Feeds

Microsoft plans science of appliance for next SQL Server

2010 or bust

Internet Security Threat Report 2014

Start your clocks and count the delays: Microsoft has named the first half of 2010 as the window for the next version of SQL Server - codenamed Kilimanjaro.

Microsoft has also said it's working on an server appliance with hardware giants Bull, Dell, EMC, Hewlett-Packard, and Unisys that'll use a subset of technology in Kilimanjaro that came with DATAllegro and Zoomix - acquired this summer - for large scale and detailed analysis.

The thrust follows HP's announcement that it's going into business with Microsoft's database, BI, and applications rival Oracle to deliver a massive, parallel, high-speed server, and storage running on Linux. Oracle has promised servers on "other" platforms, suggesting there's something in the works on Windows.

Microsoft said it plans early access Community Technology Previews (CTPs) of its server-appliance - codenamed Madison - in the next 12 months, but did not give exact dates. Kilimanjaro CTPs are also planed for the next year - again without dates.

The new version of SQL Server will be focused on business intelligence, the company said while making the announcement at its second BI conference in Redmond, Washington. Kilimanjaro will provide "self-service reporting" and "self-service analysis" through something called Project Gemini.

Microsoft promised Project Gemini would deliver self-service analysis through "deep integration" with Microsoft's SharePoint Server and Excel.

It'll be Microsoft's work with the big-iron partners in servers and storage that'll prove interesting at least in the short term. Microsoft promised Madison would use technology from the DATAllegro acquisition to build the "most demanding data warehouses and workloads" serving hundreds of terabytes and thousands of concurrent users. Zoomix would provide "rich data capabilities."

Microsoft teaming up with some names well versed in the kind of big-iron engineering this has traditionally provided the underpinning of such systems - names such as Bull and Unisys. However, Microsoft - as ever - has promised to deliver a package based on SQL Server's reputation for affordability and ease-of-use.

Microsoft said it wants to build an ecosystem around Madison and promised new data warehouse reference configurations for the current version of SQL Server - released this year following massive delays - from its hardware partners. ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
HTML5 vs native: Harry Coder and the mudblood mobile app princes
Developers just want their ideas to generate money
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.