On the Internet, IP addresses are the foundation of communications between users and businesses. In this intensive three-session eLearning class, Internet communications expert Mel Beckman tells you what you need to know to get IPv6-fluent, and how to set up a test lab to make you IPv6-ready.
In The Art Of War, Sun Tzu wrote that the winning strategist only seeks battle after victory has been won. To turn this maxim on its head, I would also suggest that the successful warrior does not declare defeat before any battle has been lost....More
Erwin Earley dives into LPI certification exam Objective 104.1, which covers the creation of partitions and filesystems and is the first objective in the Devices, Linux Filesystems, and Filesystem Hierarchy Standard topic....More
In this blog entry, Erwin Earley starts his exploration of topic 104 of the Linux Professional Institute certification exam, which takes a look at devices, filesystems, and the filesystem hierarchy standard....More
The six articles in this ebook present a half dozen simple yet powerful security topics that any IT pro can digest in lunchtime reading. The title comes from a similar collection of basic physics lectures by the brilliant physicist and Nobel laureate Dr. Richard Feynman....More
IBM i has extremely robust intrinsic security, and Linux, although much less secure than either AIX or IBM i, has many more eyes watching for problems. But AIX has some significant corner cases where security can be breached if you're not careful....More
IBM is investing heavily in three major areas that are POWER-related. Of these three, which interests you the most?