A file is a file, the saying goes, but not all files are the
same. Logically they are just bits on a disk; however, from a usage perspective
this is where the commonality ends. Databases are very different from plain
text files and have differing usage scenarios and storage performance needs.
Likewise, not all databases are the same. Oracle database solutions have
specific performance and data storage requirements that are part of Oracle’s
articulated strategy for storage, which involves clustering, disk management,
and replication, as well as promoting the Linux OS. The choice of storage
architecture affects database performance, storage utilization, suitability as
a high-availability solution, and the ability to tune and optimize the solution
to meet organizational goals. Organizations deploying storage solutions that
are not in alignment with Oracle’s strategy as instantiated by Oracle 10g, ASM,
and
To appreciate the significance of this announcement, one
must consider the depth of the technical and commercial relationship that the
two companies share, and the dependency upon one another that they have
developed over time. The Oracle Global Single Instance, which has been promoted
by Oracle as the driving force behind a multi-billion dollar IT
cost savings, runs on a variety of
Overall, this announcement will likely be welcomed by the
many organizations, large and small, that depend on Oracle databases to run
their businesses. Although vendor partnerships are common and sometimes
short-lived, it is a rarity in the industry for such a deep vendor relationship
to develop for a substantial period of time. The obvious joint investments made
by
Oracle Identity Management Ecosystem May Fertilize the Market
Oracle announced this week that it has added eight new members and more than doubled the size of its Identity Management ecosystem. Joining existing partners such as Authenex, F5 Networks, Giesecke & Devrient, Identity Engines, and Lenel Systems International are strong authentication providers Arcot, Imageware, and TriCipher; converged physical access control provider Quantum Secure; network access control providers Juniper Networks and ForeScout; privileged accounts management partner Cyber-Ark; and a secure, federated identity partner Pay By Touch. These new participating ISVs are working with Oracle to provide value-added integrations to Oracle Identity Management thereby delivering solutions that extend beyond traditional access and identity management infrastructures. Launched last year, the Oracle Extended Identity Management Ecosystem and Reference Architecture delivers integrations that make it easier for organizations to unify siloed security technologies into a comprehensive, standards-based identity management framework. Unifying these technologies with Oracle Identity Management enables customers to create a common security policy framework that spans heterogeneous systems and applications, lowers costs, and improves overall enterprise security. The expansion of the ecosystem is indicative of a commitment by Oracle to the identity management market and is likely predicated on its view of the continued demand for comprehensive identity and access management systems.
The information security market plays like a team sport.
Players in the market tend to group into three classes: large powerful vendors;
small new-technology vendors, and a group we call the “Goldilocks” vendors.
This last group is the smallest of the three and consists of security vendors
that have grown to a critical mass with revenues in excess of $100 million. We
believe that the Oracle IDM is designed to attract a bevy of smaller companies
who want to “draft” on Oracle much like racing car drivers
increase their advantage in a race by drafting vehicles in front of them. With
respect to the group named above, we believe that Juniper is the
”one thing that doesn’t belong” (to quote
Technologically it makes great sense for Oracle to open its ecosystem to any and all comers. In that way customers can choose between Oracle and something, or Oracle and something else. This arrangement also allows the smaller vendors to leverage off Oracle’s penetration and to focus some of their precious developmental activity on building the interfaces needed to optimize performance with Oracle software. Where the rubber meets the road, however, is in lead generation and deal control. While we applaud the kumbaya nature of the ecosystem, we’re adopting a wait-and-see attitude as to how this relationship affects the top line of players besides Oracle.
Looking to the Top500 Supercomputers
With much anticipated fanfare, the Top500 Supercomputer list
was announced this week at the International Supercomputing Conference in
Dresden, Germany. For the fourth time, the BlueGene/L System development by
A total of 289 systems (~58%) use Intel processors, 105
systems (21%) feature
Clusters remain the most common architecture in the TOP500
list. The list has 373 clusters, representing just under
three-quarters of all systems. HP Cluster Platform 3000BL and 4000BL systems
based on HP BladeSystem c-Class servers accounted for 152 entries on the list.
HP has the highest number of systems on the list with 40.6%,
Not surprisingly, the sheer amount of computational
horsepower listed on the Top500 has broken another record, and the table stakes
required to play in this game have jumped up about 50%
over six months ago. The industry’s ability to continue to shatter past
assumptions about performance limits has proven remarkably resilient and
perhaps serves notice that we should simply stop trying to define what the
limit of computing will ever be. Nevertheless, what we find most interesting in
the latest list is how prevalent, and how far up the totem pole blade-based
solutions have become. The Dell Abe system installed at NCSA ranked #8 overall,
These are remarkable achievements for an architecture that
for many is becoming the de facto IT platform of the future. From an overall
efficiency and cost perspective, this bodes well for the architecture and begs
the question: in the world of
Overall, we are impressed with the continued growth in
Savi Networks Employs RFID in Tracking of Colombian Cargo Shipments
Savi Networks and Emprevi Ltd. have officially launched the
first Radio Frequency Identification-based information network operating in
South America that automatically tracks the location and security status of
cargo shipments from in-country factories to sea ports. Emprevi, a
Colombia-based provider of logistics and security services for major importers
and exporters, contracted with Savi Networks to build the information network,
which extends between Emprevi's customers' manufacturing facilities,
intermediate transportation checkpoints, and ports. Readers throughout the
network capture data transmitted over radio waves from RFID-based e-Seals
affixed to containers, and route the information to the transportation security
software with ongoing location and security status, and delivers automated
alerts on security breaches and other exceptions that users can receive via
their emails, cell phones, or PDAs. The network is compatible with
There is an extricable connection between physical and information security, and global security infrastructure is the rule rather than the exception. While RFID may raise the privacy hackles of many U.S. citizens and privacy advocacy organizations, there can be no doubt of the technology’s value in securing commercial assets, especially those with high value. Maritime cargo in particular has generated significant concern, for two reasons at least. On the one hand, governments are concerned about terrorist exploitation of maritime cargo as a means to deliver a weapon of mass destruction; on the other hand, commercial entities are concerned about the safety of their personnel and their cargo especially in treacherous areas or areas of significant criminal activity such as narcotics.
The combination of an internationally based security systems provider such as Savi, especially with its Lockheed backing and a strong local presence such as that offered by Emprevi, has to be a winning one. We also note that there are specific industries that are to be addressed by the marketing of the services and that these industries are often marked by high value-added cargo. RFID technology appears to be non-intrusive as well as cost-effective. Furthermore, commercial organizations do not have the privacy concerns of consumer ones and are more inclined to dictate the use of a form of technology especially when it is perceived as a high added value by their customers. We expect to see RFID technology become more prevalent over time in commercial settings.