Connect With Us

Forward this page

Thank you for your interest in spreading the word about PowerITPro. NOTE: We only request your email address so that the person you are recommending the page to knows that you wanted them to see it, and that it is not junk mail. We do not capture any email address.

Enter multiple addresses on separate lines or separate them with commas.
Common Sweden has its eyes on the future
(Your Name) has forwarded a page to you from PowerITPro
(Your Name) thought you would like to see this page from the PowerITPro web site.
Refresh Type the characters you see in this picture. Type the characters you see in the picture; if you can't read them, submit the form and a new image will be generated. Not case sensitive.  Switch to audio verification.
AIX User-Related Commands

Download AIX User-Related Commands (Infographic) today! This quick guide highlights differences between user administration commands on AIX and other UNIX-derived operating systems.


POWER IT Pro Blogs
NiSUG chairman Mike Ryan
Mar 10, 2014
blog

NiSUG to merge with CUA and hold Europe's biggest conference  

The UK's NiSUG is to hold Europe's biggest Power Systems user group conference of the year and is to merge with another British institution, the IBM Computer Users Association (CUA)....More
Mar 5, 2014
Commentary

IBM's UNIX War Is Far From Over   1

In The Art Of War, Sun Tzu wrote that the winning strategist only seeks battle after victory has been won. To turn this maxim on its head, I would also suggest that the successful warrior does not declare defeat before any battle has been lost....More
LPI 104.1: Create Partitions and Filesystems
Feb 24, 2014
blog

LPI Exam 104.1: Create Partitions and Filesystems  

Erwin Earley dives into LPI certification exam Objective 104.1, which covers the creation of partitions and filesystems and is the first objective in the Devices, Linux Filesystems, and Filesystem Hierarchy Standard topic....More
eBooks & Training
Dec 3, 2012
Datasheet

AIX Security

IBM i has extremely robust intrinsic security, and Linux, although much less secure than either AIX or IBM i, has many more eyes watching for problems. But AIX has some significant corner cases where security can be breached if you're not careful....More

Sponsored Introduction Continue on to (or wait seconds) ×