Connect With Us

Storage

RSS

Solid State Disk: PureFlex and the Speed for Need 

  • Mar 11, 2013
    blog

    Using Physical Tape Devices with PowerLinux  

    I have recently had several IBM i customers request assistance with setting up PowerLinux to use physical tape devices. Since this seems to be becoming a prevalent configuration, I thought I would take this blog entry to share some information on the process for establishing connectivity to physical tape devices....More
  • Jun 18, 2012
    Video
    POWER IT Pro

    Mel Beckman's Three Minute Miracle Guide to Enterprise SSD Performance  

    In this three minute chalk talk, IT technologist and POWER IT Pro editor Mel Beckman explains how to exploit solid state disk for performance and economy in the enterprise data center, with a focus on IBM PureFlex SSD capabilities. You'll learn how SSDs can be more fully utilized than HDDs, letting you serve applications equally well with lower capacity devices. You'll also learn how SSD solves the looming problem of RAID resilience with high capacity disks....More
AIX User-Related Commands

Download AIX User-Related Commands (Infographic) today! This quick guide highlights differences between user administration commands on AIX and other UNIX-derived operating systems.


POWER IT Pro Blogs
Apr 9, 2012
blog

Introducing the Power Systems Implementers Blog  

Welcome to the first entry in our Power Systems Implementers Blog! This blog is intended to provide timely and useful hints and tips on implementation of various technologies on IBM Power Systems and will cover aspects of IBM i as well as AIX and Linux. I would like to use this inaugural blog entry to introduce myself as well as to give you an idea of the types of material you can expect to see in this blog....More
eBooks & Training
Dec 3, 2012
Datasheet

AIX Security

IBM i has extremely robust intrinsic security, and Linux, although much less secure than either AIX or IBM i, has many more eyes watching for problems. But AIX has some significant corner cases where security can be breached if you're not careful....More

Sponsored Introduction Continue on to (or wait seconds) ×