Cloud Repatriation and the Growth Paradox of Public Cloud IaaS

Cloud Repatriation and the Growth Paradox of Public Cloud IaaS

Over the past two years, a new narrative has taken hold in the cloud market. No, it is not always about sovereign cloud. 🙂 Headlines talk about cloud repatriation – nothing really new, but it is still out there. CIOs speak openly about pulling some workloads back on-premises. Analysts write about organizations “correcting” some earlier cloud decisions to optimize cloud spend. In parallel, hyperscalers themselves now acknowledge that not every workload belongs in the public cloud.

And yet, when you look at the data, you will find a paradox.

IDC and Gartner both project strong, sustained growth in public cloud IaaS spending over the next five years. Not marginal growth and sign of stagnation. But a market that continues to expand at scale, absorbing more workloads, more budgets, and more strategic relevance every year.

At first glance, these two trends appear contradictory. If organizations are repatriating workloads, why does public cloud IaaS continue to grow so aggressively? The answer lies in understanding what is actually being repatriated, what continues to move to the cloud, and how infrastructure constraints are reshaping decision-making in ways that are often misunderstood.

Cloud Repatriation Is Real, but Narrower Than the Narrative Suggests

Cloud repatriation is not a myth. It is happening, but it is also frequently misinterpreted.

Most repatriation initiatives are highly selective. They focus on predictable, steady-state workloads that were lifted into the public cloud under assumptions that no longer hold. Cost transparency has improved, egress fees are better understood and operating models have matured. What once looked flexible and elastic is now seen as expensive and operationally inflexible for certain classes of workloads.

What is rarely discussed is that repatriation does not mean “leaving the cloud”, but I have to repeat it again: It means rebalancing. Meaning, that trganizations are not abandoning public cloud IaaS as a concept. They are just refining their usage of it.

At the same time, some new workloads continue to flow into public cloud environments. Digital-native applications, analytics platforms, some AI pipelines, globally distributed services, and short-lived experimental environments still align extremely well with public cloud economics and operating models. These workloads were not part of the original repatriation debate, and they seem to be growing faster than traditional workloads are being pulled back.

This is how both statements can be true at the same time. Cloud repatriation exists, and public cloud IaaS continues to grow.

The Structural Drivers Behind Continued IaaS Growth

Public cloud IaaS growth is not driven by blind enthusiasm anymore. It is driven by structural forces that have little to do with fashion and everything to do with constraints.

One of the most underestimated factors is time. Building infrastructure takes time and procuring hardware takes time as well. Scaling data centers takes time and many organizations today are not choosing public cloud because it is cheaper or “better”, but because it is available now.

This becomes even more apparent when looking at the hardware market right now.

Hardware Shortages and Rising Server Prices Change the Equation

The infrastructure layer beneath private clouds has suddenly become a bottleneck. Server lead times have increased, GPU availability is constrained and prices for enterprise-grade hardware continue to rise, driven by supply chain pressures, higher component costs, and growing demand from AI workloads.

For organizations running large environments, this introduces a new type of risk. Capacity planning is a logistical problem and no longer just a financial exercise anymore. Even when budgets are approved, hardware may not arrive in time. That is the new reality.

In this context, public cloud data centers represent something extremely valuable: pre-existing capacity. Hyperscalers have already made the capital investments and they already operate at scale. From the customer perspective, infrastructure suddenly looks abundant again.

This is why many organizations currently consider shifting workloads to public cloud IaaS, even if they were previously skeptical. It became a pragmatic response to scarcity.

The Flawed Assumption: “Just Use Public Cloud Instead of Buying Servers”

However, this line of thinking often glosses over a critical distinction.

Many of these organizations do not actually want “cloud-native” infrastructure, if we are being honest here. What they want is physical capacity – They want compute, storage, and networking under predictable performance characteristics. In other words, they want some VMs and bare metal.

Buying servers allows organizations to retain architectural freedom. It allows them to choose their operating system or virtualization stack, their security model, their automation tooling, and their lifecycle strategy. Public cloud IaaS, by contrast, delivers abstraction, but at the cost of dependency.

When organizations consume IaaS services from hyperscalers, they implicitly accept constraints around instance types, networking semantics, storage behavior, and pricing models. Over time, this shapes application architectures and operational processes. The usage of such services suddenly became a lock-in.

Bare Metal in the Public Cloud Is Not a Contradiction

Interestingly, the industry has started to converge on a hybrid answer to this dilemma: bare metal in the public cloud.

Hyperscalers themselves offer bare-metal services. This is an acknowledgment that not all customers want fully abstracted IaaS. Some want physical control without owning physical assets. It is simple as that.

But bare metal alone is not enough. Without a consistent cloud platform on top, bare-metal in the public cloud becomes just another silo. You gain performance and isolation, but you lose portability and operational consistency.

Nutanix Cloud Clusters and the Reframing of IaaS

Nutanix Cloud Platform running on AWS, Azure, and Google Cloud through NC2 (Nutanix Cloud Clusters) introduces a different interpretation of public cloud IaaS.

Instead of consuming hyperscaler-native IaaS primitives, customers deploy a full private cloud stack on bare-metal instances in public cloud data centers. From an architectural perspective, this is a subtle but profound difference.

Customers still benefit from the hyperscaler’s global footprint and hardware availability and they still avoid long procurement cycles, but they do not surrender control of their cloud operating model. The same Nutanix stack runs on-premises and in public cloud, with the same APIs, the same tooling, and the same governance constructs.

Workload Mobility as the Missing Dimension

The most underappreciated benefit of this approach is workload mobility.

In a cloud-native bare-metal deployment tied directly to hyperscaler services, workloads tend to become anchored, migration becomes complex, and exit strategies are theoretical at best.

With NC2, workloads are portable by design. Virtual machines and applications can move between on-premises environments and public cloud (or a service provider cloud) bare-metal clusters without refactoring. In practical terms, this means organizations can use public cloud capacity tactically rather than strategically committing to it. Capacity shortages, temporary demand spikes, regional requirements, or regulatory constraints can be addressed without redefining the entire infrastructure strategy.

This is something traditional IaaS does not offer, and something pure bare-metal consumption does not solve on its own.

Reconciling the Two Trends

When viewed through this lens, the contradiction between cloud repatriation and public cloud IaaS growth disappears.

Public cloud is growing because it solves real problems: availability, scale, and speed. Repatriation is happening because not all problems require abstraction, and not all workloads benefit from cloud-native constraints.

The future is not a reversal of cloud adoption. It is a maturation of it.

Organizations are asking how to use public clouds without losing control. Platforms that allow them to consume cloud capacity while preserving architectural independence are not an alternative to IaaS growth and they are one of the reasons that growth can continue without triggering the next wave of regret-driven repatriation.

What complicates this picture further is that even where public cloud continues to grow, many of its original economic promises are now being questioned again.

The Broken Promise of Economies of Scale

One of the foundational assumptions behind public cloud adoption was economies of scale. The logic seemed sound. Hyperscalers operate at a scale no enterprise could ever match. Massive data centers, global procurement power, highly automated operations. All of this was expected to translate into continuously declining unit costs, or at least stable pricing over time.

That assumption has not materialized as we know by now.

If economies of scale were truly flowing through to customers, we would not be witnessing repeated price increases across compute, storage, networking, and ancillary services. We would not see new pricing tiers, revised licensing constructs, or more aggressive monetization of previously “included” capabilities. The reality is that public cloud pricing has moved in one direction for many workloads, and that direction is up.

This does not mean hyperscalers are acting irrationally. It means the original narrative was incomplete. Yes, scale does reduce certain costs, but it also introduces new ones. That is also true for new innovations and services. Energy prices, land, specialized hardware, regulatory compliance, security investments, and the operational complexity of running globally distributed platforms all scale accordingly. Add margin expectations from capital markets, and the result is not a race to the bottom, but disciplined price optimization.

For customers, however, this creates a growing disconnect between expectation and reality.

When Forecasts Miss Reality

More than half of organizations report that their public cloud spending diverges significantly from what they initially planned. In many cases, the difference is not marginal. Budgets are exceeded, cost models fail to reflect real usage patterns, optimization efforts lag behind application growth.

What is often overlooked is the second-order effect of this divergence. Over a third of organizations report that cloud-related cost and complexity issues directly contribute to delayed projects. Migration timelines slip, modernization initiatives stall, and teams slow down not because technology is unavailable, but because financial and operational uncertainty creeps into every decision.

Commitments, Consumption, and a Structural Risk

Most large organizations do not consume public cloud on a purely on-demand basis. They negotiate commitments, look at reserved capacity, and spend-based discounts. These are strategic agreements designed to lower unit costs in exchange for predictable consumption.

These agreements assume one thing above all else: that workloads will move. They HAVE TO move.

When migrations slow down, a new risk pops up. Organizations fail to reach their committed consumption levels, because they cannot move workloads fast enough. Legacy architectures, migration complexity, skill shortages, and governance friction all play a role.

The consequence is subtle but severe. Committed spend still has to be paid and because of that future negotiations become weaker. The organization enters the next contract cycle with a track record of underconsumption, reduced leverage, and less credibility in forecasting.

In effect, execution risk turns into commercial risk.

This dynamic is rarely discussed publicly, but it is increasingly common in private conversations with CIOs and cloud leaders. The challenge is no longer whether the public cloud can scale, but whether the organization can.

Speed of Migration as an Economic Variable

At this point, migration speed stops being a technical metric and becomes an economic one. The faster workloads can move, the faster negotiated consumption levels can be reached. The slower they move, the more value leaks out of cloud agreements.

This is where many cloud-native migration approaches struggle. Refactoring takes time and re-architecting applications is expensive. Not every workload is a candidate for transformation under real-world constraints.

As a result, organizations are caught between two pressures. On one side, the need to consume public cloud capacity they have already paid for. On the other hand, the inability to move workloads quickly without introducing unacceptable risk.

NC2 as a Consumption Accelerator, Not a Shortcut

This is where Nutanix Cloud Platform with NC2 changes the conversation.

By allowing organizations to run the same private cloud stack on bare metal in AWS, Azure, and Google Cloud, NC2 removes one of the biggest bottlenecks in migration programs: The need to change how workloads are built and operated before they can move.

Workloads can be migrated as they are, operating models remain consistent, governance does not have to be reinvented, and teams do not need to learn a new infrastructure paradigm under time pressure. It’s all about efficiency and speed.

Faster migrations mean workloads start consuming public cloud capacity earlier and the negotiated consumption targets suddenly become achievable. Commitments turn into realized value rather than sunk cost, and the organization regains control over both its migration timeline and its commercial position.

Reframing the Role of Public Cloud

In this context, NC2 is not an alternative to public cloud economics, but a mechanism to actually realize them.

Public cloud providers assume customers can move fast. In reality, many customers cannot, not because they resist change, but because change takes time. Platforms that reduce friction between private and public environments do not undermine cloud strategies. They are here to stabilize them. And they definitely can!

The uncomfortable truth is that economies of scale alone do not guarantee better outcomes for customers, execution does. And execution, in large enterprises, depends less on ideal architectures and more on pragmatic paths that respect existing realities.

When those paths exist, public cloud growth and cloud repatriation stop being opposing forces. They become two sides of the same maturation process, one that rewards platforms designed not just for scale, but for transition.

Multi-cloud is normal in public cloud. Why is “single-cloud” still normal in private cloud?

Multi-cloud is normal in public cloud. Why is “single-cloud” still normal in private cloud?

If you ask most large organizations why they use more than one public cloud, the answers are remarkably consistent. It is not fashion, and it is rarely driven by engineering curiosity. It is risk management and a best of breed approach.

Enterprises distribute workloads across multiple public clouds to reduce concentration risk, comply with regulatory expectations, preserve negotiation leverage, and remain operationally resilient in the face of outages that cannot be mitigated by adding another availability zone. In regulated industries, especially in Europe, this thinking has become mainstream. Supervisors explicitly expect organisations to understand their outsourcing dependencies, to manage exit scenarios, and to avoid structural lock-in where it can reasonably be avoided.

Now apply the same logic one layer down into the private cloud world, and the picture changes dramatically.

Across industries and geographies, a significant majority of private cloud workloads still run on a single private cloud platform. In practice, this platform is often VMware (by Broadcom). Estimates vary, but the dominance itself is not controversial. In many enterprises, approximately 70 to 80 percent of virtualized workloads reside on the same platform, regardless of sector.

If the same concentration existed in the public cloud, the discussion would be very different. Boards would ask questions, regulators would intervene, architects would be tasked with designing alternatives. Yet in private cloud infrastructure, this concentration is often treated as normal, even invisible.

Why?

Organisations deliberately choose multiple public clouds

Public cloud multi-cloud strategies are often oversimplified as “fear of lock-in”, but that misses the point.

The primary driver is concentration risk. When critical workloads depend on a single provider, certain failure modes become existential. Provider-wide control plane outages, identity failures, geopolitical constraints, or contractual disputes cannot be mitigated by technical architecture alone. Multi-cloud does not eliminate risk, but it limits the blast radius.

Regulation reinforces this logic. The European banking supervision, for example, treats cloud as an outsourcing risk and expects institutions to demonstrate governance, exit readiness, and operational resilience. An exit strategy that only exists on paper is increasingly viewed as insufficient. There are also pragmatic reasons. Jurisdictional considerations, data protection regimes, and shifting geopolitical realities make organizations reluctant to anchor everything to a single legal and operational framework. Multi-cloud (or hybrid cloud) becomes a way to keep strategic options open.

And finally, there is negotiation power. A credible alternative changes vendor dynamics. Even if workloads never move, the ability to move matters.

This mindset is widely accepted in the public cloud. It is almost uncontroversial.

How the private cloud monoculture emerged

The dominance of a single private cloud platform did not happen by accident, and it did not happen because enterprises were careless.

VMware earned its position over two decades by solving real problems early and building an ecosystem that reinforced itself. Skills became widely available, tooling matured, and operational processes stabilized. Backup, disaster recovery, monitoring, security controls, and audit practices are all aligned around a common platform. Over time, the private cloud platform evolved into more than just software. It became the operating model.

And once that happens, switching becomes an organizational transformation.

Private cloud decisions are also structurally centralized. Unlike public cloud consumption, which is often decentralized across business units, private cloud infrastructure is intentionally standardized. One platform, one set of guardrails, one way of operating. From an efficiency and governance perspective, this makes sense. From a dependency perspective, it creates a monoculture.

For years, this trade-off was acceptable because the environment was stable, licensing was predictable, and the ecosystem was broad. The rules of the game did not change dramatically.

That assumption is now being tested.

What has changed is not the technology, but the dependency profile

VMware remains a technically strong private cloud platform. That is not in dispute. What has changed under Broadcom is the commercial and ecosystem context in which the platform operates. Infrastructure licensing has shifted from a largely predictable, incremental expense into a strategically sensitive commitment. Renewals are no longer routine events. They become moments of leverage.

At the same time, changes in partner models and go-to-market structures affect how organizations buy, renew, and support their private cloud infrastructure. When the surrounding ecosystem narrows, dependency increases, even if the software itself remains excellent.

This is not a judgment on intent or quality. It is just a structural observation. When one private cloud platform represents the majority of an organization’s infrastructure, any material change in pricing, licensing, or ecosystem access becomes a strategic risk by definition.

The real issue is not lock-in, but the absence of a credible exit

Most decision-makers do not care about hypervisors, they care about exposure. The critical question is not whether an organization plans to leave its existing private cloud platform. The question is whether it could leave, within a timeframe the business could tolerate, if it had to.

In many cases, the honest answer is no.

Economic dependency is the first dimension. When a single vendor defines the majority of your infrastructure cost base, budget flexibility shrinks.

Operational dependency is the second. If tooling, processes, security models, and skills are deeply coupled to one platform, migration timelines stretch into years. That alone is a risk, even if no migration is planned.

Ecosystem dependency is the third. Fewer partners and fewer commercial options reduce competitive pressure and resilience.

Strategic dependency is the fourth. The private cloud platform is increasingly becoming the default landing zone for everything that cannot go to the public cloud. At that point, it is no longer just infrastructure. It is a critical organizational infrastructure.

Public cloud regulators have language for this. They call it outsourcing concentration risk. Private cloud infrastructure rarely receives the same attention, even though the consequences can be comparable.

Concentration risk in the public sector – When dependency is financed by taxpayers

In the public sector, concentration risk is not only a technical or commercial question but also a governance question. Public administrations do not invest their own capital. Infrastructure decisions are financed by taxpayers, justified through public procurement, and expected to remain defensible over long time horizons. This fundamentally changes the risk calculus.

When a public institution concentrates the majority of its private cloud infrastructure on a single platform, it is committing public funds, procurement structures, skills development, and long-term dependency to one vendor’s strategic direction. Now, what does it mean for a nation where 80 or 90% of its public sector is dependent on one single vendor?

That dependency can last longer than political cycles, leadership changes, or even the original architectural assumptions. If costs rise, terms change, or exit options narrow, the consequences are beared by the public. This is why procurement law and public sector governance emphasize competition, supplier diversity, and long-term sustainability. In theory, these principles apply equally to private cloud platforms. In practice, historical standardization decisions often override them.

There is also a practical constraint. Public institutions cannot move quickly. Budget cycles, tender requirements, and legal processes mean that correcting structural dependency is slow and expensive once it is entrenched.

Seen through this lens, private cloud concentration risk in the public sector is not a hypothetical problem. It is a deferred liability.

Why organizations hesitate to introduce a new or second private cloud platform

If concentration risk is real, why do organizations not simply add a second platform?

Because fragmentation is also a risk.

Enterprises do not want five private cloud platforms. They do not want duplicated tooling, fragmented operations, or diluted skills. Running parallel infrastructures without a coherent operating model creates unnecessary cost and complexity, without addressing the underlying problem. This is why most organizations are not looking for “another hypervisor”. They are seeking a second private cloud platform that preserves the VM-centric operating model, integrates lifecycle management, and can coexist without necessitating a redesign of governance and processes.

The main objective here is credible optionality.

A market correction – Diversity returns to private cloud infrastructure

One unintended consequence of Broadcom’s acquisition of VMware is that it has reopened a market that had been largely closed for years. For a long time, the conversation about private cloud infrastructure felt settled. VMware was the default, alternatives were niche, and serious evaluation was rare. That has changed.

Technologies that existed on the margins are being reconsidered. Xen-based platforms are evaluated again, where simplicity and cost control dominate. Proxmox is discussed more seriously in environments that value open-source governance and transparency. Microsoft Hyper-V is re-examined, where deep Microsoft integration already exists.

At the same time, vendors are responding. HPE Morpheus VM Essentials reflects a broader trend toward abstraction and lifecycle management that reduces direct dependency on a single virtualization layer.

Nutanix appears in this context not as a disruptive newcomer, but as an established private cloud platform that fits a diversification narrative. For some organizations, it represents a way to introduce a second platform without abandoning existing operations or retraining entire teams from scratch.

None of these options is a universal replacement. That is not the point. The point is that choice has returned.

This diversity is healthy. It forces vendors to compete on clarity, pricing, ecosystem openness, and operational value. It forces customers to revisit assumptions that have gone unchallenged for years and it reintroduces architectural optionality into a layer of infrastructure that had become remarkably static.

This conversation matters now

For years, private cloud concentration risk was theoretical. Today, it is increasingly tangible.

The combination of high platform concentration, shifting commercial models, and narrowing ecosystems forces organizations to re-examine decisions they have not questioned in over a decade. Not because the technology suddenly failed, but because dependency became visible.

The irony is that enterprises already know how to reason about this problem. They apply the same logic every day in public cloud.

The difference is psychological. Private cloud infrastructure feels “owned”. It runs on-premises and it feels sovereign. That feeling can be partially true, but it can also obscure how much strategic control has quietly shifted elsewhere.

A measured conclusion

This is not a call for mass migration away from VMware. That would be reactive and, in many cases, irresponsible.

It is a call to apply the same discipline to private cloud platforms that organizations already apply to public cloud providers. Concentration risk does not disappear because infrastructure runs in a data center.

So, if the terms change, do you have a credible alternative?

Open source gives you freedom. Nutanix makes that freedom actually usable.

Open source gives you freedom. Nutanix makes that freedom actually usable.

Every organisation that wants to modernise its infrastructure eventually arrives at the same question: How open should my cloud be? Not open as in “free and uncontrolled”, but open as in transparent, portable, verifiable. Open as in “I want to reduce my dependencies, regain autonomy and shape my architecture based on principles”.

What most CIOs and architects have realized over time is that sovereignty and openness are not separate ideas. They depend on each other. And this is where Nutanix has become one of the most interesting players in the market. Because while many vendors talk about optionality, Nutanix has built a platform that is literally assembled out of open-source building blocks. That means curated, hardened, automated and delivered as a consistent experience.

It’s a structured open-source universe, integrated from day one and continuously maintained at enterprise quality.

In other words, Nutanix operationalizes open source, turning it into something teams can deploy, trust and scale without drowning in complexity.

Operationalizing Open Source

Every architect knows that adopting open source at scale is not trivial. The problem is not the software. The problem is the operational burden:

  • Which projects are stable?
  • Which versions are interoperable?
  • Who patches them?
  • Who maintains the lifecycle?
  • How do you standardize the cluster experience across sites, regions, and teams?
  • How do you avoid configuration drift?
  • How do you keep performance predictable?

Nutanix solves this by curating the stack, integrating the components and automating the entire lifecycle. Nutanix Kubernetes Platform (NKP) is basically a “sovereignty accelerator”. It enables organizations to adopt a fully open ecosystem while maintaining the reliability and simplicity that enterprises require.

A Platform Built on Upstream Open Source

What often gets overlooked in the cloud-native conversation is that open source is not a single entity. There is upstream open source, which can be seen as the pure, community-driven version. And then there are vendor-modified forks, custom APIs, and platforms that quietly redirect you into proprietary interfaces the moment you start building something serious.

Nutanix took a very different path. NKP is built on pure upstream open-source components. Not repackaged, not modified into proprietary variants, not wrapped in a “special” vendor API that locks you in. The APIs exposed to the user are the same APIs used everywhere in the CNCF community.

This matters more than most people realize.

Because the moment a vendor alters an API, you lose portability. And the moment you lose portability, you lose sovereignty.

One of the strongest signals that Nutanix also prioritizes sovereignty, is its commitment to Cluster API (CAPI). This is what gives NKP deployments the portability many vendors can only talk about.

Nutanix Cluster API

With CAPI, the cluster lifecycle (creation, upgrade, scaling, deletion) is handled through a common, open standard that works:

  • on-premises & baremetal
  • on Nutanix
  • on AWS, Azure or GCP
  • in other/public sovereign cloud regions
  • at the edge

CAPI means your clusters are not married to your infrastructure vendor.

Nutanix Entered the Gartner MQ for Container Management 2025

Every Gartner Magic Quadrant tells a story. Not just about vendors, but about the direction a market is moving. And the 2025 Magic Quadrant for Container Management is particularly revealing. Not only because Nutanix appears in it for the first time, but because of where Nutanix is positioned and what that position says about the future of cloud-native platforms.

Nutanix made its debut as a Challenger and that’s probably a rare achievement for a first-time entrant. Interestingly and more importantly, Nutanix positioned above Broadcom (VMware) on both axes:

  • Ability to execute
  • Completeness of vision

Gartner Magic Quadrant for Container Management June 2025

2025 marks a new landscape – Broadcom fell out of the leaders quadrant entirely and now lags behind Nutanix in both execution and vision. This reflects a broader transition in customer expectations.

Organizations want portability, sovereign deployment models, and platforms that behave like products rather than collections of components. Nutanix delivered exactly that with NKP and gets recognized for that.

When Openness Becomes Strategy, Sovereignty Becomes Reality

If you step back and look at all the signals, from the rise of sovereign cloud requirements to the changes reflected in Gartner’s latest Magic Quadrant, a clear pattern emerges. The market is moving away from closed ecosystems, inflexible stacks and proprietary abstractions.

Vision today is no longer defined by how many features you can stack on top of Kubernetes. Vision is defined by how well you can make Kubernetes usable, secure, portable and sovereign. In the data center, at the edge, in public clouds, or in fully disconnected/air-gapped environments.

VMware by Broadcom – The Standard of Independence Has Become a Structure of Dependency

VMware by Broadcom – The Standard of Independence Has Become a Structure of Dependency

There comes a point in every IT strategy where doing nothing becomes the most expensive choice. Many VMware by Broadcom customers know this moment well, and they sense that Broadcom’s direction isn’t theirs, but still hesitate to move. The truth is, the real risk isn’t in changing platforms but waiting too long to reclaim control.

I have worked with VMware products for more than 15 years and even spent part of my career as a VMware solution engineer before Broadcom acquired this company. A company that once had a wonderful culture. A culture that, sadly, no longer exists. Many of my former colleagues no longer trust their leadership. What does this mean for you?

We know that VMware environments are mature, battle-tested, and deeply embedded into how enterprises operate. And that’s exactly the problem. Over the years, VMware became more than a platform. It became the language of enterprise IT with vSphere for compute, vSAN for storage, NSX for networking. It’s how we learned to think about infrastructure. That’s the vision of VMware Cloud Foundation (VCF) and the software-defined data center (SDDC).

Fast forward, even when customers are frustrated by cost increases, licensing restrictions, or shifting support models, they rarely act. Why? Because it feels safer to tolerate pain than to invite uncertainty. But stability is often just an illusion. What feels familiar isn’t necessarily secure.

The Forced Migration Nobody Talks About

The irony is that many customers who think they are avoiding change are actually facing one. Just not by choice. Broadcom’s current direction points toward a future where customers can only consume VMware Cloud Foundation (VCF) as a unified, integrated stack. Which, in general, is a good thing, isn’t it?

As a result, you no longer decide which components you actually need. Even if you only use vSphere, vSAN, and Aria Operations today, you will be licensed and forced to deploy the full stack, including NSX and VCF Operations/Automation, whether you need them or not. While that’s still speculation, everything Hock Tan says points in this direction. And many analysts see it the same way.

Broadcom reached VMware’s goal: VCF has become their flagship product, but only by force and not by the customer’s choice. Broadcom has leverage by choosing the right discounts to make VCF the “right” and only choice for customers, even if they don’t want to adopt the full stack.

Paths to VCF 9

What does this mean for your future? In practice, it’s a structural migration disguised as continuity and not just a commercial shift. Moving from a traditional vSphere or HCI-based setup to VCF comes with the same side effects, changes, and costs you would face when adopting a new platform (Nutanix, Red Hat, Azure Local etc.).

Think about it: If you must migrate anyway, why not move toward more control, not less?

Features, Not Products

Broadcom has been clear about its long-term vision. The company now describes VMware Cloud Foundation as the only product name. They see it as the operating system for data centers, which is a great message, but Broadcom wants VMware to operate like Azure, where you don’t “buy” networking or storage. You consume them as built-in features of the platform.

Once this model is fully implemented, you won’t purchase vSphere or NSX. You’ll subscribe to VCF, and those technologies will simply be features. The Aria Suite has already disappeared from the portfolio (example: Aria Operations became VCF Operations). The next product to vanish will be everything except the name VMware Cloud Foundation.

It’s a clever move for Broadcom, but a dangerous one for customers. Yes, I am looking at you. Because when every capability becomes part of a single subscription, the flexibility to choose or not to use disappears. This means your infrastructure, once hybrid and modular, is now a monolith. Imagine the lock-in of any hyperscaler, but on-premises. That’s the new VMware.

The True Cost of Change

Let’s be honest, migrations are not easy. They require time, expertise, and courage. Yes, courage as well. But the cost of change is not the real problem. The cost of inaction is.

When organizations stay on platforms that no longer align with their strategy, they pay with flexibility, not just money. Every renewal locks in another year(s) of dependency. Every delay potentially pushes innovation further out of reach. And with Broadcom’s model, the risk isn’t just financial. The control over your architecture, your upgrade cadence, your integrations, and even your licensing terms slowly moves away from you. And faster than you may think.

VCF SPD November 2025

Broadcom’s new compliance mechanisms amplify that dependency. According to the November 2025 VCF Specific Program Documentation, customers must upload a verified compliance report every 180 days. Failing to do so allows Broadcom to degrade or block management-plane functionality and suspend support entitlements. What once was a perpetual license has become an always-connected control loop. A system that continuously validates, monitors, and enforces usage from the outside. Is that okay for a “sovereign” cloud or you as the operator?

As Hock Tan , our President and CEO, shared in today's General Session at  VMware Explore Barcelona, European customers want control over their data  and processes. | Broadcom

You don’t notice it day by day. But five years later, you realize: Your data center doesn’t belong to you anymore.

Why Change Feels Bigger Than It Is

Anyway, change is often perceived as a massive technical disruption. But in reality, it’s usually a series of small, manageable steps. Modern infrastructure platforms have evolved to make transitions far less painful than before. Today, you can migrate workloads gradually, reuse existing automation scripts, and maintain uptime while transforming the foundation beneath.

What used to be a twelve-month migration project can now be done in phases, with full visibility and reversible checkpoints. The idea is not to replace everything. It’s to regain control, layer by layer.

Freedom as a Strategy

Freedom should be a design principle. It means having a platform that lets you choose, and it also means being able to decide when to upgrade, how to scale, and where your data lives, without waiting for a vendor’s permission.

This is why I joined Nutanix. They don’t force you into a proprietary stack. They abstract complexity instead of hiding it. They allow you to run what you need, and only what you need, whether that’s virtualization, containers, or a mix of both. Yep, and you can also provide DBaaS (NDB) or a private AI platform (NAI).

I’m not telling you to abandon what you know. Take a breath and think about what’s possible when choice returns.

For years, VMware has been the familiar home of enterprise IT. But homes can become cages when you are no longer allowed to move the furniture. The market is moving towards platforms that combine the comfort of virtualization with the agility of cloud without the loss of control.

This shift is already happening. Many organizations start small – with their disaster recovery site, their dev/test environment, or their EUC workloads. Once the first step is done, confidence grows. They realize that freedom doesn’t come from ripping everything out. It comes from taking back control, one decision at a time.

A Quiet Revolution

The next chapter of enterprise infrastructure will not be written by those who cling to the past, but by those who dare to redesign their foundations. Not because they want to change, but because they must to stay agile, compliant, and sovereign in a world where autonomy is everything.

The legal fine print makes it clear. What Broadcom calls modernization is, in fact, a redesign of control. And control rarely moves back to the customer once it’s gone.

The question is no longer “Can we afford to change?”

It should be “Can we afford not to?”. Can YOU afford not to?

And maybe that’s where your next journey begins. Not with fear, but with the quiet confidence that the time to regain control has finally arrived.

Why I Left Oracle and Joined Nutanix

Why I Left Oracle and Joined Nutanix

There are moments in a career when you stop and realise that the path beneath your feet is no longer the path you set out to walk. Sometimes the change is subtle, almost invisible and other times it becomes impossible to ignore. For me, this moment arrived somewhere between large public sector strategy discussions, another round of organizational changes, and one more conversation about “global priorities” that had little connection to the needs of Swiss or European sovereign infrastructure.

I spent a meaningful year at Oracle. I met great people and learned what it means to bring a (dedicated) hyperscale cloud into regulated environments. OCI Dedicated Region is still one of the most interesting and ambitious engineering efforts in the cloud industry. But at some point, I realized that my personal mission of digital sovereignty, open choice, and the empowerment of customers started to diverge from where I felt the company was going.

Not wrong. Not bad. Just different. And that difference grew large enough that it became impossible to pretend we were still walking in the same direction.

Sovereignty has always been my north star

Years before Oracle, long before the idea of sovereign clouds became a political agenda, I cared about the question of who controls technology. My time at VMware shaped that perspective deeply. Private cloud, infrastructure independence, and the ability for organizations to define their own architecture rather than renting someone else’s world.

Even during my time at Oracle, I continued to view everything through that sovereignty lens. Dedicated Region was my way of reconciling public cloud innovation with local control, which is a compelling proposition in many cases. But it became increasingly clear to me that the broader industry narrative was drifting toward full-stack centralization. Clouds wanted to become operating systems. Platforms wanted to become monopolies. The idea that customers deserve autonomy was becoming a footnote.

At some point, you have to ask yourself: Are you still aligned with the direction of travel, or are you just trying to keep up even though you know you want something else?

Realizing that it was time to step off the path

There is no single moment that triggered my decision to leave. It was more like a slow accumulation of signals. My conversations increasingly shifted from “how do we empower customers?” to “how do we position the stack?”. The freedom and creativity I had in the early days of promoting sovereign cloud initiatives felt narrower over time. And internally, I caught myself spending more energy explaining why sovereignty matters than building solutions around it.

If your work becomes a negotiation with your own values, you eventually reach a point where you must choose. Stay and adapt, or step forward and realign.

I chose alignment.

Why private cloud again?

When you think deeply about sovereignty, you eventually come to the simple truth that sovereignty does not happen by accident. It is not a checkbox, a certificate, or a location of a data center. Sovereignty is an architectural stance. A design choice. A commitment to decentralization, reversibility, and customer control.

And that is where private cloud becomes relevant again as the foundation for a new era of controlled autonomy.

The more the world embraces hyperscale convenience, the more valuable real control becomes. The more cloud platforms abstract everything away, the more important it becomes to own the layers that matter. The more AI, data, and national infrastructure rely on cloud services, the more essential locally governed, locally designed, locally operable environments become.

Private cloud, done right, is a rebalancing of power.

Why Nutanix was the logical next chapter

If you want to work on digital sovereignty in a way that is meaningful, credible, and technically grounded, there are only a handful of companies where that mission is more than a marketing line. Nutanix is one of them and arguably the most aligned with the idea of customer freedom.

Nutanix sits in a unique space. It is an infrastructure platform that modernizes private cloud while keeping openness at the center. It doesn’t force customers into a predefined world and it creates the foundation upon which customers can build their own.

Choice becomes real again. Migration paths become optional rather than forced. Hybrid and multi-cloud become strategies instead of slogans. And customers regain something that hyperscale economics has quietly eroded for years. Yep, the right to decide their own future.

What I found at Nutanix is a philosophy that echoes my own. Technology should not dictate. It should enable. It should adapt to the customer, not the other way around. It should enhance sovereignty rather than dilute it behind yet another managed layer. And it should make modernization possible without making independence impossible.

Stepping into a mission, not just a new job

Leaving Oracle was not an escape. It was a conscious return to the principles that have guided me for more than a decade. I joined Nutanix not because it is fashionable, but because it represents the next phase of what the infrastructure world needs. A platform that gives power back to the organisations that increasingly rely on technology for national, economic, and operational resilience.

Modernisation should not mean giving up autonomy. Cloud adoption should not mean losing choice. Future architectures should not be designed by someone else’s business model.

Nutanix brings the balance back. It brings control back. It brings the freedom to design infrastructure on your terms.

And that is where I want to contribute. That is where I want to help customers. That is the path I want to walk.

Final Words

This move means a realignment with my own principles and the narrative I want to push into the market. The next decade will belong to organizations that understand this early and build accordingly.

I want to help shape that decade with customers, partners, policymakers, and anyone who believes that the future of infrastructure must be both modern and self-determined.

Leaving Oracle was the end of a chapter. Joining Nutanix is the continuation of a mission.

And for the first time in a long time, I feel like I am walking exactly where I am supposed to be.

Why Workloads Are Really Repatriating to Private Cloud and How to Prepare for AI

Why Workloads Are Really Repatriating to Private Cloud and How to Prepare for AI

In the beginning, renting won. Managed services and elastic capacity let teams move faster than procurement cycles, and the “convenience tax” felt like a bargain. A decade later, many enterprises have discovered what one high-profile cloud exit made clear: The same convenience that speeds delivery can erode margins at scale. That realization is driving a new wave of selective repatriation, moving the right workloads from hyperscale public clouds back to private cloud platforms, while a second force emerges simultaneously. AI is changing what a data center needs to look like. Any conversation about bringing workloads home that ignores AI-readiness is incomplete.

What’s really happening (and what isn’t)

Repatriation today is targeted. IDC’s Server and Storage Workloads Survey found that only ~8-9% of companies plan full repatriation. Most enterprises bring back specific components like production data, backup pipelines, or compute, where economics, latency, or exit risk justify it.

Media coverage has sharpened the picture. CIO.com frames repatriation as strategic workload placement rather than a retreat. InfoWorld’s look at 2025 trends notes rising data-center use even as public-cloud spend keeps growing. Forrester’s 2025 predictions echo the co-existence. Public cloud expands, private cloud thrives alongside it.  Hybrid is normal. Sovereignty, cost control, and performance are the levers. 

And then there are the headline case studies. 37signals (Basecamp/HEY) publicized their journey off AWS – deleting their account in 2025 after moving storage to on-prem arrays and citing seven-figure annual savings on S3 alone. Whether or not your estate looks like theirs, it crystallized the idea that the convenience premium can outgrow its value at scale.

Why the calculus changed

Unit economics at scale. Per-unit cloud pricing that felt fine at 100 TB looks different at multiple PB, especially once you add data egress, cross-AZ traffic, and premium managed services. Well-understood examples (Dropbox earlier) show material savings when high-volume, steady-state workloads move to owned capacity. 

Performance locality and control. Some migrations lifted and shifted latency-sensitive systems into the wrong place. Round-trip times, noisy neighbors, or throttling can make the public cloud an expensive place to be for chatty, tightly coupled apps. Industry coverage repeatedly points to “the wrong workload in the wrong spot” as a repatriation driver. 

Sovereignty and exit risk. Regulated industries must reconcile GDPR/DORA-class obligations and the US CLOUD Act with how and where data is processed. The mid-market is echoing this too. Surveys show a decisive tilt toward moving select apps for compliance, control, and resilience reasons. 

FinOps maturity. After a few budgeting cycles, many teams have better visibility into cloud variability and the true cost of managed services. Some will optimize in-place, others will re-platform components where private cloud wins over a 3-5 year horizon.

Don’t bring it back to a 2015 data center

Even if you never plan to train frontier models, AI has changed the physical design targets. Racks that once drew 8-12 kW now need to host 30-50 kW routinely and 80-100+ kW for dense GPU nodes. Next-gen AI racks can approach 1 MW per rack in extreme projections.

Evolution of power consumption & dissipation per rack (2000-2030)

Image credit: Lennox Data Center Solutions

Air alone won’t be enough. Direct-to-Chip or immersion liquid cooling, higher-voltage distribution, and smarter power monitoring become minimum requirements. European sites face grid constraints that make efficiency and modular growth plans essential. 

This is the retrofit conversation many teams are missing. If you repatriate analytics, vector databases, or LLM inference and can’t cool them, you’ve just traded one bottleneck for another.

How the analysts frame the decision

A fair reading across recent coverage lands on three points:

  1. Hybrid wins. Public cloud spend grows, and so do private deployments, because each has a place. Use the public cloud for burst, global reach, and cutting-edge managed AI services. Use the private cloud for steady-state, regulated (sovereign), chatty, or data-gravity workloads.
  2. Repatriation is selective. It’s about fit. Data sets with heavy egress, systems with strict jurisdiction rules, or platforms that benefit from tight locality are top candidates.
  3. AI is now a first-order constraint. Power, cooling, and GPU lifecycle management change the platform brief. Liquid cooling and higher rack densities stop being exotic and become practical requirements.

Why Nutanix is the safest private cloud bet for enterprises and the regulated world

If you are going to own part of the stack again, two things matter: Operational simplicity and future-proofing. This is where Nutanix stands out.

A single control plane for private, hybrid, and edge. Nutanix Cloud Platform (NCP) lets you run VMs, files/objects, and containers with one operational model across on-prem and public cloud extensions. It’s built for steady-state enterprise workloads and the messy middle of hybrid.

Kubernetes without the operational tax. Nutanix Kubernetes Platform (NKP), born from the D2iQ acquisition, prioritizes day-2 lifecycle management, policy, and consistency across environments. If you are repatriating microservices or building AI micro-stacks close to data, this reduces toil.

AI-ready from the hypervisor up. AHV supports NVIDIA GPU passthrough and vGPU, and Nutanix has published guidance and integrations for NVIDIA AI Enterprise. That means you can schedule, share, and secure GPUs for training or inference alongside classic workloads, instead of creating a special-case island.

Data services with immutability. If you bring data home, protect it. Nutanix Unified Storage (NUS) provides WORM/immutability and integrates with leading cyber-recovery vendors, giving you ransomware-resilient backups and object locks without bolt-on complexity. 

Enterprise AI without lock-in. Nutanix Enterprise AI (NAI) focuses on building and operating model services on any CNCF-certified Kubernetes (on-prem, at the edge, or in cloud) so you keep your data where it belongs while retaining choice over models and frameworks. That aligns directly with sovereignty programs in government and regulated industries.

A Full-Stack Platform for Private AI

You get a private cloud that behaves like a public cloud where it matters, including lifecycle automation, resilience, and APIs. Under your control and jurisdiction.

Designing the landing zone

On day zero, deploy NCP as your substrate with AHV and Nutanix Unified Storage. Enable GPU pools on hosts that will run inference/training, and integrate NKP for container workloads. Attach immutable backup policies to objects and align with your chosen cyber-recovery stack. As you migrate, standardize on one identity plane and network policy model so VMs and containers are governed the same way. When you are ready to operationalize AI services closer to data, layer NAI to package and run model APIs with the same lifecycle tooling you already know.

The bottom line?

Repatriation is the natural correction after a decade of fast, sometimes indiscriminate, lift-and-shift, and not an anti-cloud movement. The best operators are recalibrating placement. AI turns this from a pure cost exercise into an infrastructure redesign. You can’t bring modern workloads home to a legacy room.

If you want the private side of that hybrid story without rebuilding a platform team from scratch, Nutanix is the safe choice. You get a single control plane for virtualization, storage, and Kubernetes, immutable data services for cyber-resilience, proven GPU support, and an AI stack that respects your sovereignty choices. That’s how you pay for convenience once, not forever, and how you make the next decade less about taxes and more about outcomes.