Would you be able to survive one full day without using the X server? Linux offers us a wide assortment of CLI based tools which use curses and/or framebuffer for functional user interfaces. There is no reason why you shouldn't be able look up stuff online, read your email, look at pictures, watch movies and listen to music as you are trying to configure X.
Changing some memory parameters on your system can increase performance dramatically, particularly when these parameters are not optimized for the environment which you are running. Part 1 of this series provides an overview of memory on AIX, including a discussion of virtual memory and the Virtual Memory Manager (VMM).
GNU/Fiwix is a 32-bit x86 operating system kernel based on the Unix architecture and fully focused on being Linux compatible. It is designed exclusively for educational purposes, so the kernel code is kept as simple as possible for the benefit of students. In the latest version, the virtual memory manager code has been improved to support SVGAlib-based applications and to add the ability to mmap() physical addresses. The way to map physical addresses in the /dev/mem driver has been improved. The mmap() and readpage() methods have been added to the VFS structure. Among other improvements in the VFS layer, the code to build with gcc 4.x has been fixed.
"On UNIX systems, each system and end-user task is contained within a process. The system creates new processes all the time and processes die when a task finishes or something unexpected happens. Here, learn how to control processes and use a number of commands to peer into your system."
UNIX has a dialect all its own and you will find with the UNIX command-line, there are many ways to skin a cat. Martin Streicher, Editor-in-Chief, Linux Magazine, shares his extensive knowledge and experience with command-line combinations to help you expand your mastery of the UNIX language and in the command-line in particular.
"The UNIX operating system provides a rich set of features that allows processes to communicate with each other. Known as Inter-Process Communication, you can use this communication method to reconfigure an application at run time or to share data between different processes that are running in parallel. This article teaches you how to identify the methods that applications can use to communicate with each other, select the most appropriate method for your application, and begin your implementation."
Get an overview of the Lightweight Directory Access Protocol-related enhancements in the AIX 5L operating system V5.3 TL5 update. This lets clients configure and manage multiple systems with a single set of user identity configuration information, and it simplifies system administration.
"HP this week moved to bulk up the security tools available with its HP-UX operating system. The company has released an assortment of additions for HP-UX 11i V2 - including server-side encryption, a security chip and fortified data containers - that give customers some nice, high-end options. HP officials bragged that a number of the new tools arrive at no additional cost to customers. In addition, HP insisted that we remind you of its 'commitment to the long-term success of the HP-UX roadmap'."
Memory leaks can be tough and costly problems to solve, so it makes sense to use good tools to clearly point out and understand where the leaks are coming from. This article outlines an approach you can use while tackling memory leaks, and it discusses how to take advantage of the MALLOCDEBUG tool that is supplied with AIX.
Set up a Kerberized environment to work with Solaris 10 and learn how to configure a Key Distribution Center on AIX Version 5.3. You'll also run through a series of steps for configuring a Kerberos client on Solaris 10 to authenticate users for Telnet, remote shell, and Secure Shell using AIX 5.3 as your KDC.
AIX has a vast array of commands that enable you to do a multitude of tasks. Depending on what you need to accomplish, you use only a certain subset of these commands. There are a few core commands that you commonly use. This article will cover some of the core commands with the intent to provide a list that you can use as a ready reference.
UNIX provides robust tools and infrastructure so that you can both protect and share information. This article looks at user privileges and, in particular, examines how to manipulate file permissions to restrict or share your directories and files with others. Understanding permissions is crucial if you want to speak UNIX fluently. Learn how to manipulate file permissions to protect your files, or share them with others.
"To make Linux applications usable worldwide, with no inequity between Western dialects and the rest of the world's many languages, you must be able to deliver localized versions that input, store, retrieve, and render any language, no matter how complex. The multilingualization library, or m17n, provides a single internationalization solution for all languages on UNIX-like platforms."
The language of the UNIX command line is notoriously versatile: with a panorama of small tools and utilities and a shell to combine and execute them, you can specify many precise and complex tasks. Learn how to use techniques unique to UNIX in an office setting, which become a powerful ally toward increasing your productivity.
"Want to run best of breed apps under both Windows and Unix? Eric Hall tells you about an option for doing this: Microsoft's Posix subsystem. It lets Unix apps think they are using regular Unix, but they are actually using Windows instead."
UNIX provides hundreds, if not thousands, of commands with which you can manipulate a large variety of resources available in the kernel and user space. Martin Streicher, Editor-in-Chief, Linux Magazine, looks at three essential UNIX utilities that deliver the entire Internet to your command line.
"Examine methods for standardizing your interface to simplify movements between different UNIX systems. If you manage multiple UNIX systems, particularly in a heterogeneous environment, then the hardest task can be switching between the different environments and performing the different tasks while having to consider all of the differences between the systems. This article does not cover specific differences, but you'll look at ways that can provide compatible layers, or wrappers, to support a consistent environment."
Every skilled trade has its secrets -- those little tricks, techniques, and tools that make light of even the most complex task. Programmers, system administrators, and other UNIX computer professionals have their own kind of specialized tools. Learn how to leverage the many shortcuts that the UNIX shell provides. With a little practice, you'll work smarter, not harder.
Organizations adopting Linux might not abandon Unix entirely. NASA's Jet Propulsion Laboratory, for example, has migrated its e-mail system from Sun hardware and Solaris to HP servers and Red Hat Enterprise Linux. But even though the use of Linux on production servers is growing, the practice isn't yet the norm at the laboratory, said Douglas Hughes, a service engineer at JPL Information Services.
Examine how to best migrate your Linux skills to take advantage of AIX and Solaris. Linux is all the rage, but what if you have experience in Linux and need to apply it to a commercial UNIX environment? UNIX and Linux are similar, and many of the same principles exist; there is a shell, root is still all powerful, and many of the tools and applications are the same. This tutorial will show you how to cope and understand the nuances and differences.