Feeds

Analyst: Chinese buyers shunning IBM, EMC, Oracle and Cisco

Government nudging locals towards home-grown kit when possible

New hybrid storage solutions

For years, the world's largest technology vendors have assumed that China represents a colossal opportunity, albeit with an unusual set of hoops to jump through in order to do business.

That view now seems a little dated according to Frank Liu, analyst firm Forrester's chap covering converged infrastructure and big data in China.

Liu yesterday wrote that Chinese technology management professionals need to “start looking closely at domestic IT vendors.”

One reason to do so is that China's government is sending not-so-subtle signals about its preferences, through recent news items questioning the security of Windows 8 and the suitability of IBM kit for local banks. China has also made much of Edward Snowden's revelations, especially those alleging US-derived technology offers surveillance facilities.

Liu also argues that Alibaba's move from IBM servers, EMC storage and Oracle databases to x86 servers, PCIe storage and open source databases has set a “trend” other local business will follow.

Throw in local vendors like Inspur setting out to offer replacements for IBM servers and he feels there's momentum for a move to domestic suppliers.

Global titans are already feeling the pinch in China, he adds, even if there is some upside in the fact that “in key areas like mainframe computing, applications, and databases, there are almost no domestic vendor alternatives.” Top-tier storage vendors can also breathe easy-ish for a while. Liu also notes that China, and Chinese businesses, are pragmatic enough not to force replacements of complex applications like core banking systems.

Overall, however, he thinks the move to local suppliers is on and that local buyers need to fall in line with the buy local trend, especially for greenfield applications.

If Chinese firms follow Liu's advice, it will give local vendors a fine collection of customer references with which to impress buyers beyond the middle kingdom. With Huawei already making inroads into the enterprise and harder access to China's markets cutting off growth opportunities for US firms, this could get interesting. ®

The next step in data security

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.