Connect With Us

Greg Hintermeister

Greg
Hintermeister

Greg Hintermeister is a Senior Technical Staff Member at IBM focusing on user experience and is an IBM Master Inventor. He has extensive experience designing user interaction for IBM Flex System Manager, virtualization products, mobile applications, and numerous Web applications. Greg is a regular speaker at executive briefings and technical conferences. You can reach him at gregh@us.ibm.com, on Twitter @greghint, and interact with his thoughts on user experience, inventing, and more at his technical blog.

AIX User-Related Commands

Download AIX User-Related Commands (Infographic) today! This quick guide highlights differences between user administration commands on AIX and other UNIX-derived operating systems.


POWER IT Pro Blogs
Jan 7, 2014
blog

LPI Exam 103.5: Create, Monitor, and Kill Processes  

Objective 103.5 of the LPI exam covers creating, monitoring, and killing processes. Erwin Earley dives into the details....More
LPI Exam 103.4: Use Streams, Pipes, and Redirects
Dec 23, 2013
blog

LPI Exam 103.4: Use Streams, Pipes, and Redirects  

In his coverage of Objective 103.4 of the LPI exam, Erwin Earley takes a look at using pipes and redirects to affect input and output streams....More
Worldwide Server Market Revenues Decline 3.7 Percent in 3Q
Dec 18, 2013
blog

Worldwide Server Market Revenues Decline 3.7 Percent in 3Q, IDC Reports  

Not a lot to love in this report, unfortunately. Here's the most relevant points of interest from IDC for the third quarter of 2013 for server action:   According to IDC's Worldwide Quarterly Server Tracker, factory revenue in the worldwide server market decreased 3.7 percent year over year to $12.1 billion in the third quarter of 2013 (3Q13)....More
eBooks & Training
Dec 3, 2012
Datasheet

AIX Security

IBM i has extremely robust intrinsic security, and Linux, although much less secure than either AIX or IBM i, has many more eyes watching for problems. But AIX has some significant corner cases where security can be breached if you're not careful....More

Sponsored Introduction Continue on to (or wait seconds) ×