Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/17/2010
05:52 PM
Bob Evans
Bob Evans
Commentary
50%
50%

Global CIO: Oracle Foes Scurry To Curry Favor With Dictatorships

Spurned by his former heartthrob heroes in the EU, MySQL's founder now sings the praises of Russia and China.

Unable to convince even the semi-capitalists of the European Union to block Oracle's acquisition of Sun, the founder of MySQL is taking his sorry obstructionist grandstanding to the dictatorships of Russia and China in hopes of currying favor among their corrupt bureaucrats. Oh the irony: that's the very same China Google abandoned last week due to its oppressive stances toward its citizens' use of technology.

"China and Russia can still say No unless there's a real solution in place," MySQL founder Michael Widenius said in a press release earlier today. "They are powerful, self-confident and open-source-friendly countries and they have every right and opportunity to do a better job on this than the EU. Russia just decided to take more time for this review and China proved in the Panasonic-Sanyo case that it stood its ground even after a deal had been cleared by the US and the EU."

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our new online community and information resource for CIOs operating in the global economy.

Steamrolled in Brussels when the EU heard from large numbers of Oracle customers that the Sun acquisition would have no harmful effect on them, Widenius and his cohorts have shifted their petition-signing efforts to Russia and China. And while I hope Widenius meets with zero success in those countries, I also hope he realizes that these two countries on which he's pinning all his open-source hopes have been known to brandish what we could call a less-than-open view toward public efforts to gather signatures on petitions as well as online expressions of individual opinions.

Maybe he'll realize that the rule of law in Europe and the U.S.—imperfect though it may be—will force Oracle to stick to the 10 commitments it made to seal the EU deal and that no such sense of fairness and consistency will be forthcoming in China and Russia.

"The helpmysql.org campaign already has more than 600 supporters in China and more than 800 in Russia, almost double the number it had a week before," Widenius said in the press release. "The campaign will now work closely with its local supporters in order to support the work of the competition authorities in those two countries and will step up its efforts to collect signatures from local MySQL users."

In recent months, Widenius and his florid spokesman frequently issued equally glowing comments about the anti-capitalist popinjays of the EU, cooing about their vigor and rigor and predicting bad times for Oracle at the hands of those valiant stewards of parity and managed capitalism. Imagine my surprise, then, to see Widenius and his spokesman turn rather viciously on their former heartthrobs, replacing all that pillow talk with some rather harsh language.

Heck, Widenius could have spared himself a lot of emotional tribulations if he'd just read our Oct. 21 column, Global CIO: Can Oracle's Larry Ellison Keep MySQL From EU Whiners?, in which we said this:

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...