Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:31 AM
Bob Evans
Bob Evans

Global CIO: IBM Supports Oracle But Microsoft Kisses EU Ring

IBM exec Steve Mills says MySQL doesn't compete with Oracle, but Microsoft obsequiously awaits its chance to kiss the EU's ring by demonizing Larry Ellison's company.

Saying that MySQL "comes in at the bottom" of the database market and is "not used for sophisticated" tasks, IBM software chief Steve Mills says MySQL presents no competitive threat to database products from IBM and Oracle and should not be a dealbreaker with the EU. How does the line go? "Keep your friends close, and your enemies closer . . . ."

With testimony from friends and enemies of Oracle expected to come tomorrow and Friday at EU hearings in Brussels, Mills made his comments yesterday in a Financial Times article:

Critics claim MySQL is an important rival to Oracle's own core database business. But the IBM software chief said MySQL posed little direct challenge to database products from groups such as IBM and Oracle.

"It's certainly not the most sophisticated database in the marketplace," Mr Mills said. "It's not used for sophisticated query and analysis things."

This is both remarkable and, then again, quite sensible: remarkable because, since Oracle and IBM compete aggressively and sometimes viciously in the high-end database market, we might expect IBM to join the rotten-tomato throwers in the managed-economy side of the house that the EU seeks to establish as the norm.

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our new online community and information resource for CIOs operating in the global economy.

But it's also quite sensible in a more sophisticated way because if IBM were to join Microsoft and SAP in their silly and short-sighted support for the EU's fool's errand, then the result would be even more influence and power accruing to the EU in its desire to hold sway over how businesses operate, what businesses can and can't do, and how competition is defined.

And the crazy thing is, IBM does indeed have a dog in this fight because it battles Oracle day in and day out on multiple fronts around the world. On top of that, Larry Ellison has said very publicly and very specifically that Oracle's goal is to compete with and beat IBM software, hardware, and systems.

So if anybody's got a reason to want to try to slow down the Oracle-Sun deal, it's IBM—but Mills is having none of that. In fact, Mills is saying very specifically that there is no anticompetitive threat—that such fantasies are baseless—that MySQL, as Oracle has said all along, is a totally different animal serving totally different masters than Oracle's databases.

Look at IBM's track record of acquisitions in the software business: in the past several years, it has acquired more than 20 companies in the BI field alone. And it surely is not done buying companies, especially in its high-growth areas of software and services, and it surely intends to leverage the companies and products it buys across the globe.

That means in Europe. That means the EU. And that means that for some deals down the road, IBM could well be in the spot Oracle's in right now, which I define as a political trap in which the only way out is for Oracle to prove a negative: it has to prove that it doesn't and won't stifle competition with MySQL.

If the EU succeeds in having its way with Oracle, then the already plumped-up popinjays of Brussels will feel that nothing is beyond their reach, that no move is too intrusive, and that businesses exist to answer to them.

That might be the world that SAP and Microsoft would prefer, as evidenced by their intentions to testify on how much damage the free market would suffer if Oracle would be allowed to acquire Sun, but IBM appears to have no desire to try to operate and innovate and grow and evolve in a global marketplace where it has to kneel and kiss the EU's ring each time it wants to do a deal.

Look at Mills' comments in the FT about the competitive reality:


Recommended Reading:

1 of 2
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-04
Cross-site request forgery (CSRF) vulnerability in [Calendar01] free edition ver1.0.0 and [Calendar02] free edition ver1.0.0 allows remote attackers to hijack the authentication of administrators via unspecified vectors.
PUBLISHED: 2020-08-04
[Calendar01], [Calendar02], [PKOBO-News01], [PKOBO-vote01], [Telop01], [Gallery01], [CalendarForm01], and [Link01] [Calendar01] free edition ver1.0.0, [Calendar02] free edition ver1.0.0, [PKOBO-News01] free edition ver1.0.3 and earlier, [PKOBO-vote01] free edition ver1.0.1 and earlier, [Telop01] fre...
PUBLISHED: 2020-08-04
Privilege escalation vulnerability in SKYSEA Client View Ver.12.200.12n to 15.210.05f allows an attacker to obtain unauthorized privileges and modify/obtain sensitive information or perform unintended operations via unspecified vectors.
PUBLISHED: 2020-08-03
A GET-based XSS reflected vulnerability in Plesk Obsidian 18.0.17 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.
PUBLISHED: 2020-08-03
A GET-based XSS reflected vulnerability in Plesk Onyx 17.8.11 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.