Connect With Us

Forward this page

Thank you for your interest in spreading the word about PowerITPro. NOTE: We only request your email address so that the person you are recommending the page to knows that you wanted them to see it, and that it is not junk mail. We do not capture any email address.

Enter multiple addresses on separate lines or separate them with commas.
IBM Launches PureSystems with Resources Already in Play
(Your Name) has forwarded a page to you from PowerITPro
(Your Name) thought you would like to see this page from the PowerITPro web site.
Refresh Type the characters you see in this picture. Type the characters you see in the picture; if you can't read them, submit the form and a new image will be generated. Not case sensitive.  Switch to audio verification.
AIX User-Related Commands

Download AIX User-Related Commands (Infographic) today! This quick guide highlights differences between user administration commands on AIX and other UNIX-derived operating systems.


POWER IT Pro Blogs
Feb 10, 2014
blog

German firm offers backup with a Tivoli twist  

A German specialist is offering a new twist on backups with a solution based on an extension to IBM's Tivoli software built by Danish developer Front-safe....More
Feb 10, 2014
blog

Blue Chip runs world's biggest IBM i cloud  

A British managed services provider is operating the world's largest IBM i cloud. That was the bold claim made by Lee Bailey, client director at Bedford-based Blue Chip, on his blog and across social media last month. So far, he says, no one has been in touch to refute it....More
LPIC Topic 103 Wrap Up
Feb 6, 2014
blog

LPIC Exam 103: GNU and UNIX Commands Wrap Up  

Erwin Earley wraps up the GNU and Unix Commands topic of the LPI Exam with a brief recap of each objective....More
eBooks & Training
Dec 3, 2012
Datasheet

AIX Security

IBM i has extremely robust intrinsic security, and Linux, although much less secure than either AIX or IBM i, has many more eyes watching for problems. But AIX has some significant corner cases where security can be breached if you're not careful....More

Sponsored Introduction Continue on to (or wait seconds) ×