Risk
2/1/2010
10:49 PM
Bob Evans
Bob Evans
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Global CIO: IBM Calls Out Oracle's Ellison On Database Claims

Ellison said Oracle-Sun "blew the doors off" IBM's top database system, but IBM says he's blowing hot air.

Back in April when Oracle announced its intention to acquire Sun—ironically, shortly after IBM dropped its bid to make that deal—Ellison said he pushed his team to "look at Sun's current Sparc and Solaris technology, and our current database technology, and marry them up and see how we compared to IBM's largest and fastest servers. IBM was then the record-holder in TCP database performance." The result, Ellison said, was that "we blew the doors off of IBM. We crushed them. In a machine that takes up less than 10% of the floor space of IBM's record-setting computer, we ran faster—a lot faster—using only a tiny fraction of the floor space, a tiny fraction of the power, and it costs less."

IBM's not buying that story, however, and Spang said a lot of CIOs as well are failing to buy it. In the second half of 2009, he said, more than 100 companies running SAP applications on top of Oracle databases replaced those databases with DB2.

"The reason why is part of a broader trend of better performance and lower costs—we've done a lot with improved automation of tasks built into DB2, particularly with SAP optimizations," he said. "So I thought [Ellison's assertion] was amusing."

One customer that checked out databases from both companies for use in medical research is BJC Healthcare, which runs 13 hospitals and needed to build a 3-terabyte database of patient treatment and histories to allow trends and patterns to be spotted so that diagnoses and treatment could be more effective.

BJC ended up choosing IBM for a number of reasons, said lead architect Tom Holdener, and the organization's been very happy with its choice after giving each company an equal chance at winning its business.

"The IBM installation was easy to do, they gave us lots of help, and answered all of our questions in a very timely fashion," Holdener said. "We had it up quickly and within a week had data flowing into it. With Oracle, they were slow in response to our questions, and it took longer to set up, and after it was set up we found that only about 90% of the data was accepted—we weren't sure what was going on with the other 10%."

Calls to Oracle were not returned, he said, until two weeks later, and BJC chose IBM. The new system, which lets researchers see only the relevant portions of patients' charts and protects confidentiality, has collapsed the time required for some queries from weeks or even months to 10-15 minutes for most inquiries, or just less than a day for the most complex.

It's not the first scrap between IBM and Oracle and it sure won't be the last, and as a result CIOs should be able to play these aggressive and capable adversaries against each other to gain terms and levels of service that might not have been available before. Isn't competition a great thing?

RECOMMENDED READING:

Global CIO: Oracle's Ellison Challenges IBM, NetApp And—Well—Everyone

Global CIO: Oracle CEO Larry Ellison's Top 10 Reasons For Buying Sun

Global CIO: Oracle CEO Larry Ellison On The Future Of IT

Global CIO: Oracle-Sun A Bad Deal? Only A Fool Would Say That

Oracle Sees Unconditional EU Approval For Sun

Global CIO: Why Oracle's Larry Ellison Will Tell The EU To Pound Sand

IBM CEO Sam Palmisano Talks With Global CIO

Global CIO: An Open Letter To Oracle CEO Larry Ellison

Global CIO: Where Do Oracle's Profits Come From?

Global CIO: Oracle Dumps HP After Co-Creating 'Most Successful Introduction Ever'

Global CIO: Sam Palmisano's Grand Strategy For IBM

Global CIO: In Oracle Vs. SAP, IBM Could Tip Balance

Global CIO: Upheaval In The IT Industry: The End Of The World As We Knew It

Global CIO: IBM's Game-Changing Plunge Into Predictive Analytics

Global CIO: An Open Letter To Hewlett-Packard CEO Mark Hurd

Global CIO: Hewlett-Packard CEO Hurd's Strategy: The Infrastructure Company

GlobalCIO Bob Evans is senior VP and director of InformationWeek's Global CIO unit.

To find out more about Bob Evans, please visit his page.

For more Global CIO perspectives, check out Global CIO,
or write to Bob at bevans@techweb.com.

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

CVE-2014-7292
Published: 2014-10-23
Open redirect vulnerability in the Click-Through feature in Newtelligence dasBlog 2.1 (2.1.8102.813), 2.2 (2.2.8279.16125), and 2.3 (2.3.9074.18820) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter to ct.ashx.

CVE-2014-8071
Published: 2014-10-23
Multiple cross-site scripting (XSS) vulnerabilities in OpenMRS 2.1 Standalone Edition allow remote attackers to inject arbitrary web script or HTML via the (1) givenName, (2) familyName, (3) address1, or (4) address2 parameter to registrationapp/registerPatient.page; the (5) comment parameter to all...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.