Connect With Us

Secrets of an AIX Administrator

In this 5-part series, Christian Pruett covers the secrets of being an AIX systems administrator. Whether you're just starting out with AIX or you are already an AIX admin, Christian shows you real-world tips and solutions so you can avoid the headaches and overcome many challenges you may face with AIX administration. This information can't be found in any training program or book. Download this FREE ebook now

REGISTER NOW TO ACCESS THIS ARTICLE

All registered users get access to premium content on POWER IT Pro for free.

Already registered? here.
AIX User-Related Commands

Download AIX User-Related Commands (Infographic) today! This quick guide highlights differences between user administration commands on AIX and other UNIX-derived operating systems.


POWER IT Pro Blogs
NiSUG chairman Mike Ryan
Mar 10, 2014
blog

NiSUG to merge with CUA and hold Europe's biggest conference  

The UK's NiSUG is to hold Europe's biggest Power Systems user group conference of the year and is to merge with another British institution, the IBM Computer Users Association (CUA)....More
Mar 5, 2014
Commentary

IBM's UNIX War Is Far From Over   1

In The Art Of War, Sun Tzu wrote that the winning strategist only seeks battle after victory has been won. To turn this maxim on its head, I would also suggest that the successful warrior does not declare defeat before any battle has been lost....More
LPI 104.1: Create Partitions and Filesystems
Feb 24, 2014
blog

LPI Exam 104.1: Create Partitions and Filesystems  

Erwin Earley dives into LPI certification exam Objective 104.1, which covers the creation of partitions and filesystems and is the first objective in the Devices, Linux Filesystems, and Filesystem Hierarchy Standard topic....More
eBooks & Training
Dec 3, 2012
Datasheet

AIX Security

IBM i has extremely robust intrinsic security, and Linux, although much less secure than either AIX or IBM i, has many more eyes watching for problems. But AIX has some significant corner cases where security can be breached if you're not careful....More

Sponsored Introduction Continue on to (or wait seconds) ×