Feeds

Oracle sits big iron on Amazon cloud

Removes license hurdle

High performance access to file storage

OpenWorld 08 Oracle has eased licensing terms and introduced virtualization and back-up tools for using its database and infrastructure stack with Amazon's cloud services.

The database giant said existing customers can use Oracle Database 11g, its Fusion Middleware, and Oracle Enterprise Manager with Amazon's Compute Cloud (EC2) without need for an additional license.

Oracle has licensed products using a named-user or processor license model. These potentially mitigate against use of Oracle's products in a web-based environment, where customers must either cost out a system by number of users or pay for a larger server with accompanying big license in order to scale for the anticipated number of users.

The news is particularly handy for software developers, who can use Amazon's services with any existing Oracle infrastructure products without the expense of purchasing a new Oracle license.

The company also announced it planned to release a set of free Amazon Machine Images (AIMs) to provision virtual machines with Oracle Database 11g, Fusion Middleware, and Oracle's Enterprise Linux.

The target customer are developers, which Oracle said would be able to "rapidly" build applications for EC2 using tools such as its JDeveloper and Enterprise Pack for Eclipse.

Oracle additionally announced Secure Backup Cloud Module - based on Oracle's tape back-up management software - to back up data to Amazon's Simple Storage Service (S3).

Chuck Rozwat, Oracle executive vice president of Oracle product development, speaking earlier at OpenWorld said: "We've started to move and make available our complete Fusion Middleware stack on the Amazon cloud."

Keeping with the virtualization theme, meanwhile, Oracle announced the release of Oracle VM 2.1.2. Features include high-availability for guest systems, live migration of virtual machines to new physical servers, and the ability to convert Linux physical servers or VMware virtual machines to Oracle VM virtual machines. Pricing is on a per-system basis, starting at $599 per year for a machine with up to two processors and $1,199 for a machine with an unlimited number of CPUs per year. ®

High performance access to file storage

More from The Register

next story
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.