Connect With Us

Forward this page

Thank you for your interest in spreading the word about PowerITPro. NOTE: We only request your email address so that the person you are recommending the page to knows that you wanted them to see it, and that it is not junk mail. We do not capture any email address.

Enter multiple addresses on separate lines or separate them with commas.
Indian exchange shows scale of IBM's cloud ambition
(Your Name) has forwarded a page to you from PowerITPro
(Your Name) thought you would like to see this page from the PowerITPro web site.
Refresh Type the characters you see in this picture. Type the characters you see in the picture; if you can't read them, submit the form and a new image will be generated. Not case sensitive.  Switch to audio verification.
AIX User-Related Commands

Download AIX User-Related Commands (Infographic) today! This quick guide highlights differences between user administration commands on AIX and other UNIX-derived operating systems.


POWER IT Pro Blogs
Working without Windows
Mar 24, 2014
blog

Working in a World Without Windows  

For a long time there have been few options when it comes to the desktop. But tablets, smartphones, and web-based services/applications have made people think twice about their reliance on Windows. Erwin Earley recently moved to a Linux-based desktop; in this blog, he shares his thoughts (both good and bad) on the experience....More
Mar 10, 2014
blog

Indian exchange shows scale of IBM's cloud ambition  

Anyone seeking evidence of IBM's accelerating commitment to cloud-based business offerings need look no further than a massive project it launched in India last week....More
Mar 10, 2014
blog

Halcyon tour highlights strength of Infor M3  

British systems management specialist Halcyon Software is setting off on a tour of M3 user group events this month that will take in the Netherlands, Denmark, Sweden and Norway....More
eBooks & Training
Dec 3, 2012
Datasheet

AIX Security

IBM i has extremely robust intrinsic security, and Linux, although much less secure than either AIX or IBM i, has many more eyes watching for problems. But AIX has some significant corner cases where security can be breached if you're not careful....More

Sponsored Introduction Continue on to (or wait seconds) ×