Connect With Us


Steve Will

IBM i Chief Architect Steve Will on V5R4 to IBM i 7.1 

  • Aug 21, 2013

    IBM Posts Impressive SAP Benchmark with IBM i  

    When IBM i is used to deliver SAP's enterprise goodness, it can handle all the vagaries of SAP with snappy performance . . . and do it at enviable price points....More
  • Jul 10, 2013

    IBM i Customers Believe IBM i Is 'Future Proof'  

    Here's a gem: Infor recently completed research into its customer base -- 70,000 strong -- that revealed that it's 16,000-plus IBM i-running customers still consider IBM i on Power Systems to be the platform the future....More
  • Apr 24, 2013

    IBMi25 Not Slowing Down  

    IBM's IBMi25 celebration remains in full swing, and if it's been a while since you first checked out the IBMi25 Facebook page, head on over for the reveal of more descriptive chapters of the IBM i story, plus a new video....More
  • ibmi25
    Apr 10, 2013

    IBMi25 Celebration in Full Swing  

    The IBM i Twenty Five celebration kicked off at COMMON and is now in full swing, most notably surfaced around the world via the IBMi25 page on Facebook. The page has already picked up more than 700 likes, and IBM i enthusiasts are joining the fun through prolific comments and Twitter a la #IBMi25 hashtag. The official Twitter handle from IBM is @IBMi25 (which you can also view online without a Twitter account)....More
  • ibm i 25 year celebration logo
    Apr 3, 2013

    IBM i Turns 25!  

    This year the IBM i turns 25 years old, which seems impossible since "IBM i" only hit the scene in April of 2008. IBM i, though, was just a new name for for the core operating system behind the all-in-one server phenomenon that started as the AS/400....More
  • ibm i logo
    Jan 23, 2013

    IBM i Is All Around Us   1

    IBM i Chief Architect Steve Will recently made a post to his blog about how IBM i is, despite the fact that we can't see it, all around us. IBM i is being used by major (and minor) companies all around the world. Steve Will is in an interesting position at IBM where, in many respects, he represents the public face of IBM i, and yet, can't talk about it as openly as all of us Power fans would hope....More
  • itg-study-shows-ibm-i-downtime-costs-less
    Jan 2, 2013

    IBM i Far Less Risky for Downtime Costs in Enterprises, ITG Reports  

    There's more to the IBM i cost of operation reports from ITG. Last year we highlighted the research company's study that showed how much more cost-effective it is to run IBM i in midsize businesses instead of Windows or x86 Linux with Oracle. This year, we'll turn our attention to enterprise-class companies. ...More

Operating Systems Topics




AIX User-Related Commands

Download AIX User-Related Commands (Infographic) today! This quick guide highlights differences between user administration commands on AIX and other UNIX-derived operating systems.

POWER IT Pro Blogs
Working without Windows
Mar 24, 2014

Working in a World Without Windows  

For a long time there have been few options when it comes to the desktop. But tablets, smartphones, and web-based services/applications have made people think twice about their reliance on Windows. Erwin Earley recently moved to a Linux-based desktop; in this blog, he shares his thoughts (both good and bad) on the experience....More
Mar 10, 2014

Indian exchange shows scale of IBM's cloud ambition  

Anyone seeking evidence of IBM's accelerating commitment to cloud-based business offerings need look no further than a massive project it launched in India last week....More
Mar 10, 2014

Halcyon tour highlights strength of Infor M3  

British systems management specialist Halcyon Software is setting off on a tour of M3 user group events this month that will take in the Netherlands, Denmark, Sweden and Norway....More
eBooks & Training
Dec 3, 2012

AIX Security

IBM i has extremely robust intrinsic security, and Linux, although much less secure than either AIX or IBM i, has many more eyes watching for problems. But AIX has some significant corner cases where security can be breached if you're not careful....More

Sponsored Introduction Continue on to (or wait seconds) ×