Feeds

Chasing pack about to sink teeth into Amazon's AWS, says Gartner

Google, Microsoft and one more 'very dangerous competitor' are closing fast

Secure remote control for conventional and virtual desktops

Amazon Web Services' position as the leading infrastructure-as-a-service provider is under threat, as competitors target markets the organisation has to date ignored, according to Gartner research veep Lydia Leong.

Leong's expressed her opinion in a double-barrelled blog post, the first instalment of which says the source of AWS's success is that it has catered superbly to developers. Other types of buyers, Leong says, may soon become more influential, allowing infrastructure-as-a-service and platform-as-a-service players that cater to other types of buyer an opportunity to grow.

In part two Leong says “three very dangerous competitors” are coming after AWS.

The three are Microsoft, Google and VMware.

Redmond will pick up more cloud business thanks to what Leong describes as “deep customer relationships, deep technology entrenchment, and a useful story about how all of those pieces are going to fit together”. Google will eventually convinces enterprises it is not a risk and pinches pinching some startups and HPC customers from AWS. “Interactive agencies that use its cloud platform” will also fuel broader adoption of its IaaS and PaaS products.

On VMware, Leong has good news: Virtzilla's plans to convince its current clientele that ESX everywhere is a good idea will work. The company will therefore emerge as one of the top four IaaS vendors, a big win given its entry to the cloud market was widely considered to sit somewhere between defence and desperation.

Many readers may, at this point, be wondering why Leong has not mentioned OpenStack, or its champion RackSpace. The analyst feels OpenStack's fate will be tied to the fortunes of the companies that offer it. That's not a happy assessment of RackSpace's prospects, but Leong also notes “the real war for market share is just beginning.” ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.