Filter by products, topics, and types of content

(0 Products)

(39 Topics)

(1 Industries)

(6 Types)

1 - 22 of 22 results
Show Summaries | Hide Summaries
View Results
Title none Type none Date none
Optimizing AIX 7 operating system performance, Part 3: Tune with ioo, filemon, fileplace, JFS and JFS2
Part 3 of the AIX 7 performance series covers how to improve overall file system performance, how to tune your systems with the ioo command, and how to use the filemon and fileplace utilities. You will also learn about JFS and JFS2 that is available in AIX 7.
Also available in: Chinese  
Articles 26 Oct 2010
System Administration Toolkit: Network scanning
Discover how to scan your network for services and how to regularly monitor your services to keep uptimes to a maximum. A key way of ensuring the security of your network is to know what is on your network and what services individual machines are at risk of exposure. Unauthorized services, such as Web servers or file sharing solutions, not only degrade performance, but others can use these services as routes into your network. In this article, learn how to use these same techniques to ensure that genuine services remain available.
Also available in: Chinese  
Articles 04 Dec 2007
System Administration Toolkit: Monitor user usage
Explore new ways to record UNIX(R) logins and other system activities in a number of different logs, and take advantage of this information to monitor user usage. This can be helpful from a number of perspectives, either to use for chargeback reporting or just to get an idea of how busy and active individual users are on the system to help when planning and allocating resources.
Also available in: Chinese  
Articles 23 Oct 2007
System Administration Toolkit: Standardizing your UNIX command-line tools
Examine methods for standardizing your interface to simplify movements between different UNIX(R) systems. If you manage multiple UNIX systems, particularly in a heterogeneous environment, then the hardest task can be switching between the different environments and performing the different tasks while having to consider all of the differences between the systems. This article does not cover specific differences, but you'll look at ways that can provide compatible layers, or wrappers, to support a consistent environment.
Also available in: Chinese  
Articles 22 Aug 2006
System Administration Toolkit: Process administration tricks
Discover how to get the information you want on UNIX(R) processes. Knowing what is running on your UNIX system is one of the most basic requirements of any system administrator. The standard process list is useful, but often the information that it provides is not in the right format or doesn't contain exactly the processes or information you need. In this article, you'll examine how to extend that process further to improve the readability of the information, or provide summaries and information that are not easily obtainable elsewhere. You'll also look at methods for standardizing how to obtain process information across different UNIX platforms.
Articles 21 Feb 2006
System Administration Toolkit: Get the most out of zsh
Examine key parts of the Z shell (zsh) and how to use it's features to ease your UNIX(R) system administration tasks. zsh is a popular alternative to the original Bourne and Korn shells. It provides an impressive range of additional functionality, including improvements for completing different commands, files, and paths automatically, and for binding keys to functions and operations.
Also available in: Chinese  
Articles 19 Dec 2006
System Administration Toolkit: Build intelligent, unattended scripts
Look at how to create scripts that are able to record their output, trap and identify errors, and recover from errors and problems so that they either run correctly or fail with a suitable error message and report. Building scripts and running them automatically is a task that every good administrator has to handle, but how do you handle the error output and make intelligent decisions about how the script should handle these errors? This article addresses these issues.
Also available in: Chinese  
Articles 03 Jul 2007
System Administration Toolkit: Distributed administration using SSH
Use Secure Shell (SSH) to run commands on remote UNIX(R) systems and, with some simple scripts, put together a system that enables you to manage many systems simultaneously from one machine without having to log in directly to the machines themselves. Also examine the basics of a distributed management system and some scripts and solutions using the technique.
Also available in: Chinese  
Articles 14 Aug 2007
System Administration Toolkit: Get the most out of bash
Ease your system administration tasks by taking advantage of key parts of the Bourne-again shell (bash) and its features. Bash is a popular alternative to the original Bourne and Korn shells. It provides an impressive range of additional functionality that includes improvements to the scripting environment, extensive aliasing techniques, and improved methods for automatically completing different commands, files, and paths.
Also available in: Chinese   Russian  
Articles 12 Dec 2006
System Administration Toolkit: Migrating and moving UNIX directory trees
Occasionally, you need to copy around an entire UNIX(R) directory tree, either between areas on the same system or between different systems. There are many different methods of achieving this, but not all preserve the right amount of information or are compatible across different systems. This article discusses the various options available for UNIX and how best to make them work.
Also available in: Chinese  
Articles 25 Jul 2006
Optimizing AIX 7 operating system performance, Part 2: Monitoring logical volumes and analyzing the results
Discover how to use appropriate disk placement prior to creating your logical volumes to improve disk performance. These investigations are based on AIX 7 beta and updating information from the original AIX 5L version of this article. Part 2 of this series focuses on monitoring your logical volumes and the commands and utilities (iostat, lvmstat, lslv, lspv, lsvg) used to analyze results.
Also available in: Chinese  
Articles 19 Oct 2010
System Administration Toolkit: Migrating and moving UNIX filesystems
Learn how to transfer an entire file system on a live system, including how to create, copy, and re-enable the new file system. If you have a UNIX(R) disk or system failure or simply fill up your file system, then you need to create a new partition and file system and copy over the contents. You might even need to mount the new partition in place to preserve the location of vital files and components. To add further complications, you need to do this on a live system, where you'd need to preserve file permissions, ownership, and possibly named pipes and other components. Effectively transferring these components and retaining all of this information is a vital part of the migration process.
Also available in: Chinese  
Articles 03 Jul 2006
UNIX network analysis
You can find out a lot about your network by using a variety of different tools. If you want to understand the layout of your network, where packets are going, and what people are doing, then you need to use a variety of different tools that can help you to build up a picture of your network and what is going on. This tutorial examines techniques for monitoring the traffic and content of your UNIX network and how to read and diagnose problems on your network.
Also available in: Chinese  
Tutorial 05 May 2009
System Administration Toolkit: Set up remote access in UNIX through OpenSSH
Use OpenSSH to provide a secure environment for running a remote terminal. The basics of OpenSSH and terminal usage are quite simple but, in this article, examine additional elements that allow automatic login to remote hosts, methods for running remote applications, and how to securely copy files between hosts.
Also available in: Chinese  
Articles 13 Feb 2007
System Administration Toolkit: Understanding DNS
The Domain Name System (DNS) is the service that converts hostnames and domain details into the IP addresses required for application to communicate. Under UNIX, the primary DNS service is based on BIND, and DNS itself is a key part of most UNIX installations. This article looks at the basics of DNS setup, how servers and requests are distributed and exchanged, and how to set up and keep a DNS environment running smoothly.
Also available in: Chinese  
Articles 04 Mar 2008
System Administration Toolkit: Using SNMP data
The Simple Network Management Protocol (SNMP) is built in to many devices, but often the tools and software that can read and parse this information are too large and complicated when you only want to check a quick statistic or track a particular device or issue. This article looks at some simplified methods for getting SNMP information from your devices and how to integrate this information into the rest of your network's data map.
Also available in: Chinese  
Articles 15 Apr 2008
Synchronizing UNIX files
There are many tools available that allow you to synchronize files across UNIX directories, but doing it effectively, and securely, takes a little bit more effort. This article looks at solutions for synchronizing files across UNIX filesystems and different computer systems securely, and at solutions that allow you to synchronize encrypted versions of your files for the purposes of backup.
Also available in: Chinese  
Articles 03 Feb 2009
System Administrators Toolkit: Migrating and moving UNIX filesystems
If you have a UNIX disk or system failure, or simply fill up your filesystem, you will need to create a new partition and filesystem and then copy over the contents. You may even need to mount the new partition in place to preserve the location of vital files and components. To add further complications, you could need to do this on a live system, where you'd need to preserve file permissions, ownership, and possibly named pipes and other components. Effectively transferring these components and retaining all of this information is a vital part of the migration process. In this article we'll look at effective methods for the transfer of entire filesystems on a live system, including how to create, copy and re-enable the new filesystem.
Articles 05 Jul 2006
Deep-protocol analysis of UNIX networks
Whether you are monitoring your network to identify performance issues, debugging an application, or have found an application on your network that you do not recognize, occasionally you need to look deep into the protocols being used on your UNIX network to understand what they are doing. Some protocols are easy to identify and understand, even when used on non-standard ports. Others need more investigation to understand what they are doing and what information they are exchanging. In this article, we will take a look at techniques for performing detailed analysis of the protocols in use on your UNIX network.
Also available in: Chinese  
Articles 08 Jun 2010
Develop with Java and PHP technology on AIX Version 5.3, Part 6: Building a PHP Web interface to the Java business application
Set up a PHP Web interface for a Java(TM) business application using the database created in earlier in this series. The PHP Web interface collects information from users and sends the session data to the Java business application for processing and for a response.
Tutorial 15 Jan 2008
System Administration Toolkit: Managing NIS services for authorizations
Examine how to set up, configure, and update a Network Information System (NIS) installation for sharing information, and learn how NIS can be merged with other solutions, such as files and Domain Name System (DNS), to provide subnet, network, and worldwide data sharing facilities. In a large UNIX(R) network, the ability to share information among the many systems helps to alleviate many problems, such as sharing permissions across different systems with Network File System (NFS), or simply providing a single login for the entire network.
Also available in: Russian  
Articles 01 Aug 2006
Adding DTrace probes to your applications
DTrace provides a rich environment of probes that can be used to monitor the execution of your system, from the kernel up to your application. You can perform a significant amount of examination without changing your application, but to get detailed statistics, you need to add probes to your application. In this article, we will examine how to design the probes, where to add them into your application, the best locations for the probes, and how to effectively build and use the probes that you have added.
Also available in: Chinese  
Articles 04 May 2010
1 - 22 of 22 results
Show Summaries | Hide Summaries