Dell A/NZ picking up Windows 8 consulting, tablet work
- 03 December, 2012 11:26
Hardware giant Dell is starting to see some traction from Windows 8 tablet sales with enterprises across Australia and New Zealand, said local boss Joe Kremer.
Speaking at a press and analyst briefing in Sydney, Kremer said enterprises, educational institutions and consumers had expressed interest in the vendor's Windows 8 tablets, including the Latitude 10 and XPS 12.
“The greatest interest in the A/NZ market is coming from people who manage [device] fleets. If you are a CIO trying to manage different devices, these tablets can be locked down, they have finger print ID security and they run Windows 8 organically,” he said.
Kremer said Dell is seeing interest from CIOs in its managed fleet services because they are wary of going to the board and asking for large pools of funds to spend on IT infrastructure.
“If the CIO or CEO partners with someone like Dell, [which] has a fully managed service model, then that fleet management becomes a monthly service fee.”
Kremer said the vendor was also picking up Windows XP and 7 migration consulting work and was being hired by companies that needed help managing a broader fleet, which included Apple and Acer tablet devices.
“For most IT shops, they only think about application packaging or Exchange migration so moving to a new operating system is not something they normally have to do,” he said.
Turning to Dell’s global results, Kremer said the vendor delivered US$1.3 billion of cash flow in what he described as a “pretty tough market” around the world.
Servers and services continued to grow for the vendor. This was backed up by recent global server unit statistics from analyst firm Gartner which revealed that server units shipped worldwide increased year over year by 3.6 per cent to 2.46 million.
While HP managed to hang on to the top spot shipping 634,793 servers, Dell shipped 9 per cent more units than it did a year ago, maintaining its number two spot.
“If you look at what has happened globally at Dell over the past five years, the enterprise and services component of the business has grown from 23 to 29 per cent,” Kremer said.
“There is a very steady migration towards offering more comprehensive solutions that tend to come at higher margins.”
Follow Hamish Barwick on Twitter: @HamishBarwick Follow CIO Australia on Twitter and Like us on Facebook… Twitter: @CIO_Australia, Facebook: CIO Australia, or take part in the CIO conversation on LinkedIn: CIO Australia
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
How to Switch From iPhone 5S to BlackBerry Z30 (and Why)
CIOs to Become In-House Brokers -- and That's a Good Thing
The future of computing
10 Hot Hadoop Startups to Watch
The future of computing
Journey to the Future-State framework
Defining the future role and cataloguing the competencies that would take CIOs there was only the first step. In 2009 Council members pushed for more – they wanted to help the IT profession make the journey from Functional Head (where IT is inevitably viewed as a cost centre) to a Business Strategist (where IT is externally focused and viewed as an organisational ‘game changer’). Although a single prescription for advancing the role is impossible because CIOs circumstances are all different, members wanted a general roadmap and guidelines.
Secure by design - How to dramatically simplify data protection, access control and other critical security tasks
This white paper examines how you can dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple, flexible remote access that enhances business productivity.
Top 20 Critical Security Controls - Compliance Guide
Simply being compliant is not enough to mitigate attacks and protect critical information. Organizations can reduce chances of compromise by shifting away from a compliance-driven approach. This guide provides the Top 20 Critical Security Controls (CSCs) developed by the SANS Institute to address the need for a risk-based approach to security.