Connect With Us

Forward this page

Thank you for your interest in spreading the word about PowerITPro. NOTE: We only request your email address so that the person you are recommending the page to knows that you wanted them to see it, and that it is not junk mail. We do not capture any email address.

Enter multiple addresses on separate lines or separate them with commas.
Common Sweden has its eyes on the future
(Your Name) has forwarded a page to you from PowerITPro
(Your Name) thought you would like to see this page from the PowerITPro web site.
Refresh Type the characters you see in this picture. Type the characters you see in the picture; if you can't read them, submit the form and a new image will be generated. Not case sensitive.  Switch to audio verification.
AIX User-Related Commands

Download AIX User-Related Commands (Infographic) today! This quick guide highlights differences between user administration commands on AIX and other UNIX-derived operating systems.


POWER IT Pro Blogs
LPI 104: Devices, Filesystems, and the Filesystem Hierarchy Standard
Feb 13, 2014
blog

LPI Exam 104: Devices, Filesystems, and the Filesystem Hierarchy Standard  

In this blog entry, Erwin Earley starts his exploration of topic 104 of the Linux Professional Institute certification exam, which takes a look at devices, filesystems, and the filesystem hierarchy standard....More
Feb 12, 2014
blog

IBM Brings Power Systems Servers to the Cloud for No-Charge App Dev Access  

Software developers can tap into IBM's new cloud-based Power Development Platform to build, port, and test apps running on AIX, IBM i, and Linux....More
Feb 10, 2014
blog

PowerLinux is red hot for high-frequency trading, says specialist  

An IBM i specialist is making waves in the City of London with PowerLinux. iSys specialises in infrastructure optimisation, mainly with Power technology, and the financial and capital markets where it counts the London Stock Exchange among its customers....More
eBooks & Training
Dec 3, 2012
Datasheet

AIX Security

IBM i has extremely robust intrinsic security, and Linux, although much less secure than either AIX or IBM i, has many more eyes watching for problems. But AIX has some significant corner cases where security can be breached if you're not careful....More

Sponsored Introduction Continue on to (or wait seconds) ×