Technical library

  • spacer Filter by products, topics, and types of content

    (0 Products)

    (38 Topics)

    (1 Industries)

    (4 Types)

 

1 - 100 of 302 results | Next Show Summaries | Hide Summaries Subscribe to search results (RSS)

View Results
Title none Type none Date down
Getting started with SSH security and configuration
Are you a new UNIX(R) administrator who needs to be able to run communication over a network in the most secure fashion possible? Brush up on the basics, learn the intricate details of SSH, and delve into the advanced capabilities of SSH to automate securely your daily system maintenance, remote system management, and use within advanced scripts to manage multiple hosts.
Also available in: Chinese   Korean  
Articles 09 May 2014
IBM AIX commands you should not leave home without
Do you ever wish you could answer some of your own questions when you work with IBM AIX® and your IBM Power Systems™ server? Do you ever feel you could save time by not having to call on the support professionals all the time? Well, wish no more. Shiv Dutta discusses some of the AIX commands that answer those questions and tells you how to enlarge the list of such answers.
Also available in: Chinese  
Articles 04 Apr 2014
The performance detective: Where does it hurt?
If you're up against a performance problem on the IBM AIX operating system, your most important task is to diagnose it correctly. When a user tells you "the system is running slowly," it's time for some detective work. You need to know what questions to ask to help you pinpoint the real issue. The first article of this two-part series demonstrates how describing a performance problem can help you identify the bottlenecks. Part 2 will look at some good practices that help prevent those bottlenecks in the first place.
Also available in: Chinese   Russian  
Articles 31 Jan 2012
VIOS disk mapping in a nutshell
Have you found yourself doing some kind of troubleshooting on servers which you have never touched before? Nowadays, working in huge companies or even as a consultant, you might not be able to avoid such situations. To avoid mistakes in VIOS and LPAR environments, this article will simply show you how to map disk devices within VIOS server without caring about name patterns. In the end, you will see how name patterns are important and how to bypass them if required.
Also available in: Chinese   Russian  
Articles 24 Jan 2012
Hardware migration using alt_disk_copy
The alt_disk_copy utility can be used to migrate your rootvg disks to new hardware. This method is practicable when you do not have the facility or resource of using remote network installs.
Also available in: Chinese   Russian  
Articles 17 Jan 2012
Using Storix
Recovering or building new machines running AIX is a straightforward process when you use Storix.
Also available in: Chinese   Russian  
Articles 10 Jan 2012
Optimizing internal AIX storage
Although SAN technology has taken the limelight when it comes to storage solutions, AIX systems still need to use internal storage. Whether you have small stand-alone servers or use a full system partition with all the resources available pooled together, internal storage is the typical medium for root volume groups and other smaller file system utilization. But when these disks are not planned out well, I/O bottlenecks, inefficient space utilization, and slower performance can occur. Learn how to optimize internal storage and lay things out properly.
Also available in: Chinese   Russian  
Articles 10 Jan 2012
Running with Tripwire
Tripwire is an intrusion detection system that monitors for file or directory changes based on the policy provided by the system administrator.
Also available in: Chinese   Russian  
Articles 13 Dec 2011
Managing VLANs on mission-critical shared Ethernet adapters
Shared Ethernet adapters (SEAs) can be used for IEEE 802.1Q VLAN tagging. However, once the SEA is in use, you cannot make changes to the VLANs on the trunk virtual Ethernet adapter without stopping the SEA. By using separate virtual adapters for each tagged VLAN, you can attach a new virtual adapter with its new VLAN to the SEA without any downtime. Retiring a VLAN from the SEA can be just as easy with a modular approach: one tagged VLAN per virtual adapter.
Also available in: Chinese   Russian  
Articles 06 Dec 2011
Manage LPAR startup order and validate resource allocation with system profiles
IBM Power Systems are built to stay powered up. On those rare occasions that a Power System does get powered down, it pays to be prepared when it comes time to start it up again. The logical partitions (LPARs) need to be activated, and it can be challenging to start them in the correct order. There is a simple way to establish your LPAR startup order: create a system profile via the Hardware Management Console (HMC). System profiles also alert you to resource conflicts between LPAR profiles. In addition, you can use system profiles to reconfigure server hardware quickly and easily.
Also available in: Chinese   Russian  
Articles 29 Nov 2011
LDAP client enhancements in AIX 7
Lightweight directory access protocol (LDAP) is a subset of the x.500 directory access protocol. LDAP maintains information of different objects and can be represented as user names, group names, file names, and more. The LDAP protocol allows the exchange of information between the LDAP client and LDAP server. Applications make use of the LDAP client to interact with LDAP servers to get the information for application request. This article can be used as a quick reference for understanding LDAP client features in AIX 6.1 and 7.1 releases.
Also available in: Chinese   Russian  
Articles 29 Nov 2011
Security authentication mechanism in AIX
Authentication mechanism verifies which users are allowed to access a system. Administrator can define authentication protocol; based on that protocol, users' credentials are verified, and users are given access to the system. AIX provides several authentication and identification modules. A user's authentication and identification are done based on the user's attributes on AIX. This article covers the user's authentication and identification attributes, load modules available in AIX, and a new authentication attribute introduced AIX 6.1 Tl07 and AIX 7.1 Tl1 releases.
Also available in: Chinese   Russian  
Articles 15 Nov 2011
Workload Partitioning (WPAR) in AIX 7.1
The most popular innovation of AIX 6.1 was clearly workload partitioning (WPARs). Once you get past the marketing hype, you'll need to determine the value that WPARs can provide in your environment. What can WPARs do that logical partitions (LPARs) could not? How and when should you use WPARs? Equally as important, when should you not use workload partitioning? Finally, how do you create, configure and administer workload partitions? These are some of the topics that we'll discuss in this article, and we'll look at some of the WPAR enhancements in AIX 7.1.
Also available in: Chinese  
Articles 15 Nov 2011
Get to know the VIOS CLI
Discover the syntax used by the Virtual I/O Server (VIOS) command-line interface (CLI). Get a feel for VIOS commands, their intuitive flags, and how close the VIOS commands are to IBM AIX operating system commands. If you know AIX, VIOS commands are easy to learn. If you're not familiar with AIX, learning to navigate the VIOS is a great stepping stone to understanding AIX better.
Also available in: Chinese  
Articles 08 Nov 2011
AIX and USB memory sticks
USB memory sticks are cheap, cheap, cheap. As long as your hardware has USB slots, using these memory sticks is an option to consider for files that require fast reads, large data copies, or temporary file storage. This article demonstrates how to mount a USB stick on your AIX box and use it for storage.
Also available in: Chinese   Russian  
Articles 01 Nov 2011
Safer than editing
Editing a critical system file such as /etc/passwd can be tempting, but if something goes wrong, your system can become unusable. The IBM AIX operating system provides several commands and System Management Interface Tool (SMIT) menus to help you manage system files without having to edit them directly. Built-in AIX commands can also check syntax before updating critical files, offering you extra protection for files you can't afford to lose.
Also available in: Chinese  
Articles 01 Nov 2011
AIX security commands: Part 2
Management of system administration is always a tedious task. Various tools and methods are available to handle administrative activities on a system. AIX 6.1 provides different security features that help to manage user and group administration and maintain integrity on a system. This articles provides a list commands which are enabled using these features.
Also available in: Chinese  
Articles 25 Oct 2011
Securing your DB2 file systems with EFS
From AIX 6.1 onwards, user created filesystems can now be encrypted, which is implemented at the file system level. This approach allows for some applications to be encrypted, with not much overhead maintenance. One such product that can be used for data encryption is DB2. The need to encrypt application data is becoming more common, especially if backups are taken and are moved off site, or the application resides on external sites. SOX even recommends that to maintain the confidentially of the data, encryption should be strongly considered. This article demonstrates how to create a DB2 database and encrypt it under AIX and looks at common EFS commands.
Also available in: Chinese  
Articles 25 Oct 2011
The Boost Serialization library
The Boost C++ libraries make it easier to write good code, but what happens when something goes wrong? Discover the Boost Serialization library and learn how to employ serialization in your code to make debugging easier in the future.
Also available in: Chinese  
Articles 19 Oct 2011
Tips for implementing NPIV on IBM Power Systems
Chris Gibson shares some tips for implementing NPIV in an AIX and Virtual I/O Server environment on IBM POWER7 systems.
Also available in: Chinese  
Articles 11 Oct 2011
Standardizing user UID and GID numbers on AIX
If you have more than one AIX server that uses local user accounts, you probably have some inconsistent user ID (UID) and group ID (GID) numbers across the different systems. This article explains how to standardize your UID and GID numbers across all of your AIX systems so that they are consistent.
Also available in: Chinese  
Articles 04 Oct 2011
Setting up a firewall with AIX TCP/IP filtering
The purpose of this article is to show how an AIX server can be configured to filter TCP/IP traffic using the operating systems built-in filtering capabilities. Audience for this article includes server and network administrators in the need of restricting the network traffic allowed to flow in and out of a server. This article applies to a broad set of scenarios, from hardening critical midrange database servers running in internal networks, to securing border servers handling Internet traffic, like web, DNS or email servers.
Also available in: Chinese  
Articles 04 Oct 2011
More locks for your SSH door
Security isn't an exact science, so the more difficulties you can put in a hacker's way, the better. This article considers how to enhance Secure Shell (SSH) access by eliminating passwords and using public/private key pairs instead. The article also explores how to recognize and block possible attacks, including brute-force and dictionary attacks, by denying server access to origins that are identified as unsafe.
Also available in: Spanish  
Articles 27 Sep 2011
When good disks go bad
It's never a matter of if a disk will fail, but when. So, what do you do when you're awakened at 2 o'clock in the morning because of file system, LVM, or SAN errors on an IBM AIX server? Or, better yet, how do you prevent them from waking you up in the first place? This article looks at strategies for managing disk resources to maximize availability, performance, and redundancy and provides techniques on how to recover from failures when good disks go bad.
Also available in: Chinese   Korean   Spanish  
Articles 20 Sep 2011
Introduction to Domain RBAC
This article provides data in simplified terms for using Domain RBAC to gain granular access on resources and objects. It also gives examples on implementing domain RBAC on resources.
Articles 20 Sep 2011
Give rootvg the space it needs
The root volume group (rootvg) is the lifeblood of your IBM AIX system. It contains the AIX operating system, but you can use it for a lot more than that. A rootvg may include paging space, system dump devices, data file systems, a copy of mksysb backups, a second instance of AIX (when you use multibos), and more. With all of those possible demands on the rootvg disk, it is a good idea to keep data file systems in their own volume group and give rootvg the space it needs.
Also available in: Chinese  
Articles 06 Sep 2011
Basics of Perl web portals
Perl is a powerful scripting language that can be used to perform small operations from the command line or power a complete web portal. Understanding techniques for making safe and secure Perl CGI scripts is vital to developing a web portal that does not compromise the integrity of a server or the web site's data. This article explains several techniques that will help developers create secure Perl CGI scripts and handle errors, before looking at a simpler method for building web applications like portals using the Plack system.
Also available in: Chinese   Korean  
Articles 30 Aug 2011
Solaris to AIX
Are you moving away from Oracle or Sun Microsystems equipment to IBM System p servers? Are you more familiar with zones and LDOMs than HMCs and VIO servers? This article provides practical tips for migrating from Solaris to IBM AIX servers.
Also available in: Chinese   Spanish  
Articles 24 Aug 2011
Information Lifecycle Management for AIX data using IBM SONAS
Leverage information management facilities of IBM Scaled Out Network Attached Storage(IBM SONAS) to keep AIX data managed. IBM SONAS provides you with data placement, migration and deletion policies to ease your burden of Information Lifecycle Management for AIX data and helps ensure compliance to government regulations. This article takes a deep dive to illustrate how responsibilities of AIX data management are efficiently delegated to IBM SONAS.
Also available in: Chinese  
Articles 16 Aug 2011
Get proactive with limitations in COBOL multithreading
Often businesses and government agencies need to run COBOL programs faster by running them as multithreaded applications. In reality, COBOL multithreading comes with some limitations. In this article, the author explains the pitfalls of limitations and how to handle them.
Also available in: Chinese  
Articles 26 Jul 2011
Using traps in your scripts
For scripts to be reasonably robust, one of the conditions that should ideally be met is the ability to clean up any temporary logs or processes left lying around from a forceful termination. Another element to consider is when an interrupt from a user is received, what appropriate action should be taken? With the shell built-in trap command and the logger utility, these can help to provide your scripts with more robustness when a script is forcefully terminated. In this article, I will demonstrate ways trap and logger can be used.
Also available in: Chinese  
Articles 26 Jul 2011
AIX pluggable authentication modules
Pluggable authentication module (PAM) supports authentication mechanism. Applications can make use of this module for implementing authentication mechanism in AIX. PAM provides different service modules, and each module supports different functionality. Make use of these PAM service modules to enable PAM with authentication, account, password, and session management mechanisms in AIX.
Also available in: Chinese  
Articles 19 Jul 2011
Move data quickly between AIX LPARs using Logical Volume Manager
Migrating data from one LPAR to another can be challenging. You need to set aside some disk space on the new LPAR and create file systems. And whether you choose to copy the data across the network or do a backup and restore, a large amount of data can take many hours to move. Wouldn't it be good if you could gift wrap your data, send it to a new LPAR, and then unwrap it ready to use? The IBM AIX operating system Logical Volume Manager (LVM) lets you do just that by exporting a volume group from one LPAR and importing it to another one.
Also available in: Chinese  
Articles 19 Jul 2011
Build a scalable open source web application using Moonlight on BSD UNIX
Have you ever built a web application that performed sluggishly, because you tried to display too many columns or rows? Moonlight is an open source implementation of Microsoft's Silverlight technology that allows large, complex web applications to perform robustly, even though they have large amounts of data to process or display. In this article, we will show you how to install Moonlight on BSD UNIX and then build an application with hundreds of columns and thousands of rows using Moonlight. No prior Moonlight experience is required.
Also available in: Chinese  
Articles 12 Jul 2011
Using TCP Wrappers to control access
TCP Wrappers allows system administrators to control and log incoming TCP-based connections to the local host run from inetd.conf. TCP wrappers, often called wrappers, can lock down popular TCP inbound clients on your AIX box quickly. Find out how wrappers can easily protect and secure your machines.
Also available in: Chinese  
Articles 12 Jul 2011
Planning Active Memory Expansion
This article helps to understand the Active Memory Expansion concept and how to use the amepat tool to achieve the benefits of Active Memory Expansion.
Also available in: Chinese  
Articles 28 Jun 2011
Generating AIX audit reports
Using the AIX audit produces a lot of records that are triggered by the configured events on the system. These events need to be kept for an external audit reviewer. However, for day-to-day internal reports, a lot of these events can be filtered out, and the remaining records can be used to produce a more centered, daily audit report. AIX provides the auditselect utility to extract records; however, if you know what record types you need extracted, then the awk utility suffices.
Also available in: Chinese  
Articles 28 Jun 2011
Migrating data
Migrating or copying data is a frequent task that system administrators carry out often. There are various tools available for these tasks, including cp, tar, and cplv.
Also available in: Chinese   Spanish  
Articles 21 Jun 2011
Building your Power Systems server without data center access
You can configure your brand new IBM Power Systems server without getting up from your seat. Learn how to build your virtual I/O server, a network installation manager server, and your AIX partitions remotely.
Also available in: Chinese  
Articles 14 Jun 2011
Speaking UNIX: Extreme shell makeover
Break out the caffeine, elbow grease, and your text editor. It's time to turn your UNIX shell into a hot rod. It's time for an extreme shell makeover.
Also available in: Chinese   Korean   Spanish  
Articles 14 Jun 2011
End-to-end data protection using T10 standard data integrity field
This article provides an overview of end-to-end data protection as provided by implementing the T10 standard data integrity field (DIF). In addition, it provides configuration information and restrictions based on the current implementation for Power Systems. Reading this article provides the information required to set up a Power System for T10 DIF within the current constraints and an overview of how it is implemented.
Also available in: Chinese  
Articles 24 May 2011
Multithreaded data structures for parallel computing
Everyone is talking about parallel computing; it's all the rage. In this first article of a two-part series on multithreaded structures, learn how to design concurrent data structures in a multithreaded environment using the POSIX library.
Also available in: Chinese   Korean   Russian  
Articles 17 May 2011
Wiki structure for AIX documentation
This article provides a structure, configuration, and methodology for building and maintaining an automated wiki server for your AIX technical documentation. One of the most difficult tasks associated with system administration is maintaining a centralized documentation repository and enforcing standards for documentation in the repository. The wiki environment helps to create a standardized look-and-feel for your documentation repository and provides an easy to maintain environment for all contributors to the repository.
Also available in: Chinese  
Articles 10 May 2011
New to AIX and UNIX
The AIX and UNIX zone of developerWorks contains articles, tutorials, and tips to help developers with AIX and UNIX application development and system administration. For users trying to find their way in a new topic, all of that information can be overwhelming. This page provides an overview for readers who would like to learn about AIX and UNIX but don't know where to start.
Also available in: Korean  
Articles 26 Apr 2011
Capturing screen shots and program interaction on UNIX and Linux systems: Part 3, Advanced graphical screen and window capture
Capturing screen images of applications is something that all technical writers, most graphical application developers, many technical marketing staff members, and even many users need to do. Modern UNIX systems provide a number of different tools to capture graphical screens and single windows. This article, the final of three-part series, focuses on graphical tools that are available for most Linux and UNIX systems. These tools make it easy to capture graphical portions of the screen to help illustrate both proper and improper program behavior.
Also available in: Chinese   Korean  
Articles 26 Apr 2011
Capturing screen shots and program interaction on UNIX and Linux systems: Part 2, Simple graphical screen and window capture
Capturing screen images of applications is something that all technical writers, most graphical application developers, many technical marketing staff members, and even many users need to do. Modern UNIX systems provide a number of different tools to capture graphical screens and single windows. This article, the second of three, focuses on tools that are present on every Linux and UNIX system that uses the X Window System. These tools make it easy to capture graphical portions of the screen to help illustrate both proper and improper program behavior.
Also available in: Chinese   Korean  
Articles 19 Apr 2011
Beat the AIX Security Expert gotchas
The AIX Security Expert (AIXPert) makes implementing security a breeze, but it does have some traps for the uninitiated. Once you're aware of them, AIXPert is a natural choice for security hardening. So, if you want to secure your system without leaving yourself locked out in the rain, this article is for you.
Also available in: Chinese  
Articles 19 Apr 2011
SSL configuration for IBM Tivoli Directory Server 6.0
Gain an overview of SSL configuration for IBM Tivoli Directory Server 6.0 on the AIX 5L operating system. Learn about command line configuration steps for SSL key database creation, certificate creation, certificate extraction, SSL authentication mechanisms, troubleshooting for SSL issues, and steps to perform LDAP client-server communication.
Also available in: Chinese  
Articles 18 Apr 2011
Virtualization technologies for agile software development
Virtualization is a modern approach for enhancing a system's ability for sharing system resources to ensure provisioning can readily meet business requirements. Agile development helps us ascertain stakeholder inputs with changing business and market requirements in software development. This article explains different virtualization technologies that can be used in agile software product development life cycle.
Also available in: Chinese   Korean  
Articles 08 Mar 2011
C++0x feature support in GCC 4.5
If you're one of the many users of the GCC C++ compiler, you should be aware of the new features that the upcoming C++0x specification has in store and available in GCC version 4.5.
Also available in: Chinese   Korean  
Articles 01 Mar 2011
Speaking UNIX: Introduction to emerging file systems
In UNIX, everything can be a file, but not every file is stored the same way. A file system dictates how a file is decomposed and organized on media. Historically, media meant tape or disk. But increasingly, file systems now translate virtually any source - remote server, archive file, even other file systems - into virtual media. Here's a look at some novel file systems.
Also available in: Chinese   Korean  
Articles 15 Feb 2011
Guide to selecting a multipathing path control module for AIX or VIOS
This guide will assist a client in making the decision on identifying and deciding on which path control module to use in their AIX environment. The major functions for path control or multipathing are discussed and compared.
Also available in: Chinese  
Articles 08 Feb 2011
Using the GNU Virtual Private Ethernet
Providing a secure communication conduit implies many different issues and problems, such as how you provide an effective communication channel that is capable of handling multiple streams of information. Using the GNU Virtual Private Ethernet (GVPE) provides an alternative to the normal single or multiple channel solutions by effectively emulating the entire network stack and allowing you to build TCP, UDP and other network technologies on top of the virtual environment. This article examines ways of using GVPE with your applications to provide communication, and of using GVPE with your Web sites to provide secure connectivity over private and public networks. In particular, you'll learn about using GVPE with distributed infrastructure projects, such as Amazon EC2, clouds, or public/private web performance deployments.
Also available in: Chinese   Korean  
Articles 01 Feb 2011
Speaking UNIX: Creating great graphical applications with shell scripts
The command line isn't suitable for every user. Indeed, some users may only feel comfortable when armed with a mouse. To accommodate those users or build custom desktop applications using only the shell, add GUIs to your scripts. Here's how you can do it.
Also available in: Chinese   Korean  
Articles 25 Jan 2011
Practical AIX troubleshooting
What do you do when things don't exactly work as planned? How do you tackle those really good, head-scratching problems in AIX where servers don't seem to work right? In this article, you'll learn the basic skills of troubleshooting AIX in practical, day-to-day situations.
Also available in: Chinese  
Articles 19 Jan 2011
Customizing the vi and Vim editors
The vi (visual) text editor is the oldest screen-oriented editor that is still provided by default on all UNIX, Linux, and other UNIX-like systems. Due to some combination of its age and its underlying editing model, vi doesn't always get the respect that it deserves, but it is an incredibly fast and dependable tool that every UNIX and Linux administrator should know how to use. Vim (vi improved) is a commonly-used modern clone of vi and extends the capabilities of vi in a variety of ways while remaining backward compatible. This article explains how to customize vi and Vim in multiple ways, ranging from simple configuration settings to defining your own commands.
Also available in: Chinese   Korean  
Articles 18 Jan 2011
Basic understanding and troubleshooting of LPM
This article can teach you how to configure and troubleshoot LPM. It also includes a brief explanation of LPM basic concepts, troubleshooting problems, and easy to fix solutions for assorted problems.
Also available in: Chinese  
Articles 27 Dec 2010
Setting up IBM DB2 database for IBM Systems Director 6.2
IBM Systems Director is the core IBM platform management product for managing data center devices. A default Systems Director installation includes the Apache Derby database as its data repository. If your environment has more than 500 devices under management, it's highly recommended you switch to a full-fledge database management system, such as IBM DB2. This article will show you how to prepare the DB2 instance and database and how to make the switch in conformance with DB2 best practices.
Also available in: Chinese  
Articles 07 Dec 2010
The performance detective, part 2: Prevention is better than cure
This second article in a two-part series on managing system performance looks at preventing performance problems. By keeping your system well tuned, you can avoid a lot of stress. There are also steps you can take so that when the system does start to choke, you're ready to identify the bottlenecks quickly and know where to go for help.
Also available in: Chinese  
Articles 01 Dec 2010
Optimizing AIX 7 network performance: Part 2, NFS monitoring and tuning
This three-part series on AIX 7 networking focuses on the challenges of optimizing network performance. With AIX 7 being used more frequently in network deployment environments and with common use of workload partitions to help manage your resources, you must be aware of all the different applications and environments you need to optimize your network deployment. Part 2 focuses on tuning NFS. You'll learn about monitoring utilities such as nfsstat and nmon, and you'll also tune with nfso. The series also offers best practices for network I/O performance tuning.
Also available in: Chinese  
Articles 30 Nov 2010
Optimizing AIX 7 network performance: Part 1, Network overview - Monitoring the hardware
This three-part series on AIX 7 networking focuses on the challenges of optimizing network performance. With AIX 7 and the new POWER7 architecture, you have to think about the performance of your system, and also the effects of your network performance on both LPAR and WPAR environments. In the first installment, you'll review some best practices for network configuration and utilize those practices for efficient monitoring of your hardware by taking advantage of network tools such as netstat, netpmon, entstat, and nmon. You'll also examine certain tools used to look at your interfaces to see how to configure them.
Also available in: Chinese  
Articles 23 Nov 2010
Up and down the directory tree
The cd command you use to change directories is one of the first UNIX shell commands you learn, and it's remarkably versatile. Learn some shortcuts that make it even easier for you to zip around between directories. Also, find out how to make good use of some common variables that help cd work for you.
Also available in: Chinese   Korean  
Articles 18 Nov 2010
AIX networking
Have you ever been perplexed on how to configure networking devices on AIX servers? Confused by the ins and outs of default routes, IP aliases, and logical versus physical devices? In this article, you can get the basics of configuring network devices and learn how to get your System p servers communicating.
Also available in: Chinese  
Articles 16 Nov 2010
AIX higher availability using SAN services
Learn the scenarios in which remapping, copying, and reuse of SAN disks is allowed and supported. More easily switch AIX environments from one system to another and help achieve higher availability and reduced down time. These scenarios also allow for fast deployment of new systems using cloning.
Also available in: Chinese  
Articles 10 Nov 2010
Developing custom plug-ins for the Vim editor
Learn how to extend the popular and versatile Vim editor to suit your systems administration needs using Vim's custom scripting language and options such as Perl and Python.
Also available in: Chinese   Korean  
Articles 09 Nov 2010
Optimizing AIX 7 memory performance: Part 2, Monitoring memory usage (ps, sar, svmon, vmstat) and analyzing the results
Use ps, sar, svmon, and vmstat to monitor memory usage and analyze the results. This three-part series focuses on the various aspects of memory management and tuning on IBM System p servers running AIX 7, including taking advantage of the POWER7 CPU to improve memory usage within LPARs. Part 2 of the series focuses on the detail of actual memory subsystem monitoring and discusses how to analyze the results. Throughout the series, we also cover some of the best practices of memory performance tuning and monitoring.
Also available in: Chinese  
Articles 09 Nov 2010
IBM SONAS storage for AIX and Linux environment
Go beyond scale up and use the power of scale out via IBM Scale Out Network Attached Storage (IBM SONAS). IBM SONAS easily integrates with existing UNIX environments and can be deployed instantaneously for business data storage. This article introduces you to the basic IBM SONAS setup and how it can be leveraged in UNIX environment like AIX for centralized data storage.
Also available in: Chinese  
Articles 02 Nov 2010
Optimizing AIX 7 memory performance: Part 1, Memory overview and tuning memory parameters
AIX 7 takes advantage of the POWER7 CPU to improve memory usage within LPARs. While memory tuning might be more difficult to implement than processor or disk tuning, it is no less important. You can do more to tune memory on an AIX 7 server than on any other subsystem. Changing some memory parameters on your system can increase performance dramatically, particularly when these parameters are not optimized for the environment which you are running. This three-part series on memory tuning dives right into tuning parameters focusing on the many challenges and the various best practices of optimizing memory performance, and it also discusses some improvements in AIX 6 and AIX 7. Part 1 provides an overview of memory on AIX 7, including a discussion of virtual memory and the Virtual Memory Manager (VMM).
Also available in: Chinese  
Articles 02 Nov 2010
Optimizing AIX 7 performance: Part 3, Tune with ioo, filemon, fileplace, JFS and JFS2
Part 3 of the AIX 7 performance series covers how to improve overall file system performance, how to tune your systems with the ioo command, and how to use the filemon and fileplace utilities. You will also learn about JFS and JFS2 that is available in AIX 7.
Also available in: Chinese  
Articles 26 Oct 2010
Using Open PGP
GnuPG (gpg) is a free encryption package, originally based on the Open PGP (Pretty Good Privacy) project. Users can encrypt and send files to trusted users, providing the file was encrypted with the intended recipients' public key. The recipient then uses their own private key to decrypt the file.
Articles 19 Oct 2010
Optimizing AIX 7 performance: Part 2, Monitoring logical volumes and analyzing the results
Discover how to use appropriate disk placement prior to creating your logical volumes to improve disk performance. These investigations are based on AIX 7 beta and updating information from the original AIX 5L version of this article. Part 2 of this series focuses on monitoring your logical volumes and the commands and utilities (iostat, lvmstat, lslv, lspv, lsvg) used to analyze results.
Also available in: Chinese  
Articles 19 Oct 2010
Bash scripting for beginning system administrators
If you're new to Linux or UNIX administration and want to get up to speed on bash scripting techniques, or you're a Windows engineer running something like a Cygwin UNIX sub-shell on your system, you need to know the hows, whys, and how-to's for bash shell scripting. Learn everyday usage of bash on a UNIX or Linux system; see how to become a bash power user by chaining bash commands together; and dive into variables, syntax structure, and loops in bash.
Also available in: Chinese   Korean  
Articles 12 Oct 2010
Optimizing AIX 7 performance: Part 1, Disk I/O overview and long-term monitoring tools (sar, nmon, and topas)
Learn more about configuring and monitoring AIX 7 based on the investigations of AIX 7 beta compared to the original articles based on AIX 5L. The article covers the support for direct I/O, concurrent I/O, asynchronous I/O, and best practices for each method of I/O implementation. This three-part series on the AIX disk and I/O subsystem focuses on the challenges of optimizing disk I/O performance. While disk tuning is arguably less exciting than CPU or memory tuning, it is a crucial component in optimizing server performance. In fact, partly because disk I/O is your weakest subsystem link, you can do more to improve disk I/O performance than on any other subsystem.
Also available in: Chinese  
Articles 12 Oct 2010
SSH restriction
Restrict access to SSH users connecting to your host by utilising the users, group, and deny/allow stanzas. TCP Wrappers can also be used on a host-by-host basis.
Also available in: Chinese   Korean  
Articles 05 Oct 2010
Writing clean, testable, high quality code in Python
Catastrophically bad code can be written in any language, including the elegant and powerful Python language. In this article, we explore how thinking about testing actually produces dramatically different Python code. Lastly, we learn how to measure scientifically the difference.
Also available in: Chinese   Korean  
Articles 28 Sep 2010
Controlling su access with sugroups
Using sugroups allows system administrators to restrict access on who can su to what account, even if the users know the password, by grouping users into sugroups.
Also available in: Chinese   Korean  
Articles 28 Sep 2010
Speaking UNIX: Interprocess communication with shared memory
UNIX provides a number of technologies for interprocess communication, or cooperative computing between two or more applications. Shared memory is the fastest and most flexible of the techniques and is surprisingly easy to implement.
Also available in: Chinese  
Articles 28 Sep 2010
REST application programming
Tired of waiting on the GUI to access your energy data? Want to access your data quickly, even at remote locations? With some basic Java programming skills, and investment of your time, you can take advantage the powerful capabilities of the Active Energy Manager REST APIs. This article starts with a basic understanding of REST and RESTful programming and concludes with the development of a AEM REST program for accessing and reporting power usage metrics.
Also available in: Chinese  
Articles 21 Sep 2010
Memory allocation mechanisms in AIX
Memory management is one of the most important responsibilities of an operating system. It allocates portions of memory to programs at their request and frees it for reuse when no longer needed. This article describes different allocation algorithms which are available in AIX for memory management and their features.
Also available in: Chinese  
Articles 21 Sep 2010
Boost network performance with libevent and libev
Building a modern server application requires a method of accepting hundreds, thousands, and even tens of thousands of events simultaneously, whether they are internal requests or network connections effectively handling their operation. There are many solutions available, but the libevent library and libev libraries have both revolutionized the performance and event handling capability. In this article, we will examine the basic structure and methods available for using and deploying these solutions within your UNIX applications. Both libev and libevent can be used in your high performance applications, including those deployed within the IBM Cloud or Amazon EC2 environment, where you need to support large numbers of simultaneous clients or operations.
Also available in: Chinese   Korean  
Articles 21 Sep 2010
Speaking UNIX: Managing multitudes of machines the mild-mannered way
Cloud computing may currently be all the rage, but there is a silicon lining to each calculating cumulus: hardware and software require very real upkeep. Learn how to manage gobs of machines right from the command line.
Also available in: Korean  
Articles 14 Sep 2010
Debugging Java applications using ProbeVue
Vue language syntaxes, probing several Java function types, is explained, as well as ways of accessing their arguments and header file structure. Key points and limitations for writing Vue script are also mentioned.
Also available in: Chinese  
Articles 07 Sep 2010
IBM AIX 7
The IBM AIX operating system is an open standards-based UNIX operating system. It provides a highly scalable IT infrastructure for client workloads ranging from small department systems to enterprise-class workloads, such as data mining, database, transaction processing, and high-performance computing. The latest version, AIX 7.1, includes significant new capabilities for virtualization, security features, availability features, and manageability. AIX V7.1 is the first generally available version of AIX 7.
Also available in: Chinese   Korean  
Articles 07 Sep 2010
Three locks for your SSH door
Security always requires a multi-layered scheme. SSH is a good example of this. Methods range from simple sshd configuration through the use of PAM to specify who can use SSH, to application of port-knocking techniques, or to hide the fact that SSH access even exists. Applying these techniques can make life much harder for possible intruders, who will have to go past three unusual barriers.
Also available in: Chinese   Korean   Russian  
Articles 31 Aug 2010
Password expiry
Without a doubt, password policy is an audit requirement. If audited, as a system administrator you will need to prove your policy with ad-hoc reports and listings.
Also available in: Chinese   Korean  
Articles 31 Aug 2010
Heterogeneous IPSec solution between AIX and Windows
Internet security is a major concern. Internet Protocol Security (IPSec) is a framework for a set of protocols that helps you implement security at the IP packet level. IPSec works across heterogeneous environments to create secure tunnels for safer transactions. This article talks about what you can gain from configuring IPSec to a heterogeneous environment between AIX and Windows.
Also available in: Chinese  
Articles 24 Aug 2010
Introduction to PowerHA
PowerHA for AIX is the new name for HACMP (High Availability Cluster Multiprocessing). HACMP is an application that makes system fault resilient and reduces downtime of applications. This article introduces PowerHA and provides a detailed explanation of how to configure a two node cluster. Considering the demand for this configuration from various customers, this document is very useful for understanding PowerHA and setting up a two node cluster.
Also available in: Chinese  
Articles 17 Aug 2010
Integrated IBM Systems Director via REST API
IBM Systems Director version 6.1 is a platform management foundation that streamlines the way physical and virtual systems are managed across a multi-system environment. IBM Systems Director version 6.1.2 provides RESTful web services which allows users to utilize System Director's powerful management tasks by simply relying on named resources rather than its web console and command line. This article gives you the experience on how to make customer system management software integrated with IBM Systems Director via the RESTful web services. Besides learning to use the RESTful web service client to implement the basic task of IBM Systems Director, this paper will introduce to you how to receive the asynchronized message from IBM Systems Director.
Articles 10 Aug 2010
Network problem determination: AIX tools for a system administrator: Part 2, Detailed diagnosis and troubleshooting
This two-part series discusses the tools that can assist the systems administrator in diagnosing TCP/IP network-related issues on AIX. In this installment, get under the covers to see what is really going on when your host has problems communicating with another. A step-by-step guide to logical problem diagnosis is also provided.
Also available in: Chinese  
Articles 03 Aug 2010
vi tips and tricks: Ten cool commands sure to impress your friends
Amaze your friends with cool vi tips and tricks that will improve the efficiency of your file editing. This article takes you through ten of the less well-known vi commands that should form part of any serious vi user's toolkit.
Also available in: Chinese   Korean  
Articles 27 Jul 2010
Speaking UNIX: Get to know Ksplice
Ksplice applies kernel patches on-the-fly - no reboot required - in a fraction of a second. Here's a hands-on guide to performing painless system updates.
Also available in: Chinese   Korean   Portuguese  
Articles 27 Jul 2010
Network problem determination: AIX tools for a system administrator: Part 1, The basics of network troubleshooting
This two-part series discusses the tools that can assist the systems administrator in diagnosing TCP/IP network-related issues on AIX. This first installment details testing connectivity to a host, getting useful network-related information about a host, and analyzing data sent to and from a host.
Also available in: Chinese  
Articles 20 Jul 2010
The VIO cheat sheet
Do you want to consolidate multiple AIX systems under a single System p server in ways that maximize your investment return on disk and network resources? Have you been confused about technical terms like SEAs, IVE, or NPIV? This article introduces you to the latest AIX technology, virtual I/O, and provides a cheat sheet on how to set up a simple yet robust server and client environment.
Also available in: Chinese  
Articles 20 Jul 2010
Using the AIX Logical Volume Manager to perform SAN storage migrations
This article provides examples of how to migrate AIX systems from old to new SAN storage subsystems. It will cover both dedicated and virtual I/O systems. We will examine IBM and non-IBM storage migrations, using the AIX Logical Volume Manager (LVM).
Also available in: Chinese  
Articles 13 Jul 2010
AIX A-Z: Managing printing on AIX
Learn how to use the AIX command line to configure and manage print queues easily.
Articles 29 Jun 2010
AIX V6.1 Remote Login Session Management
Regulatory compliances require systems to implement automatic logoff of sessions to enable secure environment. UNIX based solutions tend to make extensive use of utilities like FTP, TELNET and SSH whose sessions are required to be configured for automatic timeout. This article explains the relationship between automatic logoff and various regulatory compliances. Subsequently, it steps through the administrative procedure required to configure it for FTP, TELNET and SSH over AIX V6.1.
Also available in: Chinese  
Articles 22 Jun 2010
Capturing screen shots and program interaction on UNIX and Linux systems: Part 1, Program interaction
Taking screen shots and capturing interaction between a program and user is something that all technical writers, most developers, and many technical marketing staff need to do. Modern UNIX systems provide a number of different tools to capture the text-oriented interaction between a user and a specific program and to capture graphical screens and single windows. This article, the first of three, focuses on different ways to keep a record of the interaction between a user and a command-line application. Capturing user input and program output is valuable, not just for internal or external documentation, but also for use as a common debugging mechanism for many application developers.
Also available in: Chinese   Korean  
Articles 22 Jun 2010
Security considerations over distributed environment using DCE security framework
Most of the businesses today are running over a distributed environment. Security and integrity of the data flowing over the network is, therefore, of utmost importance for the business units. The DCE security framework essentially does the same for such business needs. Most of the present day distributed environment based business services are using the basics of DCE security. Primarily the DCE security service, with additional new services and facilities, is based on the Kerberos system. This article is targeted to understand the basic concepts and implementation of security mechanisms being used in distributed environment and how the whole idea of DCE security is related to Kerberos.
Also available in: Chinese   Korean  
Articles 15 Jun 2010
The PowerHA for AIX (formerly HACMP) cheat sheet
Do you want to set up a redundant environment for high availability but don't know how AIX can help you? Discover PowerHA (formerly HACMP) and gain a cheat sheet on how to configure and set up a simple two-node cluster.
Also available in: Chinese  
Articles 15 Jun 2010
AIX Technology Level update strategies
As an AIX system administrator, you know the importance of keeping the systems up to date. Unfortunately, this is always a little tricky and, sometimes, due to the size of the environments, very hard to accomplish. This article shows the many ways available to update an AIX server.
Also available in: Chinese  
Articles 08 Jun 2010

1 - 100 of 302 results | Next Show Summaries | Hide Summaries Subscribe to search results (RSS)