Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:00 PM
Fritz Nelson
Fritz Nelson
Connect Directly

LulzSec Intrigue; Hurd Talks Oracle's Real Battle

A youthful hacker on a remote island surfaces. Plus Mark Hurd goes one-on-one about what Oracle really wants.

InformationWeek Now - What's Hot Right Now
LulzSec's alleged spokesperson (spokeschild?) was arrested late last week, but Scotland Yard may have nabbed the wrong miscreant, or maybe not. It's very confusing. Windows Phone 7 is starting to gain some momentum, and whenever Nokia comes out with its first Windows Phone 7 device, sales will start to scream; or maybe the projections are more pedestrian, perhaps even disappointing. SAP gained market share on Oracle this past quarter, but then again Oracle's Exadata is on fire, so I'm not really sure what to believe. The iPhone 5, about which Apple has said nothing, is coming in September; unless, that is, it's really coming in October.

What to believe. Why to care. Those questions plague me daily.

The LulzSec spokesman catch-and-release is the equivalent of National Enquirer-style news for the technology industry. It makes for fun reading and idle gossip. These seemingly youthful hackers (Jake Davis, the arrested alleged hacker, is all of 18) take pleasure in boasting about their exploits in colorful, defiant language, undoubtedly honed through a youth miss-spent on discussion boards, instant messaging, and texting. It probably doesn't really matter if Scotland Yard caught the spokesboy or just another random member, because the cause will continue unabated.

The InfoSec concerns run much more broadly, and far more deeply than all of this theatrical hacking--although, it shouldn't be dismissed, either. This week kicks off another Black Hat conference--the popular destination for security researchers to demonstrate and discuss the latest exploits and vulnerabilities. Today, Dark Reading contributor Robert Lemos writes about weaknesses in chip-and-PIN authentication, which is an underlying technology for transactions, especially in the retail industry. You can follow all of our Black Hat coverage on InformationWeek, and on Dark Reading, especially our Black Hat special report page.

Meanwhile, InformationWeek's Doug Henschen had a chance to talk with SAP co-CEO Bill McDermott on the heels of SAP's stellar earnings last week, and the focus on SAP's market share growth (its first gain on Oracle in 18 months, Henschen points out). SAP wants us to believe that these results signal a certain momentum for the company, and specifically that it provides evidence that its software and innovation are winning the day while IT spends fewer dollars on increasingly commoditized hardware and maintaining legacy systems. "What's the evidence of this trend?" Henschen asks. "You need only look at the financials of the major hardware companies, which 'haven't reported the kind of numbers that we've reported,' McDermott said in an interview with InformationWeek." SAP's software revenues climbed 26%.

And yet . . . to paint SAP as the majority stockholder on innovation is to shade the discussion entirely with a quarter's worth of financial results. Oracle has quite loudly and noticeably become a different company, if only on the surface. While Oracle's database still holds a vast majority of the world's data (anywhere from 65-70%, according to Oracle), this is a company that is now selling both an application suite (Fusion) and hardware (Sun), and whose hottest selling product right now is Exadata, Oracle President Mark Hurd told me last week, re-iterating what he said in Oracle's quarterly financial analyst call in June. Exalogic, he added, is not far behind.

I'm also not sure that Oracle sees a hardware-oriented world any more than SAP does. Hurd, who ran Hewlett-Packard for several years, didn't mention hardware during our conversation. He also dispelled the notion that Oracle just wants to sell its vertical stack . . . lock, stock, and barrel. Indeed, Hurd said that Oracle wants to have the absolute best product at every layer of the that stack (hardware, OS, middleware, database, horizontal applications, vertical applications), and that the company understands that many customers want to take a modular approach in building out their IT investments. Hurd said that too often Oracle has been painted by the media as being singularly focused on the integrated stack.

This might be true, and he might be responding to what Oracle is hearing from its customers. Henschen points to InformationWeek's latest enterprise application research report, in which our readers overwhelmingly say that the integration of applications with existing infrastructure is the most important that criteria they seek from their enterprise application provider.

Once again, it doesn't matter what each company says as much as it matters what they do, and as Henschen highlights, both Oracle and SAP have worked together to make sure they've certified their products (applications, databases, data warehousing appliances) to work with the others'. Not because they want to (they don't), but because customers demand it.

And that is why our report today on disappointing Windows Phone 7 sales figures (estimates for 2011) should be taken with a grain of salt. Yes, those numbers, which some dub "catastrophic," reflect current customer demand. But they also reflect the early going of a new product and a new mobile direction for Microsoft--one that has been plagued by delays, missing features, and being last to market.

What those numbers don't reflect is the muscle that Microsoft is always capable of putting behind a product it thinks is crucial to its success. Microsoft does not want to lose here, and the newest version of Windows Phone 7, called Mango, due out soon, puts the OS more on par with other mobile platforms.

And yet . . . even as those other platforms keep jumping further ahead, Microsoft plods along.

What do customers say? In a recent survey that we'll publish later this month, Windows Phone 7 does surprisingly well among the InformationWeek readership: more companies plan to adopt it than you'd expect, and more developers plan to write Windows Phone 7 applications for it than you might believe.

But as a wise man once told me: Believe none of what you hear, and only half of what you see.

Fritz Nelson is the editorial director for InformationWeek and the Executive Producer of TechWebTV. Fritz writes about startups and established companies alike, but likes to exploit multiple forms of media into his writing.

Follow Fritz Nelson and InformationWeek on Twitter, Facebook, YouTube, LinkedIn, and Google+:

ERP is old news, but enhancing legacy software with mobile, analytics, and social apps can deliver substantial new value. Also in the new, all-digital issue of InformationWeek: SaaS can create new data silos unless companies follow best practices to make those apps work with on-premises systems and data sources. Download the issue now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.