• Grid View
  • List View
  • IT Spending Benchmarks - IT Spending and Staffing Benchmarks 2010/2011: Chapters 1-3, Special Bundle

    IT Spending and Staffing Benchmarks 2010/2011: Chapters 1-3, Special Bundle

    This special bundle of chapters from our IT Spending and Staffing Benchmarks 2010/2011 study includes Chapter 1 (Executive Summary), Chapter 2 (Composite Benchmarks), and Chapter 3 (Benchmarks by Organization Size) at a significant discount off the individual chapter price. Update: Includes our Outlook for IT Spending and Staffing in 2011 at no additional charge. [Full Study Description]

    June, 2010

  • Research Bytes - VoIP Adoption Surpasses Half-Way Point

    VoIP Adoption Surpasses Half-Way Point

    The majority of organizations now have the Voice over IP in place, the result of the strong economic case for VoIP as well as its flexibility and functionality. This Research Byte tracks the three-year trend in VoIP adoption and investment.

    May, 2010

  • Technology Trends - VoIP Adoption, ROI, and TCO Trends

    VoIP Adoption, ROI, and TCO Trends

    Investment in Voice over IP (VoIP) is widespread and growing, although some organizations are having difficulty precisely estimating their total cost-of-ownership. This study examines VoIP adoption trends, providing data on how many organizations have the technology in place, how many are in the process of implementing it, and how many are expanding implementations. To give additional insight, we look at the economic experience of those that have adopted the technology. We examine return on investment (ROI) experience in terms of the percentage of organizations that report positive and break-even ROI within a two-year period. We also balance the potential ROI against the risks, measured in terms of the percentage of organizations that exceed budgets for total cost of ownership (TCO). (16 pp., 10 figs.)[Research Byte]

    May, 2010

  • Research Bytes - SMBs That Outsource Spend 6% of IT Budget on Service Providers

    SMBs That Outsource Spend 6% of IT Budget on Service Providers

    While as a rule larger organizations are more likely to engage in outsourcing a wider array of functions, those SMBs that do outsource allocate a slightly higher percentage of their total IT spending to outside service providers. This Research Byte is from our report: Four Essential Steps Toward Outsourcing IT Functions.

    May, 2010

  • Outsourcing - Four Essential Steps Toward Outsourcing IT Functions 2010

    Four Essential Steps Toward Outsourcing IT Functions 2010

    The maturation of outsourcing, globalization, an abundance of offshore providers, and the improving economy are creating more opportunities for organizations of all sizes, but especially for small and midsize businesses, to leverage outside service providers. This report outlines the essential steps required to establish the requirements, select a service provider, and negotiate a deal. (11 pp., 2 figs.) [Research Byte]

    May, 2010

  • Research Bytes - Malicious Insider Threats Greater than Most IT Executives Think

    Malicious Insider Threats Greater than Most IT Executives Think

    Many organizations do not treat the threat from malicious insiders seriously. Such threats include fraud, sabotage, and theft or loss of confidential information caused by trusted insiders. These threats go beyond negligence. They represent purposeful action on the part of insiders to act in opposition to the interests of the organization, whether for financial gain, retribution, or some other motivation. This Research Byte shows that the threats from malicious insiders is greater than most IT executives believe.

    May, 2010

  • IT Best Practices - Malicious Insider Threats

    Malicious Insider Threats

    This special report, based on our survey of IT security professionals and executives worldwide, analyzes malicious insider threats to businesses. Basic categories of malicious threats include accessing confidential information without authorization, disclosing confidential information, executing fraudulent transactions, and sabotage of the organization’s systems, network, or data. For each of these four categories of threat, we present data concerning the perceived seriousness of the threat and actual incidents and risks of each type. We then analyze the popularity of various methods for preventing, countering, and detecting incidents of malicious insider activity. (47 pp., 27 figs.) [Extended Description] [Research Byte]

    May, 2010

  • Research Bytes - DBA Staff Levels Mostly Steady

    DBA Staff Levels Mostly Steady

    Application integration, the explosion in rich media, the need for faster and better business intelligence, the regulatory environment, stepped-up custom development work, and even the emergence of database-driven mobile applications are all creating need for personnel skilled in developing, managing, testing, securing, and backing up databases. On the other side of the coin, outsourcing trends and automation tools are working to restrain the growth of database administration staff. This Research Byte analyzes the three-year trend in DBA staffing ratios.

    April, 2010

  • IT Staffing - Database Administration (DBA) Staffing Ratios 2010

    Database Administration (DBA) Staffing Ratios 2010

    Organizations are placing ever-increasing demands on the role of the database administrator (DBA). This study will help IT managers determine whether they are keeping pace with the industry by comparing their database administration staffing against industry benchmarks. We assess two basic metrics: database administrators as a percentage of the IT staff and terabytes of storage per DBA. We provide these benchmarks for the composite sample, by organization, and by sector. This report also highlights the three-year trend in the staffing of the DBA function and the influence of outsourcing on DBA staffing ratios. (20 pp., 10 figs.) [Research Byte]

    April, 2010

  • Research Bytes - Number of Firms Outsourcing Desktop Support Declines

    Number of Firms Outsourcing Desktop Support Declines

    Desktop support outsourcing can be a valuable tool for keeping in-house staffing costs down, but keeping the right balance is key. This Research Byte presents and analyzes trend data on outsourcing of the desktop support function over the prior three years.

    April, 2010

  • Outsourcing - Desktop Support Outsourcing Trends and Cost Experience

    Desktop Support Outsourcing Trends and Cost Experience

    Outsourcing of desktop support is a popular strategy for controlling costs related to PC hardware, software, and maintenance. This study examines the percentage of organizations outsourcing desktop support (frequency), the average amount of work outsourced (level), and the change in the amount of work being outsourced (trend). We also present the cost experience, which provides insight into the risk IT organizations take in turning to outside service providers. This statistic measures the percentage of organizations that find outsourcing desktop support costs more, the same, or less than expected. We also show how these trends differ by organization size and sector and examine the surprisingly substantial role played by offshore outsourcing. (19 pp., 13 figs.) [Research Byte]

    April, 2010

  • IT Staffing - IT Staffing Ratios 2010: Benchmarking Metrics and Analysis for 15 Key IT Functions

    IT Staffing Ratios 2010: Benchmarking Metrics and Analysis for 15 Key IT Functions

    This special publication bundles the entire collection of our reports on IT staffing ratios. The IT functions covered include IT management, project management, documentation and training, help desk, desktop support, business analysts, server support, network administration, applications development, ERP support, database administration, data warehouse/business intelligence, IT quality assurance, IT security, and web/e-commerce. This special collection is a valuable source of information for IT executives interested in benchmarking their staffing levels with those of similar organizations. This special bundle is priced with a 66% discount from the cost of purchasing the 15 individual reports. (225 pp., 126 figs.) [Full Report Description and Free Sample]

    March, 2010

  • Research Bytes - Apps Development, Maintenance Staff Shrinks

    Apps Development, Maintenance Staff Shrinks

    The size of the application development and maintenance staff employed by the typical organization appears to be in decline, at least as a percentage of the IT staff. As defined in our study, this function comprises application programmers and system analysts, who design, analyze, code, test, and maintain application software. This Research Byte is abstracted from our full report.

    March, 2010

  • IT Staffing - Application Development and Maintenance Staffing Ratios 2010

    Application Development and Maintenance Staffing Ratios 2010

    Application development and maintenance personnel make up the single largest job category in the IT organization today. However, these application programmers and system analysts appear to be declining as a percentage of the total IT staff. This study will help IT managers determine whether their organizations are keeping pace with the industry by comparing their application staffing against industry benchmarks. We assess two basic metrics: application personnel as a percentage of the IT staff, and the number of users per application staff member. We provide benchmarks for the composite sample, by organization, and by sector. We also report on the three-year trend in the staffing of this function and the influence of outsourcing on staffing ratios. (19 pp., 10 figs.) [Research Byte]

    March, 2010

  • Research Bytes - Desktop Virtualization Interest High, Adoption Low

    Desktop Virtualization Interest High, Adoption Low

    Judging by the number of conference presentations, promotional events, free educational sessions, vendor-sponsored research, and new product announcements, you would think this is destined to be the year of the virtual desktop. Yet this Research Byte shows that while desktop virtualization may be a promising technology, adoption remains limited to a small percentage of organizations.

    March, 2010