Feeds

Fujitsu chief disses Amazon’s ‘threatening’ enterprise attack

Lack of cost control is Amazon’s secret weapon

Beginner's guide to SSL certificates

Amazon is a threat to enterprise tech firms like Fujitsu not because of its tech nous but because of its willingness to operate at zero cost to expand its business, the Japanese giant’s president has told The Reg.

Masami Yamamoto also said keeping a strong hardware business was essential to the "smartphone to mainframe" vendor’s overall business strategy, even as it rebrands itself primarily as a software and services firm.

Amazon has been pushing into the enterprise space with its EC2, S3 and other cloud services, targeting large customers looking to consolidate their data centres. By partnering with major consultancies and SIs, hiring consultants and large account consulting staff, and doling out certifications on its platforms, it is adding the bells and whistles of an enterprise IT vendor, without having to sell the tin.

Asked if Amazon, and other cloud players without traditional infrastructure businesses to support, were a threat to Fujitsu, Yamamoto chose to focus specifically on the Seattle-based sometime bookseller, but not on its technology nous.

“Their company policy is a threat,” he told us at a meeting of the giant in Tokyo.

Traditional IT firms felt obliged to keep their shareholders happy by at least attempting to deliver a profit margin in the region of 10 per cent, he said, and looked to keep their costs under control to achieve this.

Amazon, by contrast, was looking to expand, he said, “even at zero percentage profit” and "at the price of taking these costs".

Fujitsu’s response could not simply be to “play the cost game”. Rather, it sought to better understand its own customers and leverage that relationship, he said. They needed to be “assured” he said, that Fujitsu was a secure and reliable partner.

While IBM has offloaded much of its hardware portfolio, and HP has flirted with dumping its PC business, Yamamoto declared that hardware was essential, despite Fujitsu's reinvention as a software and services firm. “The base platform to realise all of this is the ICT technology,” Yamamoto declared.

This includes PCs, as well as its mainframe, server and other infrastructure offerings. PCs and other client devices were important as an interface with the customer in branding terms as well as literally, Yamamoto said.

He argued that the client PC market was not shrinking, as a tablet was essentially a PC. “In 10 years' time, the tablet will be replaced,” he said. However, he was not prepared to speculate on what it would be replaced with. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
IT crisis looming: 'What if AWS goes pop, runs out of cash?'
Public IaaS... something's gotta give - and it may be AWS
Linux? Bah! Red Hat has its eye on the CLOUD – and it wants to own it
CEO says it will be 'undisputed leader' in enterprise cloud tech
BT claims almost-gigabit connections over COPPER WIRE
Just need to bring the fibre box within 19m ...
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
Hey, what's a STORAGE company doing working on Internet-of-Cars?
Boo - it's not a terabyte car, it's just predictive maintenance and that
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.