Feeds

Ingres alumnus joins DBMS scrum

Cloudy conjecture

Secure remote control for conventional and virtual desktops

Ingres originator Jerry Held has become the latest database big gun to take aim at traditional database management systems (DBMS), saying they are unsuited to cloud computing.

A former senior Oracle vice president, now chairman of Vertica promoting a database it claims is - guess what - suited to cloud computing, Held has blogged that the infrastructure of cloud computing is so different to traditional computing that established DBMS will not be able to cope.

Held has listed five basic criteria for a successful DBMS running in a cloud infrastructure. These include high availability and performance, standards-based connectivity, "aggressive" compression and a "shared nothing massively parallel processing (MPP) architecture."

"There are no high-end servers with dozens of CPU cores, SANs, replicated systems, or proprietary data warehousing appliances available in the cloud. Therefore, a new DBMS software architecture is required to enable large volumes of data to be analyzed quickly and reliably on the cloud's commodity hardware," Held wrote.

Held joins fellow Ingres alumni and Vertica co-founder and chief technology officer Michael Stonebraker in critiquing DBMS. Stonebraker recently wrote DBMS is 20 years out of date and in need of a radical rewrite. He was even handed in his criticism, and laid into Google's MapReduce, which he called "sub optimal" compared to DBMS for processing large unstructured databases.

The past year has certainly seen a plethora of DBMS products aimed at different levels of cloud computing users. These range from enterprise products such as Google's BigTable, EnterpriseDB, Microsoft's SQL Server Data Services and Sun Microsystems' MySQL to more humble small-business products such as Google's Googlebase and Amazon's SimpleDB. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
HTML5 vs native: Harry Coder and the mudblood mobile app princes
Developers just want their ideas to generate money
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.