Welcome to the MC White Paper Center

>> Review the list of White Papers below. >> Select the items you would like to receive. >> Provide your email address at the bottom of the page and submit. >> Your selection(s) will be sent to you without cost or obligation. >> All information must be submitted in English.

The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $100 MC Press Bookstore gift card. Visit the MC Webcast, MC White Paper, and MC Software Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $100 MC Press Bookstore gift card! Next Drawing: September 1, 2017.


(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)


PowerTech Group, Inc.

 

For every breach that makes headlines, dozens of other organizations have had data stolen or corrupted by hackers—or even their own users. Cyberthreats become more sophisticated every year, raising the importance of proper security controls.
The 2017 State of IBM i Security Study proves once more that many organizations running the IBM i operating system rely on system settings that leave data vulnerable. This is true across all industries for businesses large and small.
Weak passwords, lax system auditing, and overly privileged users leave your server vulnerable to internal and external threats. A data breach caused by a cybercriminal or a negligent insider can cause irreparable damage to an organization of any size.
The annual State of IBM i Security Study strives to help executives, IT managers, system administrators, and auditors understand the full extent of IBM i security exposures and how to correct them quickly and effectively.


(return to top).

SkyView Partners, Inc.

 

While one may think that PCI is a thing of the past and that it’s already been implemented, major breaches (most notably of the Target PoS systems) have brought it back into focus. Some retailers are just now understanding how PCI applies to them and other organizations have started to accept credit cards when they didn’t in the past. To refresh everyone’s memory, here’s an overview of what PCI means to the IBM i community and what organizations that use an IBM i to store, process or access cardholder data need to be aware of.

(return to top).

Profound Logic Software, Inc.

 

Creating mobile applications for IBM i on Power Systems doesn't have to be difficult!
Mobile applications can take your business to new levels of engagement, customer support and competitiveness. By making your ERP, Sales, Line of Business, and other applications mobile, you empower your workforce to get more done - from anywhere, at any time. If your business runs on IBM i (formerly known as AS400 or iSeries) there's no need to worry. You can easily make your RPG applications available on any mobile device!

Read this free white paper, and learn how you can overcome the most common challenges to mobile for IBM i shops, including:

  • How to go mobile with limited staff or budget
  • How to make any RPG developer a mobile superstar
  • Whether to choose hybrid or native development
  • How to ease BYOD development stress

  • (return to top).

SkyView Partners, Inc.

 

In this white paper we hope to explain why the decision to secure- or not secure – data on the IBM i needs to be a business decision … not a technical decision.

Something is preventing management from understanding the need to secure the electronic data. So let’s explore why we think this happens....


(return to top).

infor

 

For all manufacturing industries, growth remains top of mind. Post-recession cautiousness has given way to confidence and more ambitious business goals. From automotive to fashion, more manufacturing leaders are ready to take bigger risks in the hopes of bigger payoffs, and optimism is the highest it’s been in years.
To help manufacturers choose the right software in a rapidly changing industry landscape, this guide will explore four key technologies that are essential to any successful manufacturing operation:

  • Enterprise Resource Planning (ERP)
  • Enterprise Asset Management (EAM)
  • Configure Price Quote (CPQ)
  • Supply Chain Management (SCM)
We’ll discuss the market trends increasing the need for adoption of each technology, provide a “shopper’s checklist” of essential features and functions, and share success stories from real-life industry leaders. This guide will also outline how Infor’s industry-specific software and cloud-based technology are helping global companies thrive.


(return to top).

Help/Systems

 

Learn how to combine automation software and IBM i to increase revenue and enhance customer experiences. Download the exclusive Help/Systems White Paper “Building a Sound Investment Strategy Through Technology.”

This free four-page PDF, written by Help/Systems Director of Automation Technology Chuck Losinski, is packed with concise tips for IBM i. You’ll learn why Power Systems running IBM i are the key to a sound investment strategy. You’ll also discover how automation technologies such as batch processing, agent tasks, interactive processes, backups, report management, and system and message monitoring can save your company money while making your operations more reliable than ever.


(return to top).

Halcyon, a HelpSystems Company

 

Today’s businesses must be available 24/7 with fewer people having to manage more complex systems and processes.
IT departments receive a constant bombardment of information from a diverse variety of operating systems, business applications, and critical processes and support a complex array of servers and devices running across their entire network.
With tight resources and the need to keep costs in check, more and more is expected of IT operational staff to handle this information efficiently. They need to ensure a swift response with appropriate actions, that essential data is received at the right time, prove service levels are maintained, that contingency and high availability strategies are fully operational, and that vital business activities run smoothly and without disruption.
What kind of safety net processes can you put in place so you can combat information overload, yet not miss a single thing, drop the ball, or cause a negative impact on the business—and more importantly, how do you go about it?
Learn how to handle the daily deluge of information and discover five strategies you can deploy to become an IT superhero in your organization.


(return to top).

SkyView Partners, Inc.

 

Never heard of Application Administration? Don’t be surprised. Although it’s full of function, it’s one of little-known features of IBM i. Application Administration (or App Admin as it’s commonly called) has been around for a while but the additional features provided in the latest releases as well as recent Technology Releases makes this a feature worth exploring again. Carol Woodbury, President of SkyView Partners, has written a white paper describing how you can use Application Administration (a feature of i Navigator) to control access to various client functions as well as functions available on the IBM i and network features such as ODBC and FTP access.

(return to top).

Profound Logic Software, Inc.

 

After surveying 400+ IBM i professionals, we discovered:

  • The state of IBM i modernization in today's businesses and their goals for the future
  • The effect legacy applications have on the businesses' internal and external processes
  • The #1 concern upper managers have with the IBM i, and how to combat it
...and much much more!

Download your copy of The 2016 State of IBM i Modernization today.

(return to top).

ASNA

 

Mobile computing is rapidly maturing into a solid platform for delivering enterprise applications. Many IBM i shops today are realizing that integrating their IBM i with mobile applications is the fast path to improved business workflows, better customer relations, and more responsive business reporting. The ROI that mobile applications can produce for your business is substantial.
This ASNA whitepaper takes a look at mobile computing for the IBM i. It discusses the different ways mobile applications may be used within the enterprise and how ASNA products solve the challenges mobile presents. It also presents the case that you already have the mobile programming team your projects need: that team is your existing RPG development team!

(return to top).

Townsend Security

 

A Step by Step Guide
Active monitoring is one of the most critical and effective security controls that an organization can deploy. Unlike many Windows and Linux server deployments, the IBM i can host a complex mix of back-office applications, web applications, and open source applications and services - leaving millions of security events to actively monitor.
This eBook discusses:

  • Real-time security event logging and monitoring
  • Security architecture and logging sources on the IBM i
  • Creating the IBM security audit journal QAUDJRN
  • Enabling IBM security events through system values
  • File integrity monitoring (FIM)
  • A step by step checklist begin collecting and monitoring IBM i security logs


(return to top).

SkyView Partners, Inc.

 

Does a virus have your server down? Perhaps it’s the latest worm, Trojan horse, buffer overflow or denial of service attack that’s got you or one of your servers down. While one of these bugs may be affecting one or more of your servers in your enterprise, it is highly unlikely that the server affected is a Power server running IBM i. IBM i may be running your core business applications or it may be hosting your web site or running Domino. Whatever its function within your enterprise IBM i has remained unaffected by virus and malware attacks. Why is that?
Viruses and other ailments spread by infecting a host that is vulnerable. Let’s take a look at how IBM i and the applications running on it can remain unscathed by the viruses and malware that are so prevalent today.
In this white paper, Carol Woodbury of SkyView Partners defines each “ailment” and then describe the defenses and protection mechanisms provided by IBM i to ward off the attack.

(return to top).

HelpSystems

 

For the third annual IBM i Marketplace Survey, HelpSystems set out to gather data about how businesses use the IBM i platform. The past two surveys have sparked many thoughtful conversations about this technology and we’re thrilled to be part of such an engaged community.
Nearly 500 people from across the globe completed this year’s survey. We’re so happy to share the results with you, and hope you’ll find the information interesting and useful as you evaluate your own IT projects.
Sections: IBM i in the Data Center | IT Initiatives & Trends | Outlook for IBM i | Demographics | Resources


(return to top).

DDL Systems, Inc.

 

Download the technical whitepaper on MANAGING YOUR IBM i WIRELESSLY and (optionally) register to download an absolutely FREE software trail. This whitepaper provides an in-depth review of the native IBM i technology and ACO MONITOR™'s advanced two-way messaging features to remotely manage your IBM i while in or away from the office. Notify on-duty personnel of system events and remotely respond to complex problems (via your Smartphone) before they become critical-24/7. Problem solved!

(return to top).

Profound Logic Software, Inc.

 

If your business is thinking about modernizing your legacy IBM i (also known as AS/400 or iSeries) applications, you will want to read this white paper first!

Download this paper and learn how Node.js can ensure that you:
  • Modernize on-time and budget - no more lengthy, costly, disruptive app rewrites!
  • Retain your IBM i systems of record
  • Find and hire new development talent
  • Integrate new Node.js applications with your existing RPG, Java, .Net, and PHP apps
  • Extend your IBM i capabilties to include Watson API, Cloud, and Internet of Things
Read Node.js for Enterprise IBM i Modernization Now!


(return to top).

Connectria Hosting

 

1. Affordable Cloud Solutions
2. Efficiencies of MIMIX
3. Rising Cost of Downtime

This white paper is a collaborative effort between Connectria Hosting, a pioneer in the development of the IBM i Cloud, and Vision Solutions, the leader in High Availability and Disaster Recovery solutions including MIMIX®, the standard for complete, scalable HA/DR protection for the IBM i.

It will provide a review of the core causes and costs of both planned and unplanned downtime and will then provide a detailed discussion of current options for IBM i High Availability and Disaster Recovery in the Cloud.

Most importantly, as you read you will learn why true HA and DR protection are now within reach of even the smallest of businesses.

(return to top).

MaxAva

 

PRACTICAL TOOLS TO IMPLEMENT DISASTER RECOVERY IN YOUR IBM i ENVIRONMENT

  • CLOUD VS. ON-PREMISE?
  • COMPREHENSIVE CHECKLISTS
  • RISK COST CALCULATIONS
  • BUSINESS CASE FRAMEWORK
  • DR SOLUTIONS OVERVIEW
  • RFP BUILDER

Download your free copy of DR Strategy Guide for IBM i today.
The DR Strategy Guide for IBM i is brought to you by Maxava – innovative global leaders in High Availability and Disaster Recovery solutions for IBM i.


(return to top).

 

* Email Address



 
 
 

* Verify Email Address

 
  Note: An email will be sent to this address to confirm your order.
 

 

 


Interested in IBM Power System White Papers, Webcasts or Software solutions?
Then use the buttons below to visit our other centers!

MC White Paper Center
MC Webcast Center
MC Software Center