Feeds

HP steals agenda setting crown from IBM

Playing with its big stick

High performance access to file storage

Comment It took the well-dressed businessmen hanging upside down from the rafters, the acrobats with iPAQs and the data center porn to mush the concept all over my brain. HP has unseated IBM as the agenda setter in the IT game. Or at least that's what HP believes.

I'm ashamed to admit that it required the full force of HP's Technology Forum propaganda to sound the alarm. Many of you not present at HP's customer extravaganza held last week in Las Vegas may have already figured out what's up with the recent "Business Technology" marketing pushed by Hurd and Co. HP wants to define the next major data center movement, just like IBM did a few years back with the "On Demand" onslaught.

Having overtaken IBM as the world's largest technology company, HP apparently sees this market setting plan as its right. I happen to agree with HP and am impressed with the speed at which it concocted the Business Technology concept.

For the unfamiliar, Business Technology, as best as I can tell, means that HP is ready to talk to customers about more than the gigabytes of storage in an array, the ROI of a web server rollout or how many transactions per minute an Itanium box can crank. Instead, HP wants to discuss a "phase where IT assets are managed in only one way – just on the business results" they deliver.

HP wants to brawl with Nick Carr who infamously asked, "Does IT matter?" and then more or less told us "No."

The argument makes sense given the recent fluctuations in technology spending. In the boom times, companies would pay anything to obtain the latest and greatest technology. During the bust times, they spent nothing. Of late, companies have turned to things such as VMware hoping to get the most out of the gear they're willing to buy.

The end result is an IT spending scenario where companies dish out most of their cash to maintain data center status quo and have just a small fraction of their budgets leftover for fresh, allegedly innovative projects. That's a horrible turn of events for companies such as HP and IBM that need to increase revenue $10bn to $20bn per year if they're to please investors.

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.