Feeds

Is MySQL's Google's Trojan Horse for world domination?

Er, probably not. At least that's what IBM, HP and Sun hope

Designing a Defense for Mobile Applications

We're not quite ready to buy into Cringely's entire proposal. Even Cringely rarely takes his ideas seriously. And we're not ready to consider Google as evil - even though it is.

We are, however, concerned about the pace at which things are heading and the wrappers they're coming in.

Were a company of Google's size and occasional competence to really pull off this enormous information-sucking database you might suppose those people initially buying into the products would like an exit option. You need an effective, economical means of shifting your data between service providers on this scale. In that sense data is quite a bit more of a touchy subject than electricity, where a rather dull debate arises around which provider might save you a few pennies per day, if you have the luxury of picking between multiple suppliers.

It'll probably take Microsoft until about 2035 to pull something like this off. But if Microsoft could do an effective utility service today, you can bet that people would worry about a Redmond lock-in. Meanwhile companies like Amazon, Sun and Salesforce run around sucking information, with users thinking little about the end game.

Most tragically, we can see customers flocking to "do no evil" evildoer Google with their usual glee. "Gee, that company makes sweet text ads. They sure seem to know what they're doing. Let's fork over the whole shebang." Add to that the open source wrapper of peace, love and justice, and you can start to imagine how easily Google could reach Cringelapocalypse.

Here's us hoping that a company with the moxie and stubbornness of an IBM or Sun starts pushing for some manner of open utility protocol or open coalition. While historically fond of some lock-ins, these vendors must see the likes of Amazon and Google as a threat to their data center domination, especially Google, which builds much of its own hardware. So, they should want to ensure a means of open competition around grabbing as much end user data as possible. Why be shoved out of the hardware game just because Google touches people first with search and email? (Pardon the Cringely moment.)

Dear God, this is a long way of saying that Google's chumminess with MySQL does raise an awful lot of questions. Maybe it's just a couple of database tweaks, but maybe it's not. Maybe it's Google befriending open source, but maybe it's Google building a Trojan Horse.

In either case, the big hardware and software boys better get their acts together and learn how to share data across these utility computing systems. It's what customers deserve. ®

Register editor Ashlee Vance has just pumped out a new book that's a guide to Silicon Valley. The book starts with the electronics pioneers present in the Bay Area in the early 20th century and marches up to today's heavies. Want to know where Gordon Moore eats Chinese food, how unions affected the rise of microprocessors or how Fairchild Semiconductor got its start? This is the book for you - available at Amazon US here or in the UK here.

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Attack of the clones: Oracle's latest Red Hat Linux lookalike arrives
Oracle's Linux boss says Larry's Linux isn't just for Oracle apps anymore
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.