Solved

Unix types

Posted on 2004-10-19
8
1,688 Views
Last Modified: 2013-12-06
Please generally compare HP Unix, AIX Unix and Solarias  Unix.
0
Comment
Question by:JavaQuestioner
8 Comments
 
LVL 38

Accepted Solution

by:
yuzh earned 63 total points
ID: 12353577
Please read the Unix guide (html or pdf):

http://www.unixguide.net/
0
 
LVL 20

Expert Comment

by:tfewster
ID: 12357338
0
 
LVL 61

Expert Comment

by:gheist
ID: 12366806
Generally names are lexically different, so please describe what you want to get out of your future system to get them compared side by side.
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 51

Expert Comment

by:ahoffmann
ID: 12388736
> .. generally compare ..
hmm, all are different, at least lexically, obviously ;-)
Compare returns: different
0
 
LVL 1

Expert Comment

by:suzer
ID: 12489368
Or assign more points to make it worth someone's while...
0
 

Assisted Solution

by:timf04
timf04 earned 62 total points
ID: 12505595
One is written by Hewlett-Packard/Compaq, one by Sun Microsystems, and one by IBM.  :^)

What are you looking for?  Are they going to be on their respective platforms, or on x86 hardware.  Are you looking at ease of management, number of applications written for it, or support for Java?

This is like asking a fraternity to compare a blond, brunette, and red head.  They all have positives and negatives, but they are all preferred over the bald lumberjack (MS). lol
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In tuning file systems on the Solaris Operating System, changing some parameters of a file system usually destroys the data on it. For instance, changing the cache segment block size in the volume of a T3 requires that you delete the existing volu…
Introduction Regular patching is part of a system administrator's tasks. However, many patches require that the system be in single-user mode before they can be installed. A cluster patch in particular can take quite a while to apply if the machine…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now