Feeds

European CIOs get consolidation

Supplier diversity could suffer

HP ProLiant Gen8: Integrated lifecycle automation

More than three-quarters of businesses in Europe, the Middle East and Africa (EMEA) are looking to consolidate their existing IT infrastructure in the next 12 months, according to Brocade-commissioned research.

The research found that 76 per cent of enterprises consider IT consolidation to be one of the top three IT issues they face in the coming year, followed by both virtualisation and security.

When asked what they plan to consolidate, 70 per cent of respondents stated their existing servers, 56 per cent are considering storage and 54 per cent are focusing on databases. In addition 49 per cent stated their networks, and 47 per cent claimed their applications.

Brocade's product interest here is in converging Fibre Channel storage networking onto Ethernet via the FCoE protocol, and using Ethernet as the main networking medium within data centres.

The idea is that convergence onto a single network platform will simplify networking infrastructure complexity, reduce its acquisition and operational costs, and increase efficiency.

There is a parallel move to converge IT stacks; storage, server hardware and system software, and networking, onto an integrated set of components purchasable as an entity from a single supplier, with Cisco, HP, IBM and Dell, all making moves as server vendors to have a converged IT stack offering. The system software includes both operating system and hypervisors, and vendors talk about a virtualised data centre as being the destination of such convergence.

Brocade's research, which questioned 600 CIOs, shows that businesses this side of the Atlantic buy into IT convergence ideas, and think it will deliver a simplified infrastructure and one that is more agile, in the sense of responding faster to business requirements.

Brocade's EMEA VP, Alberto Soto, said: "The need for IT consolidation and its underlying technologies has gained widespread acceptance in recent years."

If the CIOs do what the research says they want to do then they will buy more uniform systems and applications from fewer suppliers. These suppliers really will have to have converged IT stack components that are effectively integrated or both best-of-breed and capable of slotting into converged IT stacks.

Supplier diversity could well suffer as a result. ®

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.