GPFS ( General Parallel File System , brand name IBM Storage Scale and previously IBM Spectrum Scale ) is high-performance clustered file system software developed by IBM . It can be deployed in shared-disk or shared-nothing distributed parallel modes, or a combination of these. It is used by many of the world's largest commercial companies, as well as some of the supercomputers on the Top 500 List . For example, it is the filesystem of the Summit at Oak Ridge National Laboratory which was the #1 fastest supercomputer in the world in the November 2019 Top 500 List. Summit is a 200 Petaflops system composed of more than 9,000 POWER9 processors and 27,000 NVIDIA Volta GPUs . The storage filesystem is called Alpine.
69-534: Like typical cluster filesystems, GPFS provides concurrent high-speed file access to applications executing on multiple nodes of clusters. It can be used with AIX clusters, Linux clusters, on Microsoft Windows Server , or a heterogeneous cluster of AIX, Linux and Windows nodes running on x86 , Power or IBM Z processor architectures. GPFS began as the Tiger Shark file system, a research project at IBM's Almaden Research Center as early as 1993. Tiger Shark
138-512: A beta test version of AIX 5L for the IA-64 ( Itanium ) architecture in 2001, but this never became an official product due to lack of interest. The Apple Network Server (ANS) systems were PowerPC-based systems designed by Apple Computer to have numerous high-end features that standard Apple hardware did not have, including swappable hard drives, redundant power supplies, and external monitoring capability. These systems were more or less based on
207-476: A trade secret . Software can be made available with fewer restrictions on licensing or source-code access; software that satisfies certain conditions of freedom and openness is known as " free " or " open-source ." Since license agreements do not override applicable copyright law or contract law , provisions in conflict with applicable law are not enforceable. Some software is specifically licensed and not sold, in order to avoid limitations of copyright such as
276-507: A "mixed source" model including both free and non-free software in the same distribution. Most if not all so-called proprietary UNIX distributions are mixed source software, bundling open-source components like BIND , Sendmail , X Window System , DHCP , and others along with a purely proprietary kernel and system utilities. Some free software packages are also simultaneously available under proprietary terms. Examples include MySQL , Sendmail and ssh. The original copyright holders for
345-523: A February 21, 1997, internal Microsoft memo drafted for Bill Gates : Early versions of the iPhone SDK were covered by a non-disclosure agreement . The agreement forbade independent developers from discussing the content of the interfaces. Apple discontinued the NDA in October 2008. Any dependency on the future versions and upgrades for a proprietary software package can create vendor lock-in , entrenching
414-467: A Government Security Program (GSP) to allow governments to view source code and Microsoft security documentation, of which the Chinese government was an early participant. The program is part of Microsoft's broader Shared Source Initiative which provides source code access for some products. The Reference Source License (Ms-RSL) and Limited Public License (Ms-LPL) are proprietary software licenses where
483-527: A Text Formatting System package priced at $ 200. The TCP/IP stack for AIX PS/2 retailed for another $ 300. The X Window System package was priced at $ 195, and featured a graphical environment called the AIXwindows Desktop , based on IXI's X.desktop . The C and FORTRAN compilers each had a price tag of $ 275. Locus also made available their DOS Merge virtual machine environment for AIX, which could run MS DOS 3.3 applications inside AIX; DOS Merge
552-540: A contentious move that resulted in v3 containing no PL.8 code and being somewhat more "pure" than v2. Other notable subsystems included: In addition, AIX applications can run in the PASE subsystem under IBM i . IBM formerly made the AIX for RS/6000 source code available to customers for an additional fee; in 1991, IBM customers could order the AIX 3.0 source code for a one-time charge of US$ 60,000; subsequently, IBM released
621-401: A copy can decide whether, and how much, to charge for a copy or related services. Proprietary software that comes for no cost is called freeware . Proponents of commercial proprietary software argue that requiring users to pay for software as a product increases funding or time available for the research and development of software. For example, Microsoft says that per-copy fees maximize
690-473: A file is not a sequence of bytes, but rather multiple disjoint sequences that may be accessed in parallel. The partitioning is such that it abstracts away the number and type of I/O nodes hosting the filesystem, and it allows a variety of logically partitioned views of files, regardless of the physical distribution of data within the I/O nodes. The disjoint sequences are arranged to correspond to individual processes of
759-564: A license for the Internet forum software vBulletin can modify the source for their own site but cannot redistribute it. This is true for many web applications, which must be in source code form when being run by a web server. The source code is covered by a non-disclosure agreement or a license that allows, for example, study and modification, but not redistribution. The text-based email client Pine and certain implementations of Secure Shell are distributed with proprietary licenses that make
SECTION 10
#1732787290810828-560: A monopoly position. Proprietary software may also have licensing terms that limit the usage of that software to a specific set of hardware. Apple has such a licensing model for macOS , an operating system which is limited to Apple hardware, both by licensing and various design decisions. This licensing model has been affirmed by the United States Court of Appeals for the Ninth Circuit . Proprietary software which
897-480: A parallel application, allowing for improved scalability. Vesta was commercialized as the PIOFS filesystem around 1994, and was succeeded by GPFS around 1998. The main difference between the older and newer filesystems was that GPFS replaced the specialized interface offered by Vesta/PIOFS with the standard Unix API : all the features to support high performance parallel I/O were hidden from users and implemented under
966-477: A policy to control initial data placement or data migration. Data in a single fileset can reside in one or more storage pools. Where the file data resides and how it is migrated is based on a set of rules in a user defined policy. There are two types of user defined policies: file placement and file management. File placement policies direct file data as files are created to the appropriate storage pool. File placement rules are selected by attributes such as file name,
1035-481: A single user or computer. In some cases, software features are restricted during or after the trial period, a practice sometimes called crippleware . Proprietary software often stores some of its data in file formats that are incompatible with other software, and may also communicate using protocols which are incompatible. Such formats and protocols may be restricted as trade secrets or subject to patents . A proprietary application programming interface (API)
1104-462: A software package may be ended to force users to upgrade and pay for newer versions ( planned obsolescence ). Sometimes another vendor or a software's community themselves can provide support for the software, or the users can migrate to either competing systems with longer support life cycles or to FOSS -based systems. Some proprietary software is released by their owner at end-of-life as open-source or source available software, often to prevent
1173-425: A technical measure, such as product activation , a product key or serial number, a hardware key , or copy protection . Vendors may also distribute versions that remove particular features, or versions which allow only certain fields of endeavor, such as non-commercial, educational, or non-profit use. Use restrictions vary by license: Vendors typically distribute proprietary software in compiled form, usually
1242-406: A work of free software, even copyleft free software, can use dual-licensing to allow themselves or others to redistribute proprietary versions. Non-copyleft free software (i.e. software distributed under a permissive free software license or released to the public domain) allows anyone to make proprietary redistributions. Free software that depends on proprietary software is considered "trapped" by
1311-419: Is a clustered file system . It breaks a file into blocks of a configured size, less than 1 megabyte each, which are distributed across multiple cluster nodes. The system stores data on standard block storage volumes, but includes an internal RAID layer that can virtualize those volumes for redundancy and parallel access much like a RAID block storage system. It also has the ability to replicate across volumes at
1380-484: Is a software library interface "specific to one device or, more likely to a number of devices within a particular manufacturer's product range." The motivation for using a proprietary API can be vendor lock-in or because standard APIs do not support the device's functionality. The European Commission , in its March 24, 2004, decision on Microsoft's business practices, quotes, in paragraph 463, Microsoft general manager for C++ development Aaron Contorer as stating in
1449-712: Is a database of system information integrated into AIX, analogous to the registry in Microsoft Windows . A good understanding of the ODM is essential for managing AIX systems. Data managed in ODM is stored and maintained as objects with associated attributes . Interaction with ODM is possible via application programming interface (API) library for programs, and command-line utilities such as odmshow , odmget , odmadd , odmchange and odmdelete for shell scripts and users. SMIT and its associated AIX commands can also be used to query and modify information in
SECTION 20
#17327872908101518-714: Is certified to the UNIX 03 and UNIX V7 specifications of the Single UNIX Specification , beginning with AIX versions 5.3 and 7.2 TL5, respectively. Older versions were certified to the UNIX 95 and UNIX 98 specifications. AIX was the first operating system to implement a journaling file system . IBM has continuously enhanced the software with features such as processor, disk, and network virtualization , dynamic hardware resource allocation (including fractional processor units), and reliability engineering concepts derived from its mainframe designs. Unix began in
1587-489: Is no longer marketed, supported or sold by its owner is called abandonware , the digital form of orphaned works . If the proprietor of a software package should cease to exist, or decide to cease or limit production or support for a proprietary software package, recipients and users of the package may have no recourse if problems are found with the software. Proprietors can fail to improve and support software because of business problems. Support for older or existing versions of
1656-436: Is not synonymous with commercial software , although the two terms are sometimes used synonymously in articles about free software. Proprietary software can be distributed at no cost or for a fee, and free software can be distributed at no cost or for a fee. The difference is that whether proprietary software can be distributed, and what the fee would be, is at the proprietor's discretion. With free software, anyone who has
1725-400: Is required for another party to use the software. In the case of proprietary software with source code available, the vendor may also prohibit customers from distributing their modifications to the source code. Shareware is closed-source software whose owner encourages redistribution at no cost, but which the user sometimes must pay to use after a trial period. The fee usually allows use by
1794-578: Is scalable and can be run on many nodes at once. This allows management policies to be applied to a single file system with billions of files and complete in a few hours. IBM AIX AIX (pronounced / ˌ eɪ . aɪ . ˈ ɛ k s / ay-eye- EKS ) is a series of proprietary Unix operating systems developed and sold by IBM since 1986. The name stands for "Advanced Interactive eXecutive". Current versions are designed to work with Power ISA based server and workstation computers such as IBM's Power line. Originally released for
1863-537: Is the System Management Interface Tool for AIX. It allows a user to navigate a menu hierarchy of commands, rather than using the command line. Invocation is typically achieved with the command smit . Experienced system administrators make use of the F6 function key which generates the command line that SMIT will invoke to complete it. SMIT also generates a log of commands that are performed in
1932-463: Is the case with some patent-encumbered and EULA -bound software—from making use of the software on their own, thereby restricting their freedoms. Proprietary software is a subset of non-free software , a term defined in contrast to free and open-source software ; non-commercial licenses such as CC BY-NC are not deemed proprietary, but are non-free. Proprietary software may either be closed-source software or source-available software . Until
2001-469: The smit.script file. The smit.script file automatically records the commands with the command flags and parameters used. The smit.script file can be used as an executable shell script to rerun system configuration tasks. SMIT also creates the smit.log file, which contains additional detailed information that can be used by programmers in extending the SMIT system. smit and smitty refer to
2070-630: The IBM RT PC RISC workstation in 1986, AIX has supported a wide range of hardware platforms, including the IBM RS/6000 series and later Power and PowerPC -based systems, IBM System i , System/370 mainframes, PS/2 personal computers, and the Apple Network Server . Currently, it is supported on IBM Power Systems alongside IBM i and Linux . AIX is based on UNIX System V with 4.3BSD -compatible extensions. It
2139-687: The Power Macintosh hardware available at the time but were designed to use AIX (versions 4.1.4 or 4.1.5) as their native operating system in a specialized version specific to the ANS called AIX for Apple Network Servers. AIX was only compatible with the Network Servers and was not ported to standard Power Macintosh hardware. It should not be confused with A/UX , Apple's earlier version of Unix for 68k -based Macintoshes . The release of AIX version 3 (sometimes called AIX/6000 ) coincided with
GPFS - Misplaced Pages Continue
2208-425: The first-sale doctrine . The owner of proprietary software exercises certain exclusive rights over the software. The owner can restrict the use, inspection of source code, modification of source code, and redistribution. Vendors typically limit the number of computers on which software can be used, and prohibit the user from installing the software on extra computers. Restricted use is sometimes enforced through
2277-468: The machine language understood by the computer's central processing unit . They typically retain the source code , or human-readable version of the software, often written in a higher level programming language . This scheme is often referred to as closed source. While most proprietary software is distributed without the source code, some vendors distribute the source code or otherwise make it available to customers. For example, users who have purchased
2346-470: The AIX 3.1 source code in 1992, and AIX 3.2 in 1993. These source code distributions excluded certain files (authored by third-parties) which IBM did not have rights to redistribute, and also excluded layered products such as the MS-DOS emulator and the C compiler. Furthermore, in order to be able to license the AIX source code, the customer first had to procure source code license agreements with AT&T and
2415-625: The Free Software Foundation. This includes software written only for Microsoft Windows, or software that could only run on Java , before it became free software. Most of the software is covered by copyright which, along with contract law , patents , and trade secrets , provides legal basis for its owner to establish exclusive rights. A software vendor delineates the specific terms of use in an end-user license agreement (EULA). The user may agree to this contract in writing, interactively on screen ( clickwrap ), or by opening
2484-435: The ODM. ODM is stored on disk using Berkeley DB files. Example of information stored in the ODM database are: Proprietary software Proprietary software is software that grants its creator, publisher, or other rightsholder or rightsholder partner a legal monopoly by modern copyright and intellectual property law to exclude the recipient from freely sharing the software or modifying it, and—in some cases, as
2553-563: The S/370 platform to be used as a build host for the 5ESS switch 's software. During this process, IBM made modifications to the TSS/370 Resident Supervisor to better support Unix. In 1984, IBM introduced its own Unix variant for the S/370 platform called VM/IX, developed by Interactive Systems Corporation using Unix System III. However, VM/IX was only available as a PRPQ (Programming Request for Price Quotation) and
2622-502: The University of California, Berkeley. The default shell was Bourne shell up to AIX version 3, but was changed to KornShell (ksh88) in version 4 for XPG4 and POSIX compliance. The Common Desktop Environment (CDE) is AIX's default graphical user interface . As part of Linux Affinity and the free AIX Toolbox for Linux Applications (ATLA), open-source KDE Plasma Workspaces and GNOME desktop are also available. SMIT
2691-419: The announcement of the first POWER1 -based IBM RS/6000 models in 1990. AIX v3 innovated in several ways on the software side. It was the first operating system to introduce the idea of a journaling file system , JFS , which allowed for fast boot times by avoiding the need to ensure the consistency of the file systems on disks (see fsck ) on every reboot. Another innovation was shared libraries which avoid
2760-416: The box containing the software ( shrink wrap licensing ). License agreements are usually not negotiable . Software patents grant exclusive rights to algorithms, software features, or other patentable subject matter , with coverage varying by jurisdiction. Vendors sometimes grant patent rights to the user in the license agreement. The source code for a piece of proprietary software is routinely handled as
2829-592: The distinction of being built on top of SNA, and thereby being fully compatible with DS on IBM mainframe systems and on midrange systems running OS/400 through IBM i . For the graphical user interfaces, AIX v2 came with the X10R3 and later the X10R4 and X11 versions of the X Window System from MIT, together with the Athena widget set . Compilers for Fortran and C were available. AIX PS/2 (also known as AIX/386 )
GPFS - Misplaced Pages Continue
2898-525: The early 1970s at AT&T 's Bell Labs research center, running on DEC minicomputers . By 1976, the operating system was used in various academic institutions, including Princeton , where Tom Lyon and others ported it to the S/370 to run as a guest OS under VM/370 . This port later grew into UTS , a mainframe Unix offering from IBM's competitor Amdahl Corporation . IBM's involvement with Unix began in 1979 when it assisted Bell Labs in porting Unix to
2967-595: The first commercial RISC chip. This was based on a design pioneered at IBM Research (the IBM 801 ). One of the novel aspects of the RT design was the use of a microkernel , called Virtual Resource Manager (VRM). The keyboard, mouse, display, disk drives and network were all controlled by a microkernel. One could "hotkey" from one operating system to the next using the Alt-Tab key combination. Each OS in turn would get possession of
3036-514: The grouping of disks within a file system. An administrator can create tiers of storage by grouping disks based on performance, locality or reliability characteristics. For example, one pool could be high-performance Fibre Channel disks and another more economical SATA storage. A fileset is a sub-tree of the file system namespace and provides a way to partition the namespace into smaller, more manageable units. Filesets provide an administrative boundary that can be used to set quotas and be specified in
3105-424: The higher file level. Features of the architecture include Other features include high availability, ability to be used in a heterogeneous cluster, disaster recovery, security, DMAPI , HSM and ILM . Hadoop 's HDFS filesystem, is designed to store similar or greater quantities of data on commodity hardware — that is, datacenters without RAID disks and a storage area network (SAN). Storage pools allow for
3174-496: The hood. GPFS also shared many components with the related products IBM Multi-Media Server and IBM Video Charger, which is why many GPFS utilities start with the prefix mm —multi-media. In 2010, IBM previewed a version of GPFS that included a capability known as GPFS-SNC, where SNC stands for Shared Nothing Cluster. This was officially released with GPFS 3.5 in December 2012, and is now known as FPO (File Placement Optimizer). It
3243-623: The host operating system, and as a guest under VM . AIX/ESA, while technically advanced, had little commercial success, partially because UNIX functionality was added as an option to the existing mainframe operating system, MVS , as MVS/ESA SP Version 4 Release 3 OpenEdition in 1994, and continued as an integral part of MVS/ESA SP Version 5, OS/390 and z/OS, with the name eventually changing from OpenEdition to Unix System Services . IBM also provided OpenEdition in VM/ESA Version 2 through z/VM. As part of Project Monterey , IBM released
3312-504: The keyboard, mouse and display. Besides AIX v2, the PICK OS also included this microkernel. Much of the AIX v2 kernel was written in the PL.8 programming language, which proved troublesome during the migration to AIX v3. AIX v2 included full TCP/IP networking, as well as SNA and two networking file systems: NFS , licensed from Sun Microsystems , and Distributed Services (DS). DS had
3381-447: The late 1960s, computers—especially large and expensive mainframe computers , machines in specially air-conditioned computer rooms—were usually leased to customers rather than sold . Service and all software available were usually supplied by manufacturers without separate charge until 1969. Computer vendors usually provided the source code for installed software to customers. Customers who developed software often made it available to
3450-619: The legal status of software copyright , especially for object code , was not clear until the 1983 appeals court ruling in Apple Computer, Inc. v. Franklin Computer Corp . According to Brewster Kahle the legal characteristic of software changed also due to the U.S. Copyright Act of 1976 . Starting in February 1983 IBM adopted an " object-code -only" model for a growing list of their software and stopped shipping much of
3519-421: The need for static linking from an application to the libraries it used. The resulting smaller binaries used less of the hardware RAM to run, and used less disk space to install. Besides improving performance, it was a boon to developers: executable binaries could be in the tens of kilobytes instead of a megabyte for an executable statically linked to the C library . AIX v3 also scrapped the microkernel of AIX v2,
SECTION 50
#17327872908103588-712: The public without charge. Closed source means computer programs whose source code is not published except to licensees. It is available to be modified only by the organization that developed it and those licensed to use the software. In 1969, IBM, which had antitrust lawsuits pending against it, led an industry change by starting to charge separately for mainframe software and services, by unbundling hardware and software. Bill Gates ' " Open Letter to Hobbyists " in 1976 decried computer hobbyists' rampant copyright infringement of software, particularly Microsoft's Altair BASIC interpreter, and asserted that their unauthorized use hindered his ability to produce quality software. But
3657-498: The same program, though smitty invokes the text-based version, while smit will invoke an X Window System based interface if possible; however, if smit determines that X Window System capabilities are not present, it will present the text-based version instead of failing. Determination of X Window System capabilities is typically performed by checking for the existence of the DISPLAY variable. Object Data Manager ( ODM )
3726-561: The software from becoming unsupported and unavailable abandonware . 3D Realms and id Software are famous for the practice of releasing closed source software into the open source . Some of those kinds are free-of-charge downloads ( freeware ), some are still commercially sold (e.g. Arx Fatalis ). More examples of formerly closed-source software in the List of commercial software with available source code and List of commercial video games with available source code . Proprietary software
3795-484: The software. This is particularly common with certain programming languages . For example, the bytecode for programs written in Java can be easily decompiled to somewhat usable code, and the source code for programs written in scripting languages such as PHP or JavaScript is available at run time . Proprietary software vendors can prohibit the users from sharing the software with others. Another unique license
3864-402: The source code available. Some licenses for proprietary software allow distributing changes to the source code, but only to others licensed for the product, and some of those modifications are eventually picked up by the vendor. Some governments fear that proprietary software may include defects or malicious features which would compromise sensitive information. In 2003 Microsoft established
3933-476: The source code is made available . Governments have also been accused of adding such malware to software themselves. According to documents released by Edward Snowden , the NSA has used covert partnerships with software companies to make commercial encryption software exploitable to eavesdropping, or to insert backdoors . Software vendors sometimes use obfuscated code to impede users who would reverse engineer
4002-606: The source code, even to licensees. In 1983, binary software became copyrightable in the United States as well by the Apple vs. Franklin law decision, before which only source code was copyrightable. Additionally, the growing availability of millions of computers based on the same microprocessor architecture created for the first time an unfragmented and big enough market for binary distributed software. Software distributions considered as proprietary may in fact incorporate
4071-585: The standard OS for the Apple Network Server line by Apple Computer . In the late 1990s, under Project Monterey , IBM and the Santa Cruz Operation attempted to integrate AIX and UnixWare into a multiplatform Unix for Intel IA-64 architecture. The project was discontinued in 2002 after limited commercial success. In 2003, the SCO Group filed a lawsuit against IBM, alleging misappropriation of UNIX System V source code in AIX. The case
4140-413: The user name or the fileset. File management policies allow the file's data to be moved or replicated or files to be deleted. File management policies can be used to move data from one pool to another without changing the file's location in the directory structure. File management policies are determined by file attributes such as last access time, path name or size of the file. The policy processing engine
4209-498: Was IBM's fourth attempt to offer Unix-like functionality for their mainframe line, specifically the System/370 (the prior versions were a TSS/370 -based Unix system developed jointly with AT&T c.1980, a VM/370 -based system named VM/IX developed jointly with Interactive Systems Corporation c.1984, and a VM/370 -based version of TSS/370 named IX/370 which was upgraded to be compatible with UNIX System V ). AIX/370
SECTION 60
#17327872908104278-492: Was developed by Locus Computing Corporation under contract to IBM. AIX PS/2, first released in October 1988, ran on IBM PS/2 personal computers with Intel 386 and compatible processors. The product was announced in September 1988 with a baseline tag price of $ 595, although some utilities, such as UUCP , were included in a separate Extension package priced at $ 250. nroff and troff for AIX were also sold separately in
4347-575: Was developed for the IBM RT PC workstation by IBM in conjunction with Interactive Systems Corporation , who had previously ported UNIX System III to the IBM PC for IBM as PC/IX . According to its developers, the AIX source (for this initial version) consisted of one million lines of code. Installation media consisted of eight 1.2M floppy disks . The RT was based on the IBM ROMP microprocessor ,
4416-484: Was initially designed to support high throughput multimedia applications. This design turned out to be well suited to scientific computing. Another ancestor is IBM's Vesta filesystem, developed as a research project at IBM's Thomas J. Watson Research Center between 1992 and 1995. Vesta introduced the concept of file partitioning to accommodate the needs of parallel applications that run on high-performance multicomputers with parallel I/O subsystems. With partitioning,
4485-540: Was not a General Availability product. It was replaced in 1985 by IBM IX/370, a fully supported product based on AT&T's Unix/360 6th Edition, later updated to Unix System V. In 1986, IBM introduced AIX Version 1 for the IBM RT PC workstation. It was based on UNIX System V Releases 1 and 2, incorporating source code from 4.2 and 4.3 BSD UNIX. AIX Version 2 followed in 1987 for the RT PC. In 1990, AIX Version 3
4554-515: Was released for the POWER -based RS/6000 platform. It became the primary operating system for the RS/6000 series, which was later renamed IBM eServer pSeries , IBM System p , and finally IBM Power Systems . AIX Version 4, introduced in 1994, added symmetric multiprocessing and evolved through the 1990s, culminating with AIX 4.3.3 in 1999. A modified version of Version 4.1 was also used as
4623-524: Was released in 1990 with functional equivalence to System V Release 2 and 4.3BSD as well as IBM enhancements. With the introduction of the ESA/390 architecture, AIX/370 was replaced by AIX/ESA in 1991, which was based on OSF/1 , and also ran on the System/390 platform. This development effort was made partly to allow IBM to compete with Amdahl UTS . Unlike AIX/370, AIX/ESA ran both natively as
4692-536: Was resolved in 2010 when a jury ruled that Novell owned the rights to Unix, not SCO. AIX 6 was announced in May 2007 and became generally available on November 9, 2007. Key features included role-based access control , workload partitions , and Live Partition Mobility . AIX 7.1 was released in September 2010 with enhancements such as Cluster Aware AIX and support for large-scale memory and real-time application requirements. The original AIX (sometimes called AIX/RT )
4761-509: Was sold separately for another $ 250. IBM also offered a $ 150 AIX PS/2 DOS Server Program, which provided file server and print server services for client computers running PC DOS 3.3. The last version of PS/2 AIX is 1.3. It was released in 1992 and announced to add support for non-IBM (non-microchannel) computers as well. Support for PS/2 AIX ended in March 1995. In 1988, IBM announced AIX/370 , also developed by Locus Computing. AIX/370
#809190