Title: search400.com - Today's News: The top iSeries headlines, trends and technical advice
![]()
| LEAD STORY |
| The IBM iSeries Developer Road Map -- is it right for you? (Search400.com) |
![]() |
| |
![]() |
There's a new road map in town: the iSeries Developer Road Map. It
isn't the first road map iSeries developers have had from IBM, but
this one promises to make more sense to more people as they shift
to using J2EE to develop Web-based applications.
|
|
SPONSORED BY: Bytware, Inc.
![]()
You've disabled Active X, turned off Java, and set up a firewall.
But do you have virus scanning on your mail? If you use OS/400
mail, a malicious message could undermine all of your other
efforts. Don't overlook your iSeries. Make sure you're covered with
the first and only mail scanner for OS/400 mail. Get Protected. Get
StandGuard Anti-Virus. Powered by McAfee.
![]()
More information
|
|
NEWS
IBM's Lotus strategy -- collaborative or uncoordinated? (The Four Hundred)
Will IBM Lotus Notes/Domino be the fuel that keeps the iSeries
running?
DAILY HEADLINES
All headlines, including those below, are available from our news page.
![]()
PRODUCT OF THE YEAR AWARDS
Application deadline Nov. 5
Have a great product or tool for the iSeries? In January,
Search400.com will present its first Product of the Year awards.
The awards will highlight and celebrate those entries in the market
that are deemed outstanding examples of new and innovative
technological advancement for users.
Contact site editor Michelle Davidson to receive an application. But act
fast: The deadline to submit nominations is Wednesday, Nov. 5.
EXPERT ADVICE
Recommended firewall security solution
Carol Woodbury, security advice
Dear Carol,
What firewall security solution for the iSeries would you
recommend?
TAKE OUR NEW POLL
Vote now
How effective are IBM promotional programs and finance incentives
in getting you to upgrade to a new iSeries server or other
products?
Read this recent Search400.com article: Green Streak program for
iSeries revived
BOOK EXCERPT
Information Security Best Practices
Log on and download for free Chapter 9 of Information Security Best
Practices -- 205 Basic Rules written by George L Stefanek and
published by the Morgan Kaufmann division of Elsevier.
This chapter, "Operating System Security Rules," addresses best
practices for setting up security within operating systems.
Authentication, file protection, virus checking, file sharing,
network software and security logging are discussed.
THE MISSING LINK
Friday feature: Attack of the charged particles
![]()
Anything weird happen at work Friday? Any systems go down? See any
gremlins running around? Blame the sun. On Friday, Mr. Sol lobbed
loads of energy at Earth via a geomagnetic storm. Electrical
utilities, airline communications and satellite navigation systems
could have been affected, but there haven't been any reports of
serious problems. So if something weird happened in the IT
department, it's probably the same ol' same ol', not ol' Sol. But
go ahead and blame him -- silent scapegoats can't deny anything.
|
|
![]() |
![]() |
|
Update your subscriptions
|
![]() |
| Select newsletters you would like to receive from the list below. |
![]() |
|
Security Tip |
|
Programmer Tips |
|
Administrator Tips |
|
![]() |
E-mail
|
|
|
| Not a member? We'll activate your membership with your subscription. |
![]() |
|
|
![]()
![]()
SITE EDITOR
Michelle Davidson
[EMAIL PROTECTED]
Send us your story ideas and best practices
![]()
SENIOR NEWS EDITOR
Kate Evans-Correia
[EMAIL PROTECTED]
Send in your product announcements and poll ideas
![]()
ASSISTANT SITE EDITOR
Debra Tart
[EMAIL PROTECTED]
Send us your tips and Best Web Links
![]()
DIRECTOR OF SITE SALES
Gabrielle Derussy
mailto:[EMAIL PROTECTED]
Sponsor this or any other TechTarget newsletter
|
|
|
|
|