details Steve Pitcher Current Events & Commentary 20 October 2020


Maybe these companies were able to pivot easily because IBM i doesn’t require
the daily hand-holding required to keep other platforms working.

By Steve Pitcher

It’s easy to look at the year 2020 with contempt.

I’ve done it. Most all of us probably have. There’s no reason to do a recap of
2020. It started with a near-miss war with Iran, and it hasn’t let up since. I
was joking the other week that the only thing we’re missing in 2020 is the
equivalent of the Ten Plagues of Egypt. And we still have a couple of months for
that to unfold.

0 Comments
Current Events & Commentary Details Fresche Solutions 05 May 2020



HOW 2020 IS CHANGING THE WAY THAT COMPANIES APPROACH DIGITAL TRANSFORMATION

Analysis of News Events Details Steve Pitcher Current Events & Commentary 17
March 2020



THE EFFECTS OF COVID-19 ON THE IBM I ECOSYSTEM

Analysis of News Events Details Steve Pitcher Current Events & Commentary 18
February 2020



DISSECTING THE HELPSYSTEMS IBM I MARKETPLACE SURVEY


PROGRAMMING


SQL


SQL 101 – DML RECAP – BETWEEN AND IN PREDICATES

Details Rafael Victoria-Pereira Programming 05 July 2022


It’s now time to do a Data Manipulation Language (DML) statements recap and use
the sample UMADB database, presented in the previous two articles, in all the
coming examples.

By Rafael Victória-Pereira

It will go over the SELECT, INSERT, UPDATE, and DELETE statements. However, this
chapter won’t discuss the syntax of these statements. Here we will explain how
you can write shorter and clearer statements by resorting to a few keywords that
you might not be aware of. If you want to play around with the examples, be sure
to restore the UMADB library. SQL 101 48 - UMADB.zip.

I’m going to assume that you’re familiar with the most commonly used DML
statements and will not explain their syntax in depth, as they were previously
covered in this series, starting here. Instead, I’ll focus on some details that
can simplify the statements—for instance, shorter “implementations” of concepts.
Having said that, let’s start with two of my personal favorites: BETWEEN and IN.

0 Comments
RPG Details Jim Martin Programming 05 July 2022



INTRODUCING FREE-FORMAT RPG IV, PART 3

Web Languages Details Laura Ubelhor Programming 09 June 2022



BUSINESS WEB APPLICATION DEVELOPMENT - USING CASCADING STYLE SHEETS, PART 1

CL Details Sam Lennon Programming - Other 31 May 2022



TECHTIP: DATE ARITHMETIC IN CL PROGRAMS


MOBILE


Development Tools / Utilities


TECHTIP: A PRIMER TO BOOTSTRAP 4, PART 2

Details Jan Jorgensen Mobile 13 September 2018


In this second and final part of this short series about mobile app dev, let’s
talk about grids and glyphicons.

By Jan Jorgensen

In a previous article, I covered how the grid system in Bootstrap works, so in
order not to bore you I will try not to repeat myself.

The grid system in version 4 is still based on a maximum of 12 columns! But even
though the grid system seems the same from version 3 to 4, something has changed
under the hood. In Bootstrap 3, the grid system was based on floats, but that
changed in Bootstrap 4; it is now based on flexbox.

0 Comments
Development Tools / Utilities Details Jan Jorgensen Mobile 09 August 2018



TECHTIP: A PRIMER TO BOOTSTRAP 4, PART 1

Development Tools / Utilities Details John Ghrist Mobile 15 February 2018



A HAND-HOLDING APP BUILDER FOR HANDHELD DEVICES

Mobile - Other Details John Ghrist Mobile 09 November 2017



KEY CONSIDERATIONS FOR ESTABLISHING A BYOD POLICY


SECURITY


IBM i (OS/400, i5/OS)


CAROL’S TOP FIVE FAVORITE SECURITY ENHANCEMENTS IN IBM I 7.5 AND 7.4 TR6

Details Carol Woodbury Security 14 June 2022


The latest announcements from IBM contained many security enhancements and
changes. Carol describes her faves.

By Carol Woodbury

An IBM announcement hasn’t contained this many security enhancements and changes
to IBM i security in many years. You can find information on all enhancements
and previous supported releases here.

0 Comments
IBM i (OS/400, i5/OS) Details Carol Woodbury Security 19 April 2022



DO YOU KNOW WHAT END USERS CAN DO WITH IBM I ACCESS CLIENT SOLUTIONS?

IBM i (OS/400, i5/OS) Details Help Systems, LLC Security 19 April 2022



THE STATE OF IBM I SECURITY IN 2022: 3 KEY TAKEAWAYS

IBM i (OS/400, i5/OS) Details Carol Woodbury Security 15 February 2022



USING IBM I SERVICES TO MANAGE OWNED OBJECTS


LATEST COMMENTS


MC PRESS ONLINE

Follow
 * Latest Discussions
 * Top Commenters

 * Sam J Lennon
   
   There's a version on Github here:...
   
   Centering a String of Text · 2 months ago

 * Sam J Lennon
   
   Seems like older articles no longer format correctly. However... If you want
   a...
   
   Centering a String of Text · 2 months ago

 * Glenn Gundy
   
   I don't see the code that does the actual centering. Where can I find this?
   
   Centering a String of Text · 2 months ago

 * Glenn Gundermann
   
   I've seen some programs where the PREPARE is before the DECLARE and some
   programs...
   
   TechTip: PREPARE to DECLARE · 2 months ago


SUPPORT MC PRESS ONLINE

Select Your Contribution Amount $ 12.00 $ 24.00 $ 36.00 $ 48.00 $


CURRENT EVENTS ALL EVENTS


OCEAN TECHCON22 WILL BE TAKING PLACE JULY 21-23, 2022!

Three Days of Inspiration & Innovation!

Save the dates

July 21, 22, 23, 2022

Technically, We’re passionate about continuing education on the IBM Power
Systems platform!

Register Now

#OceanTechCon22

2022 Innovate & Thrive with IBM i - Online-Only Day

Thursday, July 21, 2022
8:30 AM - 4:30 PM

Online

Focusing on how to Innovate & Thrive with IBM i.

Technical Conference

Friday, July 22, 2022
8:00 AM - 5:00 PM

Crowne Plaza Hotel - Costa Mesa

Full day of technical presentations focusing on all aspects of IT from strategic
directions to drilling down into today’s latest technologies plus the Vendor
Solutions Expo.

Workshops

Saturday, July 23, 2022
8:30 AM - 5:00 PM

Mission Viejo Community Center

Workshops & Hands-on learning to tune up your skill sets.
Lunch is included.

OCEAN TechCon22
IBM i Technical Conference

July 21–23, 2022

Register Now

Contact: Margaret Matthews - margaret@oceanusergroup.org

 * 21 July 2022 - 23 July 2022
 * 
 * 

0 Comments
View as: Grid List


EDITOR'S LETTER


Editor's Letter


THERE’S NOTHING TO BE SCARED OF…OR IS THERE?

Details Victoria Mack MC Press Magazine 30 October 2017


Ghosts and witches—they’re kid stuff. But there really are other things to be
afraid of.

By Victoria Mack

This being October, Steve Pitcher has a bit of a Halloween scare for you. But
this goblin isn’t a fantasy. It’s real. IBM has announced end of support for the
exceptionally popular POWER7 machines. Will IBM offer extended hardware
maintenance? Who knows? It hasn’t happened yet. Read Steve’s article to see his
perceptions of what some may consider a truly horrifying announcement.

0 Comments
Editor's Letter Details Victoria Mack MC Press Magazine 28 September 2017



IT’S SEPTEMBER. WHAT HAS YOUR ATTENTION?

Editor's Letter Details Victoria Mack MC Press Magazine 30 August 2017



THINKING ANALYTICALLY

Editor's Letter Details Victoria Mack MC Press Magazine 30 July 2017



CH-CH-CH-CHANGES


CAREER


Career


TECH PROJECT MANAGEMENT - PROJECT CONCEPTION

Details Colleen Garton 09 June 2022


A project concept can be implemented in a matter of weeks, or it can be a
complex concept that will require a monumental engineering feat and a few years
to accomplish. The concept describes either a problem that needs to be solved or
a solution to a problem. 

By Colleen Garton and Erika McCulloch

Editor's Note: This article is excerpted from chapter 3 of Fundamentals of
Technology Project Management, by Colleen Garton and Erika McCulloch.


The concept may be presented verbally or as a Project Concept Document. In some
companies, the concept is considered part of the Project Proposal process while
in others it is a separate step, with a formal document, which is used to attain
initial approval prior to creating a Project Proposal.

0 Comments
Career Details Colleen Garton 17 May 2022



TECH PROJECT MANAGEMENT - PLANNING YOUR PROJECT

Career Details Colleen Garton 15 March 2022



PROJECT LIFECYCLE, METHODOLOGIES, AND STANDARDS - PROJECT MANAGEMENT AND QUALITY
MANAGEMENT STANDARDS

Career Details Colleen Garton 15 February 2022



PROJECT LIFECYCLE, METHODOLOGIES, AND STANDARDS - MANAGING EACH STEP OF THE
PROJECT LIFECYCLE


COMMERCE


Customer Relationship Management


TO MAKE SHOPPING EXPERIENCES EXCEPTIONAL, BRICK AND CLICK RETAILERS MUST
INNOVATE

Details Vish Ganapathy Commerce 31 July 2016


These days, consumers expect retailers to provide information tailored
personally just for them.

In the industry’s current disruptive environment, retail and consumer product
companies are competing with new business models and being forced to refresh
their consumer experiences and brand engagements to be more relevant.

A new IBM study finds retailers' current strategies to deliver engaging brand
experiences are not keeping pace with what customers’ expect and want out of
their brick and click shopping experiences.

0 Comments
Enterprise Resource Planning / Financial Details Robert Vormittag Commerce 21
March 2016



ERP IMPLEMENTATION STRATEGIES THAT YIELD ULTIMATE ROI

Enterprise Resource Planning / Financial Details Ross Freeman Commerce 13 July
2015



9 THINGS TO CONSIDER WHEN CHOOSING AN ERP PACKAGE ON IBM I

Enterprise Resource Planning / Financial Details John Ghrist Commerce 15 June
2015



TECHNOLOGY FOCUS: IBM I ACCOUNTING APPLICATIONS STAY ON THE MONEY


INTERNET OF THINGS


Internet of Things - Other


THE INTERNET OF THINGS: YOU'RE ALREADY A PART OF IT

Details Jan Jorgensen Internet of Things 28 September 2017


Do you realize how many of your personal or business devices are connected to
the Internet? Let's talk about that.

By Jan Jorgensen

The Internet of Things (IoT): You've heard somebody talk about it; or you've
read about it in a newspaper, in a tech magazine, or on a website; or you've
attended a seminar or conference where somebody told you about the next big
thing.

0 Comments
Internet of Things - Other Details Graham Williamson Internet of Things 19 March
2017



INTERNET OF THINGS: YOU CAN’T AVOID THE INEVITABLE

Internet of Things - Other Details Joydip Kanjilal Internet of Things 02 October
2016



INTERNET OF THINGS: CREATING A CONNECTED, SMARTER WORLD

RFID Details Bill Rice Internet of Things 12 December 2004



RFID: THE NEXT WAVE OF SUPPLY CHAIN TECHNOLOGY


IT INFRASTRUCTURE


IBM i (OS/400, i5/OS)


2022 IBM I MARKETPLACE SURVEY RESULTS

Details Help Systems, LLC Operating Systems 10 February 2022


SURVEY HIGHLIGHTS

By HelpSystems

Editor's note: This article introduces the February 2022 Report: 2022 IBM i
Marketplace Survey Results, which is available to download from the MC White
Paper Center.

Cybersecurity continues to top the charts as the main concern when planning an
IT environment.

Perhaps the most consistent data point in the IBM i Marketplace Survey Results
is the ongoing cybersecurity threat. Over the past six years, cybersecurity has
been the main concern for people planning their IT environment, and this year
was no exception. Although it has decreased since last year’s results, 62% of
respondents still said this was their number one concern. And although
organizations prioritizing security seem to be implementing multiple solutions,
it is still alarming that, on average, almost 30% of respondents do not plan to
implement each of the surveyed cybersecurity solutions. If your organization has
concerns over IBM i cybersecurity skills, managed security services could be a
way of filling in any holes.

0 Comments
IT Infrastructure Details Help Systems, LLC 19 October 2021



POWER10 POWER HOUR

Linux / Open Source Details Joe Pluta Operating Systems 06 April 2021



PRACTICAL OSS: MKDOCS FOR THE IBM I, PART 2

IT Infrastructure - Other Details Steve Pitcher IT Infrastructure 16 February
2021



IBM I 7.2: THE CARROT VERSUS THE STICK


SOCIAL


Collaboration & Messaging


WHAT DOES DOMINO 10 REALLY MEAN?

Details Steve Pitcher Social 14 November 2017


IBM Notes Domino gets a new future with HCL Technologies.

By Steve Pitcher

On October 25, 2017, IBM announced (well, they blogged it) that they were
entering into a strategic partnership with HCL Technologies to give the
following products a new lease on development life:

0 Comments
Collaboration & Messaging Details Steve Pitcher Social 31 July 2016



THE DOMINO 9.0.2 WAITING GAME

Collaboration & Messaging Details John Ghrist Social 18 January 2015



TECHNOLOGY FOCUS: EMPLOYEE AIDS FOR INTERNAL COMMUNICATIONS

Collaboration & Messaging Details Serge Charbit Social 25 November 2014



TECHTIP: 24/7 NOTIFICATIONS FROM YOUR IBM I


RESOURCE CENTER


 * WHITE PAPERS


 * WEBCAST


 * TRIAL SOFTWARE

 * MOBILE COMPUTING AND THE IBM I
   
   Mobile computing is rapidly maturing into a solid platform for delivering
   enterprise applications. Many IBM i shops today are realizing that
   integrating their IBM i with mobile applications is the fast path to improved
   business workflows, better customer relations, and more responsive business
   reporting.
   
   This ASNA whitepaper takes a look at mobile computing for the IBM i. It
   discusses the different ways mobile applications may be used within the
   enterprise and how ASNA products solve the challenges mobile presents. It
   also presents the case that you already have the mobile programming team your
   projects need: that team is your existing RPG development team!
   
   Get your copy today!

 * AUTOMATE IBM I OPERATIONS USING WIRELESS DEVICES
   
   Download the technical whitepaper on MANAGING YOUR IBM i WIRELESSLY and
   (optionally) register to download an absolutely FREE software trail. This
   whitepaper provides an in-depth review of the native IBM i technology and ACO
   MONITOR's advanced two-way messaging features to remotely manage your IBM i
   while in or away from the office. Notify on-duty personnel of system events
   and remotely respond to complex problems (via your Smartphone) before they
   become critical-24/7. Problem solved!
   
   Order your copy here.

 * DR STRATEGY GUIDE FROM MAXAVA: BRAND NEW EDITION - NOW FULLY UPDATED TO
   INCLUDE CLOUD!
   
   PRACTICAL TOOLS TO IMPLEMENT DISASTER RECOVERY IN YOUR IBM i ENVIRONMENT
   
   CLOUD VS. ON-PREMISE?
   - COMPREHENSIVE CHECKLISTS
   - RISK COST CALCULATIONS
   - BUSINESS CASE FRAMEWORK
   - DR SOLUTIONS OVERVIEW
   - RFP BUILDER
   Download your free copy of DR Strategy Guide for IBM i from Maxava today.
   
   
   
    

 * WHITE PAPER: NODE.JS FOR ENTERPRISE IBM I MODERNIZATION
   
   
   
   If your business is thinking about modernizing your legacy IBM i (also known
   as AS/400 or iSeries) applications, you will want to read this white paper
   first!
   
   Download this paper and learn how Node.js can ensure that you:
   - Modernize on-time and budget - no more lengthy, costly, disruptive app
   rewrites!
   - Retain your IBM i systems of record
   - Find and hire new development talent
   - Integrate new Node.js applications with your existing RPG, Java, .Net, and
   PHP apps
   - Extend your IBM i capabilties to include Watson API, Cloud, and Internet of
   Things
   
   
   Read Node.js for Enterprise IBM i Modernization Now!
   
    

 * 2020 IBM I MARKETPLACE SURVEY RESULTS
   
   
   
   This year marks the sixth edition of the popular IBM i Marketplace Survey
   Results. Each year, HelpSystems sets out to gather data about how businesses
   use the IBM i platform and the IT initiatives it supports. Year over year,
   the survey has begun to reveal long-term trends that give insight into the
   future of this trusted technology.
   
   More than 500 IBM i users from around the globe participated in this year’s
   survey, and we’re so happy to share the results with you. We hope you’ll find
   the information interesting and useful as you evaluate your own IT projects.

 * AIX SECURITY BASICS ECOURSE
   
   
   
   With so many organizations depending on AIX day to day, ensuring proper
   security and configuration is critical to ensure the safety of your
   environment. Don’t let common threats put your critical AIX servers at risk.
   Avoid simple mistakes and start to build a long-term plan with this AIX
   Security eCourse. Enroll today to get easy to follow instructions on topics
   like:
   
    * Removing extraneous files
    * Patching systems efficiently
    * Setting and validating permissions
    * Managing service considerations
    * Getting overall visibility into your networks
   
    

 * DEVELOPER KIT: MAKING A BUSINESS CASE FOR MODERNIZATION AND BEYOND
   
   
   
   Having trouble getting management approval for modernization projects? The
   problem may be you're not speaking enough "business" to them.
   
   This Developer Kit provides you study-backed data and a ready-to-use business
   case template to help get your very next development project approved!

 * WHAT TO DO WHEN YOUR AS/400 TALENT RETIRES
   
   IT managers hoping to find new IBM i talent are discovering that the pool of
   experienced RPG programmers and operators or administrators is small.
   
   This guide offers strategies and software suggestions to help you plan IT
   staffing and resources and smooth the transition after your AS/400 talent
   retires. Read on to learn:
   
    * Why IBM i skills depletion is a top concern
    * How leading organizations are coping
    * Where automation will make the biggest impact
   
    

Next Previous


 * IBM I RESOURCES RETIRING?
   
   Let’s face it: IBM i experts and RPG programmers are retiring from the
   workforce. Are you prepared to handle their departure?
   Our panel of IBM i experts—Chuck Losinski, Robin Tatam, Richard Schoen, and
   Tom Huntington—will outline strategies that allow your company to cope with
   IBM i skills depletion by adopting these strategies that allow you to get the
   job done without deep expertise on the OS:
   - Automate IBM i processes
   - Use managed services to help fill the gaps
   - Secure the system against data loss and viruses
   The strategies you discover in this webinar will help you ensure that your
   system of record—your IBM i—continues to deliver a powerful business
   advantage, even as staff retires.
   
    

 * BACKUP AND RECOVERY CONSIDERATIONS FOR SECURITY DATA AND ENCRYPTED BACKUPS
   
   Security expert Carol Woodbury is joined by Debbie Saugen. Debbie is an
   expert on IBM i backup and recovery, disaster recovery, and high
   availability, helping IBM i shops build and implement effective business
   continuity plans.
   In today’s business climate, business continuity is more important than ever.
   But 83 percent of organizations are not totally confident in their backup
   strategy.
   During this webinar, Carol and Debbie discuss the importance of a good backup
   plan, how to ensure you’re backing up your security information, and your
   options for encrypted back-ups.

 * PROFOUND.JS: THE AGILE APPROACH TO LEGACY MODERNIZATION
   
   In this presentation, Alex Roytman and Liam Allan will unveil a completely
   new and unique way to modernize your legacy applications. Learn how Agile
   Modernization:
   - Uses the power of Node.js in place of costly system re-writes and
   migrations
   - Enables you to modernize legacy systems in an iterative, low-risk manner
   - Makes it easier to hire developers for your modernization efforts
   - Integrates with Profound UI (GUI modernization) for a seamless, end-to-end
   legacy modernization solution
   
    

 * DATA BREACHES: IS IBM I REALLY AT RISK?
   
   IBM i is known for its security, but this OS could be more vulnerable than
   you think.
   Although Power Servers often live inside the safety of the perimeter
   firewall, the risk of suffering a data leak or data corruption remains high.
   Watch noted IBM i security expert Robin Tatam as he discusses common ways
   that this supposedly “secure” operating system may actually be vulnerable and
   who the culprits might be.
   
   Watch the webinar today!
   
    

 * EASY MOBILE DEVELOPMENT
   
   Watch this on-demand webinar and learn how to rapidly and easily deploy
   mobile apps to your organization – even when working with legacy RPG code!
   IBM Champion Scott Klement will demonstrate how to:
   - Develop RPG applications without mobile development experience
   - Deploy secure applications for any mobile device
   - Build one application for all platforms, including Apple and Android
   - Extend the life and reach of your IBM i (aka iSeries, AS400) platform
   You’ll see examples from customers who have used our products and services to
   deliver the mobile applications of their dreams, faster and easier than they
   ever thought possible!
   
    

 * PROFOUND UI: UNLOCK TRUE MODERNIZATION FROM YOUR IBM I ENTERPRISE
   
   Modern, web-based applications can make your Enterprise more efficient,
   connected and engaged. This session will demonstrate how the Profound UI
   framework is the best and most native way to convert your existing RPG
   applications and develop new modern applications for your business.
   Additionally, you will learn how you can address modernization across your
   Enterprise, including databases and legacy source code, with Profound Logic.
   
   

 * NODE WEBINAR SERIES PT. 1: THE WORLD OF NODE.JS ON IBM I
   
   Have you been wondering about Node.js? Our free Node.js Webinar Series takes
   you from total beginner to creating a fully-functional IBM i Node.js business
   application.
   
   Part 1 will teach you what Node.js is, why it's a great option for IBM i
   shops, and how to take advantage of the ecosystem surrounding Node.
   
   In addition to background information, our Director of Product Development
   Scott Klement will demonstrate applications that take advantage of the Node
   Package Manager (npm).

 * 5 NEW AND UNIQUE WAYS TO USE THE IBM I AUDIT JOURNAL
   
   You must be asking yourself: am I doing everything I can to protect my
   organization’s data? Tune in as our panel of IBM i high availability experts
   discuss:
   
   
   - Why companies don’t test role swaps when they know they should
   - Whether high availability in the cloud makes sense for IBM i users
   - Why some organizations don’t have high availability yet
   - How to get high availability up and running at your organization
   - High availability considerations for today’s security concerns

 * PROFOUND.JS 2.0: EXTEND THE POWER OF NODE TO YOUR IBM I APPLICATIONS
   
   In this Webinar, we'll demonstrate how Profound.js 2.0 enables you to easily
   adopt Node.js in your business, and to take advantage of the many benefits of
   Node, including access to a much larger pool of developers for IBM i and
   access to countless reusable open source code packages on npm (Node Package
   Manager).
   You will see how Profound.js 2.0 allows you to:
   
    * Provide RPG-like capabilities for server-side JavaScript.
    * Easily create web and mobile application interfaces for Node on IBM i.
    * Let existing RPG programs call Node.js modules directly, and vice versa.
    * Automatically generate code for Node.js.
    * Automatically converts existing RPGLE code into clean, simplified Node.js
      code.
   
   Download and watch today!
   
    

 * MAKE MODERN APPS YOU'LL LOVE WITH PROFOUND UI & PROFOUND.JS
   
   Whether you have green screens or a drab GUI, your outdated apps can benefit
   from modern source code, modern GUIs, and modern tools.
   Profound Logic's Alex Roytman and Liam Allan are here to show you how
   Free-format RPG and Node.js make it possible to deliver applications your
   whole business will love:
   
    * Transform legacy RPG code to modern free-format RPG and Node.js
    * Deliver truly modern application interfaces with Profound UI
    * Extend your RPG applications to include Web Services and NPM packages with
      Node.js
   
    

 * ACCELERATING PROGRAMMER PRODUCTIVITY WITH SEQUEL
   
   
   
   Most business intelligence tools are just that: tools, a means to an end but
   not an accelerator. Yours could even be slowing you down. But what if your BI
   tool didn't just give you a platform for query-writing but also improved
   programmer productivity?
   Watch the recorded webinar to see how Sequel:
   
    * Makes creating complex results simple
    * Eliminates barriers to data sources
    * Increases flexibility with data usage and distribution
   
   Accelerated productivity makes everyone happy, from programmer to business
   user.

 * BUSINESS INTELLIGENCE IS CHANGING: MAKE YOUR GAME PLAN
   
   It’s time to develop a strategy that will help you meet your informational
   challenges head-on. Watch the webinar to learn how to set your IT department
   up for business intelligence success. You’ll learn how the right data access
   tool will help you:
   
    * Access IBM i data faster
    * Deliver useful information to executives and business users
    * Empower users with secure data access
   
   Ready to make your game plan and finally keep up with your data access
   requests?
   
    

 * CONTROLLING INSIDER THREATS ON IBM I
   
   Let’s face facts: servers don’t hack other servers. Despite the avalanche of
   regulations, news headlines remain chock full of stories about data breaches,
   all initiated by insiders or intruders masquerading as insiders.
   User profiles are often duplicated or restored and are rarely reviewed for
   the appropriateness of their current configuration. This increases the risk
   of the profile being able to access data without the intended authority or
   having privileges that should be reserved for administrators.
   Watch security expert Robin Tatam as he discusses a new approach for
   onboarding new users on IBM i and best-practices techniques for managing and
   monitoring activities after they sign on.

 * DON'T JUST SETTLE FOR QUERY/400...
   
   While introducing Sequel Data Access, we’ll address common frustrations with
   Query/400, discuss major data access, distribution trends, and more advanced
   query tools. Plus, you’ll learn how a tool like Sequel lightens IT’s load by:
   
   - Accessing real-time data, so you can make real-time decisions
   - Providing run-time prompts, so users can help themselves
   - Delivering instant results in Microsoft Excel and PDF, without the wait
   - Automating the query process with on-demand data, dashboards, and scheduled
   jobs

 * HOW TO MANAGE DOCUMENTS THE EASY WAY
   
   What happens when your company depends on an outdated document management
   strategy?
   Everything is harder.
   You don’t need to stick with status quo anymore.
   Watch the webinar to learn how to put effective document management into
   practice and:
   
    * Capture documents faster, instead of wasting everyone’s time
    * Manage documents easily, so you can always find them
    * Distribute documents automatically, and move on to the next task
   
    

 * LESSONS LEARNED FROM THE AS/400 BREACH
   
   Get actionable info to avoid becoming the next cyberattack victim.
   In “Data breach digest—Scenarios from the field,” Verizon documented an
   AS/400 security breach. Whether you call it AS/400, iSeries, or IBM i, you
   now have proof that the system has been breached.
   Watch IBM i security expert Robin Tatam give an insightful discussion of the
   issues surrounding this specific scenario.
   Robin will also draw on his extensive cybersecurity experience to discuss
   policies, processes, and configuration details that you can implement to help
   reduce the risk of your system being the next victim of an attack.

 * OVERWHELMED BY OPERATING SYSTEMS?
   
   In this 30-minute recorded webinar, our experts demonstrate how you can:
   
    * Manage multiple platforms from a central location
    * View monitoring results in a single pane of glass on your desktop or
      mobile device
    * Take advantage of best practice, plug-and-play monitoring templates
    * Create rules to automate daily checks across your entire infrastructure
    * Receive notification if something is wrong or about to go wrong
   
   This presentation includes a live demo of Network Server Suite.
   
    

 * REAL-TIME DISK MONITORING WITH ROBOT MONITOR
   
   You need to know when IBM i disk space starts to disappear and where it has
   gone before system performance and productivity start to suffer. Our experts
   will show you how Robot Monitor can help you pinpoint exactly when your
   auxiliary storage starts to disappear and why, so you can start taking a
   proactive approach to disk monitoring and analysis. You’ll also get insight
   into:
   
    * The main sources of disk consumption
    * How to monitor temporary storage and QTEMP objects in real time
    * How to monitor objects and libraries in real time and near-real time
    * How to track long-term disk trends
   
    
   
    

 * STOP RE-KEYING DATA BETWEEN IBM I AND OTHER APPLICATIONS
   
   Many business still depend on RPG for their daily business processes and
   report generation.Wouldn’t it be nice if you could stop re-keying data
   between IBM i and other applications? Or if you could stop replicating data
   and start processing orders faster? Or what if you could automatically
   extract data from existing reports instead of re-keying? It’s all possible.
   Watch this webinar to learn about:
   
    * The data dilemma
    * 3 ways to stop re-keying data
    * Data automation in practice
   
   Plus, see how HelpSystems data automation software will help you stop
   re-keying data.
   
    

 * THE TOP FIVE RPG OPEN ACCESS MYTHS....BUSTED!
   
   When it comes to IBM Rational Open Access: RPG Edition, there are still many
   misconceptions - especially where application modernization is concerned!
   
   In this Webinar, we'll address some of the biggest myths about RPG Open
   Access, including:
   
    * Modernizing with RPG OA requires significant changes to the source code
    * The RPG language is outdated and impractical for modernizing applications
    * Modernizing with RPG OA is the equivalent to "screen scraping"
   
    

 * TIME TO REMOVE THE PAPER FROM YOUR DESK AND BECOME MORE EFFICIENT
   
   Too much paper is wasted. Attempts to locate documents in endless filing
   cabinets.And distributing documents is expensive and takes up far too much
   time.
   These are just three common reasons why it might be time for your company to
   implement a paperless document management system.
   Watch the webinar to learn more and discover how easy it can be to:
   
    * Capture
    * Manage
    * And distribute documents digitally
   
    

 * IBM I: IT’S NOT JUST AS/400
   
   
   
   IBM’s Steve Will talks AS/400, POWER9, cognitive systems, and everything in
   between
   
   Are there still companies that use AS400? Of course!
   
   IBM i was built on the same foundation.
   Watch this recorded webinar with IBM i Chief Architect Steve Will and IBM
   Power Champion Tom Huntington to gain a unique perspective on the direction
   of this platform, including:
   
    * IBM i development strategies in progress at IBM
    * Ways that Watson will shake hands with IBM i
    * Key takeaways from the AS/400 days
   
    

 * ASK THE RDI EXPERTS
   
   Watch this recording where Jim Buck, Susan Gantner, and Charlie Guarino
   answered your questions, including:
   
    * What are the “hidden gems” in RDi that can make me more productive?
    * What makes RDi Debug better than the STRDBG green screen debugger?
    * How can RDi help me find out if I’ve tested all lines of a program?
    * What’s the best way to transition from PDM to RDi?
    * How do I convince my long-term developers to use RDi?
   
   This is a unique, online opportunity to hear how you can get more out of RDi.
   
    

 * NODE.JS ON IBM I WEBINAR SERIES PT. 2: SETTING UP YOUR DEVELOPMENT TOOLS
   
   Have you been wondering about Node.js? Our free Node.js Webinar Series takes
   you from total beginner to creating a fully-functional IBM i Node.js business
   application. In Part 2, Brian May teaches you the different tooling options
   available for writing code, debugging, and using Git for version control.
   Attend this webinar to learn:
   
    * Different tools to develop Node.js applications on IBM i
    * Debugging Node.js
    * The basics of Git and tools to help those new to it
    * Using NodeRun.com as a pre-built development environment
   
    
   
    

 * INSIDE THE INTEGRATED FILE SYSTEM (IFS)
   
   During this webinar, you’ll learn basic tips, helpful tools, and integrated
   file system commands—including WRKLNK—for managing your IFS directories and
   Access Client Solutions (ACS). We’ll answer your most pressing IFS questions,
   including:
   
    * What is stored inside my IFS directories?
    * How do I monitor the IFS?
    * How do I replicate the IFS or back it up?
    * How do I secure the IFS?
   
   Understanding what the integrated file system is and how to work with it must
   be a critical part of your systems management plans for IBM i.
   
    

 * EXPERT TIPS FOR IBM I SECURITY: BEYOND THE BASICS
   
   In this session, IBM i security expert Robin Tatam provides a quick recap of
   IBM i security basics and guides you through some advanced cybersecurity
   techniques that can help you take data protection to the next level. Robin
   will cover:
   
    * Reducing the risk posed by special authorities
    * Establishing object-level security
    * Overseeing user actions and data access
   
   Don't miss this chance to take your knowledge of IBM i security beyond the
   basics.
   
    
   
    

 * 5 IBM I SECURITY QUICK WINS
   
   In today’s threat landscape, upper management is laser-focused on
   cybersecurity. You need to make progress in securing your systems—and make it
   fast.
   There’s no shortage of actions you could take, but what tactics will actually
   deliver the results you need? And how can you find a security strategy that
   fits your budget and time constraints?
   Join top IBM i security expert Robin Tatam as he outlines the five fastest
   and most impactful changes you can make to strengthen IBM i security this
   year.
   Your system didn’t become unsecure overnight and you won’t be able to turn it
   around overnight either. But quick wins are possible with IBM i security, and
   Robin Tatam will show you how to achieve them.

 * HOW TO MEET THE NEWEST ENCRYPTION REQUIREMENTS ON IBM I
   
   A growing number of compliance mandates require sensitive data to be
   encrypted. But what kind of encryption solution will satisfy an auditor and
   how can you implement encryption on IBM i? Watch this on-demand webinar to
   find out how to meet today’s most common encryption requirements on IBM i.
   You’ll also learn:
   
    * Why disk encryption isn’t enough
    * What sets strong encryption apart from other solutions
    * Important considerations before implementing encryption
   
    
   
    

 * SECURITY BULLETIN: MALWARE INFECTION DISCOVERED ON IBM I SERVER!
   
   Malicious programs can bring entire businesses to their knees—and IBM i shops
   are not immune. It’s critical to grasp the true impact malware can have on
   IBM i and the network that connects to it. Attend this webinar to gain a
   thorough understanding of the relationships between:
   
    * Viruses, native objects, and the integrated file system (IFS)
    * Power Systems and Windows-based viruses and malware
    * PC-based anti-virus scanning versus native IBM i scanning
   
   There are a number of ways you can minimize your exposure to viruses. IBM i
   security expert Sandi Moore explains the facts, including how to ensure
   you're fully protected and compliant with regulations such as PCI.
   
    
   
    

 * FIGHT CYBER THREATS WITH IBM I ENCRYPTION
   
   Cyber attacks often target mission-critical servers, and those attack
   strategies are constantly changing. To stay on top of these threats, your
   cybersecurity strategies must evolve, too. In this session, IBM i security
   expert Robin Tatam provides a quick recap of IBM i security basics and guides
   you through some advanced cybersecurity techniques that can help you take
   data protection to the next level. Robin will cover:
   
    * Reducing the risk posed by special authorities
    * Establishing object-level security
    * Overseeing user actions and data access
   
    
   
    
   
    

 * 10 PRACTICAL IBM I SECURITY TIPS FOR SURVIVING COVID-19 AND WORKING FROM HOME
   
   Now that many organizations have moved to a work from home model, security
   concerns have risen.
   
   During this session Carol Woodbury will discuss the issues that the world is
   currently seeing such as increased malware attacks and then provide practical
   actions you can take to both monitor and protect your IBM i during this
   challenging time.
   
    

 * HOW TO TRANSFER IBM I DATA TO MICROSOFT EXCEL
   
   3 easy ways to get IBM i data into Excel every time
   There’s an easy, more reliable way to import your IBM i data to Excel? It’s
   called Sequel. During this webinar, our data access experts demonstrate how
   you can simplify the process of getting data from multiple sources—including
   Db2 for i—into Excel. Watch to learn how to:
   
    * Download your IBM i data to Excel in a single step
    * Deliver data to business users in Excel via email or a scheduled job
    * Access IBM i data directly using the Excel add-in in Sequel
   
   Make 2020 the year you finally see your data clearly, quickly, and securely.
   Start by giving business users the ability to access crucial business data
   from IBM i the way they want it—in Microsoft Excel.
   
    
   
    

 * HA ALTERNATIVES: MIMIX IS NOT YOUR ONLY OPTION ON IBM I
   
   In this recorded webinar, our experts introduce you to the new HA transition
   technology available with our Robot HA software. You’ll learn how to:
   
    * Transition your rules from MIMIX (if you’re happy with them)
    * Simplify your day-to-day activities around high availability
    * Gain back time in your work week
    * Make your CEO happy about reducing IT costs
   
   Don’t stick with a legacy high availability solution that makes you
   uncomfortable when transitioning to something better can be simple, safe, and
   cost-effective.
   
    
   
    

 * NODE WEBINAR SERIES PT. 1: THE WORLD OF NODE.JS ON IBM I
   
   Have you been wondering about Node.js? Our free Node.js Webinar Series takes
   you from total beginner to creating a fully-functional IBM i Node.js business
   application.
   Part 1 will teach you what Node.js is, why it's a great option for IBM i
   shops, and how to take advantage of the ecosystem surrounding Node.
   In addition to background information, our Director of Product Development
   Scott Klement will demonstrate applications that take advantage of the Node
   Package Manager (npm).
   Watch Now.

 * THE BIGGEST MISTAKES IN IBM I SECURITY
   
   The Biggest Mistakes in IBM i Security
   Here’s the harsh reality: cybersecurity pros have to get their jobs right
   every single day, while an attacker only has to succeed once to do incredible
   damage.
   Whether that’s thousands of exposed records, millions of dollars in fines and
   legal fees, or diminished share value, it’s easy to judge organizations that
   fall victim. IBM i enjoys an enviable reputation for security, but no system
   is impervious to mistakes.
   Join this webinar to learn about the biggest errors made when securing a
   Power Systems server.
   This knowledge is critical for ensuring integrity of your application data
   and preventing you from becoming the next Equifax. It’s also essential for
   complying with all formal regulations, including SOX, PCI, GDPR, and HIPAA
   Watch Now.

Next Previous


 * COMPLY IN 5! WELL, ACTUALLY UNDER 5 MINUTES!!
   
   
   
   TRY the one package that solves all your document design and printing
   challenges on all your platforms.
   
   Produce bar code labels, electronic forms, ad hoc reports, and RFID tags –
   without programming! MarkMagic is the only document design and print solution
   that combines report writing, WYSIWYG label and forms design, and conditional
   printing in one integrated product.
   
   Request your trial now!

 * BACKUP AND RECOVERY ON IBM I: YOUR STRATEGY FOR THE UNEXPECTED
   
   Robot automates the routine tasks of iSeries backup and recovery, saving you
   time and money and making the process safer and more reliable. Automate your
   backups with the Robot Backup and Recovery Solution. Key features include:
   - Simplified backup procedures
   - Easy data encryption
   - Save media management
   - Guided restoration
   - Seamless product integration
   Make sure your data survives when catastrophe hits. Try the Robot Backup and
   Recovery Solution FREE for 30 days.

 * MANAGE IBM I MESSAGES BY EXCEPTION WITH ROBOT
   
   Managing messages on your IBM i can be more than a full-time job if you have
   to do it manually. How can you be sure you won’t miss important system
   events?
   Automate your message center with the Robot Message Management Solution. Key
   features include:
   - Automated message management
   - Tailored notifications and automatic escalation
   - System-wide control of your IBM i partitions
   - Two-way system notifications from your mobile device
   - Seamless product integration
   Try the Robot Message Management Solution FREE for 30 days.

 * EASIEST WAY TO SAVE MONEY? STOP PRINTING IBM I REPORTS
   
   Robot automates report bursting, distribution, bundling, and archiving, and
   offers secure, selective online report viewing.
   Manage your reports with the Robot Report Management Solution. Key features
   include:
   
   - Automated report distribution
   - View online without delay
   - Browser interface to make notes
   - Custom retention capabilities
   - Seamless product integration
   Rerun another report? Never again. Try the Robot Report Management Solution
   FREE for 30 days.

 * HASSLE-FREE IBM I OPERATIONS AROUND THE CLOCK
   
   For over 30 years, Robot has been a leader in systems management for IBM i.
   Manage your job schedule with the Robot Job Scheduling Solution. Key features
   include:
   - Automated batch, interactive, and cross-platform scheduling
   - Event-driven dependency processing
   - Centralized monitoring and reporting
   - Audit log and ready-to-use reports
   - Seamless product integration
   Scale your software, not your staff. Try the Robot Job Scheduling Solution
   FREE for 30 days.

 * ACO MONITOR MANAGES YOUR IBM I 24/7 AND NOTIFIES YOU WHEN YOUR IBM I NEEDS
   ASSISTANCE!
   
   More than a paging system - ACO MONITOR is a complete systems management
   solution for your Power Systems running IBM i. ACO MONITOR manages your Power
   System 24/7, uses advanced technology (like two-way messaging) to notify
   on-duty support personnel, and responds to complex problems before they reach
   critical status.
   
   ACO MONITOR is proven technology and is capable of processing thousands of
   mission-critical events daily. The software is pre-configured, easy to
   install, scalable, and greatly improves data center efficiency.

Next Previous




BOOK REVIEWS

 * BOOK REVIEW: THE MODERN RPG IV LANGUAGE, FOURTH EDITION
   
   This book isn't a training manual; it's a reference book.
   
   The Modern RPG IV Language, Fourth Edition by Robert Cozzi, Jr. is the latest
   version of a book that has enjoyed a long history of popularity in the RPG
   community. With this book, MC Press continues its tradition of providing
   relevant and timely materials in a quality book format.

 * BOOK REVIEW: DB2 9 FUNDAMENTALS
   
   Whether you want to obtain an IBM certified DB2 professional certification or
   simply become well-rounded in the fundamental concepts of DB2 and general
   database theory, this is your book.
   
    
   
   Roger E. Sanders has created one of today's greatest technical certification
   books, DB2 9 Fundamentals, to prepare you for everything you need to know to
   become DB2 9 certified per IBM's standards.
   
   Sanders kicks things off with a chapter dedicated to identifying the various
   types of DB2 professional certifications that are available and the
   professional roles at which each is aimed. He also walks you through the
   complete process of obtaining your certification, first taking you through
   the steps to register for the exam and then providing examples of what to
   expect on the exam in terms of its format. If you were at all wondering what
   to expect, then wonder no more: It's all clearly spelled out in his opening
   dialog!

 * BOOK REVIEW: SOA FOR THE BUSINESS DEVELOPER
   
   If you want to know how SOA works in the real world, this is your book.
   
   By Phil Law
   
   There's a lot of hype and fanfare surrounding service-oriented architecture
   (SOA), but the authors of SOA for the Business Developer have obviously
   gotten their hands dirty participating in real-world SOA projects. The
   content of their book reflects that experience.
   
    
   
   They begin by pointing out the simple truth that "SOA includes ideas that
   have been around for decades." Comparing and contrasting new concepts with
   old, familiar software design principles quickly brings the reader up to
   speed with the overarching principles of SOA.

 * BOOK REVIEW: JAVASCRIPT FOR THE BUSINESS DEVELOPER
   
   There's no faster, easier way to become proficient in JavaScript.
   
   By Jan Jorgensen
   
   This book landed on my desk just before my holiday in Greece. I looked at it
   and thought, "How can anybody cover such a large subject in just 160 pages?
   That's not possible." But it is possible, and that's the strongest force
   about this book: It's short, it's down to business, it's concise, and most
   important, it's full of great and useful examples and sample code that you
   can download.

 * BOOK REVIEW: THE IBM I PROGRAMMER'S GUIDE TO PHP
   
   Both a primer and a reference, this book is a must-have for anyone who wants
   to program in PHP.
   
   By Mike Pavlak
   
   After developing Web solutions for the iSeries in Net.Data and then getting a
   sour taste from Java, I wanted something better. PHP was certainly the right
   choice, but making it run on an iSeries at the time was no small feat. Then
   Zend came to the table, and the rest, as they say, is history. There is no
   way any of us on the ground floor of this amazing union could have
   anticipated this level of excitement and interest. We continue to see huge
   numbers being drawn to PHP on IBM i as well as Linux, UNIX, and Windows. And
   this book comes at just the right time; it's both a primer and a reference.
   
   

 * BOOK REVIEW: YOU WANT TO DO WHAT WITH PHP?
   
   If you're serious about programming in PHP, get a book that treats you that
   way.
   
   Written by Cal Evans
   
   I hate getting books for review that are written by friends of mine. I have a
   strict policy that I won't review a book I don't like. This leads to awkward
   conversations if, after skimming the book, I decide not to review it.
   Thankfully, that isn't the case with this book. Today, I want to talk about
   You Want to Do WHAT with PHP?, written by my friend and former co-worker,
   Kevin Schroeder. (I used to work at Zend; Kevin still does.)

 * BOOK REVIEW: SELLING INFORMATION GOVERNANCE TO THE BUSINESS
   
   Who governs the information that runs your company?
   
   Written by Thomas M. Stockwell
   
   We've all witnessed the explosion of information within our organizations.
   Recent studies have estimated that nearly 15 petabytes—15 million
   gigabytes—of data are created every day. This data represents the backbone of
   how our industries interact, how they manage their businesses, how they
   perceive themselves, and how they position themselves to compete. It doesn't
   reside on any individual computing platform, application, or corporate silo,
   but it has an incalculable value that represents the lifeblood of our
   commerce.

 * BOOK REVIEW: DB2 9.7 FOR LINUX, UNIX, AND WINDOWS DATABASE ADMINISTRATION
   (EXAM 541)
   
   This book, written by the creator of the certification exam, reveals exactly
   what you'll need to know to prep for the test.
   
   Written by Kent Milligan
   
   A couple of years ago, I had the pleasure of working with Roger Sanders on
   the creation of a couple of DB2 certification exams. During the exam creation
   process, I was impressed by the deep knowledge and thoroughness that Roger
   brought to the process. As I made my way through this certification book, I
   found the same qualities coming through the pages time and time again as
   Roger reviews the various aspects of database administration for the DB2 9.7
   for Linux, UNIX, and Windows (LUW) product.

 * BOOK REVIEW: IBM I SECURITY: ADMINISTRATION AND COMPLIANCE
   
   If you have any interest in IBM i security, whether as an administrator, a
   programmer, or an auditor, then this book is the perfect resource.
   
   Written by Robin Tatam
   
   In this era of legislative and regulatory mandates, computer security has
   quickly become one of the most popular—and critical—initiatives for
   organizations of every size and in every business sector. Even those that are
   not forced to comply with an official directive should consider enhancing
   their security to ensure protection of their business data assets.

 * BOOK REVIEW: BIG DATA ANALYTICS: DISRUPTIVE TECHNOLOGIES FOR CHANGING THE
   GAME
   
   The disciplines of data analytics are evolving to meet the new challenges of
   big data.
   
   Written by Thomas M. Stockwell
   
   Most traditional approaches to data analytics aim to align the operational
   activities of the organization with the specific business strategies of
   C-level executives. The process accomplishes this by identifying key
   measurements of business performance, developing the internal (or external)
   metrics and governance principles, and then implementing a data analytics
   framework to deliver the information accurately. This enables management to
   monitor the key performance metrics and instruct managers where improvements
   are required.
   
   

   

Next Previous




MC-STORE.COM




MC Press Online
Sign up via our free email subscription services to receive our publications,
bookstore offer and industry vendor notifications.

 

Subscribe


MC PRESS USERS

Login
Registration


EXPLORE

Site Map
Privacy Policy


ADVERTISE

Advertise
Write For Us


HELP

Contact Us
FAQ
Search


ARTICLES

Feature
Industry News


RESOURCES

White Papers
Webcast
Trial Software


SOCIAL

Twitter
Facebook
Linked
RSS

© Copyright 2022 MC Press Online, LLC