Feeds

Object databases - alive and kicking?

New open mindedness in data storage

SANS - Survey on application security programs

Comment At a recent meeting with InterSystems (vendor of Caché and Ensemble) the company said it was seeing increased interest in object oriented databases.

Now, I must qualify this by saying that, first, Caché is not merely (or only) an object oriented database and, secondly, that this interest was primarily in the United States and, to a lesser extent, continental Europe - but not in the UK.

Third, of course, the information is purely anecdotal: interest and downloads do not amount to sales. However, it is worth noting that Versant (perhaps the leading pure play object database vendor) just recorded its highest quarterly net income since its IPO a decade ago. So perhaps there is something to this story. In which case, why should that be?

Mike Fuller of InterSystems expressed the opinion that graduates leaving university a decade ago are now in positions of authority, but without having gone through the previous object oriented hype of a decade ago: they are thus more prepared to look at an object database as a natural storage method when developing in, say, Java. There may some truth to that, but I think it is actually broader.

I think we have now reached a position where it is no longer a given that we have to use a relational database for everything. There has always been a peripheral awareness that non-relational databases have their place; witness the continuing use of Adabas (for which revenues continue to grow at a healthy rate) and the various multi-valued databases such as Uniface, UniVerse and Revelation, not to mention Caché itself (incidentally, in the latest release of Caché, the product will run Unidata and UniVerse applications natively, which may be useful to know if you are thinking of moving away from these platforms - other multi-valued databases will require some porting, though InterSystems reckons that 70 per cent to 80 per cent of the work needed can be automated).

However, peripheral awareness of older or different systems is not what was causing change. I think what is causing this change is twofold: first, we are thinking again about databases in general because of open source vendors such as Ingres and MySQL and even because of data warehouse appliances and, secondly, we are thinking again because of Sleepycat (now part of Oracle) and IBM.

In the case of Sleepycat Software, its Berkeley DB is essentially a file system with database management systems built around it. Many companies have woken up to the fact that you don't need a relational database to store static, structured data such as call data records or the sort of details that underpin Amazon or eBay. In fact, you don't even need to have a database management system, you can just use a flat file system together with indexing and SQL access via CopperEye Greenwich plus structured search from the same company. But the point is that, whichever approach you take, the raison d'être is that you don't need a relational approach to this.

Now add in IBM's Viper release of DB2 to this mix, which will be a hybrid relational/XML database, and here we have IBM saying, in effect, that relational is not always good enough. Now, various analysts have come to the same conclusion at various times but there is no good going on flogging a dead horse and it's a subject we've quietly dropped. However, with IBM finally coming out with the same message it is clear that the horse is no longer dead - it is very much alive and kicking.

Whether the object database market is reviving I don't know, but what I do know is that the old ways of thinking about storing data - always in a relational database - are no longer valid (if they ever were). Open source databases and appliances ask lots of questions, as do file systems, Caché, Viper and the rest. What companies need are storage mechanisms that are fit for purpose and that may vary widely depending on the data and application: if we are seeing a new open-mindedness, then that can only be a good thing.

Copyright © 2006, IT-Analysis.com

3 Big data security analytics techniques

More from The Register

next story
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
Got Windows 8.1 Update yet? Get ready for YET ANOTHER ONE – rumor
Leaker claims big release due this fall as Microsoft herds us into the CLOUD
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Patch iOS, OS X now: PDFs, JPEGs, URLs, web pages can pwn your kit
Plus: iThings and desktops at risk of NEW SSL attack flaw
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Apple inaugurates free OS X beta program for world+dog
Prerelease software now open to anyone, not just developers – as long as you keep quiet
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.