• Grid View
  • List View
  • Research Bytes - IT Security Spending Holds Strong and Steady

    IT Security Spending Holds Strong and Steady

    Focus on IT security continues to be a major issue for most organizations. Data from our most recent IS spending study confirms that spending on IT security remains strong in this era of cautious IT budget growth.

    November, 2005

  • Research Bytes - A Phased Approach to SOA

    A Phased Approach to SOA

    Because rolling out a service-oriented architecture can be a massive undertaking, most companies will be best served by taking a gradualistic approach. This Research Byte provides a brief summary of our full report on this subject.

    November, 2005

  • Research Bytes - Help Desk Staffing Metrics, Executive Summary

    Help Desk Staffing Metrics, Executive Summary

    Computer Economics has released a new report that provides help desk staffing ratios for companies in North America. This Research Byte provides an executive summary of the findings.

    October, 2005

  • Research Bytes - Understanding ITIL Key Process Relationships

    Understanding ITIL Key Process Relationships

    IT professionals newly exposed to ITIL often confuse Incident Management and Problem Management. This Research Byte explains the difference between the two, and their relationship with Change Management, another key process for IT Service Support.

    October, 2005

  • Research Bytes - VoIP Entering the Mainstream

    VoIP Entering the Mainstream

    VoIP quality of service (QoS) has improved dramatically in the past few years. The improved QoS and lower total cost of ownership is driving many companies to consider this technology for their environment. Computer Economics forecasts widespread adoption of VoIP over the next few years.

    October, 2005

  • Research Bytes - IP SANs Deliver Positive ROI

    IP SANs Deliver Positive ROI

    Many companies are finding that storage area networks (SANs) based on IP technology are more economical and effective than SANs based on traditional fiber channel technology. These results are encouraging, but potential users must consider several caveats involved before taking the plunge into IP SANs.

    October, 2005

  • Research Bytes - Getting Control of Spending on Wireless

    Getting Control of Spending on Wireless

    Over the past five years, businesses have greatly increased their use of cellular phones and wireless email devices. But many organizations exercise little control over these expenses. This article provides practical tips for getting control of and reducing the costs of wireless services.

    October, 2005

  • Research Bytes - ITIL Adoption: 2006 Could be Watershed Year in U.S.

    ITIL Adoption: 2006 Could be Watershed Year in U.S.

    The Information Technology Infrasctructure Library (ITIL) set of best practices is gaining momentum in the U.S. Most of the early adopters in the U.S. have been Fortune 500 companies and IT vendor organizations. However, this article outlines evidence that widespread adoption in is on the horizon.

    October, 2005

  • Research Bytes - Marketing IT Like a Business

    Marketing IT Like a Business

    This article explains how the CIO can and should apply basic marketing disciplines to promote the IT function throughout the organization to better serve its needs.

    September, 2005

  • Research Bytes - ITIL Foundations Training: Can One Person Make a Difference?

    ITIL Foundations Training: Can One Person Make a Difference?

    IS organizations are increasingly looking to ITIL as a framework for continuous improvement. However, in their zeal to implement ITIL, some organizations may be expecting too much too soon from the individuals that they choose to lead the effort.

    September, 2005

  • Research Bytes - Zotob: A Malware Event in Warp Speed

    Zotob: A Malware Event in Warp Speed

    The Zotob attack in August 2005 was not the costliest malware event in history, but it might be the fastest. This article provides a preliminary estimate of the impact of Zotob and why companies have a difficult time with attacks that exploit vulnerabilities so soon after they are exposed.

    September, 2005

  • Research Bytes - Using EVA to Justify IT Investments: Executive Summary

    Using EVA to Justify IT Investments: Executive Summary

    For a large new IT investment to be approved, the CIO must be able to write a business case that speaks directly to executive management in the language of shareholder value. This article is an Executive Summary of our full report, Using Economic Value to Justify IT Investments, which provides a basic introduction to the concept of Economic Value Added (EVA) and its use as a powerful tool for calculating the business value of an IT investment.

    September, 2005

  • Research Bytes - Recruiting Firms Hot, Job Boards Not

    Recruiting Firms Hot, Job Boards Not

    Recent Computer Economics research points to an interesting trend in recruiting: it appears that many companies may be losing interest in online job boards and going back to more traditional recruiting methods, such as the use of third-party recruiters.

    August, 2005

  • Research Bytes - Wi-Fi Ready for Prime Time

    Wi-Fi Ready for Prime Time

    Wi-Fi is a low risk investment as long as a security assessment and appropriate risk mitigation measures are included as part of the overall strategy for implementation

    August, 2005

  • Research Bytes - Use of Linux Growing in Corporate Data Centers

    Use of Linux Growing in Corporate Data Centers

    It is hard to argue that Linux is not ready for prime time. Some industries, such as the financial services industry, have been actively implementing Linux for several years, and major service providers such as IBM are actively promoting it. Although in most data centers Linux is relegated to a secondary role, some organizations are in the midst of a total transition to the open source operating system.

    August, 2005