Welcome to the MC White Paper Center

>> Review the list of White Papers below. >> Select the items you would like to receive. >> Provide your email address at the bottom of the page and submit. >> Your selection(s) will be sent to you without cost or obligation. >> All information must be submitted in English.

The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card. Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security, and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!


(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)


Halcyon, a HelpSystems Company

 

Today’s businesses must be available 24/7 with fewer people having to manage more complex systems and processes.
IT departments receive a constant bombardment of information from a diverse variety of operating systems, business applications, and critical processes and support a complex array of servers and devices running across their entire network.
With tight resources and the need to keep costs in check, more and more is expected of IT operational staff to handle this information efficiently. They need to ensure a swift response with appropriate actions, that essential data is received at the right time, prove service levels are maintained, that contingency and high availability strategies are fully operational, and that vital business activities run smoothly and without disruption.
What kind of safety net processes can you put in place so you can combat information overload, yet not miss a single thing, drop the ball, or cause a negative impact on the business—and more importantly, how do you go about it?
Learn how to handle the daily deluge of information and discover five strategies you can deploy to become an IT superhero in your organization.


(return to top).

BCD for IBM i Modernization

 

We've all heard the complaints from IBM i users: "Green screens look outdated. I want to use my mouse. What about mobile?"

Before decision-makers approve your modernization project, you'll need to make a compelling business case and highlight why it’s about more than giving your applications a pretty face. It's also about adding value to your IBM i.

Download this ebook to learn about the top business reasons for green screen modernization, including:

  • Modern, browser-based look and functionality
  • Improved workflows and access to information
  • Leveraging and future-proofing existing applications
  • Increased end-user productivity
  • Taking advantage of mobile devices
You'll also see real-world examples that include screenshots and links to videos.


(return to top).

Varsity Logistics, Inc.

 

Learn how companies are reducing shipping costs by Centralizing all of their Shipping Systems and Transportation Management Systems (TMS) on One Platform with One Vendor. See how companies deployed an enterprise-wide, multi-carrier shipping solution to manage both their Parcel and Freight shipments directly from their IBM i, and seamlessly integrated it to their back end IBM i ERP and WMS. This Whitepaper examines eight reasons for centralizing standalone shipping solutions on the IBM i. In addition, you will see how a Modular TMS Solution integrated with ERP has driven significant efficiencies and cost reductions in companies shipping and transportation operation.
(USA and CANADA only please!)

(return to top).

PowerTech Group, Inc.

 

Data breaches are more likely to come from inside your walls than outside. Without a way to manage user access, a privileged user can endanger your system at length before you discover it. To protect against that risk—and the chance of failing a PCI or SOX audit—you need to ensure privileged users can't abuse their access. PowerTech's exclusive white paper shows you how with:

  • Exclusive analysis
  • Top 24 powerful commands
  • Real-world examples and solutions
  • Step-by-step instructions


(return to top).

PowerTech Group, Inc.

 

Drawing participants from healthcare, communication, transportation, finance, and many other industries, the 2015 State of IBM i Security Study analyzed 110 servers. Now in its 12th year, the study provides compelling insight into security weaknesses affecting many IBM i systems.

(return to top).

Profound Logic Software, Inc.

 

After surveying 400+ IBM i professionals, we discovered:

  • The state of IBM i modernization in today's businesses and their goals for the future
  • The effect legacy applications have on the businesses' internal and external processes
  • The #1 concern upper managers have with the IBM i, and how to combat it
...and much much more!

Download your copy of The 2016 State of IBM i Modernization today.

(return to top).

Profound Logic Software, Inc.

 

Since its beginnings at the turn-of-the-century, Baker College prepares Michigan students for careers in high-demand fields, including business, health sciences, engineering and information services.

Running on the IBM i platform, Baker College's IT department over time has compiled well over a million lines of legacy RPG code which supports over 1300 menu items.

Baker College knew they needed to update their aging IBM i application environment to support end-user adoption and efficiency. But did that mean chucking their i platform altogether? Learn how the College's IT team found the perfect modernization solution using Profound UI in this Profound Logic Case Study.


(return to top).

BCD Software

 

Download this free eBook to get a detailed look at the top 10 reasons why PHP is a great web development choice for IBM i shops, including:

  • Easy learning curve for RPG programmers
  • Leveraging DB2 and RPG with PHP
  • Benefits of choosing an open-source language
  • Why PHP makes mobile apps easy to deploy
  • Attracting new programmers

This eBook, which was co-sponsored by BCD and Zend, also features a foreword written by Alan Seiden.


(return to top).

Profound Logic Software, Inc.

 

The Benefits of Using RPG OA and JSON to Store Metadata in the Display File

Scott Klement, IBM Champion and Product Developer
Profound Logic Software, Inc.

While RPG Open Access is nothing new, there is still some confusion in the IBM i community as to what it is and how it is used. Additionally, there has also been much talk lately about Open Access metadata and how it should be leveraged with regard to RPG application modernization.

This white paper explains what Rational Open Access for RPG is all about, clarify what metadata is and cover how metadata is related to Open Access. It also covers how Profound Logic stores metadata in the Profound UI Rich Display files, and why we think it’s the best solution for storing metadata.

Get the clarification you need, request this white paper today.


(return to top).

SkyView Partners, Inc.

 

Left to their own preferences, many programmers will ask to be given all possible authorities on the system. That’s because most – not all – but most programmers are focused on getting their work done and would prefer not to be concerned with security. However, many organizations have policies or have to comply with laws or regulations that limit the authorities that programmers can have – especially to production systems. This white paper describes the authorities that programmers typically need along with techniques for determining the exact authorities your programmers need to continue to perform their job functions without having an all-powerful profile.

(return to top).

SkyView Partners, Inc.

 

You’ve seen the “alphabet soup” of compliance standards and regulations. Carol Woodbury examines the more notable of these standards and regulations and compares and contrasts them, helping the reader gain a better understanding of how they relate to security.

Download your copy today!


(return to top).

DRV Technologies, Inc.

 

This whitepaper is a must read for anyone that is considering moving to Laser Check printing or anyone that has considered moving to laser check printing in the past and thought it was too expensive or too much trouble.

Included in this white paper:

  • A supply List
  • What to look for in laser check software
  • 6 Steps to Getting Bank Approval of your checks
  • 10 myths about laser check printing, find out if they are fact or fiction
Laser check printing is secure and easier to maintain than traditional pre-printed check printing. With a few quick steps, set-up is simple. You do not need to purchase any special equipment and it is very easy to maintain.
Laser check printing can save thousands, potentially hundreds of thousands of dollars in supplies and labor, depending on the size of your company.

Let this Free whitepaper by DRV Tech answer your questions about laser check printing on the IBM i.

(USA and CANADA only!)

(return to top).

infor

 

For all manufacturing industries, growth remains top of mind. Post-recession cautiousness has given way to confidence and more ambitious business goals. From automotive to fashion, more manufacturing leaders are ready to take bigger risks in the hopes of bigger payoffs, and optimism is the highest it’s been in years.
To help manufacturers choose the right software in a rapidly changing industry landscape, this guide will explore four key technologies that are essential to any successful manufacturing operation:

  • Enterprise Resource Planning (ERP)
  • Enterprise Asset Management (EAM)
  • Configure Price Quote (CPQ)
  • Supply Chain Management (SCM)
We’ll discuss the market trends increasing the need for adoption of each technology, provide a “shopper’s checklist” of essential features and functions, and share success stories from real-life industry leaders. This guide will also outline how Infor’s industry-specific software and cloud-based technology are helping global companies thrive.


(return to top).

ASNA

 

Mobile computing is rapidly maturing into a solid platform for delivering enterprise applications. Many IBM i shops today are realizing that integrating their IBM i with mobile applications is the fast path to improved business workflows, better customer relations, and more responsive business reporting. The ROI that mobile applications can produce for your business is substantial.
This ASNA whitepaper takes a look at mobile computing for the IBM i. It discusses the different ways mobile applications may be used within the enterprise and how ASNA products solve the challenges mobile presents. It also presents the case that you already have the mobile programming team your projects need: that team is your existing RPG development team!

(return to top).

PowerTech Group, Inc.

 

The IBM i platform is known for its robust security capabilities. And it’s this reputation that often keeps staff from giving IBM i the same attention as other platforms.
But as new staff rotate in, IBM i expertise rotates out. Eventually organizations find themselves with maintenance gaps and dangerous security holes on a system once considered bulletproof. Even worse—no one has the knowledge to patch them up!
From beginner basics to advanced tactics, this white paper provides the background and instruction you need to restore your IBM i security back to its former glory.

(return to top).

SkyView Partners, Inc.

 

An IBM i system can be configured to audit security-relevant actions of every profile on the system or just a handful. Or it can be configured to audit the use of objects. The amount of information available in the audit journal is really quite amazing. Unfortunately, it’s one of the system’s best kept secrets! Even when people are aware of the audit journal, they often have no idea of what type of information is available. They assume – incorrectly – that it’s strictly information needed by auditors. Unbeknownst to many system administrators is the vast information in the audit journal that they could use on a daily basis. Even more of a mystery is how one “harvests” or retrieves information out of the audit journal in a readable format.

In this white paper, Carol Woodbury presents SkyView’s Audit Journal Reporter product. This product includes a number of pre-defined reports that could be used to help shed light on security issues or help you quickly respond to auditor requests.


(return to top).

SkyView Partners, Inc.

 

While one may think that PCI is a thing of the past and that it’s already been implemented, major breaches (most notably of the Target PoS systems) have brought it back into focus. Some retailers are just now understanding how PCI applies to them and other organizations have started to accept credit cards when they didn’t in the past. To refresh everyone’s memory, here’s an overview of what PCI means to the IBM i community and what organizations that use an IBM i to store, process or access cardholder data need to be aware of.

(return to top).

SkyView Partners, Inc.

 

Your auditor may not know much about the IBMi but they do have a “playbook” covering typical things to look for during a security audit. In this whitepaper, Carol Woodbury discusses the items that most auditors typically look for on the IBMi. Further she explains how you can use the products she designed for SkyView Partners Inc. to address these and more.


(return to top).

SkyView Partners, Inc.

 

In this white paper we hope to explain why the decision to secure- or not secure – data on the IBM i needs to be a business decision … not a technical decision.

Something is preventing management from understanding the need to secure the electronic data. So let’s explore why we think this happens....


(return to top).

HelpSystems

 

HelpSystems, the creator of the popular State of IBM i Security Study, now shares exclusive new information about the outlook for the IBM i platform collected in the first annual IBM i Marketplace Survey.

From manufacturing and retail to finance and healthcare, IBM i professionals from more than a dozen countries reported their plans and concerns for their IT environments, revealing how IBM i is being used and how it relates to their broader IT objectives.

Download the survey results to see how 350 of your peers on the platform address:

  • Modernization
  • Hardware
  • Operating systems
  • IT initiatives
  • Personnel issues
  • Data growth
  • The future of IBM i


(return to top).

MaxAva

 

PRACTICAL TOOLS TO IMPLEMENT DISASTER RECOVERY IN YOUR IBM i ENVIRONMENT

  • CLOUD VS. ON-PREMISE?
  • COMPREHENSIVE CHECKLISTS
  • RISK COST CALCULATIONS
  • BUSINESS CASE FRAMEWORK
  • DR SOLUTIONS OVERVIEW
  • RFP BUILDER

Download your free copy of DR Strategy Guide for IBM i today.
The DR Strategy Guide for IBM i is brought to you by Maxava – innovative global leaders in High Availability and Disaster Recovery solutions for IBM i.


(return to top).

Profound Logic Software, Inc.

 

Creating mobile applications for IBM i on Power Systems doesn't have to be difficult!
Mobile applications can take your business to new levels of engagement, customer support and competitiveness. By making your ERP, Sales, Line of Business, and other applications mobile, you empower your workforce to get more done - from anywhere, at any time. If your business runs on IBM i (formerly known as AS400 or iSeries) there's no need to worry. You can easily make your RPG applications available on any mobile device!

Read this free white paper, and learn how you can overcome the most common challenges to mobile for IBM i shops, including:

  • How to go mobile with limited staff or budget
  • How to make any RPG developer a mobile superstar
  • Whether to choose hybrid or native development
  • How to ease BYOD development stress

  • (return to top).

HelpSystems

 

Now in its second year, HelpSystems surveyed over 800 IBM i users from around the world to produce the IBM i Marketplace Survey Results. The expanded 2016 survey builds on last year’s results to provide even greater insight into the IBM i marketplace.

From manufacturing and retail to finance and healthcare, IBM i professionals from around the world reported their plans and concerns for their IT environments, revealing how IBM i is being used and how it relates to their broader IT objectives.

Download the survey results to see how over 800 of your peers on the platform address:

  • Modernization & mobile applications
  • Hardware & operating systems
  • IT concerns & initiatives
  • Data growth, storage, & security
  • The future of IBM i


(return to top).

Linoma Software

 

Data breach incidents continue to dominate the headlines, and each episode creates huge expense to both a company's bottom line and its reputation in the market.

Linoma Software's latest white paper, "Defending Against Data Breach," addresses questions like these:

  • What factors create a higher risk for data breach?
  • What technical hurdles prevent IT mangers from using a better solution?
  • How can data encryption solutions reduce the risk of data theft while still keeping work flows efficient?
It then offers recommendations for how IT management can deploy strong security technologies to encrypt, manage, monitor, and audit data at rest and in transit.

Request this expert guide to learn more about keeping your company's data--and its reputation--protected.


(USA and CANADA only!)

(return to top).

SkyView Partners, Inc.

 

Auditors are increasingly demanding that programmers and even administrators not be given full rights to IBM i production and development systems. These demands are often taken personally by programmers and administrators who have spent many years providing solutions and ensuring systems run smoothly. Unfortunately, organizations have no choice in the matter. This white paper provides explanations on why organizations have no choice in this matter and why users should not take the loss of privileges as a personal affront.

(return to top).

New Generation Software, Inc.

 

Big data and analytics grab the headlines, but chances are there are users in your office who simply need better query and analytical tools that work with your real-time operational data. NGS, IBM and numerous other vendors offer solutions, but it can be a challenge to understand their features and costs. This White Paper helps by examining:

  • IBM’s analytics and services strategy
  • IBM Query/400 and DB2 Web Query V2.1
  • IBM Cognos and other BI software
  • the value of DB2 on IBM i
The White Paper contrasts NGS and IBM offerings from a design and cost of ownership perspective. It also provides insight into IBM's business strategy and the frequently overlooked benefits of DB2 on i.


(return to top).

HelpSystems

 

As hardware and software technologies evolve, so too does the complexity of the data center.

IBM i often serves as the backbone for business-critical applications, including ERP packages, leaving other servers to run email, print serving, and the website—but users and other computing technologies still draw data from the transactional database on IBM i.

Robot systems management solutions have been helping customers manage IBM i operations for over 30 years. This white paper is intended primarily for IT management and attempts to explain, in plain English, the components of modern IBM i environments and how Robot can be deployed to maximize business objectives.

Download this white paper to learn about:

  • IBM i virtualization technologies like SAN, LPM, and VIOS
  • IBM i high availability and disaster recovery technologies like PowerHA and VTL
  • Robot automation solutions for enhancing the ROI of IBM i


(return to top).

DDL Systems, Inc.

 

Download the technical whitepaper on MANAGING YOUR IBM i WIRELESSLY and (optionally) register to download an absolutely FREE software trail. This whitepaper provides an in-depth review of the native IBM i technology and ACO MONITOR™'s advanced two-way messaging features to remotely manage your IBM i while in or away from the office. Notify on-duty personnel of system events and remotely respond to complex problems (via your Smartphone) before they become critical-24/7. Problem solved!

(return to top).

SkyView Partners, Inc.

 

Never heard of Application Administration? Don’t be surprised. Although it’s full of function, it’s one of little-known features of IBM i. Application Administration (or App Admin as it’s commonly called) has been around for a while but the additional features provided in the latest releases as well as recent Technology Releases makes this a feature worth exploring again. Carol Woodbury, President of SkyView Partners, has written a white paper describing how you can use Application Administration (a feature of i Navigator) to control access to various client functions as well as functions available on the IBM i and network features such as ODBC and FTP access.

(return to top).

SkyView Partners, Inc.

 

Does a virus have your server down? Perhaps it’s the latest worm, Trojan horse, buffer overflow or denial of service attack that’s got you or one of your servers down. While one of these bugs may be affecting one or more of your servers in your enterprise, it is highly unlikely that the server affected is a Power server running IBM i. IBM i may be running your core business applications or it may be hosting your web site or running Domino. Whatever its function within your enterprise IBM i has remained unaffected by virus and malware attacks. Why is that?
Viruses and other ailments spread by infecting a host that is vulnerable. Let’s take a look at how IBM i and the applications running on it can remain unscathed by the viruses and malware that are so prevalent today.
In this white paper, Carol Woodbury of SkyView Partners defines each “ailment” and then describe the defenses and protection mechanisms provided by IBM i to ward off the attack.

(return to top).

Maxava

 

Bust through all the HA/DR Jargon with this free download. The Maxava Jargon Buster is a quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster Recovery. It is an easy-to-use tool to help simplify the discussions companies need to have about their HA/DR requirements for their IBM i environments. By explaining technical terms in simple language, Maxava’s Jargon Buster can help an organization’s management quickly gain a greater understanding of the important factors relating to IBM i availability in their enterprise and what is required to protect it.

(return to top).

 

* Email Address



 
 
 

* Verify Email Address

 
  Note: An email will be sent to this address to confirm your order.
 

 

 



Interested in IBM Power System White Papers, Webcasts, Software, Security or Disaster Recovery solutions?
Then use the buttons below to visit our other centers!

MC White Paper Center
MC Webcast Center
MC Software Center
MC Case Study Center

MC Security Center
MC Disaster Recovery Center