Feeds

Oh, so you've founded a disruptive storage upstart? Do tell me more

Hint for you: Disrupt, don't rip off like everyone else

High performance access to file storage

So you’ve founded a new storage business. You’ve got a great idea and you want to disrupt the market. Good for you. But you want to maintain the same old margins as the old crew? Where do we start...

So you build your startup around commodity hardware, using the same gear I can buy off the shelf from PC World or order from my preferred enterprise tin-shifter.

You tell me that you are lean and mean? You don’t have huge sales overheads, no huge marketing budget and no legacy code to maintain?

You tell me that it’s all about the software but you still want to clothe it in hardware.

And then you tell me it’s cheaper than the stuff that I buy from my current vendor? How much cheaper? 20 per cent, 30 per cent, 40 per cent, 50 per cent?

Then I do the calculations. Your cost base and your BoM is much lower and you are actually making more money per terabyte than the big old company that you used to work for.

But hey, I’m still saving money, so that’s okay…

Of course, then I dig a bit more… I want support? Your support organisation is tiny; I do my due diligence, can you really hit your response times?

But you’ve got a really great feature? How, er, great. I’ve not seen a single vendor come up with a feature that is so awesome and so unique that no-one manages to copy it.

In the race to the bottom you are still too greedy. You still believe that customers are stupid and will accept being ripped off.

If you were truly disruptive you’d work out a way of articulating the value of your software without clothing it in hardware. You’d work with me on getting it onto commodity hardware – and no, I’m not talking about some no-name white-box; you’d work with me on getting it onto my preferred vendor’s kit, be they HP, Dell, Lenovo, Oracle or whoever.

For hardware issues I could utilise the economies of scale and the leverage I have with my tin-shifter. You wouldn’t have to set-up a maintenance function or sub-contract it to some third party who will inevitably let us both down.

And for software support, well, you could concentrate on those.

You’d help me be truly disruptive… and ultimately we’d both be successful. ®

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.