With these techniques, administrators like you become much more efficient.
Written by David Tansley
Every object on AIX is a file. So it makes sense to understand a bit more about the types of files, the file sizes, and the handy commands to locate them. Each file has an inode, and the inode to a file contains information about ownership, permissions, file access times, plus other attributes relating to that particular file. In a nutshell, the inode holds all the information about the file. On AIX (or any UNIX/Linux system), there may be some files with the same inode number; however, they would reside on different file systems. The inode will be unique within that file system.
Editor's Note: This article introduces the Able-One webinar on application modernization.
Technology is now the leading factor for innovation in 71 percent of businesses, according to an IBM study. IT professionals have become acutely aware of this over the past decade, with the exponential progress of the Internet, social media, mobility, cloud computing, and the possibilities with advanced software and infrastructure. IT management is under pressure to maintain mission-critical operations while leading their organization forward at a rapid pace with these capabilities.
Discover the euphoria of self-service password reset.
Written by Robin Tatam
Since the dawn of the technological age, stories have abounded of users writing passwords on Post-It notes and in logbooks. That's because good passwords are hard to devise and even harder to remember. When we concoct one, we hang on to it. What's worse, we use the same username and password everywhere. Many experts believe passwords represent one of the greatest security vulnerabilities; however, they remain a necessary evil. The reality is that passwords will be around for the foreseeable future. And for every password that exists, there's a user who will forget it.