Connect With Us

More in System Admin

  • Nov 25, 2013
    video
    POWER IT Pro

    Session 3: Build your own IPv6 lab for $99  

    Presented by: Mel Beckman This session will cover: Components of Your IPv6 Lab Detailed network diagram with addresses Overview of your IPv6 router configuration Plan B for certain older Internet firewalls Pre-flight check and first flight in your new lab Next Steps...More
  • Nov 25, 2013
    video
    POWER IT Pro

    Session 2: IPv6 addressing crash course  

    Presented by: Mel Beckman This session will cover: Review of subnet masks Classless Internet Domain Routing (CIDR) notation Configuring IPv6 addresses on desktops and servers IPv6 address handling tips Moving to an all-IPv6 Internet: the Dual Stack solution IPv6 DNS forwards and backwards Stateless address autoconfiguration -- no more DHCP leases!...More
  • Nov 25, 2013
    video
    POWER IT Pro

    Session 1: Understanding IPv6  

    Presented by: Mel Beckman This session will cover: The state of IPv6 How to get started with IPv6 Get your own IPv6 address space -- during the class! (these IP addresses will be yours to keep forever!)...More
  • Process Text Streams Using Filters
    Oct 8, 2013
    blog

    LPI Exam 103.2: Process Text Streams Using Filters  

    Objective 103.2 of the Linux Professional Institute Certification exam covers a number of commands that are commonly used for processing textual input and output....More
  • The Linux Restore Script
    Oct 3, 2013
    blog

    The Linux Restore Script   1

    Erwin Earley demonstrates the procedure for restoring a Linux system from a previous backup to virtual tape....More
  • Use SSH to Inventory IBM i Software
    Sep 30, 2013
    blog

    Use SSH to Inventory IBM i Software  

    The protocols discovered on an endpoint from IBM Systems Director have a direct impact on the management functions that can be performed and the data that can be collected. Erwin Earley highlights the requirements for SSH for successful inventory collection against IBM i endpoints....More
AIX User-Related Commands

Download AIX User-Related Commands (Infographic) today! This quick guide highlights differences between user administration commands on AIX and other UNIX-derived operating systems.


POWER IT Pro Blogs
Working without Windows
Mar 24, 2014
blog

Working in a World Without Windows  

For a long time there have been few options when it comes to the desktop. But tablets, smartphones, and web-based services/applications have made people think twice about their reliance on Windows. Erwin Earley recently moved to a Linux-based desktop; in this blog, he shares his thoughts (both good and bad) on the experience....More
Mar 10, 2014
blog

Indian exchange shows scale of IBM's cloud ambition  

Anyone seeking evidence of IBM's accelerating commitment to cloud-based business offerings need look no further than a massive project it launched in India last week....More
Mar 10, 2014
blog

Halcyon tour highlights strength of Infor M3  

British systems management specialist Halcyon Software is setting off on a tour of M3 user group events this month that will take in the Netherlands, Denmark, Sweden and Norway....More
eBooks & Training
Dec 3, 2012
Datasheet

AIX Security

IBM i has extremely robust intrinsic security, and Linux, although much less secure than either AIX or IBM i, has many more eyes watching for problems. But AIX has some significant corner cases where security can be breached if you're not careful....More

Sponsored Introduction Continue on to (or wait seconds) ×