Feeds

Aus lags in cloud wave

ICT spend slows, clouds lining looks silver

High performance access to file storage

Cloud computing could be the life line for dwindling ICT expenditure at the top end of town, according to a new report from KPMG.

The study, titled Modelling the Economic Impact of Cloud Computing, found that ICT capital and operating expenditure is expected to significantly reduce over the next ten years, based on studies across all sectors of the economy excluding agriculture.

The report states that firms will be seeking solutions that produce greater amounts of output with the same level of input to free up resources for use in other forms of production.

The adoption of cloud platforms could result in opex and capex savings of 25 per cent and 50 per cent respectively, if it hit adoption levels of 75 per cent, as witnessed in the more mature US market, the report forecasts.

The report estimates that after 10 years, this would result in an increase in long-run GDP of A$3.32 billion per annum. At 50 per cent adoption levels, the GDP gain is A$2.16 billion per annum.

"There’s a critical need to continue to find ways to improve productivity in Australia, widespread adoption of Cloud by businesses and government is the next key area of potential productivity improvement,"€ said Nicki Hutley, chief economist at KPMG.

The study which was which was commissioned by the Australian Information Industry Association (AIIA) also found that adoption of cloud computing was lagging locally compared to uptake in the US and Europe.

AIIA chief executive Suzanne Campbell said: “Cloud computing has been shown to not only boost productivity, but it also adds greatly to the flexibility and agility of business. There are huge opportunities for businesses in Australia to adopt Cloud computing and set a firm foundation for their future growth and development.”

A key issue blocking take up is that cloud-based solutions did not always deliver identifiable, immediate or on-going cost savings.

The report also found that barriers to cloud adoption include: the compatibility of an organisation's internal processes with cloud offerings, connection speeds, location of data and related security issues, business continuity/disaster recovery and integration, and limited knowledge of product offerings including businesses’ lack of familiarity with opportunities. ®

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
USA opposes 'Schengen cloud' Eurocentric routing plan
All routes should transit America, apparently
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.