This infographic cheat sheet gives you a quick guide to the differences between user administration commands on AIX and other UNIX-derived operating systems so that you can exploit user administration tools and techniques you find in forums and elsewhere on the web.
Setting up users and passwords is a little different on AIX than other UNIX-like platforms. Anthony English presents his favorite user-related commands and explains how each helps you manage users on AIX....More
For a long time there have been few options when it comes to the desktop. But tablets, smartphones, and web-based services/applications have made people think twice about their reliance on Windows. Erwin Earley recently moved to a Linux-based desktop; in this blog, he shares his thoughts (both good and bad) on the experience....More
The six articles in this ebook present a half dozen simple yet powerful security topics that any IT pro can digest in lunchtime reading. The title comes from a similar collection of basic physics lectures by the brilliant physicist and Nobel laureate Dr. Richard Feynman....More
IBM i has extremely robust intrinsic security, and Linux, although much less secure than either AIX or IBM i, has many more eyes watching for problems. But AIX has some significant corner cases where security can be breached if you're not careful....More