Is Cloud Computing A Threat To Older Tech Companies? Part 2

Is Cloud Computing A Threat To Older Tech Companies? Part 2

Continued From Part 1…. 

So, how accurate were IDC’s predictions?

Hindsight is, as the saying goes, 20/20; so while we won’t know exactly how precise IDC’s projections are, we can certainly determine if their aim was true.

IDC predicted: “Worldwide IT spending will grow 6.9%, surprisingly solid growth in a fragile, recovering economy. Mobile devices and apps and emerging markets will be the biggest growth drivers, while European debt issues will dominate downside risks.”

The reality: It’s close. IT spending is projected to top out at 6 percent in 2012, driven by software, storage, networking and mobile technologies. Research firm Gartner predicts that the release of Microsoft Corp.’s Windows 8 OS could spur a surge of growth in the fourth quarter.

IDC predicted:Emerging markets IT spending will grow 13.8% … In the second half of 2012, China will supplant Japan as number 2 in the IT market.”

The reality: Right on course. Emerging markets are still growing, but China is slowing in response to Europe’s economic troubles. Japan’s growth has stagnated while IT spending in China is on course for fourteen percent growth this year; matching growth in India and Brazil. Russia is expected to finish at eleven percent and South Africa, eight percent.

IDC predicted: “Mobility wins” will be the top theme of the year as mobile devices outship PCs by more than 2 to 1 and generate more revenue than PCs for the first time. 85 billion mobile apps will be downloaded, and mobile data network spending will exceed fixed data network spending for the first time.

The reality: When even Microsoft is conceding that tablets will outsell PCs in coming months, that’s a pretty safe bet. As for the mobile-devices-versus-PC-shipments conjecture, some sources are positing that PC manufacturers have a little more wiggle room – until 2016 – before their former business becomes obsolete. And if projected security spending is any indication – Juniper Research believes that By 2016, 277 million mobile devices will have some kind of protection installed, costing mobile users a collective US$3.6 billion, and that 69 percent of this investment will be made by corporations concerned about corporate data is stored on mobile devices – then, yes, mobile data network spending will surpass fixed data network spending by the end of the year.

IDC predicted: Spending on public and private cloud services, and the building of those services (the “cloud arms dealer” opportunity), will reach $60 billion… and the strategic focus in the cloud will shift from infrastructure to application platforms and the race to build the largest portfolios and ecosystems around those platforms.

The reality: How about $109 billion? That’s what Gartner’s now predicting for public and private cloud spending this year.

And the same Gartner research shows that the majority of this spending is focused on Software-as-a-Service (SaaS), developing process-specific applications (like billing systems, for instance) and on-premise services like phone systems and storage.

IDC predicted: Big Data will join mobile and cloud as the next “must have” competency as the volume of digital content grows to 2.7ZB (1ZB = 1 billion terabytes) in 2012, up 48% from 2011, rocketing toward 8ZB by 2015. There will be lots of Big Data–driven mergers and acquisitions (M&A) activity.

The reality: IT behemoth Oracle certainly believes the hype. CEO Mark Hurd (formerly of Hewlett-Packard) is doubling down on Big Data and looking for ways to capitalize on the opportunity. As far as mergers and acquisitions go, here’s a very short list: Oracle acquired Endeca (a big-data company), IBM acquired HPC firm Platform Computing; Groupon acquired Adku, a big data startup that focuses on the e-commerce sector; and EMC picked up Pivotal Labs, a private agile software development firm.

Despite the ups and downs of the economy, 2012 has been a pretty good year for the IT industry. If the growth trend continues, 2013 could be even better.

By Sharon Florentine

This post is written by Rackspace blogger Sharon Florentine. Rackspace Hosting is the service leader in cloud computing, and a founder of OpenStack, an open source cloud operating system. The San Antonio-based company provides Fanatical Support to its customers and partners, across a portfolio of IT services, including Managed Hosting and Cloud Computing.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Moving To The Cloud: A Smart Move Or Proceed With Caution?

Moving To The Cloud: A Smart Move Or Proceed With Caution?

Moving To The Cloud You hear it over and over again: The future of computing is in the cloud. Businesses should be moving to the cloud. If you’re not in the cloud, you’re behind the times. But trusting your essential data to a cloud may sound like a dubious proposition. Below are some of the…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Business Analytics Vs Data Science

Business Analytics Vs Data Science

Big Data Continues To Grow Big Data continues to be a much discussed topic of interest and for good reason.  According to a recent report from International Data Corporation (IDC), “worldwide revenues for big data and business analytics will grow from nearly $122 billion in 2015 to more than $187 billion in 2019, an increase…

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps Whether it be enterprise apps or any other, if there is any heavy data that is going to be transacted in and through an app, then affiliating it with the Cloud becomes a must. And then an important question arises: How do you decide when to integrate your enterprise app with…

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud Learn how to get to grips with cloud computing in business  Struggling to get your head around the Cloud? Here are five easy ways you can improve your cloud knowledge and perhaps even introduce cloud systems into your business.  Any new technology can appear daunting, and cloud computing is no exception.…

Cloud Computing Checklist For Startups

Cloud Computing Checklist For Startups

Checklist For Startups  There are many people who aspire to do great things in this world and see new technologies such as Cloud computing and Internet of Things as a tremendous offering to help bridge and showcase their ideas. The Time Is Now This is a perfect time for highly ambitious startups to make some…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Containerization: The Bold Face Of The Cloud In 2016

Containerization: The Bold Face Of The Cloud In 2016

Containerization And The Cloud “Right now, the biggest technology shift in the cloud is a rapid evolution from simple virtual machine (VM) hosting toward containerization’’ says the CTO of Microsoft Azure, Mark Russinovitch, a man who deals with the evolving cloud infrastructure every day. In his words, containerization is “an incredibly efficient, portable, and lightweight…