Controlling symbol visibility for shared libraries: Part 2 - Advanced knowledge with IBM XL C/C++ V13 compiler
This is the second article of our two-part series about symbol visibility. This article demonstrates more methods on visibility setting and resolution using the IBM® XL C/C++ V13 compiler. The article also introduces and explains some of the linking, assembly, and tooling facilities.
Internet security is a major concern now-a-days. Internet Protocol Security (IPSec) is a security protocol suite which works on the L3 layer of network and provides a strong security with the help of different types of authentication and encryption mechanisms.
This article discusses the tasks to be performed for IBM® AIX® when updating or migrating IBM System Storage® SAN Volume Controller (SVC) to a new release. It includes a script that makes it easier to prepare many AIX servers for update or migration.
You are about to reboot your system for some planned maintenance, perhaps through some upgrade or migration. For this process to complete, you issue a : bosboot - a command. It may be the case that the bosbootcommand fails, the output informing you "it is not safe to reboot your system".
Controlling user limits should not only cover the resources being used, it should also encompass environmental limitations on the account in general. This article describes what user limits should cover and also demonstrates the concepts of limits with examples.
This article provides a lot of information including the Virtual I/O Server (VIOS) that is providing the Shared Ethernet Adapter (SEA), the virtual Small Computer System Interface (VSCSI), and the command to re-create the virtual target device as well.
In plain Live Partition Mobility(LPM), transfer of memory contents of the source logical partition (LPAR) goes unprotected over the network.