Operating Systems / UNIX/AIX
To leverage round-the-clock computing, tasks must run at all hours of the day. You could punctuate your sleep with waking interludes to log in and run this command or that command on dozens of machines, or you can enjoy your forty winks and turn the work over to the ubiquitous cron, a daemon, or perennial process, to execute commands on a schedule. From very often to every so often, cron happily minds the clock and runs jobs day or night. Learn how to configure and maintain cron, and discover just some of its many uses.
A comparison of virtualization features of HP-UX, Solaris, and AIX
Most IBM AIX administrators understand the virtualization features available to them on their System p platform through PowerVM, which is also available on the System p for Linux. But what about the other UNIX hardware platforms? What do they have to offer and how do some of their features compare to PowerVM? This article explores all of these topics in detail.
AIX commands you should not leave home without
Do you wish you could answer some of your own questions when you work with AIX and your System p server? Do you ever feel you could save time by not having to call on the support professionals all the time? Well, wish no more. Shiv Dutta discusses some of the AIX commands that answer those questions and tells you how to enlarge the list of such answers.
Initial steps on kdb
kdb is a utility that is primarily intended for performing analysis of a system dump image. This article describes the initial steps for system dump analysis.
Introducing the Boost parser framework
Learn to use Boost's highly scalable Spirit parser framework, which works on an EBNF specification and can significantly reduce your development time.
Python and LDAP
At some point in their careers, most systems administrators need to interact with an LDAP server. This article shows how LDAP can be used for Apache authentication, as well as how to perform CRUD, or Create, Read, Update, and Delete operations on an OpenLDAP database, using the Python module python-ldap.
Enabling DB2 applications for HACMP Smart Assist
HACMP Smart Assist validates the applications before getting them configured. This involves some preparation work for applications that are to be integrated with HACMP. This article documents the steps to enable DB2 applications for HACMP.
Implement two-factor authentication for AIX using Kerberos
In the ever-growing need for higher security systems, multi-factor authentication is preferred for network security. Since Kerberos is one of the most popular network authentication mechanisms, learn how to design a multi-factor authentication over the Kerberos protocol. Understand the use of One-Time Password (OTP) and GSS-API to achieve this.