-
IT Security Spending Holds Strong and Steady
Focus on IT security continues to be a major issue for most organizations. Data from our most recent IS spending study confirms that spending on IT security remains strong in this era of cautious IT budget growth.
November, 2005
-
A Phased Approach to SOA
Because rolling out a service-oriented architecture can be a massive undertaking, most companies will be best served by taking a gradualistic approach. This Research Byte provides a brief summary of our full report on this subject.
November, 2005
-
Help Desk Staffing Metrics, Executive Summary
Computer Economics has released a new report that provides help desk staffing ratios for companies in North America. This Research Byte provides an executive summary of the findings.
October, 2005
-
Understanding ITIL Key Process Relationships
IT professionals newly exposed to ITIL often confuse Incident Management and Problem Management. This Research Byte explains the difference between the two, and their relationship with Change Management, another key process for IT Service Support.
October, 2005
-
VoIP Entering the Mainstream
VoIP quality of service (QoS) has improved dramatically in the past few years. The improved QoS and lower total cost of ownership is driving many companies to consider this technology for their environment. Computer Economics forecasts widespread adoption of VoIP over the next few years.
October, 2005
-
IP SANs Deliver Positive ROI
Many companies are finding that storage area networks (SANs) based on IP technology are more economical and effective than SANs based on traditional fiber channel technology. These results are encouraging, but potential users must consider several caveats involved before taking the plunge into IP SANs.
October, 2005
-
Getting Control of Spending on Wireless
Over the past five years, businesses have greatly increased their use of cellular phones and wireless email devices. But many organizations exercise little control over these expenses. This article provides practical tips for getting control of and reducing the costs of wireless services.
October, 2005
-
ITIL Adoption: 2006 Could be Watershed Year in U.S.
The Information Technology Infrasctructure Library (ITIL) set of best practices is gaining momentum in the U.S. Most of the early adopters in the U.S. have been Fortune 500 companies and IT vendor organizations. However, this article outlines evidence that widespread adoption in is on the horizon.
October, 2005
-
Marketing IT Like a Business
This article explains how the CIO can and should apply basic marketing disciplines to promote the IT function throughout the organization to better serve its needs.
September, 2005
-
ITIL Foundations Training: Can One Person Make a Difference?
IS organizations are increasingly looking to ITIL as a framework for continuous improvement. However, in their zeal to implement ITIL, some organizations may be expecting too much too soon from the individuals that they choose to lead the effort.
September, 2005
-
Zotob: A Malware Event in Warp Speed
The Zotob attack in August 2005 was not the costliest malware event in history, but it might be the fastest. This article provides a preliminary estimate of the impact of Zotob and why companies have a difficult time with attacks that exploit vulnerabilities so soon after they are exposed.
September, 2005
-
Using EVA to Justify IT Investments: Executive Summary
For a large new IT investment to be approved, the CIO must be able to write a business case that speaks directly to executive management in the language of shareholder value. This article is an Executive Summary of our full report, Using Economic Value to Justify IT Investments, which provides a basic introduction to the concept of Economic Value Added (EVA) and its use as a powerful tool for calculating the business value of an IT investment.
September, 2005
-
Recruiting Firms Hot, Job Boards Not
Recent Computer Economics research points to an interesting trend in recruiting: it appears that many companies may be losing interest in online job boards and going back to more traditional recruiting methods, such as the use of third-party recruiters.
August, 2005
-
Wi-Fi Ready for Prime Time
Wi-Fi is a low risk investment as long as a security assessment and appropriate risk mitigation measures are included as part of the overall strategy for implementation
August, 2005
-
Use of Linux Growing in Corporate Data Centers
It is hard to argue that Linux is not ready for prime time. Some industries, such as the financial services industry, have been actively implementing Linux for several years, and major service providers such as IBM are actively promoting it. Although in most data centers Linux is relegated to a secondary role, some organizations are in the midst of a total transition to the open source operating system.
August, 2005