The balance of power is shifting to emerging economies. Compared to stagnant Western markets, business growth and investment in the Middle-East, Africa and Russia (MEAR) continues unabated.
It’s a shift that’s amplified by technological advances. In under a decade, these seismic changes have levelled the playing field, opened the door to a global market and made rapid business growth a reality:
The connected world where we can work, play and learn anytime, anywhere and with anyone.
Virtualization made it easier to manage multiple servers and reduce physical computing power.
Computing power has exponentially increased capacity and processing speeds so we can do much more for a lot less time and money.
The cloud offers all the applications and storage businesses need minus the server infrastructure.
You’ll probably point out many other factors, but I picked these because they are particularly relevant to MEAR countries and their IT spending patterns. Specifically, they are backed up by Forrester research in 2012. This showed that over half of MEAR-based companies plan to invest more in mobility, analytics, security and collaboration.
Unlike more mature companies, their spending isn’t being eroded by having to maintain and support legacy systems. This frees up budgets to completely replace or expand their IT in ways that improve their competitiveness. The top three areas that Forrester highlighted from 2011 to 2012 were mobile apps (spending increase of 47%), business intelligence (44%) and collaboration tools (41%).
Further research was carried out by Canalys in February 2012 of its online channel community – resellers, systems integrators, service providers and distributors. The results showed a positive outlook across MEAR despite ongoing economic uncertainty. Over half emphasized a move from capital expenditure to operating expenditure, with the highest demand for IT services expected from small to midsize companies (with 100-499 employees). As a respondent said, “Companies working their way out of the crisis by expanding.”
As more companies seek new technologies to secure future growth, our partner network across MEAR needs to be ready to help them become the technology leaders of tomorrow.
*Forrester, 2012, Forrsights: Cautious Optimism in 2012 IT Spending Plans -- A BT Futures Report
*Canalys, 2012, Navigating through dramatic industry change
Kiss your old running shoes good-bye. Change is constant. And technology has always been about change and convergence. But the massive, global-scale change occurring now is happening at rates faster than anyone ever predicted.
And this is disruptive change. It’s change that requires you to act, adapt, and move quickly to take advantage of the opportunities that come with it.
Cisco has a long history of showcasing disruption and convergence at Enterprise Connect since the early days of VoiceCon. TDM to voice over IP; the convergence of voice, video, and data; unified communications: In each case we saw how converging technology and collaborative behavior has helped disrupt the traditional way of doing things and created more value for businesses and users.
Today technology is creating disruption in unexpected places.
In this week’s episode of Engineers Unplugged, WWT’s Dave Kinsman (@virtualizethis) and Chris Gebhardt (@chrisgeb) take on the current buzz in the end-user computing space. Listen in on all things VDI, from storage to flash:
Welcome to Engineers Unplugged, where technologists talk to each other the way they know best, with a whiteboard. The rules are simple:
Episodes will publish weekly (or as close to it as we can manage)
This was the test I most eagerly anticipated because of the lack of information on the web regarding running a Xeon-based system at a reduced memory speed. Here I am at Cisco, the company that produces one of the only blades in the industry capable of supporting both the top bin E5-2690 processor and 24 DIMMs (HP and Dell can’t say the same), yet I didn’t know the performance impact for using all 24 DIMM slots. Sure, technically I could tell you that the E5-26xx memory bus runs at 1600MHz at two DIMMs per channel (16 DIMMs) and a slower speed at three DIMMs per channel (24 DIMMs), but how does a change in MHz on a memory bus affect the entire system? Keep reading to find out.
Speaking of memory, don’t forget that this blog is just one in a series of blogs covering VDI:
Join us for a free webinar on March 27 discussing this blog series. Register here.
The situation. As you can see in the 2-socket block diagram below, the E5-2600 family of processors has four memory channels and supports three DIMMs per channel. For a 2-socket blade, that’s 24 DIMMs. That’s a lot of DIMMs. If you populate either 8 or 16 DIMMs (1 or 2 DIMMs per channel), the memory bus runs at the full 1600MHz (when using the appropriately rated DIMMs). But when you add a third DIMM to each channel (for 24 DIMMs), the bus slows down. When we performed this testing, going from 16 to 24 DIMMs slowed the entire memory bus to 1066MHz, so that’s what you’ll see in the results. Cisco has since qualified running the memory bus at 1333MHz in UCSM maintenance releases 2.0(5a) and 2.1(1b), so running updated UCSM firmware should yield even better results than we saw in our testing.
As we’ve done in all of our tests, we looked at two different blades with two very different processors. Let’s start with the results for the E5-2665 processor. The following graph summarizes the results from four different test runs. Let’s focus on the blue lines. We tested 1vCPU virtual desktops with the memory bus running at 1600MHz (the solid blue line) and 1066MHz (the dotted blue line). The test at 1600MHz achieved greater density, but only 4% greater density. That is effectively negligible considering that the load is random in these tests. LoginVSI is designed to randomize the load.
When I think about IT security, I don’t immediately start thinking about threats, hackers and countermeasures, but begin with what is happening to IT in general. Right now, the three big megatrends in IT can be summed up in three words: virtualization, collaboration, and mobility. Unfortunately, it’s become something of a Newtonian principle that any action driving information technology forward generates an equal or greater counteraction by hackers to corrupt and exploit the new technology. I also find it disconcerting that at any given time, the most aggressively marketed “solutions” to IT security problems represent a trailing indicator of what cyber criminals are actually doing to raise hell. Read More »