Feeds

A green solution? So what?

That don't impress me much... yet

High performance access to file storage

With vendors falling over themselves to demonstrate their green credentials, it's interesting to consider how much customers really care when they are looking to buy IT products and services.

Freeform Dynamics

According to our recent survey on computing and the environment, the answer is "not that much" at the moment.

Based on responses from about 1,300 readers, the survey reveals that while environmental friendliness of suppliers and offerings is a consideration in about a third of organisations, only about one in 20 say green related selection criteria are weighted highly in the procurement process.

Looking behind these headline stats, the prominence of environmental factors in IT decision making is higher at both ends of the spectrum in terms of organisation size, undoubtedly for two quite different reasons.

Within smaller organisations, indications are that "people power" plays a big role, with factors such as pressure from employees and genuine concern for the environment highlighted as important drivers.

In corporations with more than 50,000 employees, however, drivers of the green agenda are typically more concerned with cost savings, regulatory pressure, and public relations. On this last point, it is notable that whereas almost two thirds of large enterprises have a publicly declared environmental policy, this only applies to about a quarter of organisations with less than 50 employees.

It is not just the state of play at the moment that matters, though – the dynamics are important too. We should, therefore, take note of the fact that about two thirds of respondents said they expect the emphasis on environmental considerations to increase as they look to the future.

An obvious thing to say, and perhaps a little subjective, but whether it's suppliers, politicians, or regulatory bodies pushing, or customers pulling, the "green imperative" seems set to work its way into the world of IT one way or another.

More details of the research discussed above, along with lessons to be learned and insights from a range of industry speakers, will be presented at the up and coming Reg Debate, which you can sign up for here. Every attendee will receive a free copy of the full Green Computing Report too.®

High performance access to file storage

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.