Welcome to the MC White Paper Center

>> Review the list of White Papers below. >> Select the items you would like to receive. >> Provide your email address at the bottom of the page and submit. >> Your selection(s) will be sent to you without cost or obligation. >> All information must be submitted in English.

The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card. Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security, and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!


(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)


Green Light Technologies

 

Data masking during software testing is not the simple process that the uninitiated might suppose. Gone are the days when replacing personally identifiable information with random characters makes the grade. Learn why entering into your data masking project with a clear, systematic road map will help you better understand these critical data protection factors during software testing: 1) Where the sensitive data is located 2) What data needs to be masked 3) How to properly desensitize the data to maintain compliance

(return to top).

HelpSystems

 

HelpSystems, the creator of the popular State of IBM i Security Study, now shares exclusive new information about the outlook for the IBM i platform collected in the first annual IBM i Marketplace Survey.

From manufacturing and retail to finance and healthcare, IBM i professionals from more than a dozen countries reported their plans and concerns for their IT environments, revealing how IBM i is being used and how it relates to their broader IT objectives.

Download the survey results to see how 350 of your peers on the platform address:

  • Modernization
  • Hardware
  • Operating systems
  • IT initiatives
  • Personnel issues
  • Data growth
  • The future of IBM i


(return to top).

Varsity Logistics, Inc.

 

Learn how companies are reducing shipping costs by Centralizing all of their Shipping Systems and Transportation Management Systems (TMS) on One Platform with One Vendor. See how companies deployed an enterprise-wide, multi-carrier shipping solution to manage both their Parcel and Freight shipments directly from their IBM i, and seamlessly integrated it to their back end IBM i ERP and WMS. This Whitepaper examines eight reasons for centralizing standalone shipping solutions on the IBM i. In addition, you will see how a Modular TMS Solution integrated with ERP has driven significant efficiencies and cost reductions in companies shipping and transportation operation.
(USA and CANADA only please!)

(return to top).

SkyView Partners, Inc.

 

Does a virus have your server down? Perhaps it’s the latest worm, Trojan horse, buffer overflow or denial of service attack that’s got you or one of your servers down. While one of these bugs may be affecting one or more of your servers in your enterprise, it is highly unlikely that the server affected is a Power server running IBM i. IBM i may be running your core business applications or it may be hosting your web site or running Domino. Whatever its function within your enterprise IBM i has remained unaffected by virus and malware attacks. Why is that?
Viruses and other ailments spread by infecting a host that is vulnerable. Let’s take a look at how IBM i and the applications running on it can remain unscathed by the viruses and malware that are so prevalent today.
In this white paper, Carol Woodbury of SkyView Partners defines each “ailment” and then describe the defenses and protection mechanisms provided by IBM i to ward off the attack.

(return to top).

ASNA

 

Mobile computing is rapidly maturing into a solid platform for delivering enterprise applications. Many IBM i shops today are realizing that integrating their IBM i with mobile applications is the fast path to improved business workflows, better customer relations, and more responsive business reporting. The ROI that mobile applications can produce for your business is substantial.
This ASNA whitepaper takes a look at mobile computing for the IBM i. It discusses the different ways mobile applications may be used within the enterprise and how ASNA products solve the challenges mobile presents. It also presents the case that you already have the mobile programming team your projects need: that team is your existing RPG development team!

(return to top).

DRV Technologies, Inc.

 

This whitepaper is a must read for anyone that is considering moving to Laser Check printing or anyone that has considered moving to laser check printing in the past and thought it was too expensive or too much trouble.

Included in this white paper:

  • A supply List
  • What to look for in laser check software
  • 6 Steps to Getting Bank Approval of your checks
  • 10 myths about laser check printing, find out if they are fact or fiction
Laser check printing is secure and easier to maintain than traditional pre-printed check printing. With a few quick steps, set-up is simple. You do not need to purchase any special equipment and it is very easy to maintain.
Laser check printing can save thousands, potentially hundreds of thousands of dollars in supplies and labor, depending on the size of your company.

Let this Free whitepaper by DRV Tech answer your questions about laser check printing on the IBM i.

(USA and CANADA only!)

(return to top).

CCSS

 

While no one can be aware of every potential problem that may affect the system, you can reduce the impact of issues by proactively monitoring the areas where IBM i and the network overlap.
Download this white paper and learn how to:

  • Calculate the cost of problem resolution
  • Anticipate communication issues
  • Expose network bottlenecks
  • Evaluate your need for proactive network monitoring


(return to top).

SkyView Partners, Inc.

 

These slide handouts are from a 2009 presentation by SkyView Partners Inc. and nuBridges Inc. that examines the major reasons companies fail PCI audits.


(return to top).

SkyView Partners, Inc.

 

In this white paper we hope to explain why the decision to secure- or not secure – data on the IBM i needs to be a business decision … not a technical decision.

Something is preventing management from understanding the need to secure the electronic data. So let’s explore why we think this happens....


(return to top).

SkyView Partners, Inc.

 

Carol Woodbury discusses the security concerns of cloud computing and provides resources you can check into as you address the security issues of this new technology.


(return to top).

CCSS

 

Implementing proactive system monitoring in your IBM i environment begins with planning. The effectiveness of automated monitoring solutions should be evaluated based on the degree of visibility they can offer to potential problems, the time they save, and the flexibility they offer in meeting the specific views and requirements of your existing and developing network.
Your proactive monitoring solution should be able to anticipate repeat issues based on your system demands, applications, throughput, and configuration, as well as provide fast access to information that will pinpoint the cause of unforeseen issues and those that are otherwise difficult to isolate.
For system administrators and managers who are looking for a practical guide to help maximize a new or existing proactive approach to system and message monitoring.
Download this white paper to learn:

  • Information on must-have monitors
  • Shortcuts to greater efficiency
  • Checklists of requirements for a customized roadmap

(return to top).

SkyView Partners, Inc.

 

While one may think that PCI is a thing of the past and that it’s already been implemented, major breaches (most notably of the Target PoS systems) have brought it back into focus. Some retailers are just now understanding how PCI applies to them and other organizations have started to accept credit cards when they didn’t in the past. To refresh everyone’s memory, here’s an overview of what PCI means to the IBM i community and what organizations that use an IBM i to store, process or access cardholder data need to be aware of.

(return to top).

Maxava

 

Download your free copy of our DR Strategy Guide for IBM i before it’s too late.
Learn more about the evolution of disaster recovery, how disasters of various types can impact business and the strategies you can employ to minimize the risk of impact to your business by downloading our latest e-book today.
Your free copy of the DR Strategy Guide for IBM i will help uncover the secrets to ensuring your IBM i and your business is able to weather any storm – be it caused by human interruption or natural disaster.

  • How to best implement a disaster recovery strategy
  • The importance of testing your Disaster Recovery Plan and keeping it up to date
  • How to perform scheduled back-ups without bringing down your business
  • The benefits of the Cloud and how it can work for you
  • What to look for in a Disaster Recovery Provider


(return to top).

SkyView Partners, Inc.

 

Carol Woodbury addresses discusses the compliance mandates that organizations face and discusses the advantages of using the SkyView Partners Inc. products to automate compliance tasks and help improve their accuracy and efficiency of the compliance mandate facing organizations.


(return to top).

SkyView Partners, Inc.

 

Never heard of Application Administration? Don’t be surprised. Although it’s full of function, it’s one of little-known features of IBM i. Application Administration (or App Admin as it’s commonly called) has been around for a while but the additional features provided in the latest releases as well as recent Technology Releases makes this a feature worth exploring again. Carol Woodbury, President of SkyView Partners, has written a white paper describing how you can use Application Administration (a feature of i Navigator) to control access to various client functions as well as functions available on the IBM i and network features such as ODBC and FTP access.

(return to top).

PowerTech Group, Inc.

 

Drawing participants from healthcare, communication, transportation, finance, and many other industries, the 2015 State of IBM i Security Study analyzed 110 servers. Now in its 12th year, the study provides compelling insight into security weaknesses affecting many IBM i systems.

(return to top).

Maxava

 

Bust through all the HA/DR Jargon with this free download. The Maxava Jargon Buster is a quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster Recovery. It is an easy-to-use tool to help simplify the discussions companies need to have about their HA/DR requirements for their IBM i environments. By explaining technical terms in simple language, Maxava’s Jargon Buster can help an organization’s management quickly gain a greater understanding of the important factors relating to IBM i availability in their enterprise and what is required to protect it.

(return to top).

SkyView Partners, Inc.

 

Your auditor may not know much about the IBMi but they do have a “playbook” covering typical things to look for during a security audit. In this whitepaper, Carol Woodbury discusses the items that most auditors typically look for on the IBMi. Further she explains how you can use the products she designed for SkyView Partners Inc. to address these and more.


(return to top).

SkyView Partners, Inc.

 

Compliance is not a one-time event.

Some of you have found this out the hard way. You’ve made it to “compliance” and then sat back and ignored all of the items you worked so hard to implement or modify. A year passes and it’s time to prove compliance again. Because nothing was done to maintain compliance, your efforts are almost as expensive – both in terms of person-hours and actual expense - as the first time.

Through helping our clients – large and small – attain and maintain compliance, Carol created a collection of tips and techniques to help every organization address compliance and assembled them into a book The goal of this book is to help establish a security compliance “lifestyle” so that compliance becomes a habit, not an expensive and time-consuming annual project.

Request your copy of Carol’s “Compliance without the Complexities”, FREE of charge.


(return to top).

PowerTech Group, Inc.

 

Data breaches are more likely to come from inside your walls than outside. Without a way to manage user access, a privileged user can endanger your system at length before you discover it. To protect against that risk—and the chance of failing a PCI or SOX audit—you need to ensure privileged users can't abuse their access. PowerTech's exclusive white paper shows you how with:

  • Exclusive analysis
  • Top 24 powerful commands
  • Real-world examples and solutions
  • Step-by-step instructions


(return to top).

SkyView Partners, Inc.

 

These are the slide handouts are from a "Coffee with Carol" presentation by Carol Woodbury where in which she discusses the audit journal, and the information that it contains, and ways to get to that information.


(return to top).

SkyView Partners, Inc.

 

You’ve seen the “alphabet soup” of compliance standards and regulations. Carol Woodbury examines the more notable of these standards and regulations and compares and contrasts them, helping the reader gain a better understanding of how they relate to security.

Download your copy today!


(return to top).

SkyView Partners, Inc.

 

An IBM i system can be configured to audit security-relevant actions of every profile on the system or just a handful. Or it can be configured to audit the use of objects. The amount of information available in the audit journal is really quite amazing. Unfortunately, it’s one of the system’s best kept secrets! Even when people are aware of the audit journal, they often have no idea of what type of information is available. They assume – incorrectly – that it’s strictly information needed by auditors. Unbeknownst to many system administrators is the vast information in the audit journal that they could use on a daily basis. Even more of a mystery is how one “harvests” or retrieves information out of the audit journal in a readable format.

In this white paper, Carol Woodbury presents SkyView’s Audit Journal Reporter product. This product includes a number of pre-defined reports that could be used to help shed light on security issues or help you quickly respond to auditor requests.


(return to top).

Linoma Software

 

Data breach incidents continue to dominate the headlines, and each episode creates huge expense to both a company's bottom line and its reputation in the market.

Linoma Software's latest white paper, "Defending Against Data Breach," addresses questions like these:

  • What factors create a higher risk for data breach?
  • What technical hurdles prevent IT mangers from using a better solution?
  • How can data encryption solutions reduce the risk of data theft while still keeping work flows efficient?
It then offers recommendations for how IT management can deploy strong security technologies to encrypt, manage, monitor, and audit data at rest and in transit.

Request this expert guide to learn more about keeping your company's data--and its reputation--protected.


(USA and CANADA only!)

(return to top).

HelpSystems

 

For over 30 years Query/400 has been the data access tool to generate reports easily from DB2 data—allowing access to insight like never before. While it continues to be sufficient for basic reporting functionality, most organizations are beginning to be challenged with the need to access and report on larger volumes of data than ever before. With business users are asking for easy-to-access dashboards and reports to gain insight more easily, it might be time to consider if it's time to upgrade from Query/400.

Download this exclusive IBM i white paper to see:

  • The history of Query/400
  • How organizations currently use Query
  • The benefits of investing in a new data access tool
  • And more

Don't waste any more time struggling with antiquated data access.


Download the white paper

(return to top).

SkyView Partners, Inc.

 

John Vanderwall Chairman and CEO of SkyView Partners, has written a white paper to explain the hidden cost of compliance. This white paper will be especially helpful if you are an executive trying to understand the true costs of compliance or a member of the IT Staff trying to explain to your executives, the effort involved in responding to auditors' requests for information.

(return to top).

HelpSystems

 

As hardware and software technologies evolve, so too does the complexity of the data center.

IBM i often serves as the backbone for business-critical applications, including ERP packages, leaving other servers to run email, print serving, and the website—but users and other computing technologies still draw data from the transactional database on IBM i.

Robot systems management solutions have been helping customers manage IBM i operations for over 30 years. This white paper is intended primarily for IT management and attempts to explain, in plain English, the components of modern IBM i environments and how Robot can be deployed to maximize business objectives.

Download this white paper to learn about:

  • IBM i virtualization technologies like SAN, LPM, and VIOS
  • IBM i high availability and disaster recovery technologies like PowerHA and VTL
  • Robot automation solutions for enhancing the ROI of IBM i


(return to top).

Bytware, Inc.

 

The Integrated File System is one of the most ignored parts of the IBM i, yet it enables many of the most powerful and most used features on the system today. Overlooking the ways in which IBM i utilizes the IFS could weaken your security. Learn more about the top security issues facing the IFS in this white paper.

(return to top).

New Generation Software, Inc.

 

Big data and analytics grab the headlines, but chances are there are users in your office who simply need better query and analytical tools that work with your real-time operational data. NGS, IBM and numerous other vendors offer solutions, but it can be a challenge to understand their features and costs. This White Paper helps by examining:

  • IBM’s analytics and services strategy
  • IBM Query/400 and DB2 Web Query V2.1
  • IBM Cognos and other BI software
  • the value of DB2 on IBM i
The White Paper contrasts NGS and IBM offerings from a design and cost of ownership perspective. It also provides insight into IBM's business strategy and the frequently overlooked benefits of DB2 on i.


(return to top).

DDL Systems, Inc.

 

Download the technical whitepaper on MANAGING YOUR IBM i WIRELESSLY and (optionally) register to download an absolutely FREE software trail. This whitepaper provides an in-depth review of the native IBM i technology and ACO MONITOR™'s advanced two-way messaging features to remotely manage your IBM i while in or away from the office. Notify on-duty personnel of system events and remotely respond to complex problems (via your Smartphone) before they become critical-24/7. Problem solved!

(return to top).

PowerTech Group, Inc.

 

The IBM i platform is known for its robust security capabilities. And it’s this reputation that often keeps staff from giving IBM i the same attention as other platforms.
But as new staff rotate in, IBM i expertise rotates out. Eventually organizations find themselves with maintenance gaps and dangerous security holes on a system once considered bulletproof. Even worse—no one has the knowledge to patch them up!
From beginner basics to advanced tactics, this white paper provides the background and instruction you need to restore your IBM i security back to its former glory.

(return to top).

 

* Email Address



 
 
 

* Verify Email Address

 
  Note: An email will be sent to this address to confirm your order.
 

 

 



Interested in IBM Power System White Papers, Webcasts, Software, Security or Disaster Recovery solutions?
Then use the buttons below to visit our other centers!

MC White Paper Center
MC Webcast Center
MC Software Center
MC Case Study Center

MC Security Center
MC Disaster Recovery Center