Feeds

CIOs bombarded with hybrid cloud surveys

The battle for enterprise hearts and minds

Internet Security Threat Report 2014

Two surveys published in recent days that major on CIOs and their attitude to hybrid cloud show the scramble among IT vendors to win enterprise hearts and minds.

A survey of 52 US CIOs conducted for SAP reveals strong support for the notion that hybrid cloud – combining cloud and on-premise applications – reduce complexity and flexibility. But an NTT-sponsored survey of 300 CIOs in Europe shows that the complexity of their own IT architecture is the greatest hurdle to cloud adoption.

In other words, enterprises may need to do a lot of consolidating their hardware and software estates before they are “cloud-ready”. Also institutional barriers are prominent for most (75 per cent) of non-hybrid cloud CIOs, according to SAP, which cites internal resistance and security as primary barriers to adoption.

So the consensus is emerging that hybrid cloud solutions are the way forward for large organizations. But when? Vendors have fixed upon helping the CIO to overcome the obstacles – and for some this will be a matter of survival.

IBM, Oracle, SAP have incumbents’ advantage as they are embedded firmly today in enterprise boardrooms, as indeed are traditional telcos such as Verizon, BT and NTT. Google, Amazon and Microsoft have the firepower and increasingly the product breadth to make a big impact here. But what about the traditional hardware-centric vendors?

A major shift to the cloud will create a mighty headache for many, according to Morgan Stanley which forecasts that Amazon Web Services revenues will leap from $2bn in 2012 to $24bn in 10 years.

Much of this growth will come from the “cannibalization of other traditional IT services, as people flee from expensive, old-style IT into roughly equivalent but cheaper technologies offered by Amazon”, El Reg's Jack Clark wrote. Morgan Stanley points to Brocade, NetApp, QLogogic, EMC and VMware as most vulnerable to an AWS surge. ®

Survey links

Beginner's guide to SSL certificates

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Do you spend ages wasting time because of a bulging rack?
No more cloud-latency tea breaks for you, users! Get a load of THIS
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.