By IBM Redbooks
The article of this redbook is to illustrate the AIX 5L and home windows 2000 structures to teach the reader similarities and transformations among every one working process. even if you're a home windows professional seeking to examine extra concerning the most recent model of AIX, AIX 5L, or are an AIX specialist and want to tell your self of the newest home windows platform, home windows 2000, you can find every one bankruptcy during this redbook covers the elemental applied sciences that make each one working process what it is.In resulting chapters, we are going to speak about basic working process recommendations, architectures, open criteria compliances, and product packaging for either AIX 5L and home windows 2000. Then, we will cross into the consumer interfaces for either, garage administration, safety criteria compliance and operations, and entire structures administration. eventually, we'll supply a close dialogue of networking recommendations on either systems and display the entire volume of scalability and excessive availability on either AIX 5L and home windows 2000.Furthermore, whereas now not a lot has replaced in home windows 2000, AIX is comparatively new on the time of penning this redbook, and we will make a unique aspect of stating the diversities among AIX 5L and the former model, AIX model 4.3.3.
Read or Download AIX 5L and Windows 2000: Side by Side PDF
Similar unix books
This IBM Redbook is designed as a examine advisor for pros wishing to arrange for the AIX deploy and method restoration certification examination as a particular process learn as a way to in achieving the IBM qualified complex Technical professional - RS/6000 AIX certification. This IBM Redbook is designed to supply a mix of conception and functional adventure wanted for a common realizing of the subject material.
O'Reilly's unique Linux Server Hacks gave sysadmins a hundred quintessential timesavers, suggestions, and recommendations. This new quantity 2 bargains a hundred extra: them all dependent, enjoyable, good established, and very priceless. to start, there is a complete bankruptcy on authentication in heterogeneous environments, a favourite subject of coauthor invoice von Hagen.
A fantastic instructional for these new to management and a useful reference for skilled execs. Stresses a pragmatic method of structures and management, from easy subject matters to UNIX esoterica. Now overlaying crimson Hat Linux. past variation now not brought up. Softcover.
"I've came across this e-book to be a pragmatic, hands-on guide that explains how OpenVMS process managers can combine their platforms with Linux, permitting the 2 structures to paintings cooperatively and expand the processing potential of a computing surroundings. John truly describes the positive factors and advantages of either working structures, that you can evaluation which one is healthier for any given activity.
- Bash Quick Reference
- UNIX Transparent
- Beginning Linux Programming (Programmer to Programmer)
- Linux in a Nutshell
Extra info for AIX 5L and Windows 2000: Side by Side
When Windows 2000 is installed, a user, called Administrator (which is similar to the root user in AIX), is created. The Administrator has full control of all files and resources on the system. He or she may also create other users and give them lesser rights to resources on the system. When connected to a network, Windows 2000 systems can interoperate within a domain or in a peer-to-peer relationship (called a workgroup). In a workgroup model, each computer maintains its own user account database.
Environment subsystems that provide an operating system environment by exposing the native OS services to user applications, namely: Win32, POSIX and OS/2 subsystems. 1, MS-DOS, POSIX or OS/2. User applications do not call the native Windows 2000 OS services directly; instead, they go through subsystem dynamic link libraries (DLLs). This translates a documented function into the appropriate Windows 2000 system service calls. The protected subsystems are divided into two groups, which are described in the following sections.
This scalability is provided by changing the sizes of some fundamental data types for 64-bit applications and will allow these applications to take advantage of expanded capabilities of the AIX 64-bit kernel. The scalable 64-bit ABI will be supported by the 32-bit kernel as well as the 64-bit kernel. 3 Modes of operation (execution modes) There are basically two modes of operation in the AIX operating system: the kernel mode and the user mode. Kernel extensions run in the kernel mode and user applications tend to run in the user mode.
AIX 5L and Windows 2000: Side by Side by IBM Redbooks