IBM's AIX 5L passes DII COE kernel test

The Defense Information Systems Agency has certified IBM Corp.'s proprietary Unix operating system for the Defense Information Infrastructure's Common Operating Environment.

AIX 5L, running on an IBM 7044-170 workstation, is the first platform to be certified under DII COE Version 4, said Greg Lefelar, Unix server sales manager for the IBM federal group.

The Kernel Platform Compliance Program has certified three other Posix platforms under DII COE Version 3. Those combinations are Hewlett-Packard Co.'s Tru64 Unix on an XP1000 workstation, SGI Irix 6.5.3 on an SGI Origin 200 server and O2 workstation, and Caldera Inc.'s UnixWare 7.1.0 on a Unisys Corp. VX1800 ClearPath server.

Although IBM has been selling AIX systems for years, Lefelar said company officials had counted on open-standards bodies to manage Unix standardization, so they did not pay a laboratory to obtain the Defense Department certification.

'Too much DOD opportunity slipped through our hands, and we chose to do something about it,' Lefelar said.

IBM also made a commitment to Boeing Co. and TRW Inc. to gain DII COE certification so that IBM p690 eServers could be incorporated into the Ground-based Midcourse Defense program, Lefelar said.

Under the program'formerly known as the National Missile Defense Program'prime contractor Boeing will install 66 eight- to 32-way p690 systems at DOD sites. The p690 is IBM's high-end multiprocessor Unix server.

The IBM 7044-170 workstation on which AIX 5L was tested for the DII COE kernel certification is part of the same product line as the p690 eServer. Also known as the RS/6000 44P Model 170, it has a single IBM 64-bit Power3-II processor.

A list of all platforms validated for DII COE compliance is online at


  • automated processes (Nikolay Klimenko/

    How the Army’s DORA bot cuts manual work for contracting professionals

    Thanks to robotic process automation, the time it takes Army contracting professionals to determine whether prospective vendors should receive a contract has been cut from an hour to just five minutes.

  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

Stay Connected