AIX 5L is an IBM 64-bit UNIX version with strong Linux bias. Specifically for applications, database, and transaction services designed AIX 5L ("L" for Linux) is a versatile server operating system that provides the ability to work together between 32 and 64-bit applications by sharing this performance between file access, memory, and different system services.
The AIX
You do not need to install Java in this version.
Note: I do not have an AIX 5l v5.3 extension package and an AIX toolbox for Linux applications disc. Therefore, the related software needs to be downloaded from the IBM official website.If you have related CDs, you can save a lot of trouble.
My OS and browser edition info.# Oslevel-S5300-05-06Mozilla Browser: v1.7.20., English-USNote: This version requires
Which version of AIX is being used? Provide detailed information when you need help!
As a UNIX development, maintainer, of course, know the specific version of the current login system. So when you need to communicate with other technicians, share your fun, and ask for help, you can get them to understand the basics of your system as quickly as possible. Since the 2006, AIX versioning has been more comprehe
A colleague wants to use the Python script under the AIX5, has been tossing for a long time, is the installment, summarized as follows:
1,
From AIX Toolbox for Linux applications:
Http://www-1.ibm.com/servers/aix/products/aixos/linux/download.html
Download:
Python-devel2.2licenserpmsourcethe libraries and header files needed for Python extension development. Python-docs2.2licenserpmsourcedocumentation for t
Description
In today's 7x24-hour business environment, the boundaries between work and life have become increasingly blurred. Pervasive computing allows people to engage in business activities, communicate with colleagues, and receive information----whether in the office or elsewhere.
Wsma has brought mobile server management to a new world by using wireless devices. Using standard WAP phones, system administrators can log on to AIX systems by using
Overview
Internet Protocol Security is a suite of protocols that provides a wide range of information safety features. Individual users or organizations can use the IPSEC attribute to protect the traffic of all applications without any modification to the application itself. IPSEC uses authentication, integrity checking, and encryption to protect data traffic. Data security is provided at the IP layer of the communication stack, so there is no need to make any modifications to the application.
Actually very early want to participate in IBM training activities, but last year did not start in Jinan. At the beginning of April, there was an opportunity to participate in AIX training activities. (In Jinan Mountain Road No. 228, Qilu Software building A310 Sea-day training Center.) )
In fact, every weekend is with the ball friends about the game (I love to play), but borrow my ball friend's word "work is important." As a DBA to master UNIX-relat
AIXStudy-AIX user resource access restriction Configuration
AIX Study-AIX user access system resource limit Configuration
The system resource limits used by Aix users include hard limits and soft limits ). Hard limits has been introduced since Aix 4.1. Hard limits should be
Learn how to implement the Internet small computer system interface (iSCSI) on Aix ). This step-by-step process describes how to achieve iSCSI on an AIX host through Cisco MDS across the storage area network (SAN. These procedures also describe some interface optimization parameters.
Introduction
Cost-effective storage solutions do not require any new content. Internet small computer system interfac
The meaning of ulimit-a output on AIX has previously been shared about changing commands in linux, but the AIX Commands are not the same as those in linux. However, the basic solution is www.2cto.com: toomanyopenfiles. The system resource restrictions used by AIX users include two concepts ---... the meaning of ulimit-a output on
AIX on ulimit-a the meaning of the output
The system resource constraints used by AIX users include two concepts---hard limits (hard limits) and soft limits (soft limits).Hard limits has been introduced since the AIX 4.1 release. Hard limits should be set by the AIX system administrator, and only members of the securi
Part 1th: Setting up the Java environment
Introduction: Develop a java™ application on aix® and learn how to extend the application by using the PHP interface to view the underlying Java code. Applications that use Java and PHP technologies can be developed in Aix. While gaining the benefits of using PHP as a web-based interface platform, you can use Java code as the core logic (or redeploy existing java-b
Tags: erro client use BSP AIX win backup gets aneThe Linux file system mounted under Aix failed with the following code# Mount 172.16.4.176:/tbackup/tbackup/dbraMount:1831-008 giving up on:172.16.4.176:/tbackupVmount:operation not permitted.----------------------------------------------------------------------# nfso-p-O Nfs_use_reserved_ports=1Setting Nfs_use_reserved_ports to 1Setting nfs_use_reserved_port
Environment: Database: 64-bit Oracle10.2.0.1.0TSM5.4: Windows2003 tape library: IBM3100 Problem description: 1. the aix system has a 3D32B80D error.
Environment: Database: 64-bit Oracle10.2.0.1.0 TSM5.4: Windows2003 tape library: IBM3100 Problem description: 1. the aix system has a 3D32B80D error.
Environment:
Database: 64-bit Oracle10.2.0.1.0 under AIX5.3
TSM5.4: Windows2003
With database: IBM3100
Pro
Command:
find/home/oracle/admin/zhjport/udump/-name "*.trc"-mtime +30-exec rm {} \;
If you want to do this automatically, you can join crontab
This article is from the "Wheat Dock" blog, please be sure to keep this source
What system is AIX?
Aix bar, Advanced Interactive eXecutive (AIX) is the trademark name of the IBM proprietary UNIX operating system
The EtherChannel in the AIX operating system is a network port synthesis technology that allows users to combine multiple Ethernet cards on a single server to form a more bandwidth-wide Ethernet interface. In general, these Ethernet cards should be connected to the same switch that supports EtherChannel technology, and the ports on the switches to which these network adapters are connected must be explicitly manually designated as a EtherChannel membe
http://www.ibm.com/developerworks/cn/aix/library/es-Javaperf/es-Javaperf1.html maximizing Java performance on AIX, part 1th: BasicsThis five-part series provides several techniques and techniques that are often used to optimize Java™ applications for optimal performance on AIX®. It also provides a discussion of the applicability of each technique. With these tips
HACMP can be said to be a server engineer, and there is no unknown-IBM's housekeeping architecture. I have recently asked readers to talk about the issue of HACMP by phone or email.
Here, I will repost an article from IBM, which is very well written and accurate. It is a lot better than what I said. Everyone will benefit from reading it! Wen Ping
Detailed explanations on oracle large database systems in AIX/unix: 45. What is HACMP?
===================
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.