Feeds

IBM and BI - I take it all back

Small shareholding at the leading edge

3 Big data security analytics techniques

Comment Okay, I confess. I have been beating IBM up about how it needs to buy a BI player in order to be a credible player in the space, and it turns out that I got it all wrong, because IBM already owns a BI player. Well, actually, a bit of a BI vendor. A very small bit. And I’m not actually sure the information management people actually know about it but, nevertheless, IBM owns a very small (less than 5 per cent) portion of a New Zealand based company called Descisys.

Now, despite the fact the company has been around for years, you probably haven’t heard of Descisys. However, last year the company raised some VC funding (having been privately funded previously) and re-branded itself as Information Edge, at the same time opening offices in the UK (where HM Treasury and Abbey National are customers) and the US.

So, what does Information Edge do that you might be interested in? Well, the company has some special-purpose analytic applications in the government and telco spaces, but the most interesting thing is its TeraSolve product.

To put it simply, TeraSolve is ROLAP with dynamic (rather than static) cubes, which not only does more than ROLAP can do, but does it, according to the company, ten times faster. However, where it is similar to ROLAP is that it still relies on the relational database for storage; it is just that it stores the data differently and more efficiently.

TeraSolve was originally designed to run on DB2 but has since been ported to both Oracle and SQL Server. It provides multi-dimensional functionality without actually ever instantiating this. There are two parts to this: first, it separates the data from the metadata so that all the relationship information about dimensions and hierarchies is stored separately from the data. And secondly, the aggregated data you want to retrieve is stored as BLOBS (binary large objects or, probably more accurately in this case, binary small objects). On the surface of it, this appears weird, but TeraSolve includes its own indexing techniques for this data and optimisation to ensure maximum storage and retrieval capabilities.

In addition to performance, there are a lot of advantages to this approach. First, there is no sparsity issue: if there is no data in a cell it is not stored. Secondly, the back-up, failover and security facilities that normally apply to relational databases, and which are typically superior to OLAP, all directly apply to TeraSolve data. Thirdly, you can support any size of cube with any number of dimensions: having to support multiple cubes can be a real pain that limits scalability. Fourth, it is very easy and quick to add a new dimension, say. In contrast, it might take months to make such a change in a conventional environment. And, finally, because the metadata is separated from the data you can change either without affecting the other. For those of you familiar with Kalido, this is very similar: it means the data is isolated from changes to corporate structures and, indeed, could be used to help test potential structures as well as maintaining a sort of corporate history.

You might think that was it: that’s a pretty good roll call of advantages. However, there is one more unique feature of TeraSolve, which is that it uses declarative processes for calculations. Other products use a procedural approach. Now, the problem with procedural methods is that the order in which you specify operations can make a difference to the result. Most people aren’t aware of this. It doesn’t mean that there are errors in the calculations your system makes but there may be. When, in proofs of concept, Information Edge has come up with different answers from the incumbent supplier it has to demonstrate that it is right and the previous methods were wrong—fortunately, it is able to do that.

By all these counts TeraSolve is an impressive product and it could transform the processing of aggregated queries. Indeed, it could be as disruptive a force for traditional ROLAP as appliances are in the wider data warehousing market. Given that IBM owns a (small) chunk of Information Edge, it should take a closer interest.

Copyright © 2006, IT-Analysis.com

Top three mobile application threats

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
IRS boss on XP migration: 'Classic fix the airplane while you're flying it attempt'
Plus: Condoleezza Rice at Dropbox 'maybe she can find ... weapons of mass destruction'
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.