Feeds

The myths and legends of the holy land of the database

The first myth explored and exploded

High performance access to file storage

The database world has more myths and legends than the court of King Arthur. The current myths tend to be less about dragons and dungeons and more about features and performance, such as:

  • Oracle can't do MOLAP.
  • Oracle is as easy to tune as a cathedral organ.
  • DB2 only runs on mainframes.
  • SQL Server doesn't scale.
  • Oracle is eye-wateringly expensive.
  • Access isn't a relational database.
  • SQL Server cannot row lock.

Although, sometimes there is more than a hint of scandal:

  • Microsoft was caught stealing secrets from Borland.
  • Oracle was caught cheating at the TPC benchmarks.
  • Philippe Kahn once bought Hawaiian shirts for 3,000 database conference delegates just to annoy Microsoft.

These myths tend to surface whenever database people meet - either virtually, in the news groups, or socially, in their cups.

Where do these myths originate?

Well, this is a very competitive industry and the truth is that some of them are simply made up by competitors. I know, I happen to have been there at the birth of two of those listed above. Of course, I would never suggest that this fabrication can ever be laid at the door of the CEOs involved - I'm sure that the very smooth Larry Ellison has never been personally responsible for any of these urbane myths...

Once started, these myths are perpetuated because database people are notoriously proud of, and defensive about, their database engine. They are delighted to repeat stories that denigrate the opposition, and so the myths grow.

So, do these myths have any basis is reality or are they all just dragon food? Well, one definition of a myth is "a popular belief that is false or unsupported by facts", another is "a truth disguised and distorted", and those fit pretty well with our myths. Some are provably false, other have some basis in fact. Oddly, some, like the SQL Server row locking one, were at the same time both completely true and totally misleading.

In this series of articles we are going to look at these widely-held beliefs (all of those listed above and more) and try to separate the truth from the misinformation. Unlike Sir Robert Armstrong we will try to be uneconomical with the truth.

High performance access to file storage

Next page: First Myth

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Microsoft: Windows version you probably haven't upgraded to yet is ALREADY OBSOLETE
Pre-Update versions of Windows 8.1 will no longer support patches
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.