Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

12/9/2009
11:31 AM
Bob Evans
Bob Evans
Commentary
50%
50%

Global CIO: IBM Supports Oracle But Microsoft Kisses EU Ring

IBM exec Steve Mills says MySQL doesn't compete with Oracle, but Microsoft obsequiously awaits its chance to kiss the EU's ring by demonizing Larry Ellison's company.

Saying that MySQL "comes in at the bottom" of the database market and is "not used for sophisticated" tasks, IBM software chief Steve Mills says MySQL presents no competitive threat to database products from IBM and Oracle and should not be a dealbreaker with the EU. How does the line go? "Keep your friends close, and your enemies closer . . . ."

With testimony from friends and enemies of Oracle expected to come tomorrow and Friday at EU hearings in Brussels, Mills made his comments yesterday in a Financial Times article:

Critics claim MySQL is an important rival to Oracle's own core database business. But the IBM software chief said MySQL posed little direct challenge to database products from groups such as IBM and Oracle.

"It's certainly not the most sophisticated database in the marketplace," Mr Mills said. "It's not used for sophisticated query and analysis things."

This is both remarkable and, then again, quite sensible: remarkable because, since Oracle and IBM compete aggressively and sometimes viciously in the high-end database market, we might expect IBM to join the rotten-tomato throwers in the managed-economy side of the house that the EU seeks to establish as the norm.

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our new online community and information resource for CIOs operating in the global economy.

But it's also quite sensible in a more sophisticated way because if IBM were to join Microsoft and SAP in their silly and short-sighted support for the EU's fool's errand, then the result would be even more influence and power accruing to the EU in its desire to hold sway over how businesses operate, what businesses can and can't do, and how competition is defined.

And the crazy thing is, IBM does indeed have a dog in this fight because it battles Oracle day in and day out on multiple fronts around the world. On top of that, Larry Ellison has said very publicly and very specifically that Oracle's goal is to compete with and beat IBM software, hardware, and systems.

So if anybody's got a reason to want to try to slow down the Oracle-Sun deal, it's IBM—but Mills is having none of that. In fact, Mills is saying very specifically that there is no anticompetitive threat—that such fantasies are baseless—that MySQL, as Oracle has said all along, is a totally different animal serving totally different masters than Oracle's databases.

Look at IBM's track record of acquisitions in the software business: in the past several years, it has acquired more than 20 companies in the BI field alone. And it surely is not done buying companies, especially in its high-growth areas of software and services, and it surely intends to leverage the companies and products it buys across the globe.

That means in Europe. That means the EU. And that means that for some deals down the road, IBM could well be in the spot Oracle's in right now, which I define as a political trap in which the only way out is for Oracle to prove a negative: it has to prove that it doesn't and won't stifle competition with MySQL.

If the EU succeeds in having its way with Oracle, then the already plumped-up popinjays of Brussels will feel that nothing is beyond their reach, that no move is too intrusive, and that businesses exist to answer to them.

That might be the world that SAP and Microsoft would prefer, as evidenced by their intentions to testify on how much damage the free market would suffer if Oracle would be allowed to acquire Sun, but IBM appears to have no desire to try to operate and innovate and grow and evolve in a global marketplace where it has to kneel and kiss the EU's ring each time it wants to do a deal.

Look at Mills' comments in the FT about the competitive reality:

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...