|AHAFS events support for adding and removing USB devices in IBM AIX
Hot plugging a device in a system means the device is discovered and configured by the system without reboot or without manual intervention. The existing USB infrastructure in IBM AIX does not support discovering devices on hotplug. A configuration manager command must be invoked manually to discover the new USB devices attached to the AIX system. This article explains the hotplug infrastructure provided for USB devices in AIX and how it can be used by the applications.
|14 Mar 2017|
|Developing applications using libusb in IBM AIX
libusb is an open source library that allows you to develop user space drivers (applications) for USB devices. This article provides detailed steps on developing applications using libusb on IBM AIX. Users can write driver software on AIX for their USB devices to communicate with them. This article gives detailed description on installation and configuration of libusb on AIX, enumeration of libusb devices, and how to develop applications using libusb APIs.
|14 Mar 2017|
|Disaster Recovery as a Service (DRaaS) offering using IBM Geographically Dispersed
Resiliency Solution for Power Systems
This article explains about cloud supported recovery model for disaster recovery management in which two different customers can share the same IBM site recovery management system through subscription or service offering. This can be supported with IBM Geographically Dispersed Resiliency for Power Systems.
|27 Feb 2017|
|Configuration of Enterprise Pool for Capacity on Demand with IBM Geographically Dispersed
Resiliency for Power Systems solution
This article explains about the newly released disaster recovery solution, IBM Geographically Disperse Resiliency for Power Systems, and explains how to use it seamlessly with Power Enterprise Pools. This article explains the concepts involved in capacity on demand and steps involved in configuring the same from the HMC GUI and command line.
|31 Jan 2017|
|How to safeguard the KSYS node in IBM Geographically Dispersed Resiliency for Power
This article explains how to safeguard the KSYS node (controller system node) that manages the Geographically Dispersed Resiliency environment. IBM Geographically Dispersed Resiliency for Power Systems is a disaster recovery solution that is easy to deploy and provides an automated process to recover the production site virtual machines. KSYS node is a logical partition with the IBM AIX operating system and the Geographically Dispersed Resiliency solution installed on it. This KSYS node can monitor the configured environment and handle the respective virtual machine under that environment during disaster recovery.
|31 Jan 2017|
|Performance improvements for IBM AIX FC and FCoE device driver stacks
The Fibre Channel device driver stack on IBM AIX enables multiple I/O queues to issue I/O requests in parallel across the queues. With this multiple I/O queue support, there is a significant improvement in the number of IOPS for I/O requests of smaller block sizes. The article discusses the performance improvements and results for AIX native and NPIV configurations for 16 Gb FC (Feature Code: EN0A) and 10 Gb FCoE (Feature Code: EN0H) host bus adapters (HBAs).
|06 Jan 2017|
|Introducing IBM PowerSC 1.1.5
IBM PowerSC provides a security and compliance solution optimized for virtualized environments on IBM Power Systems running PowerVM and AIX. The newest release makes managing security compliance easier than ever with an improved user interface. Try it today.
|04 Nov 2016|
|Enabling Reliability Scalability Cluster Technology (RSCT) as clustering software for
IBM PowerVM NovaLink
This article explains the Reliability Scalability Cluster Technology (RSCT) support to establish the formation of a management domain between IBM PowerVM NovaLink and its logical partitions (LPARs) automatically and to ensure that the communication between PowerVM NovaLink and the LPAR is possible over IPv6 link-local addresses using an OpenStack community driver on PowerVM NovaLink.
|17 Oct 2016|
|Open source cloud automation for IBM AIX
IBM is proactively working with AIX administrators to identify and prioritize Chef content and continue to strengthen the open source ecosystem for AIX. Read this article to learn more.
|11 Oct 2016|
|Introducing IBM AIX 7.2.1 Live Update
Updating AIX is easier than ever with the introduction of AIX 7.2.1 Live Update which updates the operating system with no reboot required.
|11 Oct 2016|
|Open source cloud automation for IBM AIX
IBM is proactively working with AIX administrators to identify and prioritize Chef content and continue to strengthen the open source ecosystem for AIX. Read this article to learn more.
|11 Oct 2016|
|Hitachi TrueCopy mirroring with IBM PowerHA SystemMirror
This article explains the steps to configure Hitachi Storage system mirroring and IBM® PowerHA® SystemMirror® to monitor and manage Hitachi disks. In case of a disaster scenario such as fire, earthquake, and so on, the configured PowerHA SystemMirror resource can be moved from the disaster location to some other backup location thereby minimizing the loss of data and business application's downtime.
|23 Sep 2016|
|Machine Learning, Deep Learning 101
This article describes the growing relevance of Machine Learning used in various kinds of analytics along with an overview of Deep Learning. It provides an end-to-end process for using Machine Learning and Deep Learning and the options for getting started on IBM® Power Systems™.
Also available in: Japanese
|20 Jul 2016|
|Gaining better control in directing Live Partition Mobility (LPM) resource
LPM is being increasingly used by system administrators in order to reduce operational downtime. For running Live Partition Mobility (LPM) with operational efficiency, we should consider the network that is going to route the traffic as well as the CPU cost on the mover service partition (MSP). The objective of this article is to demonstrate careful selection of resources during LPM operation, so that an administrator can enjoy better control over LPM traffic. This also brings in optimal performance and isolation of heavy LPM traffic from other workloads.
|30 Jun 2016|
|Get started with IBM Power Virtualization Center (PowerVC)
Virtualization plays a key role in cloud computing. IBM Power Virtualization Center (PowerVC) is a new virtualization management tool that's built on OpenStack and designed to simplify the management of virtual resources in Power Systems environments, and thus improve administrator productivity. In this tutorial, we'll cover fundamental concepts, installation, and basic configuration techniques, as well as ways to configure various resources like hosts, storage, and networks. We'll also take a look at virtual machines and images, and show you how to create and manage a VM using PowerVC with the help of screens.
|09 Mar 2016|
|Automatic Repository Disk Replacement (ARR) in an IBM PowerHA cluster
This article explains the Automatic Repository Disk Replacement (ARR) feature of IBM® PowerHA® SystemMirror®. This article can help customers to configure backup repositories for automatic repository update. The PowerHA SystemMirror ARR feature helps to prevent a cluster from moving to the restricted mode in case a cluster repository disk is inaccessible or failed, ensuring that the cluster always remains in the stable state.
|02 Mar 2016|
|IBM Cognos integration with Sterling Selling and Fulfillment Suite on Linux
This article reviews the necessary steps to integrate IBM Cognos 10 and IBM Sterling Selling and Fulfilment Suite 9 on Linux. Before you begin, it is recommended that you have an understanding of both IBM Cognos and Sterling Selling and Fulfillment Suite.
|14 Jan 2016|
|Configuration and integration of IBM System Storage SVC PPRC with IBM PowerHA using
This article provides detailed steps for the configuration of IBM® System Storage® SAN Volume Controller (SVC) with Peer-to-Peer Remote Copy (PPRC) and integrating it with IBM PowerHA®. It briefs about the SVC configuration with IBM PowerHA to provide PPRC technology for faster failover of data. SVC is block storage which does virtualization using Fiber Channel storage area network (SAN).
|22 Dec 2015|
|Installing and using IBM PowerVP and IBM AIX
This article describes how to install and use IBM
|18 Aug 2015|
|Recovering from a resource failure in IBM PowerHA cluster
This article explains about recovering from a resource failure caused due to wrong input to resources in IBM® PowerHA® cluster. There are scenarios in which a cluster might go to the unstable state and a resource might go to the error state due to wrong input to resources such as applications, file systems, and so on. This article helps to understand how to get cluster to a stable state after rectifying the wrong input to resources and make it accessible using the IBM PowerHA SystemMirror cluster recovery script failure tool.
|30 Jul 2015|
|Integration of Microsoft Windows Active Directory server as a pass-through
authentication server to IBM Tivoli Directory Server
This article explains about configuring Microsoft
|10 Jul 2015|
|Explore the OpenStack REST APIs for PowerVC
IBM Power Virtualization Center Express Edition (PowerVC) is an IaaS cloud solution designed to make it easier to build and manage virtual resources in a Power Systems Software Defined Environment or a cloud infrastructure. It is primarily based on OpenStack and includes OpenStack industry-standard application programming interfaces. Learn about the APIs for each OpenStack component and the tasks the APIs can help you complete.
|16 Apr 2015|
|Understanding storage framework disk fencing in IBM PowerHA SystemMirror 7.1
This article introduces a new feature of IBM® PowerHA® SystemMirror® 7.1, the storage framework disk fencing, which can shut off disk write access from IBM AIX® Small Computer System Interface (SCSI) disk driver layer, and help to prevent data corruption of inadvertent disk access.
|22 Jan 2015|
Recovering or building new machines running AIX is a straightforward process when you use Storix.
|16 Jan 2015|
|varyonvg and varyoffvg scripts
This article covers two scripts that can vary on and vary off one or more volume groups (VGs). It also covers troubleshooting problems when unmount, varyonvg and varyoffvg commands fail.
|06 Jan 2015|
|Moving IP address from one Ethernet to another
There will be times when you have to move an Ethernet IP address to another Ethernet. The first Ethernet may have gone bad and you have to move its IP address to another or may be you are moving from 1 GB Ethernet to a new 10 GB Ethernet. Whatever the reason is, this article provides you the steps to move the IP address from one Ethernet to another. My intention in this article is to make you aware that not only do you have to move the IP address to the new Ethernet but you also have to move all the routes as well. If the routes are missing on the new Ethernet you could run into problems and you may not know what the routes used to be so you can add them. I will show you how to create all the routes on the new Ethernet.
|24 Dec 2014|
|IBM XIV mirroring with IBM PowerHA SystemMirror using XCLI commands
This article explains the steps to configure IBM® XIV® Storage System mirroring and IBM PowerHA® SystemMirror® to monitor and manage the XIV disks using XCLI commands. In case of a disaster scenario such as fire, earthquake, and so on, the configured XIV resources can be moved from the disaster location to some other backup location thereby minimizing the loss of data and business application's downtime.
|02 Dec 2014|
|IBM GPFS cluster installation and configuration in IBM AIX
This article is intended for IBM® AIX® system administrators, file system developers and testers for installing and configuring the IBM General Parallel File System (IBM GPFS™) high availability cluster node for environments such as AIX clusters, Linux® clusters, Microsoft® Windows® Server, or heterogeneous cluster for AIX, Linux, and Windows nodes.
|25 Nov 2014|
|IBM XL compiler hardware transactional memory built-in functions for IBM AIX on IBM
POWER8 processor-based systems
Transactional memory is a hot topic in parallel programming and many software implementations have been developed, but solutions based on hardware transactional memory have superior performance. IBM
|18 Nov 2014|
|Updating Virtual I/O Server (VIOS) to a higher level using an alternate disk
This article describes how to update Virtual I/O Server (VIOS) to a higher level using an alternate disk. This is an intermediate-level article and is targeted for system administrators. This overview of VIOS update process can prepare system administrators for what needs to be done and what to expect so that the update can be as quick and as easy as possible.
|13 Nov 2014|
|Controlling symbol visibility for shared libraries: Part 2 - Advanced
knowledge with IBM XL C/C++ V13 compiler
This is the second article of our two-part series about symbol visibility. This article demonstrates more methods on visibility setting and resolution using the IBM® XL C/C++ V13 compiler. The article also introduces and explains some of the linking, assembly, and tooling facilities.
|09 Sep 2014|
|Exploring IKEv2 with ECDSA certificate in IBM AIX
Internet security is a major concern now-a-days. Internet Protocol Security (IPSec) is a security protocol suite which works on the L3 layer of network and provides a strong security with the help of different types of authentication and encryption mechanisms. This article discusses about the usage of the Elliptic Curve Digital Signature Algorithm (ECDSA) certificate based authentication mechanism for Internet Key Exchange Version 2 (IKEv2).
|23 Jul 2014|
|IBM AIX SAN Volume Controller update and migration
This article discusses the tasks to be performed for IBM® AIX® when updating or migrating IBM System Storage® SAN Volume Controller (SVC) to a new release. It includes a script that makes it easier to prepare many AIX servers for update or migration.
|19 Jun 2014|
|Getting bosboot errors, don’t reboot just yet
You are about to reboot your system for some planned maintenance, perhaps through some upgrade or migration. For this process to complete, you issue a : bosboot - a command. It may be the case that the bosboot command fails, the output informing you "it is not safe to reboot your system". Though initially, this might come across as a real and present problem (which it is), there are tasks to perform that can prove that the system is indeed rebootable with the current image. This article summarizes the tasks that can be performed to verify if it is save to reboot.
|12 May 2014|
|Getting started with SSH security and configuration
Are you a new UNIX(R) administrator who needs to be able to run communication over a network in the most secure fashion possible? Brush up on the basics, learn the intricate details of SSH, and delve into the advanced capabilities of SSH to automate securely your daily system maintenance, remote system management, and use within advanced scripts to manage multiple hosts.
|09 May 2014|
|Map VIOS LUNs with minimal requirement
This article maps the logical unit numbers (LUNs) between the client and the server. The only requirement it has is to run as root and be able to use Secure Shell (SSH) to connect an IBM® AIX® jump server to the VIOS client and server without entering the password. It provides a lot of information including the Virtual I/O Server (VIOS) that is providing the Shared Ethernet Adapter (SEA), the virtual Small Computer System Interface (VSCSI), and the command to re-create the virtual target device as well.
|02 May 2014|
|Enforcing environmental limits
Controlling user limits should not only cover the resources being used, it should also encompass environmental limitations on the account in general. This article describes what user limits should cover and also demonstrates the concepts of limits with examples.
|11 Apr 2014|
|Automatic discovery and HyperSwap configuration tool for IBM Power HA SystemMirror for AIX
The IBM® HyperSwap® feature in IBM PowerHA® SystemMirror® provides continuous storage availability in a multisite PowerHA cluster. It gives the advantage of planned and unplanned maintenance and migration of storage. To achieve HyperSwap configuration across sites, administrators need to configure Peer-to-Peer Remote Copy (PPRC) Metro Mirror between pairs and need to enable the HyperSwap feature for each of the disks. This involves collecting the logical unit number (LUN) and logical subsystem (LSS) information of the shared disks from the cluster nodes, and this is a time-consuming process. This article describes the scripts that can perform the HyperSwap configuration automatically.
|11 Apr 2014|
|IBM AIX commands you should not leave home without
Do you ever wish you could answer some of your own questions when you work with IBM AIX® and your IBM Power Systems™ server? Do you ever feel you could save time by not having to call on the support professionals all the time? Well, wish no more. Shiv Dutta discusses some of the AIX commands that answer those questions and tells you how to enlarge the list of such answers.
|04 Apr 2014|
|Secure LPM: Live Partition Mobility with IPSec
In plain Live Partition Mobility (LPM), transfer of memory contents of the source logical partition (LPAR) goes unprotected over the network. Secure LPM provides an option to administrators to choose whether or not to transfer memory contents through an Internet Protocol Security (IPSec) tunnel. This article explains the steps to configure secure LPM and provides an overview of the available security profiles that mandate the creation of automatic tunnels. It also covers the concepts, prerequisites, and hardware and software configuration along with screen captures.
|27 Mar 2014|
|Getting started with Nmap for system administrators
Nmap is an open source port scanner for Linux® and many other platforms that can boost your system's security. This article discusses the basics of Nmap for system administrators and how to get started using it.
|24 Mar 2014|
|Create nmon web pages in an enterprise environment using nmon2rrd
With nmon, you can capture performance data into a CSV file. This can then be converted into a graphic form using many tools that are available. One such rather good tool is nmon2rrd, which by using rrdtool will convert the time series data into a meaningful graphic HTML page.
|20 Mar 2014|
|Continuous integration setup for IBM System Planning Tool
This article describes the detailed steps to configure your own continuous integration build set up for the IBM® System Planning Tool (SPT) without making use of any other publicly available continuous integration tools. This setup comes with the scheduled code extraction and build, scheduled test suite execution, and scheduled code coverage report generation features. You can use this article as a reference while setting up your own continuous integration environment for any of your projects as it gives step-by-step configuration details. This greatly reduces your research, exploration, and development time of the project setup.
|07 Mar 2014|
|How to read detailed data of error-log entries
This article aims at explaining the method of reading detailed data of error-log entries using C programs. As you read, you will be introduced to various functions, structures, and constructs to be used for this and an example code to end the article.
|11 Feb 2014|
|IBM AIX MPIO: Best practices and considerations
This article can help you to learn the best practice configuration details and considerations to optimize your IBM® AIX® Multi Path I/O (MPIO) solutions, and also to easily determine the MPIO options that are most suitable for your applications and business needs.
|20 Jan 2014|
|IBM Entrepreneur Week
IBM Entrepreneur Week is a one-of-a-kind opportunity for you to meet, interact, and connect with entrepreneurs, venture capitalists, industry leaders, and academics from around the world. If you're a startup or entrepreneur, join us onlne for our inaugural IBM Entrepreneur Week, 3-7 Feb 2014. There will be events taking place online and in locations worldwide, including face-to-face and virtual mentoring sessions, a women entrepreneur-focused event, and a LiveStream broadcast of the SmartCamp Global Finals in San Francisco.
|15 Jan 2014|
|String externalization practices and considerations for UNIX shell
In this article, we provide practical "How-Tos" and experiences on externalizing shell script messages in a product. Also, we provide suggestions on what to consider before and during translation enablement from a globalization perspective. The target audience is product developers who would like to enable their shell scripts for translation. After reading this article, readers can understand the considerations for externalizing shell script messages, realize the end-to-end process of string extraction and translation, and be aware of some known issues and their solutions.
|24 Dec 2013|
|IBM AIX audit on an LDAP server
||09 Dec 2013|
|Extending snap data collection
This article aims at equipping users with the knowledge of extending the snap utility to collect debug data for third-party components installed on a system. Some background understanding of snap such as architectural overview, various components, and so on are also covered as a part of this article. We conclude the article with a full-fledged example.
|11 Nov 2013|
|Tracing IBM AIX hdisks back to IBM System Storage SAN Volume Controller (SVC)
When working in an IBM AIX® environment that uses the IBM System Storage® SAN Volume Controller (SVC), you need to be able to determine the SVC volumes that represent each AIX hdisk. This article covers the procedure to perform this manually as well as automate the process by using a script. With these skills, you will be able to better manage the storage on your SVC and AIX systems.
|01 Nov 2013|
|Using the NIM service handler with the NIM Alternate Disk Migration tool
This article describes how to use nimsh with nimadm to migrate to IBM® AIX® version 7.1.
|15 Oct 2013|
|How to write trace format entries
This article aims at equipping users with the knowledge required to write effective trace format entries. We will look at elements of the trace format entry, covering each of them with examples and situations where they can be handy. There is an example at the end of the article to give you a sense of how these pieces of a puzzle fit together.
|03 Oct 2013|
|Command-line interaction for IBM i Access Client Solutions
In this article, you can learn how to invoke Access Client Solutions from the command line and see the utility through functional examples.
|03 Oct 2013|
|Strengthening the SSH configuration used in GPFS installations to make them more secure
Currently, a prerequisite of any IBM General Parallel File System (IBM GPFS) installation is that all the nodes on the cluster must be able to communicate with each other using the root user ID and that this is done without a password in order to facilitate automated tasks. But this configuration represents a security exposure, because security best practices forbid that the root user can log in remotely. The configuration presented in this article resolves this dilemma by allowing the GPFS cluster nodes to continue communicating with each other using the root ID and at the same time blocking this type of connection to other users and nodes.
|19 Sep 2013|
|Vice partition virtualization for IBM AFS
IBM® AFS™ storage area network (SAN) storage virtualization provides the mechanism to migrate the existing vice partitions from one file server to another file server without restarting the file server or terminating the client processes. This article explains the problem with the existing IBM AFS file server setup in migrating the vice partitions from one file server to another and the steps to resolve the same using IBM AFS SAN storage virtualization.
|10 Sep 2013|
|IBM PowerHA SystemMirror cluster migration
IBM® PowerHA® SystemMirror is an application that makes a system fault resilient and reduces downtime of applications or databases. This article helps customers to plan for and successfully accomplish cluster migration.
|04 Sep 2013|
|Decoding location codes
When you have a faulty device, you need to know where the device is located physically on your system, so it can be replaced. The errpt or lscfg comand provides a location code specifying where the faulty device is located. Armed with the location code and a server manual or an IBM® Redbooks® title covering your model, or even better with access to IBM web information center, you should be able to identify exactly where the device is located.
|26 Aug 2013|
|IBM PowerHA SystemMirror HyperSwap with Metro Mirror
IBM® HyperSwap® with Metro Mirror is a new feature in IBM PowerHA® SystemMirror 7.1.2 Enterprise Edition. It provides continuous availability against storage errors and prevents unnecessary application fallover to a disaster recovery site, which happens only if the storage fails. This article introduces HyperSwap with PowerHA and provides a detailed explanation of how to plan for and configure the PowerHA Enterprise Edition cluster with HyperSwap and Metro Mirror.
|19 Aug 2013|
|Exploring the DWARF debug format information
This article helps you understand the DWARF debug file structure and explore the DWARF object files.
|12 Aug 2013|
|Building a two-node IBM GPFS cluster on IBM AIX
This article is a step-by-step guide for deploying a two-node IBM® General Parallel File System (IBM GPFS™) V3.5 cluster on IBM AIX® 7.1.
|01 Aug 2013|
|IBM AIX autostartup and shutdown scripts
Automatically starting up the required services when a system restarts can save you the task of logging in to the system to manually start those services. When shutting a system down, you can have scripts in place to shut down those services in a controlled manner. This article covers the different methods employed to start or stop your applications when a system is restarted or shut down.
|29 Jul 2013|
|Simplify and centralize IPSec management on AIX
Internet Protocol Security (IPSec) helps you secure your data, but implementing IPSec tunnels in a large enterprise with many systems can be a daunting task. In this article, learn to use the centralized IPSec management feature in AIX to manage IPSec configuration for large numbers of client machines. Examples show how to simplify and centralize management of a configuration using LDAP as a central repository.
|15 Jul 2013|
|IBM AIX and Microsoft Active Directory integration with Kerberos and LDAP
The KRB5LDAP compound load module in IBM® AIX® allows user information to be pulled from Microsoft® Active Directory (AD) using Lightweight Directory Access Protocol (LDAP) and authentication against AD using Kerberos. This article explains the necessary steps to configure KRB5LDAP.
|11 Jul 2013|
|Enhance distributed development with IBM Rational Developer for AIX and Linux Version 9.0
IBM Rational Developer for AIX and Linux Version 9.0 allows you to use a single project to develop, build, test, debug, and performance tune your application across multiple systems at the same time. Mike Kucera describes the features that enable distributed development.
|09 Jul 2013|
|Getting more done with less: Using scripts and utilities to run commands across all your IBM AIX servers quickly
System administrators are increasingly required to manage more servers, decreasing the amount of time they are able to dedicate to each server. Time-saving utilities are crucial in ensuring efficiency in managing these servers. Simple, serially run one-line Secure Shell (SSH) loops and parallel-run commands using utilities, such as dsh and parallel SSH, drastically improve efficiency, especially in large-enterprise environments.
|08 Jul 2013|
|VIOS shared storage pool and thin provisioning
I wondered why IBM® Power Systems™ does not have the snapshot and thin-provisioning features that can make the life of a system administrator much easier when there is a need to upgrade or maintain efficiency. Finally, I found it in Virtual I/O Server (VIOS) shared storage pool, which I have detailed in this article.
|03 Jul 2013|
|Get your IBM Power Systems environment to a supported level
Running unsupported software or system firmware in your IBM® Power Systems™ environment can pose a significant exposure to your business. Fortunately, getting your environment to a state where IBM can support it may be easier than you think. This article looks at the components you may need to upgrade. It also points you to further information to help you get started.
|01 Jul 2013|
|A hidden and dangerous side effect of tuning j2_inodeCacheSize and the memory DR operation
In this article, we reveal a hidden and dangerous side effect of tuning j2_inodeCacheSize and the memory dynamic reconfiguration (DR) operation. This harmful side effect might cause serious consequences including inode cache exhaustion, file system corruption, and system failure. We demonstrate and explain how it occurs and how to prevent it. We also introduce some methods to detect and fix such problems.
|24 Jun 2013|
|Controlling symbol visibility for shared
libraries: Part 1 - Introduction to symbol visibility
This is the first one of our two-part series about symbol visibility. In this part, you may get to know the fundamental concept about symbol and symbol visibility, and ways for a programmer to make symbol visibility under control on IBM® AIX® that runs on the IBM POWER® platform. Further, this article details about symbol preemption to show the subtle difference between exported symbol and symbol that is exported but also protected.
|12 Jun 2013|
|Stack-based breadth-first search tree traversal
This article explains the traditional breadth-first search (BFS) that has drawbacks in terms of extra space required by the queue data structure. If a tree has multiple children and is a balanced tree, then the queue size would grow exponentially and could cause serious memory threats. The solution in this article provides a parallel approach for printing the tree in BFS fashion, where the queue data structure in not required at all. Instead, stack memory is used but memory consumption would be log(n) with base N, where N is the average children count per node and 'n' is the number of nodes in the tree.
|04 Jun 2013|
|Considerations in software design for multi-core multiprocessor architectures
Today's chip multithreaded, multi-core, multiprocessor systems provide software designers a great opportunity to achieve faster and higher throughput. However, there are a few key design considerations, if ignored, could result in hard-to-find performance issues and scalability bottlenecks.These key design considerations are discussed in this article.
|20 May 2013|
|PowerVM configuration and scaling with WebSphere Portal
This article describes a series of performance benchmarks that demonstrate the scaling properties of an IBM PowerVM® virtual machine running IBM WebSphere® Portal on the IBM AIX® operating system. Various PowerVM configuration settings are used to demonstrate how performance changes when CPU entitlements and virtual CPUs are changed.
|09 May 2013|
|Setting up the IBM AIX server as a router (static routing)
Routing is the process of moving a packet of data from source to destination. Static routing uses manually added routes whereas dynamic routing uses dynamic routes. This article explains how to set up an IBM® AIX® server as a router to communicate with private and public networks by using static routing.
|25 Apr 2013|
|The troubleshooter's guide for managing storage using IBM Systems Director
The purpose of this article is to document the troubleshooting methodologies and the best practices to be followed while managing the storage component and also provide the information about what needs to be verified in an entity, such as IBM® Systems Director, LSI, NetApp Eagle provider, and so on to overcome certain issues. In short, this article would serve as a one-stop reference for debugging storage management issues more efficiently.
|22 Apr 2013|
|Troubleshooting process hangs caused by JFS2 inode with an empty extended attribute entry
In this article, we reveal a special kind of inode that cannot be detected by the fsck command, and explain why it can cause process hangs and drop system performance. We also introduce some approaches to tackle such an issue.
|18 Apr 2013|
|IBM PowerHA SystemMirror cluster migration to IBM POWER7
This article provides the tips for migrating an IBM® PowerHA® SystemMirror cluster from IBM POWER6® to IBM POWER7® processor-based servers. This step-by-step guide describes how to migrate a high-availability (HA) cluster to POWER7, upgrade the cluster from IBM HACMP™ to PowerHA, and migrate shared cluster volume groups for fast disk takeover.
|04 Apr 2013|
|Using IBM Image Construction and Composition Tool
This article aims to provide common best practices when working with the IBM® Image Construction and Composition Tool® (ICCT) to design and build virtual appliances on IBM PowerVM® cloud providers.
|02 Apr 2013|
|IBM AIX device driver development
This tutorial illustrates the IBM® AIX® device driver framework and related application programming interfaces (APIs). Here, we shall discuss about the device switch structure, API to register device switch methods, major and minor number management, and moving data from kernel to user space.
|28 Mar 2013|
|Fine-grain network quality of service on IBM AIX 7.1 and Linux in a multi-tenant cloud environment
In a multi-tenant environment, typically tenants share a single infrastructure on which resources are logically partitioned and where the cloud administrators support the required provisioning to enable sharing of the infrastructure. In purview of the overall administrative tasks, maintenance of network quality of service (QoS) per tenant is a must have but a tedious task. This article demonstrates a powerful QoS mechanism available with the Linux® operating system that can help cloud administrators to effectively divide the total network bandwidth available on a centralized Linux server, hosting cloud applications among tenant client systems such as IBM® AIX®, Microsoft® Windows®, and Linux.
|21 Mar 2013|
|Simulating dropped TCP/IP packets on IBM AIX
Commercial software products are often developed and tested on local high-speed, high-capacity networks, where there is little congestion or packet loss. The network conditions in deployment environments may not be so ideal. Heavy congestion or hardware errors on networking equipment might result in lost packets, which can severely affect product performance. This article shows you how to use and customize a provided facility for simulating dropped Transmission Control Protocol/Internet Protocol (TCP/IP) packets on IBM® AIX® to allow you to anticipate how well a product will behave under less-than-ideal network conditions.
|15 Mar 2013|
|Enterprise maintenance strategy for IBM AIX running on IBM Power Systems servers
Systems maintenance plays an essential role within every enterprise to ensure supportability and system reliability in order to maximize the availability of the services that make up the technical landscape. With multiple components to consider (IBM® AIX®, database, application, and so on), juggling systems maintenance requirements with service level agreements (SLAs) can be challenging, but by aligning a schedule of activities, the frequency of planned outages can be reduced. This article looks at the importance of treating the service as an entity and with it, creating an enterprise maintenance strategy that maximizes system availability.
|11 Mar 2013|
|Automated environment setup tool for IBM Systems Director VMControl
IBM® Systems Director is a platform management solution that is used to manage physical and virtual systems. IBM Systems Director provides systems management personnel with a single pane of glass, helping to reduce IT management complexity and cost. IBM Systems Director VMControl™ is an advanced plug-in installed on top of IBM Systems Director to provide the virtualization capabilities. This article talks about a tool for automatic environment setup for IBM Systems Directors testing and development. The tool is designed to work for almost all the supported resource features, such as kernel-based virtual machine (KVM), IBM z/VM®, VMware, and IBM Power® Systems™ platforms.
|05 Mar 2013|
|Technical library using IBM AIX RAS infrastructure tracing services
This article explains how to use IBM AIX reliability, availability, and serviceability (RAS) infrastructure services to enable trace capability for kernel extension and device drivers. Mainly, the AIX infrastructure manages core error logging, component tracing, and dump facilities for kernel extension and device drivers. It provides the interface to register and control the level of tracing facilities for kernel extension and driver components. It also exemplifies the concepts through an example implementation and best practices to be followed to interface with the RAS infrastructure.
|01 Mar 2013|
|Subsystem Device Driver Path Control Module (SDDPCM) for IBM AIX
Subsystem Device Driver Path Control Module (SDDPCM) is used for implementing multipath configuration environment using IBM System Storage SAN Volume Controller (SVC), IBM Storwize V7000, and other IBM Storage products. It supports a storage-redundant configuration environment for a host system that is attached to storage devices. It provides enhanced data availability, dynamic input/output (I/O) load-balancing across multiple paths, and automatic path failover protection.
|25 Feb 2013|
|SOA integration with IBM CICS from IBM WebSphere Application Server on IBM AIX
IBM WebSphere and IBM CICS Transaction Gateway (CISCS TG) deployed to run on IBM AIX in local mode with the CICS ECI XA resource adapter, using the Internet Protocol Interconnectivity (IPIC) protocol for communication with CICS Transaction Server for IBM z/OS offers many benefits, especially in the operational management of the integrated environment with deployed Java Enterprise Edition (JEE) applications.
|19 Feb 2013|
|Scripting IBM AIX LPAR builds from A to Z in an IBM PowerVM
In today's high demand and quickly changing IT environment, many system administrators are looking for areas where they can save time and automate tasks. Creating a logical partition (LPAR) creation is a common task that when manually done takes a significant amount of time. In other words, it is a perfect task to automate! This article covers the steps to create a LPAR from the command line and then show how this can be automated with a script.
|07 Feb 2013|
|IBM AIX RAS – firmware-assisted and live dump facilities explained
The article explains advanced IBM® AIX® dump facilities built up to capture system dump robustly. More specifically, it discusses the various aspects of firmware-assisted and live dump facilities. It provides the details of live dump kernel service to reliability, availability, and serviceability (RAS) infrastructure and various options or turntables to be considered to capture the live dump for a component or driver data. It illustrates the live dump facilities with an example kernel extension.
|01 Feb 2013|
|Configure SMI-S providers for storage
Storage Management Initiative Specification (SMI-S) is an industry standard developed by the Storage Networking Industry Association (SNIA) with which independent management software can manage storage devices (storage and switches) through a standard interface based on the Common Information Model (CIM) protocol.
|28 Jan 2013|
|IBM PowerHA 7.1 heartbeat over SAN
This article describes the prerequisite configuration required, and the actual configuration to use IBM PowerHA 7.1 storage area network (SAN) heartbeat. In PowerHA 7.1, the disk heartbeat has been replaced by a SAN heartbeat, which should be included in a resilient PowerHA architecture.
|21 Jan 2013|
|Versioned Workload Partitions
This article explains the requirements for moving to versioned Workload Partitions (versioned WPAR) as well as limitations and restrictions. It also explains the configurations of a versioned WPAR to allow it to run in an IBM AIX global environment.
|14 Jan 2013|
|The NIM cheat sheet
Have you ever had to install a large number of IBM AIX servers from scratch? Do you need a quick and easy way to create and store operating system backups? Would you like to know how to perform AIX operating system migrations on live servers quickly? Well, here is your complete cheat sheet for setting up and using the Network Installation Manager (NIM) tool in AIX. Learn how to set up the server and client components, perform a basic installation, use NIM to create mksysb backups, and perform alt_disk migrations over the network.
|07 Jan 2013|
|Shuffling disk data around
Data maintenance on disks is a common task for any system administrator. A quite frequent task in my experience is data movement. This may be due to hotspots on your disk, a quick fix is to move some logical volumes off to another disk to ease congestion. The migratelp command is your trusted friend in this situation. When you are experiencing a failing disk or you are migrating data from one disk to another disk, you can use the migratepv command or create a mirror copy, and you are not restricted to just one method. For original volume groups (VGs), when adding a disk to the VG, you may run into a factoring issue. However, by understanding the characteristics of the VG, the factoring can be changed. These common disk maintenance tasks are discussed with examples in this article.
|02 Jan 2013|
|Sharing physical volumes across logical partitions on IBM Power Systems servers
This article explains the process of sharing physical volumes (PVs) across multiple logical partitions (LPARs). This kind of environment is required for a cluster setup.
|24 Dec 2012|
|Interactive tool to run REST APIs of IBM Systems Director
This article covers the interactive tool to run Representational State Transfer (REST) application programming interfaces (APIs) of IBM Systems Director VMControl. This tool provides a command-line interface (CLI) interface to invoke REST APIs for IBM Systems Director VMControl.
|19 Dec 2012|
|POSIX and Olson time zone formats
This article helps you to understand various time zone formats, interpret the Portable Operating System Interface (POSIX) format, and understand the output of the zdump command with examples.
|13 Dec 2012|
|Improve your productivity by using the debugger in Rational Developer for Power Systems Software
IBM Rational Developer for Power Systems Software features an integrated source-level debugger that helps you debug applications written in different languages and running on different platforms. The key feature of the debugger is that its user interface client connects remotely to a debugger engine running on a different machine. This article shows you how to use the debugger's core features, its advanced features, and its integration with the rest of Rational Developer for Power Systems and other IBM technology.
|11 Dec 2012|
|What is that file?
There are many commands you can use on the IBM AIX operating system to get information about files. The ls -l command gives you some basics, such as the file name, its size, permissions, and the time the file was last modified. But you can find a lot more interesting and helpful information about files. This article shows you some of the commands that can give you the inside scoop about files, including what the files contain, what processes use them, when they were last accessed, and much more.
|06 Dec 2012|
|IBM SmartCloud Entry for IBM Power Systems
IBM SmartCloud Entry for IBM Power Systems is an entry-level private cloud offering from IBM for IBM POWER® processor-based systems. When the required software stack is installed and configured, the ability to deploy and manage virtual machines (VMs) becomes possible through a web front end. I recently attended the IBM SmartCloud Entry for Power Systems workshop in Sydney, and was impressed by what I saw. The following article is my first impression of the product, albeit with limited exposure to its full potential.
|06 Dec 2012|
|Exploring the Boost Graph Library
Get to know the Boost Graph Library, a generic graph library that helps C++ developers convert practical engineering problems into graph-theory problems.
|03 Dec 2012|
ksh_timer helps ksh script developers or administrators to find out quickly and with minimal change in their script, what functions or user-defined sections are time consuming. By default, ksh_timer will time the overall script and each function defined and used in the script. Users can define additional sections of the scripts they need to be timed.
|28 Nov 2012|