Feeds

IBM: Mainframe emulator part of a conspiracy

The irrelevant market is ours - all of it

Combat fraud and increase customer satisfaction

Quiet, or we'll buy you

Incidentally, if you restrict that relevant market to machines that can run z/OS or machines that can run Mac OS X, then they absolutely do have a monopoly, they do tie their operating systems to their hardware, and maybe they should be compelled to make their software available on alternative platforms. But it is going to take a much larger company than TurboHercules to make that argument, and a lot more money is going to have to be at stake in Europe and relating to European companies and European politicians, before TurboHercules even has a chance of anything but running out of money to fund its lawsuits or being bought out by Big Blue to get it to shut up.

Not that buying someone who is suing you to shut them up - as IBM did in July 2008 when clone mainframe maker Platform Solutions made a fuss - should be legal. But it is not precisely illegal, either. IBM has a long history of buying technology companies to eliminate the competition, as do many, many others.

Having said all of that, it is perfectly understandable to want the Hercules emulator to be available as a true alternative to IBM's mainframe iron running its mainframe software, and a perfect fool as well as a genius could readily see that having such an alternative would be a good thing for mainframe shops.

If Microsoft wanted to really cause some trouble, it would blackbox a version of z/OS that runs on a Windows kernel, slap a DB2 emulation layer on top of SQL Server, put natively compiled z/OS code atop the Hercules emulator inside Hyper-V partitions, and be done with it. That would cost lots of money - but then again, Microsoft has lots. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
IBM rides nightmarish hardware landscape on OpenPOWER Consortium raft
Google mulls 'third-generation of warehouse-scale computing' on Big Blue's open chips
It's GOOD to get RAIN on your upgrade parade: Crucial M550 1TB SSD
Performance tweaks and power savings – what's not to like?
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.