|Optimizing internal AIX storage
Although SAN technology has taken the limelight when it comes to storage solutions, AIX systems still need to use internal storage. Whether you have small stand-alone servers or use a full system partition with all the resources available pooled together, internal storage is the typical medium for root volume groups and other smaller file system utilization. But when these disks are not planned out well, I/O bottlenecks, inefficient space utilization, and slower performance can occur. Learn how to optimize internal storage and lay things out properly.
|Articles||10 Jan 2012|
|Build a scalable open source web application using Moonlight on BSD UNIX
Have you ever built a web application that performed sluggishly, because you tried to display too many columns or rows? Moonlight is an open source implementation of Microsoft's Silverlight technology that allows large, complex web applications to perform robustly, even though they have large amounts of data to process or display. In this article, we will show you how to install Moonlight on BSD UNIX and then build an application with hundreds of columns and thousands of rows using Moonlight. No prior Moonlight experience is required.
|Articles||12 Jul 2011|
|Concurrent programming with Boost using IPC and MPI libraries
The Boost C++ libraries make concurrent programming fun and straightforward. Learn how to use two of the Boost libraries - the Interprocess (IPC) library and the Message Passing Interface (MPI) - to implement functionality, such as shared memory objects, synchronized file locking, and distributed communication.
|Articles||03 May 2011|
|Capturing screen shots and program interaction on UNIX and Linux systems: Part 3, Advanced graphical screen and window capture
Capturing screen images of applications is something that all technical writers, most graphical application developers, many technical marketing staff members, and even many users need to do. Modern UNIX systems provide a number of different tools to capture graphical screens and single windows. This article, the final of three-part series, focuses on graphical tools that are available for most Linux and UNIX systems. These tools make it easy to capture graphical portions of the screen to help illustrate both proper and improper program behavior.
|Articles||26 Apr 2011|
|Heterogeneous IPSec solution between AIX and Windows
Internet security is a major concern. Internet Protocol Security (IPSec) is a framework for a set of protocols that helps you implement security at the IP packet level. IPSec works across heterogeneous environments to create secure tunnels for safer transactions. This article talks about what you can gain from configuring IPSec to a heterogeneous environment between AIX and Windows.
|Articles||24 Aug 2010|
|Introduction to PowerHA
PowerHA for AIX is the new name for HACMP (High Availability Cluster Multiprocessing). HACMP is an application that makes system fault resilient and reduces downtime of applications. This article introduces PowerHA and provides a detailed explanation of how to configure a two node cluster. Considering the demand for this configuration from various customers, this document is very useful for understanding PowerHA and setting up a two node cluster.
|Articles||17 Aug 2010|
|vi tips and tricks: Ten cool commands sure to impress your friends
Amaze your friends with cool vi tips and tricks that will improve the efficiency of your file editing. This article takes you through ten of the less well-known vi commands that should form part of any serious vi user's toolkit.
|Articles||27 Jul 2010|
|Configure OpenSSH Public Key Authentication with EFS on AIX 6.1.0, TL 4
OpenSSH is a free tool that includes the implementation of SSH1 and SSH2 protocols. It is a reliable and secure tool that is widely used to replace r-commands. Communication over the ssh session is encrypted and secure as it encrypts all the traffic, including passwords. Prior to this, OpenSSH provided support for opening of the keystore and loading of the keys in the kernel automatically in case of password authentication. But public key authentication does not involve passwords. This article describes how to configure EFS keystore access while OpenSSH Public Key Authentication is used. It explains the procedure for automatic opening of EFS Keystore when ssh public key authentication is used to log on to remote system.
|Articles||18 May 2010|
|Adding DTrace probes to your applications
DTrace provides a rich environment of probes that can be used to monitor the execution of your system, from the kernel up to your application. You can perform a significant amount of examination without changing your application, but to get detailed statistics, you need to add probes to your application. In this article, we will examine how to design the probes, where to add them into your application, the best locations for the probes, and how to effectively build and use the probes that you have added.
|Articles||04 May 2010|
|NcFTP: The flexible FTP client
The NcFTP client can provide an efficient method of FTPing. With NcFTP, you can run commands from the command line, which makes it ideal for scripting. NcFTP can also resume a failed FTP transfer, as well as provide batch processing facilities. This article describes how the NcFTP client is very useful in ad hoc FTP transfers and explains how to use the client utilities within scripts.
|Articles||20 Apr 2010|
|Fun with Sendmail on AIX
Using Sendmail on AIX may be considered a thing of the past, with all the available choices for mail servers on the market. However, Sendmail still has its uses. This article provides some tips and tricks for using Sendmail on AIX.
|Articles||06 Apr 2010|
|Active Memory Sharing with dual Virtual I/O Servers and Live Partition Mobility
Dual Virtual I/O Server configurations and Live Partition Mobility are widely used in PowerVM environments to provide high availability and flexibility for virtualized logical partitions. Both of these features can also be used with Active Memory Sharing. In this article, learn how to take advantage of dual Virtual I/O Server configurations and Live Partition Mobility for shared memory partitions.
|Articles||30 Mar 2010|
|Debugging C++ applications using ProbeVue
Learn various ways you can debug C++ applications using ProbeVue. Get an explanation of Vue language syntaxes for probing several function types in C++, learn how to access their arguments, and explore the structure of header files. This article also explains several limitations, while providing key points for writing Vue script.
|Articles||02 Mar 2010|
|Open source C/C++ unit testing tools, Part 3: Get to know CppTest
In this third and final article in the series on open source unit testing utilities, get to know CppTest, a simple and easy-to-use framework for developing unit tests.
|Articles||23 Feb 2010|
|Looking back at the tops from AIX and UNIX
||Articles||22 Dec 2009|
Using RPC programming is one of the most powerful and efficient ways to ensure communication between client and server entities. It forms the basis for almost any application running on distributed computing environments. This article deals with the basic flow of events between an RPC client and server and later deals with runtime handling of these events. The different routines that are dealt in this article are categorized appropriately and described based on their functionality.
|Articles||24 Nov 2009|
The alt_disk_copy is a built-in AIX utility that allows the cloning of a running rootvg. alt_disk_copy is typically used for upgrades that effect the running of AIX, cloning of disks for migration, and online backups of rootvg.
|Articles||10 Nov 2009|
|Resource controls in workload partitions
Resource control in workload partitions is based on the Workload Manager (WLM) technology that has been available in the AIX kernel since IBM AIX V4.3.3. The workload partition (WPAR) resource control encapsulates and extends the WLM technology. It presents a layer of abstraction above WLM, making it easier to administer resource control without having a need to possess an in-depth knowledge of WLM.
|Articles||25 Aug 2009|
|Speaking UNIX: Man oh man
UNIX has hundreds if not thousands of commands, and it's impossible to remember every option and nuance. But, happily, you don't have to: man, UNIX's built-in, online reference system, is man's best friend.
|Articles||28 Jul 2009|
|Speaking UNIX: 10 great tools for any UNIX system
The universe of UNIX tools changes constantly. Here are 10 tools -- some you may have overlooked and some new -- to tinker with.
|Articles||12 May 2009|
|Multiprocessing with Python
Learn to scale your Unix Python applications to multiple cores by using the multiprocessing module which is built into Python 2.6. Multiprocessing mimics parts of the threading API in Python to give the developer a high level of control over flocks of processes, but also incorporates many additional features unique to processes.
|Articles||24 Mar 2009|
|IBM System Planning Tool (SPT) and the System p
The System Planning Tool (SPT) is a wonderful utility that is a must for any System p architect or administrator. It is browser-based, and helps you architect your entire managed system by assisting in the planning, design, and validation of your system. Furthermore, it is tightly integrated with the IBM System Workload Estimator (WLE), which allows you to plan systems based upon either existing or new workloads. Follow along in this article for details on how to install and get the most from this important tool.
|Articles||23 Sep 2008|
|Korn shell scripting
Korn shell scripting is something all UNIX users should learn how to use. Shell scripting provides you with the ability to automate many tasks and can save you a great deal of time. It may seem daunting at first, but with the right instruction you can become highly skilled in it. This article will teach you to write your own Korn shells scripts.
|Articles||17 Jun 2008|
|Automatic generation of configuration data for HACMP/XD-PPRC
HACMP/XD uses PPRC mirroring technology to provide disaster recovery for critical applications' data. To achieve high availability for distributed applications over extended distances, administrators need to configure PPRC in an HACMP/XD environment. This involves collecting configuration data from the storage as well as from the cluster nodes; at times this can be tedious. This article shows you how, using pprc4hacmp, configuration data is generated for HACMP/XD-PPRC automatically.
|Articles||13 May 2008|
|Speaking UNIX: Booting up
Ever wonder what makes a computer tick or how a UNIX server does what it does? For those who wonder what happens when you push the power button on your computer, here's your inside look. This article discusses the different boot types, managing the IBM AIX bootlist, and the AIX boot sequence. After reading this article, you should have a better understanding of what exactly is happening when your server starts.
|Articles||13 May 2008|
|Transition to AIX from Solaris
You've been working with Solaris for ten years now and, like many other companies, you have just started a large server consolidation and migration project to AIX(R) 6.1 from Solaris 10. Many of the commands are similar, but you need to know how to work with partitioning and virtualization. What are the partitioning differences between an IBM(R) and Sun server? Furthermore, what do you need to know about workload partitions (WPARs) to make a successful transition from containers? What are some of the similarities and differences between WPARs and zones, and how does the process differ from creating zones and WPARs? Finally, what can you do on the IBM System p(TM) that you can't do with Sun servers? These are some of the questions addressed in this article, with the objective of making your transition easier.
|Articles||12 Feb 2008|
|Optimizing AIX 6.1 performance tuning
Just when you thought you understood performance tuning on AIX(R) Version 5.3, here comes AIX 6.1 on its heels to throw you a curveball. In this article, get up-to-date information on the recent changes to performance monitoring and tuning in AIX 6.1, including CPU, virtual memory, and I/O (disk and network). Many of the changes are really less about kernel innovations and more about ancillary changes, such as improving default parameters to more accurately reflect real-world data processing. Other enhancements include unique tunable documentation, restricted tunables, and various other improvements to certain subsystems. You'll learn more about a performance tuning methodology, which needs to be a part of any tuning strategy.
|Articles||05 Feb 2008|
Safeguard your data with the Encrypted File System (EFS), a new AIX(R) 6.1 security feature, and get a comprehensive picture on the configuration of EFS and its usage. EFS can store the content of a file in an encrypted format at the file system level. If you’re new to EFS, this article is a good starting point for reviewing the need for EFS, its features, and most commonly used commands.
|Articles||29 Jan 2008|
|Develop with Java and PHP technology on AIX Version 5.3, Part 6: Building a PHP Web interface to the Java business application
Set up a PHP Web interface for a Java(TM) business application using the database created in earlier in this series. The PHP Web interface collects information from users and sends the session data to the Java business application for processing and for a response.
|Tutorial||15 Jan 2008|
|Overview of AIX page replacement
Go through detailed information on how the AIX(R) virtual memory manager (AIX VMM) works and how to use tunable parameters to adjust the operation of the AIX VMM. The AIX VMM is responsible for managing all of the memory on a system. The operation of the AIX VMM is critical to the performance of a system, and it also provides several tunable parameters that you can use to optimize its operation for different workloads.
|Articles||08 Jan 2008|
|AIX NFS Version 4 configuration over Kerberos inter-realm setup
Learn how to configure an inter-realm setup between IBM(R) Network Authentication Service (IBM NAS) and Microsoft(R) Active Directory for AIX(R) Network File System (NFS) Version 4.
|Articles||08 Jan 2008|
|Using Net-SNMP and IPython
Data centers and production facilities are embracing Simple Network Management Protocol (SNMP) as a way to get a handle on dense and complex infrastructures. The Net-SNMP library now has Python(TM) bindings, and it is an excellent choice to write custom code to manage a data center or supplement full-blown Network Management Systems (NMS). Due to the complexity of SNMP, using an interactive tool like IPython can make all the difference. In this article, learn how to use Net-SNMP, Python, and the IPython shell to interactively explore and manage a network.
|Articles||11 Dec 2007|
|Systems Administration Toolkit: Network scanning
Discover how to scan your network for services and how to regularly monitor your services to keep uptimes to a maximum. A key way of ensuring the security of your network is to know what is on your network and what services individual machines are at risk of exposure. Unauthorized services, such as Web servers or file sharing solutions, not only degrade performance, but others can use these services as routes into your network. In this article, learn how to use these same techniques to ensure that genuine services remain available.
|Articles||04 Dec 2007|
|Optimizing AIX 5L performance: Tuning network performance, Part 1
This three-part series on AIX(R) networking focuses on the challenges of optimizing network performance. In the first installment, you’ll review some best practices for network configuration, and utilize those practices for efficient monitoring of your hardware by taking advantage of network tools such as netstat, netpmon, entstat, and nmon. You’ll also examine certain tools used to look at your interfaces to see how to configure them.
|Articles||20 Nov 2007|
|AIX 6.1 Workload Partitions
Workload Partitions (WPARs) are a new virtualization feature of AIX 6.1. This article helps you decide whether WPARs are right for your AIX workloads, and then gives you step-by-step guidance on how to learn more about WPARs and begin using them.
|Articles||20 Nov 2007|
|Emacs editing environment, Part 7: Let Emacs help you out
Part 7 of this series shows you why Emacs is the self-documenting editor, and the many ways in which you can take advantage of the help and assistance offered in this editor. In this tutorial, learn about describing keystrokes, commands, and functions. You'll also read, browse, and search through a complete Emacs reference manual.
|Tutorial||13 Nov 2007|
|Virtualization in System p
Capitalize on the benefits virtualization can provide to maximize the usage of your resources. Virtualization is a modern approach and is available on all System p(TM) servers, starting from POWER4. This article discusses physical and logical partitioning, with special relevance to how to implement logical partitioning.
|Articles||13 Nov 2007|
|Windows to UNIX porting, Part 2: Internals of porting C/C++ sources
Part 1 of this series covered the typical C/C++ project types you work with in a Microsoft(R) Visual Studio(R) environment and introduced the processes of porting dynamic and static library project variants to a UNIX(R) platform. Part 2 delves into some of the compiler options used to build Visual C++ projects and the UNIX and g++ equivalents, takes a closer look at the g++ attribute mechanism as it relates to porting, and examines some common problems you might encounter while porting from a 32-bit Windows(R) environment to a 64-bit UNIX environment. It concludes with an overview of concepts for porting multithreaded applications and an example project that shows you how to pull all these pieces together.
|Articles||06 Nov 2007|
|Know your TCP system call sequences
The TCP/IP programming interface provides various system calls to help you effectively use the protocol. The TCP stack code is vast, and a complete call sequence down to the kernel level would help in understanding the TCP stack. This article is a one-stop shop for details about TCP stack level function calls and describes the sequence of function calls, at the kernel level, when system calls are made at the application level. In this article, review and study the TCP call sequence, including references to FreeBSD and important function calls that occur in the TCP stack after a system call is made at the user level.
|Articles||06 Nov 2007|
|The power of Network Installation Manager
Get step-by-step instructions for configuring a Network Installation Manager server and clients using the smitty tool. If you have an environment with many AIX(R) systems, then you know that installing, upgrading, and maintaining the software can take a considerable amount of time. The AIX Network Installation Manager can help you with installation and software maintenance in a client and server environment.
|Articles||30 Oct 2007|
|Systems Administration Toolkit: Monitor user usage
Explore new ways to record UNIX(R) logins and other system activities in a number of different logs, and take advantage of this information to monitor user usage. This can be helpful from a number of perspectives, either to use for chargeback reporting or just to get an idea of how busy and active individual users are on the system to help when planning and allocating resources.
|Articles||23 Oct 2007|
|Learn the Perl/Tk module, Part 1: The basics of Perl/Tk
Although Perl-based Web interfaces have limitations, Perl is one of the most commonly used Web development languages. UNIX(R) users who have a programming background in shell scripting, Perl, or another language can breathe new life into Perl-based Web interfaces by using the Perl/Tk module.
|Articles||16 Oct 2007|
|Optimizing AIX 5L performance: Tuning disk performance, Part 3
Part 3 of this series covers how to improve overall file system performance, how to tune your systems with the ioo command, and how to use the filemon and fileplace utilities.
|Articles||09 Oct 2007|
|Implement lower timer granularity for retransmission of TCP
Reduce the overhead of per-tick processing with a timer wheel algorithm that implements the retransmission timer. The AIX(R) Transmission Control Protocol (TCP) has seven timers (per-connection) and uses global timer functions with two granularities to implement the timers. In this article, learn how to get lower granularity with your retransmission timer by using the AIX TCP fast timer, and discover other advantages of lower timer granularity.
|Articles||09 Oct 2007|
|Emacs editing environment, Part 6: Customize your Emacs world
This tutorial, the sixth in a series, walks you through some of the useful ways you can customize and configure the Emacs environment. Learn how to change everything about the Emacs environment to your liking, from the behavior of minor modes to the default key bindings. Along the way, figure out how to set variables, make all your customizations automatic with a startup file, save and recall any window and frame customizations that you make, and use the easy customizer that comes built into Emacs.
|Tutorial||02 Oct 2007|
|Windows to UNIX porting, Part 1: Porting C/C++ sources
Software programs are often made to run on systems that are completely different from the system in which the program is coded or developed. This process of adapting software across systems is known as porting. You might need to port software for any one of several reasons. Perhaps your end users want to use the software in a new environment, such as a different version of UNIX(R), or perhaps your developers are integrating their own code into the software to optimize it for your organization's platform.
|Articles||18 Sep 2007|
|AIX disaster recovery
Recovering AIX(R) IT resources after a disaster requires the personnel performing the recovery to concentrate on working the prepared plan. Unexpected deviations from the plan can cause immense delays in the disaster recovery project. Often, these unexpected deviations are due to a lack of adherence to business continuity policies, guidelines, standards, and procedures. This article identifies resource conflicts that typically occur during a disaster recovery implementation and provides suggestions for resolving these conflicts.
|Articles||18 Sep 2007|
|Install and configure NIS+
Ease your system administration tasks and use Network Information Service plus (NIS+) to quickly handle maintenance and security issues for information. NIS+ is a network-wide naming and administration service that works on a client-server model. The server maintains all the details of the users and clients in a central database. In this article, get step-by-step instructions on how to install, configure, and administer NIS+.
|Articles||28 Aug 2007|
|Speaking UNIX, Part 12: Do-it-yourself projects
If your UNIX(R) system lacks a tool you need, chances are you can find an apt solution in the enormous inventory of software available online. This month, learn how to build software from source code.
Also available in: Russian
|Articles||21 Aug 2007|
|Logging in multi-threaded applications efficiently with ring buffer
No software is bug free, and application users can encounter unexpected results during the run time of programs. To analyze and find the cause of problems, logging is a method widely used by programmers. In this article, learn how to use a ring buffer for efficient logging with memory operations in place of file operations. Choosing an appropriate size for the buffer ensures that relevant messages are dumped, which can help when debugging.
|Articles||14 Aug 2007|
|System Administration Toolkit: Distributed administration using SSH
Use Secure Shell (SSH) to run commands on remote UNIX(R) systems and, with some simple scripts, put together a system that enables you to manage many systems simultaneously from one machine without having to log in directly to the machines themselves. Also examine the basics of a distributed management system and some scripts and solutions using the technique.
|Articles||14 Aug 2007|
|Emacs editing environment, Part 5: Shape your Emacs view
This tutorial, the fifth in a series, shows you how to manage and manipulate the shape of your Emacs session -- examine how to partition the Emacs screen, create multiple X client windows for a single Emacs session, and display multiple buffers in each window, dividing the screen with horizontal and vertical divisions. You also learn about mouse window control and characteristics so that by the time you're through, you'll know how to make your Emacs session look and work the way you want it to.
Also available in: Russian
|Tutorial||07 Aug 2007|
|Optimizing AIX 5L performance: Tuning disk performance, Part 2
Discover how to use appropriate disk placement prior to creating your logical volumes to improve disk performance. Part 2 of this series focuses on monitoring your logical volumes and the commands and utilities (iostat, lvmstat, lslv, lspv, lsvg) used to analyze results.
|Articles||24 Jul 2007|
|Emacs editing environment, Part 4: Options, registers, and bookmarks
Take control of your editing session within Emacs and use it to your advantage. This tutorial is the fourth in a series, and shows you three areas of Emacs that control some aspect of the editing session: various command-line options, the register, and bookmark facilities for setting and saving positions and data. Knowing how and when to use these features, and what tricks are possible with them, are important topics in power editing.
|Tutorial||17 Jul 2007|
|Optimizing AIX 5L performance: Tuning disk performance, Part 1
Learn more about direct I/O, concurrent I/O, asynchronous I/O, and best practices for each method of I/O implementation. This three-part series on the AIX(R) disk and I/O subsystem focuses on the challenges of optimizing disk I/O performance. While disk tuning is arguably less exciting than CPU or memory tuning, it is a crucial component in optimizing server performance. In fact, partly because disk I/O is your weakest subsystem link, you can do more to improve disk I/O performance than on any other subsystem.
|Articles||10 Jul 2007|
|System Administration Toolkit: Build intelligent, unattended scripts
Look at how to create scripts that are able to record their output, trap and identify errors, and recover from errors and problems so that they either run correctly or fail with a suitable error message and report. Building scripts and running them automatically is a task that every good administrator has to handle, but how do you handle the error output and make intelligent decisions about how the script should handle these errors? This article addresses these issues.
|Articles||03 Jul 2007|
|Speaking UNIX, Part 11: Ramble around the UNIX file system
Many directories in the UNIX(R) file system serve a special purpose, and certain directories are named per long-standing convention. In this installment of the "Speaking UNIX" series, discover where UNIX stores important files.
|Articles||21 Jun 2007|
|Speaking UNIX, Part 10: Customize your shell
You can customize the UNIX(R) shell to save time, to save typing, and to adapt to your style of work. Shell startup files capture your preferences and recreate your shell environment session after session, even machine to machine.
|Articles||29 May 2007|
|LDAP configuration management and troubleshooting on AIX
Learn how to diagnose IBM Directory Server problems and how to identify what is needed to resolve the issues. This article is a quick reference for IBM Directory Server configuration management on AIX(R).
|Articles||01 May 2007|
|Emacs editing environment, Part 3: Advanced Emacs text operations
This tutorial, the third in a series, builds on what you've learned by taking you through a tour of some of the more advanced Emacs features for text operations. You get a hands-on demonstration of advanced editing techniques, including how to perform a recursive edit, mark and use rectangles of text, and handle complex selection techniques using the kill ring and the secondary selection.
|Tutorial||01 May 2007|
|Optimizing AIX 5L performance: Monitoring your CPU, Part 2
Identify which AIX(R) tools to use to monitor your Central Processing Unit (CPU) for a given situation and find out why some tools might be better than others. Part 1 of this series discussed the tuning methodology and the importance of having procedures for CPU performance tuning. It also briefly introduced some performance tools to use as a part of your tuning repertories, gave an overview of the POWER CPU, and discussed how the architectural improvements of the evolution of the POWER Chip have contributed to the hardware improvements of the System p(TM) product line.
|Articles||24 Apr 2007|
|Optimizing AIX 5L performance: Monitoring your CPU, Part 1
Just when you thought it was going to be an ordinary day, you receive a phone call and hear the worst six words dreaded by most AIX(R) administrators. Which of course is, "Why is the system so slow?" If you have done your homework, the answer to that question is relatively simple.
|Articles||17 Apr 2007|
|Speaking UNIX, Part 9: Regular expressions
Virtually all non-trivial problems require you to filter good data from bad. Discover the many UNIX(R) command line utilities that use regular expressions to discern the relevant from the irrelevant.
|Articles||17 Apr 2007|
|Emacs editing environment, Part 2: Learn the essential modes and editing features of Emacs
One of the powerhouses of UNIX(R) computing, the open source Emacs editor is a large, complex application that does everything from edit text to function as a complete development environment. This tutorial, the second in a series, introduces you to some of the essential concept of modes, shows you some of the powerful text manipulation functions available, and teaches you how to use the built-in search, replace, and spell check facilities of Emacs.
|Tutorial||10 Apr 2007|
|Speaking UNIX, Part 8: UNIX processes
On UNIX(R) systems, each system and end-user task is contained within a process. The system creates new processes all the time, and processes die when a task finishes or something unexpected happens. Here, learn how to control processes and use a number of commands to peer into your system.
|Articles||03 Apr 2007|
|Set up Kerberos Version 5 KDC to use AES encryption
Learn how to set up a Key Distribution Center (KDC) to use Advanced Encryption Standard (AES) encryption to secure tickets. Developers use KDC in systems to control the permission for users to access certain services. The KDC uses tickets as a means to flag permission for accessing a particular service, or for authenticating users and providers of services.
|Articles||03 Apr 2007|
|Transition from Solaris to AIX
So you've been the UNIX(R) guru on your team for years now and senior management has determined, without your input, to migrate to IBM from Sun Microsystems. Other than updating your resume, what do you need to do? Can you make the transition to AIX(R)? What does IBM offer as an alternative to either VERITAS or Solaris Volume Manager (SVM)? In this article, use the filesystem management and tools available to you on AIX to make your transition easier.
|Articles||06 Mar 2007|
|Avoid traps when porting Java Web applications from Windows to AIX
Examine three traps you could fall in when porting Java(TM) Web applications from Windows(R) to AIX(R), and learn how to maneuver around them. When developing applications, you normally do so in a development environment and then deploy to a production environment. If you develop on Windows and deploy to a UNIX(R)-like platform, you might encounter subtle pitfalls. The first trap sets up different line separators in Windows and AIX, the second shows the best approach to locate a file in different development environments and operating systems, and the third is a common exception in socket communication.
|Articles||23 Jan 2007|
|UNIX tools for exploring object files
The programs that run on a UNIX(R) system follow a careful design known as the object file format. Learn more about the object file format and the tools that you can use for exploring object files found on your system.
|Articles||21 Nov 2006|
Get an introduction to SMIT and how it's used. The System Management Interface Tool (SMIT) is an interactive application that simplifies virtually every aspect of AIX(R) system administration. By the end of this article, you'll agree that SMIT is the AIX systems administrator's best friend.
|Articles||26 Sep 2006|
|Text processing with UNIX
The origin of UNIX(R) lies in simple text processing, and its command-line environment remains one of the most powerful text processing tools available. By combining a series of simple commands to make up a complex text transformation, the tools available from UNIX let you build nearly any text processing engine you could need.
|Articles||01 Aug 2006|
|nmon performance: A free tool to analyze AIX and Linux performance
This free tool gives you a huge amount of information all on one screen. Even though IBM doesn't officially support the tool and you must use it at your own risk, you can get a wealth of performance statistics. Why use five or six tools when one free tool can give you everything you need?
|Articles||27 Feb 2006|