Feeds

European CIOs get consolidation

Supplier diversity could suffer

Beginner's guide to SSL certificates

More than three-quarters of businesses in Europe, the Middle East and Africa (EMEA) are looking to consolidate their existing IT infrastructure in the next 12 months, according to Brocade-commissioned research.

The research found that 76 per cent of enterprises consider IT consolidation to be one of the top three IT issues they face in the coming year, followed by both virtualisation and security.

When asked what they plan to consolidate, 70 per cent of respondents stated their existing servers, 56 per cent are considering storage and 54 per cent are focusing on databases. In addition 49 per cent stated their networks, and 47 per cent claimed their applications.

Brocade's product interest here is in converging Fibre Channel storage networking onto Ethernet via the FCoE protocol, and using Ethernet as the main networking medium within data centres.

The idea is that convergence onto a single network platform will simplify networking infrastructure complexity, reduce its acquisition and operational costs, and increase efficiency.

There is a parallel move to converge IT stacks; storage, server hardware and system software, and networking, onto an integrated set of components purchasable as an entity from a single supplier, with Cisco, HP, IBM and Dell, all making moves as server vendors to have a converged IT stack offering. The system software includes both operating system and hypervisors, and vendors talk about a virtualised data centre as being the destination of such convergence.

Brocade's research, which questioned 600 CIOs, shows that businesses this side of the Atlantic buy into IT convergence ideas, and think it will deliver a simplified infrastructure and one that is more agile, in the sense of responding faster to business requirements.

Brocade's EMEA VP, Alberto Soto, said: "The need for IT consolidation and its underlying technologies has gained widespread acceptance in recent years."

If the CIOs do what the research says they want to do then they will buy more uniform systems and applications from fewer suppliers. These suppliers really will have to have converged IT stack components that are effectively integrated or both best-of-breed and capable of slotting into converged IT stacks.

Supplier diversity could well suffer as a result. ®

Beginner's guide to SSL certificates

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.