Home » All Reports » Page 176
In this annual report of the IT spending and staffing outlook for 2022, we find that IT leaders worldwide generally have a positive outlook on the year ahead. On the whole, companies have put the chaos of the pandemic behind them.
It is time to get ready for a “quantum” leap in computing. In the past decade, quantum computing has leaped from science fiction to working prototypes and pilots run by large enterprises. Quantum computing has the potential to revolutionize almost every field and will have broad-ranging impact on every industry. It will open the doors to real-time analytics, faster and better decision-making, better forecasting, faster prototyping, and the creation of new products.
Computer Economics has released its major annual study on 33 IT management best practices, with two-factor authentication topping our list of least mature practices. This Research Byte highlights some of our findings on the least mature practices, along with an overview of the contents of the full study. The full study analyzes the growth and maturity of all 33 best practices, which are grouped into five major categories: IT governance, IT financial management, IT operational management, IT security and risk management, and application development.
The best-run IT organizations not only focus their process improvement efforts on those of other departments, they also seek to optimize their own IT management processes internally. In this study, we examine the growth and maturity of 33 IT management practices, which we have grouped into five major categories: IT governance practices, IT financial management practices, IT operational management practices, IT security and risk management practices, and application development practices. (196 pp., 178 figs.)
The best-run IT organizations not only focus their process improvement efforts on those of other departments, they also seek to optimize their own IT management processes internally. In this study, we examine the growth and maturity of 33 IT management practices, which we have grouped into five major categories: IT governance practices, IT financial management practices, IT operational management practices, IT security and risk management practices, and application development practices. (196 pp., 178 figs.)
The rising threat landscape has led cloud service providers to expand the scope of their cybersecurity offerings to multiple data sources and automate the triage process and incident response. This includes the use of artificial intelligence/machine learning to model the behavior of attackers and identify threats in advance. By acquiring Mandiant and Siemplify, Google is taking a big step in its vision of “invisible security” with automated threat hunting, detecting, and response. This will allow CISOs to capitalize on the SIEM-to-SOAR maturity trend for streamlining their threat response procedures.
Security and cybersecurity incidents are costly, with losses increasing every year. No wonder, then, that our research shows IT security and cybersecurity are the top priority for new IT investments year after year. But how much is enough?
Nearly all business leaders today understand the need to move to the cloud. But many do not appreciate the complexity of the decisions needed to get true business value from their cloud investments. In this fast-paced digital forum, four industry thought leaders will share their insights and lessons learned with organizations that have gotten smart about these decisions.
Ukraine has looked at IT outsourcing as an important source of revenue. The current conflict will have massive repercussions on its IT industry. From the perspective of enterprise customers, unfortunately, this conflict will force them to go back to the drawing board and lay out contingency plans. They will need to find a way forward with their Ukranian service providers that is empathetic but at the same time protects customers against disruption.
Our quarterly Residual Value Forecast (RVF) report provides forecasts for the following categories of IT equipment: desktop computers, laptops, network equipment, printers, servers, storage devices, and other IT equipment. It also includes residual values for other non-IT equipment in the following categories: copiers, material handling equipment (forklifts), mail equipment, medical equipment, test equipment, and miscellaneous equipment such as manufacturing machinery and NC machines. Residual Value Forecasts are provided for five years for end-user, wholesale, and orderly liquidation values (OLV) prices.
Login to get free content each month and build your personal library at Avasant.com