Feeds

IBM offers annual support for free DB2

Contracts buy you clustering and replication too

Internet Security Threat Report 2014

IBM is offering "low cost" 24x7 support contracts to users of the free version of DB2, called DB2 Express-C. As well as tech support, coughing up the readies allows users to hook up a second server for high-availability clustering or remote database replication.

The support contracts are available online at $2995 (around £1500) for 12 months. They also include upgrades, maintenance and quarterly service packs, called FixPaks.

Microsoft, Oracle and IBM all now offer free versions of their databases, as they attempt to stave off competition from open source offerings such as MySQL, which also offers optional support contracts (which IBM resells).

But all three come with usage limitations, as the vendors attempt to avoid cannibalising the sales of their full-fat products - for example, DB2 Express-C supports up to 4GB of main memory and two dual-core processors.

Once users and applications grow beyond those limitations, IBM hopes to move them onto DB2 9 Viper, its mainstream commercial data server which it touts as a seamless upgrade from the free version.

However, IBM does not limit the amount of data DB2 Express-C can store, and it claims that its freeware is more generous than either of its commercial rivals. "DB2 Express-C allows customers to take advantage of twice the processing power and four times the memory capacity allowed by Oracle and Microsoft for their no-charge offerings," the company said.

DB2 Express-C runs on both Windows and Linux, and on 32 and 64-bit systems, and in effect replaces IBM's open source Cloudscape database.

The company added that DB2 Express-C is now part of many Linux distributions, including Novell SUSE Linux and Red Hat Enterprise Linux, and claimed that over 300 software partners have begun integrating it into their open source-based solutions. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
Yes, Virginia, there IS a W3C HTML5 standard – as of now, that is
You asked for it! You begged for it! Then you gave up! And now it's HERE!
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.