Welcome to the MC White Paper Center

>> Review the list of White Papers below. >> Select the items you would like to receive. >> Provide your email address at the bottom of the page and submit. >> Your selection(s) will be sent to you without cost or obligation. >> All information must be submitted in English.

The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card. Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security, and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!


(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)


Profound Logic Software, Inc.

 

Creating mobile applications for IBM i on Power Systems doesn't have to be difficult!
Mobile applications can take your business to new levels of engagement, customer support and competitiveness. By making your ERP, Sales, Line of Business, and other applications mobile, you empower your workforce to get more done - from anywhere, at any time. If your business runs on IBM i (formerly known as AS400 or iSeries) there's no need to worry. You can easily make your RPG applications available on any mobile device!

Read this free white paper, and learn how you can overcome the most common challenges to mobile for IBM i shops, including:

  • How to go mobile with limited staff or budget
  • How to make any RPG developer a mobile superstar
  • Whether to choose hybrid or native development
  • How to ease BYOD development stress

  • (return to top).

HelpSystems

 

Now in its second year, HelpSystems surveyed over 800 IBM i users from around the world to produce the IBM i Marketplace Survey Results. The expanded 2016 survey builds on last year’s results to provide even greater insight into the IBM i marketplace.

From manufacturing and retail to finance and healthcare, IBM i professionals from around the world reported their plans and concerns for their IT environments, revealing how IBM i is being used and how it relates to their broader IT objectives.

Download the survey results to see how over 800 of your peers on the platform address:

  • Modernization & mobile applications
  • Hardware & operating systems
  • IT concerns & initiatives
  • Data growth, storage, & security
  • The future of IBM i


(return to top).

SkyView Partners, Inc.

 

While one may think that PCI is a thing of the past and that it’s already been implemented, major breaches (most notably of the Target PoS systems) have brought it back into focus. Some retailers are just now understanding how PCI applies to them and other organizations have started to accept credit cards when they didn’t in the past. To refresh everyone’s memory, here’s an overview of what PCI means to the IBM i community and what organizations that use an IBM i to store, process or access cardholder data need to be aware of.

(return to top).

Profound Logic Software, Inc.

 

After surveying 400+ IBM i professionals, we discovered:

  • The state of IBM i modernization in today's businesses and their goals for the future
  • The effect legacy applications have on the businesses' internal and external processes
  • The #1 concern upper managers have with the IBM i, and how to combat it
...and much much more!

Download your copy of The 2016 State of IBM i Modernization today.

(return to top).

Profound Logic Software, Inc.

 

The Benefits of Using RPG OA and JSON to Store Metadata in the Display File

Scott Klement, IBM Champion and Product Developer
Profound Logic Software, Inc.

While RPG Open Access is nothing new, there is still some confusion in the IBM i community as to what it is and how it is used. Additionally, there has also been much talk lately about Open Access metadata and how it should be leveraged with regard to RPG application modernization.

This white paper explains what Rational Open Access for RPG is all about, clarify what metadata is and cover how metadata is related to Open Access. It also covers how Profound Logic stores metadata in the Profound UI Rich Display files, and why we think it’s the best solution for storing metadata.

Get the clarification you need, request this white paper today.


(return to top).

MaxAva

 

PRACTICAL TOOLS TO IMPLEMENT DISASTER RECOVERY IN YOUR IBM i ENVIRONMENT

  • CLOUD VS. ON-PREMISE?
  • COMPREHENSIVE CHECKLISTS
  • RISK COST CALCULATIONS
  • BUSINESS CASE FRAMEWORK
  • DR SOLUTIONS OVERVIEW
  • RFP BUILDER

Download your free copy of DR Strategy Guide for IBM i today.
The DR Strategy Guide for IBM i is brought to you by Maxava – innovative global leaders in High Availability and Disaster Recovery solutions for IBM i.


(return to top).

HelpSystems

 

As hardware and software technologies evolve, so too does the complexity of the data center.

IBM i often serves as the backbone for business-critical applications, including ERP packages, leaving other servers to run email, print serving, and the website—but users and other computing technologies still draw data from the transactional database on IBM i.

Robot systems management solutions have been helping customers manage IBM i operations for over 30 years. This white paper is intended primarily for IT management and attempts to explain, in plain English, the components of modern IBM i environments and how Robot can be deployed to maximize business objectives.

Download this white paper to learn about:

  • IBM i virtualization technologies like SAN, LPM, and VIOS
  • IBM i high availability and disaster recovery technologies like PowerHA and VTL
  • Robot automation solutions for enhancing the ROI of IBM i


(return to top).

PowerTech Group, Inc.

 

Drawing participants from healthcare, communication, transportation, finance, and many other industries, the 2016 State of IBM i Security Study analyzed 177 servers and partitions.
Now in its 13th year, the study provides compelling insight into security weaknesses affecting many IBM i systems. Some of the most dangerous defects include:

  • Unmonitored network access
  • Lax system auditing
  • Dangerous default security settings

The alarming results show improperly configured servers where users are allowed to keep default passwords and traffic passes through exit points like FTP and SQL unmonitored.


(return to top).

SkyView Partners, Inc.

 

Never heard of Application Administration? Don’t be surprised. Although it’s full of function, it’s one of little-known features of IBM i. Application Administration (or App Admin as it’s commonly called) has been around for a while but the additional features provided in the latest releases as well as recent Technology Releases makes this a feature worth exploring again. Carol Woodbury, President of SkyView Partners, has written a white paper describing how you can use Application Administration (a feature of i Navigator) to control access to various client functions as well as functions available on the IBM i and network features such as ODBC and FTP access.

(return to top).

SkyView Partners, Inc.

 

Does a virus have your server down? Perhaps it’s the latest worm, Trojan horse, buffer overflow or denial of service attack that’s got you or one of your servers down. While one of these bugs may be affecting one or more of your servers in your enterprise, it is highly unlikely that the server affected is a Power server running IBM i. IBM i may be running your core business applications or it may be hosting your web site or running Domino. Whatever its function within your enterprise IBM i has remained unaffected by virus and malware attacks. Why is that?
Viruses and other ailments spread by infecting a host that is vulnerable. Let’s take a look at how IBM i and the applications running on it can remain unscathed by the viruses and malware that are so prevalent today.
In this white paper, Carol Woodbury of SkyView Partners defines each “ailment” and then describe the defenses and protection mechanisms provided by IBM i to ward off the attack.

(return to top).

Varsity Logistics, Inc.

 

Learn how companies are reducing shipping costs by Centralizing all of their Shipping Systems and Transportation Management Systems (TMS) on One Platform with One Vendor. See how companies deployed an enterprise-wide, multi-carrier shipping solution to manage both their Parcel and Freight shipments directly from their IBM i, and seamlessly integrated it to their back end IBM i ERP and WMS. This Whitepaper examines eight reasons for centralizing standalone shipping solutions on the IBM i. In addition, you will see how a Modular TMS Solution integrated with ERP has driven significant efficiencies and cost reductions in companies shipping and transportation operation.
(USA and CANADA only please!)

(return to top).

SkyView Partners, Inc.

 

Auditors are increasingly demanding that programmers and even administrators not be given full rights to IBM i production and development systems. These demands are often taken personally by programmers and administrators who have spent many years providing solutions and ensuring systems run smoothly. Unfortunately, organizations have no choice in the matter. This white paper provides explanations on why organizations have no choice in this matter and why users should not take the loss of privileges as a personal affront.

(return to top).

Connectria Hosting

 

1. Affordable Cloud Solutions
2. Efficiencies of MIMIX
3. Rising Cost of Downtime

This white paper is a collaborative effort between Connectria Hosting, a pioneer in the development of the IBM i Cloud, and Vision Solutions, the leader in High Availability and Disaster Recovery solutions including MIMIX®, the standard for complete, scalable HA/DR protection for the IBM i.

It will provide a review of the core causes and costs of both planned and unplanned downtime and will then provide a detailed discussion of current options for IBM i High Availability and Disaster Recovery in the Cloud.

Most importantly, as you read you will learn why true HA and DR protection are now within reach of even the smallest of businesses.

(return to top).

infor

 

For all manufacturing industries, growth remains top of mind. Post-recession cautiousness has given way to confidence and more ambitious business goals. From automotive to fashion, more manufacturing leaders are ready to take bigger risks in the hopes of bigger payoffs, and optimism is the highest it’s been in years.
To help manufacturers choose the right software in a rapidly changing industry landscape, this guide will explore four key technologies that are essential to any successful manufacturing operation:

  • Enterprise Resource Planning (ERP)
  • Enterprise Asset Management (EAM)
  • Configure Price Quote (CPQ)
  • Supply Chain Management (SCM)
We’ll discuss the market trends increasing the need for adoption of each technology, provide a “shopper’s checklist” of essential features and functions, and share success stories from real-life industry leaders. This guide will also outline how Infor’s industry-specific software and cloud-based technology are helping global companies thrive.


(return to top).

Profound Logic Software, Inc.

 

Since its beginnings at the turn-of-the-century, Baker College prepares Michigan students for careers in high-demand fields, including business, health sciences, engineering and information services.

Running on the IBM i platform, Baker College's IT department over time has compiled well over a million lines of legacy RPG code which supports over 1300 menu items.

Baker College knew they needed to update their aging IBM i application environment to support end-user adoption and efficiency. But did that mean chucking their i platform altogether? Learn how the College's IT team found the perfect modernization solution using Profound UI in this Profound Logic Case Study.


(return to top).

SkyView Partners, Inc.

 

In this white paper we hope to explain why the decision to secure- or not secure – data on the IBM i needs to be a business decision … not a technical decision.

Something is preventing management from understanding the need to secure the electronic data. So let’s explore why we think this happens....


(return to top).

Halcyon, a HelpSystems Company

 

Today’s businesses must be available 24/7 with fewer people having to manage more complex systems and processes.
IT departments receive a constant bombardment of information from a diverse variety of operating systems, business applications, and critical processes and support a complex array of servers and devices running across their entire network.
With tight resources and the need to keep costs in check, more and more is expected of IT operational staff to handle this information efficiently. They need to ensure a swift response with appropriate actions, that essential data is received at the right time, prove service levels are maintained, that contingency and high availability strategies are fully operational, and that vital business activities run smoothly and without disruption.
What kind of safety net processes can you put in place so you can combat information overload, yet not miss a single thing, drop the ball, or cause a negative impact on the business—and more importantly, how do you go about it?
Learn how to handle the daily deluge of information and discover five strategies you can deploy to become an IT superhero in your organization.


(return to top).

DDL Systems, Inc.

 

Download the technical whitepaper on MANAGING YOUR IBM i WIRELESSLY and (optionally) register to download an absolutely FREE software trail. This whitepaper provides an in-depth review of the native IBM i technology and ACO MONITOR™'s advanced two-way messaging features to remotely manage your IBM i while in or away from the office. Notify on-duty personnel of system events and remotely respond to complex problems (via your Smartphone) before they become critical-24/7. Problem solved!

(return to top).

SkyView Partners, Inc.

 

Left to their own preferences, many programmers will ask to be given all possible authorities on the system. That’s because most – not all – but most programmers are focused on getting their work done and would prefer not to be concerned with security. However, many organizations have policies or have to comply with laws or regulations that limit the authorities that programmers can have – especially to production systems. This white paper describes the authorities that programmers typically need along with techniques for determining the exact authorities your programmers need to continue to perform their job functions without having an all-powerful profile.

(return to top).

 

* Email Address



 
 
 

* Verify Email Address

 
  Note: An email will be sent to this address to confirm your order.
 

 

 



Interested in IBM Power System White Papers, Webcasts, Software, Security or Disaster Recovery solutions?
Then use the buttons below to visit our other centers!

MC White Paper Center
MC Webcast Center
MC Software Center
MC Case Study Center

MC Security Center
MC Disaster Recovery Center