Risk
2/1/2010
10:49 PM
Bob Evans
Bob Evans
Commentary
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Global CIO: IBM Calls Out Oracle's Ellison On Database Claims

Ellison said Oracle-Sun "blew the doors off" IBM's top database system, but IBM says he's blowing hot air.

Back in April when Oracle announced its intention to acquire Sun—ironically, shortly after IBM dropped its bid to make that deal—Ellison said he pushed his team to "look at Sun's current Sparc and Solaris technology, and our current database technology, and marry them up and see how we compared to IBM's largest and fastest servers. IBM was then the record-holder in TCP database performance." The result, Ellison said, was that "we blew the doors off of IBM. We crushed them. In a machine that takes up less than 10% of the floor space of IBM's record-setting computer, we ran faster—a lot faster—using only a tiny fraction of the floor space, a tiny fraction of the power, and it costs less."

IBM's not buying that story, however, and Spang said a lot of CIOs as well are failing to buy it. In the second half of 2009, he said, more than 100 companies running SAP applications on top of Oracle databases replaced those databases with DB2.

"The reason why is part of a broader trend of better performance and lower costs—we've done a lot with improved automation of tasks built into DB2, particularly with SAP optimizations," he said. "So I thought [Ellison's assertion] was amusing."

One customer that checked out databases from both companies for use in medical research is BJC Healthcare, which runs 13 hospitals and needed to build a 3-terabyte database of patient treatment and histories to allow trends and patterns to be spotted so that diagnoses and treatment could be more effective.

BJC ended up choosing IBM for a number of reasons, said lead architect Tom Holdener, and the organization's been very happy with its choice after giving each company an equal chance at winning its business.

"The IBM installation was easy to do, they gave us lots of help, and answered all of our questions in a very timely fashion," Holdener said. "We had it up quickly and within a week had data flowing into it. With Oracle, they were slow in response to our questions, and it took longer to set up, and after it was set up we found that only about 90% of the data was accepted—we weren't sure what was going on with the other 10%."

Calls to Oracle were not returned, he said, until two weeks later, and BJC chose IBM. The new system, which lets researchers see only the relevant portions of patients' charts and protects confidentiality, has collapsed the time required for some queries from weeks or even months to 10-15 minutes for most inquiries, or just less than a day for the most complex.

It's not the first scrap between IBM and Oracle and it sure won't be the last, and as a result CIOs should be able to play these aggressive and capable adversaries against each other to gain terms and levels of service that might not have been available before. Isn't competition a great thing?

RECOMMENDED READING:

Global CIO: Oracle's Ellison Challenges IBM, NetApp And—Well—Everyone

Global CIO: Oracle CEO Larry Ellison's Top 10 Reasons For Buying Sun

Global CIO: Oracle CEO Larry Ellison On The Future Of IT

Global CIO: Oracle-Sun A Bad Deal? Only A Fool Would Say That

Oracle Sees Unconditional EU Approval For Sun

Global CIO: Why Oracle's Larry Ellison Will Tell The EU To Pound Sand

IBM CEO Sam Palmisano Talks With Global CIO

Global CIO: An Open Letter To Oracle CEO Larry Ellison

Global CIO: Where Do Oracle's Profits Come From?

Global CIO: Oracle Dumps HP After Co-Creating 'Most Successful Introduction Ever'

Global CIO: Sam Palmisano's Grand Strategy For IBM

Global CIO: In Oracle Vs. SAP, IBM Could Tip Balance

Global CIO: Upheaval In The IT Industry: The End Of The World As We Knew It

Global CIO: IBM's Game-Changing Plunge Into Predictive Analytics

Global CIO: An Open Letter To Hewlett-Packard CEO Mark Hurd

Global CIO: Hewlett-Packard CEO Hurd's Strategy: The Infrastructure Company

GlobalCIO Bob Evans is senior VP and director of InformationWeek's Global CIO unit.

To find out more about Bob Evans, please visit his page.

For more Global CIO perspectives, check out Global CIO,
or write to Bob at bevans@techweb.com.

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web