Feeds

Cloudy plague will KILL storage vendors, say Gartner mages

The dinosaurs, the weak and the young are all at risk

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

“Peak Array” theory, the idea that today's storage vendors and their products don't have long to live, has received another endorsement from the on-stage Mages at analyst outfit Gartner's IT operations and data centre summit in Sydney.

In a session titled “The five-year storage scenario – Why storage in 2019 won't look like what's on the floor today,” analyst Arun Chandrasekaran used the slide below to outline possible scenarios for today's storage vendors.

Chandrasekaran said all storage vendors, regardless of size, are suffering from “compressed differentiation.” Features that once represented a year or two of competitive advantage are now replicated in three to six months. Users are therefore willing to wait for their incumbent providers to catch up rather than in acquiring new kit and starting a new vendor relationship.

Another problem for all players, he said, is that there are no longer many performance differentiators of note to distinguish one vendor from its rivals. With grunty multi-core Xeons supplanting the ASICs that once made a storage controller special and and solid state disks both now bog standard, Chandrasekaran's analysis seems apposite.

Gartner's scenarios for the future of storage

What then of his four scenarios?

In the first, the storage industry declines and those at the top – pure play array vendors – suffer most.

In the second vendors that include storage in a broader portfolio decide the storage market is just too hard and bail.

In the third startups are crushed as the market for storage innovation disappears.

The fourth is perhaps the most interesting, as Chandrasekaran suggested it could see startups perceived as innovating better than larger rivals. But demand for their cunning products is no guarantee of success: he said only EMC and NetApp have grown colossal storage businesses from scratch in the last 20 years and could not suggest why any upstart would be able to do the same again. One reason for their likely failure to grow is that big storage companies are happy to acquire innovative-but-small rivals to keep themselves fresh. ®

Beginner's guide to SSL certificates

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.