Research report News
December 28, 2017
Recent IDC research shows hyper-converged platforms are quickly catching up to the converged systems market. For the third quarter of 2017, global revenue on converged systems increased nearly 11% ...
October 31, 2016
Critical IT events are an inevitability for any organisation. However, new Quocirca research shows that effective operational intelligence can reduce their impact and cost.
June 06, 2016
This is a guest blog post by Larry Augustin, CEO, SugarCRM I’ve always been wary of generalisations but I’d guess that most people, if you asked them, would value ‘convenience’ pretty highly when ...
May 31, 2016
Forrester flags six breakout vendors in SaaS business applications that have high growth, solid financial backing, proven technology and the ability to support large enterprises.
Research report Get Started
Bring yourself up to speed with our introductory content
Freedom on the Net is an annual report on the extent to which people in countries around the globe can publish and access Internet content without undue restriction and have their rights respected. Continue Reading
TechTarget's most recent Networking Purchasing Intentions survey reveals IT's priority to invest in WAN optimization techniques in the next 12 months. Continue Reading
Learn how best to collaborate with internal and external auditors to audit for business continuity and disaster recovery improvements. Continue Reading
Evaluate Research report Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
This series looks at the top information security certifications for IT professionals. Part one reviews basic, vendor-neutral certifications for entry-level positions. Continue Reading
Questioning an online survey's questions might not be an app developer's job, but your logical mind is likely better-suited for finding the kinds of mistakes that could render a survey's results ... Continue Reading
Today, IoT technology is bringing ROI by reducing costs and identifying operational failures. But tomorrow's value lies in new revenue that has only skeletal outlines today. Continue Reading
Manage Research report
Learn to apply best practices and optimize your operations.
A network perimeter security strategy alone can no longer protect enterprises. Expert Paul Henry explains why organizations must adapt. Continue Reading
When it comes to ease of use and licensing costs, virtualization companies like VMware, Citrix and Microsoft got some of the highest rankings. Continue Reading
Business continuity and disaster recovery are chronically overlooked. Learn what you can do to avoid losses that could impact your organization. Continue Reading
Problem Solve Research report Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A recent study revealed more than 95% of SAP systems were exposed to potentially disastrous vulnerabilities. Expert Nick Lewis explains how to mitigate these SAP vulnerabilities and maintain ERP security. Continue Reading
The era of the Internet of Things, bring your own devices and social media has also become an era of highly sophisticated malware. Advanced security monitoring tools are crucial in the fight to protect the enterprise network.
This Insider Edition of Information Security offers the latest on these tools and how IT pros can best benefit from them. First, we review their newest capabilities, which include the ability to collect and scour immense amounts of data; some tools also have a capacity for learning. Next we talk to network security pros on the frontline, and how they are employing security monitoring tools. Finally, we examine the endpoint protection market, which was jolted back to life by demands for new levels of network protection in an era of smartphones and smartwatches.
This issue provides network and security IT pros with step-by-step guidance so they can decide what advanced security monitoring tools are right for their network’s particular needs. Continue Reading
In the business intelligence and analytics world, data lakes are their own region -- one in which today's multifarious forms of information can be stored in their native forms until used -- and cheaply at that. But these vast storage repositories, which are based on open source Apache Hadoop are not for those seeking rest and recreation. They take serious work -- and often sought-after skills -- to build and maintain.
In this guide, SearchDataManagement peers across several types of data lakes to discover how different organizations today are implementing them. First, editor Craig Stedman talks to three companies that have taken the dive -- and learns about the challenges and benefits presented to each. Next, reporter Jack Vaughan tells one executive's story -- how a Hadoop-based system opened new doors for his company. Finally, Vaughan quizzes Forrester analyst Mike Gualtieri on whether data lakes can compete with data warehouses to quench organizations' thirst for storing and analyzing business data. Continue Reading