Feeds

IBM: Mainframe emulator part of a conspiracy

The irrelevant market is ours - all of it

HP ProLiant Gen8: Integrated lifecycle automation

Quiet, or we'll buy you

Incidentally, if you restrict that relevant market to machines that can run z/OS or machines that can run Mac OS X, then they absolutely do have a monopoly, they do tie their operating systems to their hardware, and maybe they should be compelled to make their software available on alternative platforms. But it is going to take a much larger company than TurboHercules to make that argument, and a lot more money is going to have to be at stake in Europe and relating to European companies and European politicians, before TurboHercules even has a chance of anything but running out of money to fund its lawsuits or being bought out by Big Blue to get it to shut up.

Not that buying someone who is suing you to shut them up - as IBM did in July 2008 when clone mainframe maker Platform Solutions made a fuss - should be legal. But it is not precisely illegal, either. IBM has a long history of buying technology companies to eliminate the competition, as do many, many others.

Having said all of that, it is perfectly understandable to want the Hercules emulator to be available as a true alternative to IBM's mainframe iron running its mainframe software, and a perfect fool as well as a genius could readily see that having such an alternative would be a good thing for mainframe shops.

If Microsoft wanted to really cause some trouble, it would blackbox a version of z/OS that runs on a Windows kernel, slap a DB2 emulation layer on top of SQL Server, put natively compiled z/OS code atop the Hercules emulator inside Hyper-V partitions, and be done with it. That would cost lots of money - but then again, Microsoft has lots. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.