Feeds

IBM reloads Sun poaching gun

New kit for the Oracle-phobic

High performance access to file storage

With the European Union finally giving approval to Oracle's $7.4bn acquisition of Sun Microsystems last week, IBM is stepping up efforts to exploit any untapped feelings of uncertainty in shops using Sun iron.

On Tuesday, IBM announced the addition of new software to its four-year-old “Migration Factory” vendor poaching program that makes it easier for businesses to push workloads from Sun into a Big Blue embrace.

The company said its improved Oracle-phobia prescription plan helps automate several of the processes necessary for anti-Sun migration, such as sniffing out and identifying Sun assets, provisioning the new target IBM environment, and streamlining workload transitions.

The software promises a speedier move from Sun Solaris to either Linux or IBM's AIX operating systems, migrating both applications and middleware.

Although IBM's poaching technique for Sun customers isn't new – the company clearly hopes to shake out any anti-Oracle stragglers as the official date of marriage looms closer. Oracle's chief executive Larry Ellison is scheduled to outline a strategy for the combined companies and their roadmaps tomorrow during a webcast. The event is expected to lay out Oracle's future plans in hardware and software.

IBM hopes to stir up concerns of Sun's new ownership by stirring up unproven fears. “The future of Sun's hardware business is highly uncertain given its imminent acquisition by Oracle,” IBM said on its Sun server migration page. “There's also been speculation in the press on whether Sun will cancel Rock, its next-generation chip project.”

Big iron vendors like IBM are always especially eager to circle over the remains of companies freshly processed for acquisition. On the same day, Sun shareholders voted in favor of the Oracle deal, HP unveiled its Sun Complete Care program, offering Sun shops free migration and total cost of ownership assessments if they consider dropping Sun iron for HP.

IBM's Migration Factory shop also offers incentives to abandon Dell, EMC, and of HP kit. HP pitches the reverse favor in return. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.