• Grid View
  • List View
  • IT Spending Benchmarks - IT Spending and Staffing Benchmarks 2010/2011: Chapter 22, Higher Education Subsector Snapshot

    IT Spending and Staffing Benchmarks 2010/2011: Chapter 22, Higher Education Subsector Snapshot

    Chapter 22 provides selected IT spending and staffing statistics for the higher education subsector. These statistics are based on five survey respondents, including three public and two private universities. This chapter is only available for sale as a bundle with Chapter 3, Benchmarks by Organization Size. (19 pp. 13 figs.)[Full Study Description]

    June, 2010

  • IT Spending Benchmarks - IT Spending and Staffing Benchmarks 2010/2011: Chapter 23, Automotive Parts Subsector Snapshot

    IT Spending and Staffing Benchmarks 2010/2011: Chapter 23, Automotive Parts Subsector Snapshot

    Chapter 23 provides selected IT spending and staffing statistics for the automotive parts subsector. These statistics are based on six survey respondents, including five organizations that supply auto parts to OEMs and one manufacturer of specialty vehicles. This chapter is only available for sale as a bundle with Chapter 10, Discrete Manufacturing Sector Benchmarks. (19 pp. 13 figs.)[Full Study Description]

    June, 2010

  • IT Spending Benchmarks - IT Spending and Staffing Benchmarks 2010/2011: Chapter 24, IT Services & Solutions Subsector Snapshot

    IT Spending and Staffing Benchmarks 2010/2011: Chapter 24, IT Services & Solutions Subsector Snapshot

    Chapter 24 provides selected IT spending and staffing statistics for the IT services and solutions subsector. These statistics are based on eight survey respondents, including three business process outsourcing firms, two independent software vendors, and three providers of IT consulting and integration services. This chapter is only available for sale as a bundle with Chapter 15, Professional and Technical Services Sector Benchmarks (19 pp. 13 figs.)[Full Study Description]

    June, 2010

  • IT Spending Benchmarks - IT Spending and Staffing Benchmarks 2010/2011: Chapter 25, Federal, State, & Regional Agencies Subsector Snapshot

    IT Spending and Staffing Benchmarks 2010/2011: Chapter 25, Federal, State, & Regional Agencies Subsector Snapshot

    Chapter 25 provides selected IT spending and staffing statistics for the federal, state and regional agencies subsector. These statistics are based on seven survey respondents, including a federal department, a federal research agency, a federal regulatory agency, a county public health agency, a regional water quality regulatory agency, a municipal transportation authority, and a county land-use regulatory agency. This chapter is only available for sale as a bundle with Chapter 16, Government Sector Benchmarks. (19 pp. 13 figs.)[Full Study Description]

    June, 2010

  • IT Spending Benchmarks - IT Spending and Staffing Benchmarks 2010/2011: Chapters 1-3, Special Bundle

    IT Spending and Staffing Benchmarks 2010/2011: Chapters 1-3, Special Bundle

    This special bundle of chapters from our IT Spending and Staffing Benchmarks 2010/2011 study includes Chapter 1 (Executive Summary), Chapter 2 (Composite Benchmarks), and Chapter 3 (Benchmarks by Organization Size) at a significant discount off the individual chapter price. Update: Includes our Outlook for IT Spending and Staffing in 2011 at no additional charge. [Full Study Description]

    June, 2010

  • Research Bytes - VoIP Adoption Surpasses Half-Way Point

    VoIP Adoption Surpasses Half-Way Point

    The majority of organizations now have the Voice over IP in place, the result of the strong economic case for VoIP as well as its flexibility and functionality. This Research Byte tracks the three-year trend in VoIP adoption and investment.

    May, 2010

  • Technology Trends - VoIP Adoption, ROI, and TCO Trends

    VoIP Adoption, ROI, and TCO Trends

    Investment in Voice over IP (VoIP) is widespread and growing, although some organizations are having difficulty precisely estimating their total cost-of-ownership. This study examines VoIP adoption trends, providing data on how many organizations have the technology in place, how many are in the process of implementing it, and how many are expanding implementations. To give additional insight, we look at the economic experience of those that have adopted the technology. We examine return on investment (ROI) experience in terms of the percentage of organizations that report positive and break-even ROI within a two-year period. We also balance the potential ROI against the risks, measured in terms of the percentage of organizations that exceed budgets for total cost of ownership (TCO). (16 pp., 10 figs.)[Research Byte]

    May, 2010

  • Research Bytes - SMBs That Outsource Spend 6% of IT Budget on Service Providers

    SMBs That Outsource Spend 6% of IT Budget on Service Providers

    While as a rule larger organizations are more likely to engage in outsourcing a wider array of functions, those SMBs that do outsource allocate a slightly higher percentage of their total IT spending to outside service providers. This Research Byte is from our report: Four Essential Steps Toward Outsourcing IT Functions.

    May, 2010

  • Outsourcing - Four Essential Steps Toward Outsourcing IT Functions 2010

    Four Essential Steps Toward Outsourcing IT Functions 2010

    The maturation of outsourcing, globalization, an abundance of offshore providers, and the improving economy are creating more opportunities for organizations of all sizes, but especially for small and midsize businesses, to leverage outside service providers. This report outlines the essential steps required to establish the requirements, select a service provider, and negotiate a deal. (11 pp., 2 figs.) [Research Byte]

    May, 2010

  • Research Bytes - Malicious Insider Threats Greater than Most IT Executives Think

    Malicious Insider Threats Greater than Most IT Executives Think

    Many organizations do not treat the threat from malicious insiders seriously. Such threats include fraud, sabotage, and theft or loss of confidential information caused by trusted insiders. These threats go beyond negligence. They represent purposeful action on the part of insiders to act in opposition to the interests of the organization, whether for financial gain, retribution, or some other motivation. This Research Byte shows that the threats from malicious insiders is greater than most IT executives believe.

    May, 2010

  • IT Best Practices - Malicious Insider Threats

    Malicious Insider Threats

    This special report, based on our survey of IT security professionals and executives worldwide, analyzes malicious insider threats to businesses. Basic categories of malicious threats include accessing confidential information without authorization, disclosing confidential information, executing fraudulent transactions, and sabotage of the organization’s systems, network, or data. For each of these four categories of threat, we present data concerning the perceived seriousness of the threat and actual incidents and risks of each type. We then analyze the popularity of various methods for preventing, countering, and detecting incidents of malicious insider activity. (47 pp., 27 figs.) [Extended Description] [Research Byte]

    May, 2010

  • Research Bytes - DBA Staff Levels Mostly Steady

    DBA Staff Levels Mostly Steady

    Application integration, the explosion in rich media, the need for faster and better business intelligence, the regulatory environment, stepped-up custom development work, and even the emergence of database-driven mobile applications are all creating need for personnel skilled in developing, managing, testing, securing, and backing up databases. On the other side of the coin, outsourcing trends and automation tools are working to restrain the growth of database administration staff. This Research Byte analyzes the three-year trend in DBA staffing ratios.

    April, 2010

  • IT Staffing - Database Administration (DBA) Staffing Ratios 2010

    Database Administration (DBA) Staffing Ratios 2010

    Organizations are placing ever-increasing demands on the role of the database administrator (DBA). This study will help IT managers determine whether they are keeping pace with the industry by comparing their database administration staffing against industry benchmarks. We assess two basic metrics: database administrators as a percentage of the IT staff and terabytes of storage per DBA. We provide these benchmarks for the composite sample, by organization, and by sector. This report also highlights the three-year trend in the staffing of the DBA function and the influence of outsourcing on DBA staffing ratios. (20 pp., 10 figs.) [Research Byte]

    April, 2010

  • Research Bytes - Number of Firms Outsourcing Desktop Support Declines

    Number of Firms Outsourcing Desktop Support Declines

    Desktop support outsourcing can be a valuable tool for keeping in-house staffing costs down, but keeping the right balance is key. This Research Byte presents and analyzes trend data on outsourcing of the desktop support function over the prior three years.

    April, 2010

  • Outsourcing - Desktop Support Outsourcing Trends and Cost Experience

    Desktop Support Outsourcing Trends and Cost Experience

    Outsourcing of desktop support is a popular strategy for controlling costs related to PC hardware, software, and maintenance. This study examines the percentage of organizations outsourcing desktop support (frequency), the average amount of work outsourced (level), and the change in the amount of work being outsourced (trend). We also present the cost experience, which provides insight into the risk IT organizations take in turning to outside service providers. This statistic measures the percentage of organizations that find outsourcing desktop support costs more, the same, or less than expected. We also show how these trends differ by organization size and sector and examine the surprisingly substantial role played by offshore outsourcing. (19 pp., 13 figs.) [Research Byte]

    April, 2010