December 9, 2016
December 9, 2016 | Volume 13 Issue 48
• LEAD ARTICLE: TechTip: IFS Containers Part 3, Installing Open Source from the Internet
• FEATURED ARTICLE: TechTip: C# for RPGers - Introducing Lists
• NEWS HIGHLIGHT: LaserVault UBD/VM Integration Further Streamlines the IBM i Backup and Restore Process
• WHITE PAPER: IBM i Security: Event Logging & Active Monitoring
• EVENT: Overwhelmed by Operating Systems?
TechTip: IFS Containers Part 3, Installing Open Source from the Internet
One of the core tenets of open source is freedom to obtain and use software. Now it's time to see that benefit in action.
Written by Aaron Bartell
In the first article of this series, we learned about how IFS Containers could be manually created by copying things into a new directory and then running the chroot command against that directory. This was a laborious process that would cause the technology to not be used unless some amount of automation was introduced. In the second article, I introduced the IBM i Chroot (ibmichroot) project, which addresses the automation of creating IFS Containers in a matter of minutes and even more important, uniformity. In this article, we will navigate through the other core feature of the IBM i Chroot project: package installation.
10 Titles 70-85% Off. Get Your Copies Today!
End the year with Super Savings on bestselling MC Press titles! Pay just $15 each for popular books on RPG, PHP, Java, Project Management, DB2, and more. Don’t wait – at these prices, books will sell out soon!
Visit our store NOW for great deals.
End the year with Super Savings on bestselling MC Press titles! Pay just $15 each for popular books on RPG, PHP, Java, Project Management, DB2, and more. Don’t wait – at these prices, books will sell out soon!
Visit our store NOW for great deals.
Just $35 during the MC Press Year-End Inventory Blowout!
TechTip: C# for RPGers - Introducing Lists
Lists are a special type of “thing” in C#; they have no parallel in RPG. This is most unfortunate, because lists are awesome!
Written by Rafael Victória-Pereira
The last couple of TechTips introduced Arrays and explained the foreach loop. This kind of sets the stage for the List data type. You can think of a List as an Array with all the bells and whistles and none of its limitations. For instance, when you define an Array, you have to define its size. That value is (more or less) definitive, because the memory will be statically allocated to store the variable. Lists, however, are dynamically allocated, which means that you don’t have to specify the size of the List. Actually, you can’t specify it. Instead, you’re able to specify the initial capacity, but even that is optional.
IBM i Security: Event Logging & Active Monitoring
A Step by Step Guide
Active monitoring is one of the most critical and effective security controls that an organization can deploy. Unlike many Windows and Linux server deployments, the IBM i can host a complex mix of back-office applications, web applications, and open source applications and services - leaving millions of security events to actively monitor.
This eBook discusses:
- Real-time security event logging and monitoring
- Security architecture and logging sources on the IBM i
- Creating the IBM security audit journal QAUDJRN
- Enabling IBM security events through system values
- File integrity monitoring (FIM)
- A step by step checklist begin collecting and monitoring IBM i security logs
Download your copy today from the MC White Paper Center
Plus Choose From The Outstanding Selection in our MC White Paper Center
*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.