Welcome to the MC White Paper Center

>> Review the list of White Papers below. >> Select the items you would like to receive. >> Provide your email address at the bottom of the page and submit. >> Your selection(s) will be sent to you without cost or obligation. >> All information must be submitted in English.

The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card. Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security, and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!


(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)

(Offer Details)


PowerTech Group, Inc.

 

The IBM i platform is known for its robust security capabilities. And it’s this reputation that often keeps staff from giving IBM i the same attention as other platforms.
But as new staff rotate in, IBM i expertise rotates out. Eventually organizations find themselves with maintenance gaps and dangerous security holes on a system once considered bulletproof. Even worse—no one has the knowledge to patch them up!
From beginner basics to advanced tactics, this white paper provides the background and instruction you need to restore your IBM i security back to its former glory.

(return to top).

Halcyon Software, Inc.

 

Martin Norman, industry expert, provides recommendations for managing users on IBM Power Systems i in today’s world.

Over the last 10 years there has been a dramatic shift in the importance of security and audit issues with more laws and regulations. In the beginning some vendors were claiming that the only path to total security compliance was using their solution - otherwise you could find yourself in jail! Compare those days to the reality of data security practices today. The big difference is the focus on the “real world” that we all work in rather than a standardized, perfect world approach to security. Martin introduces a more realistic approach to addressing security concerns using modern tools for user authority challenges and recommendations for real-time event auditing.


(return to top).

SkyView Partners, Inc.

 

An organization’s data is a vital corporate asset. So how do you determine how much security is enough to adequately protect the data? Carol Woodbury discusses the considerations you’ll want to make to determine how much security is enough.

(return to top).

SkyView Partners, Inc.

 

In this white paper we hope to explain why the decision to secure- or not secure – data on the IBM i needs to be a business decision … not a technical decision.

Something is preventing management from understanding the need to secure the electronic data. So let’s explore why we think this happens....


(return to top).

Halcyon Software, Inc.

 

This whitepaper discusses 101 specific things you can automate on your IBM Power System, (System i, iSeries), including links to demonstration videos to explain the exact process plus hints and tips on the best ways to use automation tools. Written by a systems management expert, Martin Norman, the introduction also provides “Ten Top Tips for Peace of Mind” and advice on how to prove a return on investment to your boss.

* If you previously requested "51 Things you can Automate on your System i" this updated version will be sent to you directly from Halcyon Software.

(return to top).

Linoma Software

 

As more and more companies are implementing managed file transfer solutions, they often overlook a critical piece in the data protection cycle. This paper explains the role of the gateway, a buffer that resides in the DMZ between trading partners and a company's private network that serves as a proxy for file exchanges, and helps companies meet compliance regulations such as HIPAA, PCI DSS, SOX and state privacy regulations.


(USA and CANADA only!)

(return to top).

New Generation Software, Inc.

 

Would you like help filtering through announcements and product offerings from IBM and others? Do you feel like your company's needs and budget aren't quite what a lot of these vendors have in mind? This White Paper helps you wade through the headlines to assess what's right for your IBM i users. It also examines:

  • IBM’s analytics and services strategy
  • IBM Query/400 and DB2 Web Query
  • IBM Cognos
  • Microsoft solutions
  • Open source and other software
The White Paper compares these products with NGS-IQ, NGS’ scalable, proven query, reporting, and analytics suite. It concludes with a section designed to help IBM i and DB2 supporters explain the strengths of the environment to critics and the uninformed.


(return to top).

Halcyon Software, Inc.

 

The ever increasing accessibility of IT presents business with a great opportunity to be productive from just about anywhere. However, this in turn gives rise to a range of issues and complications that cannot be ignored. Companies in today’s marketplace must be able to securely manage a complex configuration of applications, devices and business-critical information while allowing employees to engage with the systems in a variety of ways. Even the smallest businesses have to manage a myriad of different entities – servers, networks, applications, storage and remote devices.

With so much to take into account, and with so much riding on the implications of these decisions, is it possible to manage it all through a single pane of glass or is the concept just a myth?


(return to top).

HelpSystems

 

For over 30 years Query/400 has been the data access tool to generate reports easily from DB2 data—allowing access to insight like never before. While it continues to be sufficient for basic reporting functionality, most organizations are beginning to be challenged with the need to access and report on larger volumes of data than ever before. With business users are asking for easy-to-access dashboards and reports to gain insight more easily, it might be time to consider if it's time to upgrade from Query/400.

Download this exclusive IBM i white paper to see:

  • The history of Query/400
  • How organizations currently use Query
  • The benefits of investing in a new data access tool
  • And more

Don't waste any more time struggling with antiquated data access.


Download the white paper

(return to top).

SkyView Partners, Inc.

 

John Vanderwall Chairman and CEO of SkyView Partners, has written a white paper to explain the hidden cost of compliance. This white paper will be especially helpful if you are an executive trying to understand the true costs of compliance or a member of the IT Staff trying to explain to your executives, the effort involved in responding to auditors' requests for information.

(return to top).

CCSS

 

While no one can be aware of every potential problem that may affect the system, you can reduce the impact of issues by proactively monitoring the areas where IBM i and the network overlap.
Download this white paper and learn how to:

  • Calculate the cost of problem resolution
  • Anticipate communication issues
  • Expose network bottlenecks
  • Evaluate your need for proactive network monitoring


(return to top).

Halcyon Software, Inc.

 

Martin Norman, the acknowledged systems management expert, looks at common scenarios faced by operational staff and senior management at IBM Power Systems (iSeries) customer sites and identifies the top ten job scheduling challenges.

This free whitepaper discusses how these challenges can be solved and provides three examples of how companies solved their particular issues through job automation. Videos resources show how you can simplify even the most complex scheduling tasks across an IBM i environment.

Martin provides his observations about what the future holds for the experienced IBM i (iSeries) workforce, and identifies trends in working practices in some of the largest data centers where the “IBM i” is still the core platform of choice.


(return to top).

Halcyon Software, Inc.

 

How to improve the flow of essential information around your organization, save costs and free up your time

Ash Giddings, IBM i industry expert, gives advice on how not to fall into the trap of ignoring or sometimes deleting large volumes of spooled files. These unassuming files can contain information and data that may be critical to your business.

This whitepaper aimed at IBM i System Administrators, discusses smarter ways to handle spooled files by considering the confines of disk space, backup and restore techniques and more efficient procedures for the retrieval, archiving and distribution of files. Ash challenges whether the traditional ‘green-screen’ view is the best way for working with spooled files and examines alternative methods to improve the flow of information around the business and reduce the administrator’s workload.

Download this document to learn his 6 key recommendations for smarter ways to manage spooled files, save resource time and ensure your organisation doesn’t get caught out.


(return to top).

SkyView Partners, Inc.

 

Security Administration is one of those ‘bullets’ on your System Administration To Do List.
IBM i Security Administrators’ Guide is brought to you by SkyView Partners Inc. Specifically written for the security administrator, Carol Woodbury takes her years’ of experience and knowledge as the IBM i Security Expert and explains the processes that should be established and checks that should be made by every IBM i security administrator.


(return to top).

CCSS

 

Implementing proactive system monitoring in your IBM i environment begins with planning. The effectiveness of automated monitoring solutions should be evaluated based on the degree of visibility they can offer to potential problems, the time they save, and the flexibility they offer in meeting the specific views and requirements of your existing and developing network.
Your proactive monitoring solution should be able to anticipate repeat issues based on your system demands, applications, throughput, and configuration, as well as provide fast access to information that will pinpoint the cause of unforeseen issues and those that are otherwise difficult to isolate.
For system administrators and managers who are looking for a practical guide to help maximize a new or existing proactive approach to system and message monitoring.
Download this white paper to learn:

  • Information on must-have monitors
  • Shortcuts to greater efficiency
  • Checklists of requirements for a customized roadmap

(return to top).

HelpSystems

 

As hardware and software technologies evolve, so too does the complexity of the data center.

IBM i often serves as the backbone for business-critical applications, including ERP packages, leaving other servers to run email, print serving, and the website—but users and other computing technologies still draw data from the transactional database on IBM i.

Robot systems management solutions have been helping customers manage IBM i operations for over 30 years. This white paper is intended primarily for IT management and attempts to explain, in plain English, the components of modern IBM i environments and how Robot can be deployed to maximize business objectives.

Download this white paper to learn about:

  • IBM i virtualization technologies like SAN, LPM, and VIOS
  • IBM i high availability and disaster recovery technologies like PowerHA and VTL
  • Robot automation solutions for enhancing the ROI of IBM i


(return to top).

PowerTech Group, Inc.

 

IBM i remains one of the most securable servers, but poor configuration and missing controls can result in undetected data access, fraud, or worse.

The only study focused exclusively on IBM i security found an alarming 94% of systems fail to protect all 27 exit points.

How many of your exit points are controlled? How do your systems compare?

Download the study to find out.

(return to top).

Halcyon Software, Inc.

 

Previously, businesses have targeted hardware, operating systems and the user-base as the focus of their monitoring and management expenditure but an increasing number of companies are now investing in Enterprise Resource Planning (ERP) and High Availability (HA) applications to keep ahead of the competition. Organizations that follow this trend are making a large investment in their future and complex implementations mean that you have to manage more, faster and with less downtime.

This paper explores the management and monitoring challenges faced by companies when implementing ERP and HA applications and demonstrates how, by automating complex and resource hungry monitoring activities, the business can focus on realizing the full potential of its investment and remain competitive.


(return to top).

Help/Systems

 

Learn how to combine automation software and IBM i to increase revenue and enhance customer experiences. Download the exclusive Help/Systems White Paper “Building a Sound Investment Strategy Through Technology.”

This free four-page PDF, written by Help/Systems Director of Automation Technology Chuck Losinski, is packed with concise tips for IBM i. You’ll learn why Power Systems running IBM i are the key to a sound investment strategy. You’ll also discover how automation technologies such as batch processing, agent tasks, interactive processes, backups, report management, and system and message monitoring can save your company money while making your operations more reliable than ever.


(return to top).

Bytware, Inc.

 

The Integrated File System is one of the most ignored parts of the IBM i, yet it enables many of the most powerful and most used features on the system today. Overlooking the ways in which IBM i utilizes the IFS could weaken your security. Learn more about the top security issues facing the IFS in this white paper.

(return to top).

Profound Logic Software, Inc.

 

Since its beginnings at the turn-of-the-century, Baker College prepares Michigan students for careers in high-demand fields, including business, health sciences, engineering and information services.

Running on the IBM i platform, Baker College's IT department over time has compiled well over a million lines of legacy RPG code which supports over 1300 menu items.

Baker College knew they needed to update their aging IBM i application environment to support end-user adoption and efficiency. But did that mean chucking their i platform altogether? Learn how the College's IT team found the perfect modernization solution using Profound UI in this Profound Logic Case Study.


(return to top).

Varsity Logistics, Inc.

 

Learn how companies are reducing shipping costs by Centralizing all of their Shipping Systems and Transportation Management Systems (TMS) on One Platform with One Vendor. See how companies deployed an enterprise-wide, multi-carrier shipping solution to manage both their Parcel and Freight shipments directly from their IBM i, and seamlessly integrated it to their back end IBM i ERP and WMS. This Whitepaper examines eight reasons for centralizing standalone shipping solutions on the IBM i. In addition, you will see how a Modular TMS Solution integrated with ERP has driven significant efficiencies and cost reductions in companies shipping and transportation operation.

(return to top).

Profound Logic Software, Inc.

 

The Benefits of Using RPG OA and JSON to Store Metadata in the Display File

Scott Klement, IBM Champion and Product Developer
Profound Logic Software, Inc.

While RPG Open Access is nothing new, there is still some confusion in the IBM i community as to what it is and how it is used. Additionally, there has also been much talk lately about Open Access metadata and how it should be leveraged with regard to RPG application modernization.

This white paper explains what Rational Open Access for RPG is all about, clarify what metadata is and cover how metadata is related to Open Access. It also covers how Profound Logic stores metadata in the Profound UI Rich Display files, and why we think it’s the best solution for storing metadata.

Get the clarification you need, request this white paper today.


(return to top).

HelpSystems

 

HelpSystems, the creator of the popular State of IBM i Security Study, now shares exclusive new information about the outlook for the IBM i platform collected in the first annual IBM i Marketplace Survey.

From manufacturing and retail to finance and healthcare, IBM i professionals from more than a dozen countries reported their plans and concerns for their IT environments, revealing how IBM i is being used and how it relates to their broader IT objectives.

Download the survey results to see how 350 of your peers on the platform address:

  • Modernization
  • Hardware
  • Operating systems
  • IT initiatives
  • Personnel issues
  • Data growth
  • The future of IBM i


(return to top).

Halcyon Software, Inc.

 

Most IT Managers must question at one time or another ‐ what exactly they are getting for their money from a software maintenance agreement?
Beyond ‘corrective maintenance’ what should you expect from a software vendor in today’s world to ensure the software is constantly moving in a direction which benefits your business?
Lorraine Cousins, CEO of Halcyon Software, discusses why some companies see their maintenance agreement as a way of getting new features with tangible business benefits while others regard it as insurance to protect against the risk of software malfunction.
Discover how to benchmark current and future software vendors to make sure your organization is getting the maximum value from your software maintenance agreement.


(return to top).

Linoma Software

 

Leading edge IT shops are rethinking the use of underlying components within its data transfer arsenal, and are arming themselves to meet the ever changing requirements of PCI DSS and other compliance requirements.

This white paper examines how managed file transfer can help companies stay ahead of compliance regulations by keeping data transfers secure while saving time and allowing staff time to be reallocated to other projects.


(USA and CANADA only!)

(return to top).

ASNA

 

Mobile computing is rapidly maturing into a solid platform for delivering enterprise applications. Many IBM i shops today are realizing that integrating their IBM i with mobile applications is the fast path to improved business workflows, better customer relations, and more responsive business reporting. The ROI that mobile applications can produce for your business is substantial.
This ASNA whitepaper takes a look at mobile computing for the IBM i. It discusses the different ways mobile applications may be used within the enterprise and how ASNA products solve the challenges mobile presents. It also presents the case that you already have the mobile programming team your projects need: that team is your existing RPG development team!

(return to top).

Halcyon Software. Inc.

 

By John Fearon, ONCALL Group

This is not about getting rid of IT checklists. The power of a good checklist is awesome – but how can we make sure the best procedures are continuously in place and always ready for action if a problem is encountered. The key is to automate manual routines and checklists.

This White Paper discusses the advantages of automating traditional manual, hands-on management tasks for the operation and maintenance of IT platforms, systems, applications, networks and architectures.

For many of these tasks, missing a step or running steps out of sequence can be disastrous to IT services and the business.

Discover the five benefits of automation and how to cement in place a high quality set of actions, according to a proven plan.


(return to top).

 

* Email Address



 
 
 

* Verify Email Address

 
  Note: An email will be sent to this address to confirm your order.
 

 

 



Interested in IBM Power System White Papers, Webcasts, Software, Security or Disaster Recovery solutions?
Then use the buttons below to visit our other centers!

MC White Paper Center
MC Webcast Center
MC Software Center
MC Case Study Center

MC Security Center
MC Disaster Recovery Center