August 2010
:
AIX Documentation Wiki:
Configuration and Implementation
() -
Methodology, configuration, instructions, and scripts for the
implementation of an AIX documentation server using "MediaWiki"
software. Included are scripts for the automated creation and upload of
categories, pages, and redirects associated with the IBM AIX operating
system and related software. This article also discusses a methodology
for the design, maintenance, and support of the documentation server to
insure business continuity is preserved.
July 2009
:
Automated and Dynamic IP Address Allocation for Data Center Automation:
System Deployment Tools for Business Continuity -
Discussion of the usage of a dynamic DNS for the storage, allocation,
and management of IP addresses for system deployment operations in
automated data center environments. A step-by-step procedure for the
creation and configuration of the AIX dynamic DNS is provided to support
automated IP address allocations across multiple subnets.
()
April 2009
:
AIX Job Spooler: Process and Resource Control -
Job spooling or batch processing are mainframe concepts that are
available in the IBM AIX environment, but are rarely implemented. This
article describes the configuration, reasons, and purposes for
implementing job spooling in AIX environments.
(url)
January 2009
:
Enterprise Wide Unique Identifiers for Business Continuity -
A discussion of "Enterprise Wide Unique" (EWU) identifiers as they are
needed in supporting a business continuity environment. These
identifiers provide a mechanism of ensuring a single value for a
parameter that must be unique across an entire enterprise. The purpose
of this article is to show the value of generating or calculating these
values on an as needed basis rather than recording and maintaning these
values in spreadsheets and databases.
(url)
November 2008
:
Naming Standards for Business Continuity -
In today's partitioned and virtualized computing environments, the
requirement for naming standards is more apparent than ever before.
Unfortunately there is a wide spread lack of understanding between the
different categories of names used to identify managed systems, LPAR's,
profiles, node names, host names, and aliases. This article defines
naming categories and provide standards for creating enterprise wide
unique names associated with each category. This article also explains
why it is important to distinguish between the different naming
categories and how they are an integral part of data center automation
projects and an overall business continuity plan.
(url)
September 2008
:
KornShell 93 Auditing - New features of the Korn Shell
provide system administrators and management with the ability to
monitor, track, record, and audit every command executed by any user of
a system. This is different from normal the normal shell history, and
provides detailed information that includes date, time, tty, user, and
the command. This information can be stored locally or transmitted in
real time to a remote logging system.
(url)
Mar 2008
:
Shell Curses Function Library - Provides the shell
programmer the ability to perform text-based cursor movements to
specified locations on the screen. This ability permits the creation of
menuing and data-entry systems using shell scripts without the need for
compiled binaries. These functions are similar to the "C" language
"Curses" library.
(url)
(pedia)
Sep 2007
:
AIX disaster recovery - Resolving resource conflicts -
This article identifies resource conflicts that typically occur during a
disaster recovery implementation and provides suggestions for resolving
these conflicts.
(url)
unpublished
:
Virtualization Standards for Business Continuity: Part 10
(pdf)
Mar 2008
:
Virtualization Standards for Business Continuity: Part 9
(pdf)
Feb 2008
:
Virtualization Standards for Business Continuity: Part 8
(pdf)
Nov 2007
:
Virtualization Standards for Business Continuity: Part 7
(pdf)
Sep 2007
:
Virtualization Standards for Business Continuity: Part 6
(pdf)
Aug 2007
:
Virtualization Standards for Business Continuity: Part 5
(pdf)
May 2007
:
Virtualization Standards for Business Continuity: Part 4
(pdf)
Mar 2007
:
Virtualization Standards for Business Continuity: Part 3
(pdf)
Feb 2007
:
Virtualization Standards for Business Continuity: Part 2
(pdf)
Dec 2006
:
Virtualization Standards for Business Continuity: Part 1
((pdf))
Aug 2006
:
Successful Business Continuity: Automated Documentation
(doc)
Jul 2006
:
Automated Process Monitoring
(ksh93)
May 2006
:
Tracking disks and vSCSI adapters in a VIOS environment
(ksh93)
Apr 2006
:
Generate Secure Random Passwords
(ksh93)
Apr 2006
:
Successful Business Continuity: Websphere MQ
(doc)
Feb 2006
:
Setting Path Priorities for Virtualized Disks
(ksh93)
Feb 2006
:
Korn Shell Awk Emulation
(ksh93)
Nov 2005
:
Successful Business Continuity: Volume Names
(doc)
May 2005
:
Successful Business Continuity: Naming Structures
(doc)
Apr 2005
:
Successful Business Continuity: User Names and Groups
(doc)
2008
:
Mt Xia Dictionary:
Definition of Terms
(html)
2007
:
Disaster Recovery:
Quick Reference Card
(doc)
2007
:
ksh93 Quick Reference Guide:
Testing and Substitutions
(pdf)
2007
:
ksh93 Quick Reference Guide:
Built-in Commands
(pdf)
2007
:
ksh93 Quick Reference Guide:
set and unset Commands
(pdf)
2007
:
ksh93 Quick Reference Guide:
typeset Command
(pdf)
2007
:
Virtualization for Business Continuity
(in IBM AIX environments)
(Book)
2007
:
Advanced Korn Shell Programming
(Book)
Most of the standards described by the following are obsolete. Click here for the current standards.
Contained here are numerous standards, procedures, and best practices developed over many years of working with AIX/Unix/Linux.