CICS insights from IT professionals revealed
|
|
- Theresa Bruce
- 6 years ago
- Views:
Transcription
1 CICS insights from IT professionals revealed A CICS survey analysis report from:
2 IBM, CICS, and z/os are registered trademarks of International Business Machines Corporation in the United States, other countries, or both. All other products mentioned herein may be service marks, trademarks, or registered trademarks of their respective companies. 2
3 Contents Introduction Summary of findings CICS in today s business environment How important is CICS? CICS challenges and technologies to address them How does CICS access business-critical data? CICS and data access: It s about VSAM and DB The place that VSAM holds with CICS DB2 usage and its relative importance Conclusions Survey methodology and profiles Survey approach Industry profile Mainframe organization profile Job function profile Survey data charts Figure 1: CICS is still important in today s mainframe environment Figure 2: CICS is Highly Important to 90% of respondents Figure 3: Top CICS challenges focus on application integration, development, and availability.. 7 Figure 4: The majority of respondents have not found technologies to solve CICS challenges.. 7 Figure 5: 99% of respondents access business-critical data using CICS Figure 6: VSAM and DB2 are the most used data sources for CICS applications Figure 7: Respondents saying % of VSAM data is accessed using batch is increasing. 10 Figure 8: Eight out of 10 respondents said concurrent access is Important Figure 9: Modernizing is the top issue driving the need for concurrency for the Important group 12 Figure 10: Growth issues drive concurrency need for Highly Important group Figure 11: Those with large amounts of data in DB2 equal those with little or none Figure 12: DB2 and Oracle are the most widely used relational databases Survey data profiles Figure 13: Distribution of respondents by industry Figure 14: Distribution of respondents by size of total organization Figure 15: Distribution of respondents by size of mainframe organization Figure 16: Distribution of respondents by CICS release Figure 17: Distribution of respondents by job function CICS insights from IT professionals revealed 3
4 Introduction Much of the world s business-critical data is still stored on mainframes.the Arcati 2013 Mainframe User Survey found that almost half of respondents have more enterprise data on mainframes than on other platforms. The Arcati survey also showed that about 67 percent of respondents reported at least 40 percent of their enterprise data resides on the mainframe. 1 At the core of many of these global business systems are CICS applications, which IBM estimates handle more than 30 billion transactions a day and that process $1 trillion of business each week worldwide. Enterprise Tech Journal (formerly named z/journal) has explored the state of CICS usage in today's organizations by conducting a CICS survey. The survey targets IT professionals with architecture responsibilities and explores the challenges, strategies, and successful approaches in organizations that use CICS. The results of the 2012 survey are presented in this report, which also discusses the significance of the data in relation to today s CICS environment. The report also compares 2012 findings with the 2011 and 2010 survey results and acknowledges any significant differences. The report addresses these topics from both a survey respondent and an H&W perspective. Summary of findings Survey responses drew a picture of CICS in the contemporary mainframe environment from a cross-section of industries and organizational sizes. CICS applications are clearly integral to business-critical data systems for the majority of survey respondents. When asked about the importance of CICS applications to their business, nine out of 10 respondents stated they are Highly Important, with 70 percent choosing Extremely important. Although CICS applications are still very important to respondents businesses, they can also pose challenges. The top tier challenges were application integration, availability, and development, with Application integration with Web services or SOA most frequently selected. To understand the comprehensive CICS landscape, the survey sought information about the relationship between CICS and its data sources. A full 88 percent of respondents said that their CICS applications rely on VSAM files, with another 79 percent citing DB2. Every organization represented in the survey maintains a portion of its business-critical data in VSAM files, and the percentage of respondents to whom concurrent access to VSAM and batch is important has been rising year over year since Respondents who cited concurrent access as being Highly Important also cited growth-focused reasons for the ranking. 1. Lillycrop, Mark and Trevor Eddolls. The 2013 Mainframe User Survey. Arcati Mainframe Yearbook 2013, (accessed January 22, 2013). 4 Introduction
5 CICS in today s business environment The survey asked several new questions about the importance of CICS and the challenges it presents. Responses showed that CICS still plays a major role in accessing businesses-critical data. The survey also presents new information on specific technologies being used to address important business issues. How important is CICS? More than half (54 percent) of the survey respondents said that at least 51 percent of their businesscritical applications are used online through CICS, with the largest number of respondents saying 51 to 75 percent (see Figure 1). Percentage of business-critical applications used online through CICS (entire group) 1-25% 20% Don t know 1% % 22% 26-50% 25% 51-75% 32% Figure 1. CICS is still important in today s mainframe environment Respondents are also keeping up with the latest CICS releases. The adoption of CICS release 4.x is steadily increasing while the use of CICS 3.x has been declining over the past three years. CICS insights from IT professionals revealed 5
6 When asked about the importance of CICS applications to their business, nine out of 10 respondents fell in the Highly Important group, with 70 percent choosing Extremely important (see Figure 2). (The Highly Important group consists of everyone who answered Extremely important or Very important.) Further analysis showed a significant relationship between the importance of CICS to the respondents and the CICS release they are using. Importance of CICS applications to organization (entire group) Somewhat important 9% Very important 21% Extremely important 70% Figure 2. CICS is Highly Important to 90% of respondents CICS challenges and technologies to address them This year s survey explored challenges specific to CICS and the technologies respondents use to address those challenges. Respondents were given a list of the top CICS challenges and asked to choose which of those challenges their organization currently faces (see Figure 3). Results split into two distinct tiers, with the first tier focused on application issues related to integration, development, and availability. The challenge most often cited was Application integration with Web services or SOA. The second tier of responses focused on performance, as well as transaction volume. 6 CICS in today s business environment
7 Top CICS challenges (entire group) Application integration with Web services or SOA Application development including updates, maintenance, and interface modernization Application availability Application integration with other platforms or systems 51% 44% 42% 41% 0% 20% 40% 60% 80% 100% Figure 3. Top CICS challenges are focused on application integration, development, and availability To better understand how the respondents addressed their current CICS challenges, the survey asked them to list the specific technologies they use to address them. It is important to note that a response of None was given more than 10 times as often as any single, named technology. This seems to indicate that while respondents are facing challenges, they are struggling to find solutions. The following chart (see Figure 4) lists the 10 solutions cited most often by respondents. Technologies used to address top CICS challenges (entire group) Omegamon 16 Websphere 15 MQ Series 13 CICS Tools CICS Web Services 9 9 CPU upgrade Human Resources Web services, SOA CICS Transaction Gateway In-house development Figure 4. The majority of respondents have not found technologies to solve CICS challenges CICS insights from IT professionals revealed 7
8 How does CICS access business-critical data? The survey also asked new questions about CICS and business-critical data on the mainframe, and what types of file structures or access methods that CICS relies on. About eight out of 10 respondents said that more than half of their business-critical data is accessed through the mainframe. The majority of respondents (62 percent) said that more than half of their business-critical data on the mainframe is being accessed by CICS (see Figure 5). Percent of business-critical data on the mainframe that is accessed by CICS (entire group) 1-25% 16% Don t know 1% 26-50% 21% 51-75% 28% % 34% Figure 5. 99% of respondents access business-critical data using CICS Further analysis showed a significant relationship between the degree of importance and the percentage of mainframe data being accessed by CICS. Those who said that CICS is Extremely important also more frequently reported that more than 50 percent of their organization s businesscritical data stored on the mainframe is being accessed by CICS. 8 How does CICS access business-critical data?
9 Respondents chose VSAM and DB2 as the most common types of file structures and data access methods that their CICS applications rely on (see Figure 6). CICS file structures and access methods (entire group) VSAM 88% DB2 79% Oracle IMS 26% 25% DL/1 18% ADABAS 10% 0% 20% 40% 60% 80% 100% Figure 6. VSAM and DB2 are the most used data sources for CICS applications A significant majority (88 percent) said that their CICS applications rely on VSAM files. The second most given response was DB2 (79 percent) followed by Oracle at 26 percent. CICS insights from IT professionals revealed 9
10 CICS and data access: It s about VSAM and DB2 Survey results show VSAM and DB2 as the most dominant data access methods for IT organizations. In exploring these two data sources further, the study revealed steady trends, issues of increasing importance, and new findings. The place that VSAM holds with CICS VSAM files continue to store large amounts of business-critical data. Almost all respondents (96 percent) said that some portion of their business-critical data is stored in VSAM. This VSAM data is not just being viewed historically; 95 percent said that some portion of their business-critical data in VSAM files is being accessed by batch. In fact, the number of respondents who said that 76 to 100 percent of their business-critical data in VSAM is accessed using batch has increased year over year since 2010 (see Figure 7). Percent of business-critical data in VSAM files that is accessed using batch (entire group) % 20% 22% 25% % 26-50% 1-25% 0% 0% 0% 1% 28% 22% 21% 23% 19% 24% 27% 25% 35% Don t know 2% 2% 4% 0% 10% 20% 30% 40% Figure 7. Respondents saying % of VSAM data is accessed using batch is increasing 10 CICS and data access: It s about VSAM and DB2
11 When respondents were asked how important it is for their organization s business-critical data that is in VSAM files to be shared concurrently by both batch jobs and CICS, the results showed a significant increase over 2011 and 2010 (see Figure 8). In 2012, 53 percent reported concurrency to be Highly Important, compared to 43 percent in 2011 and 45 percent in Importance of concurrently sharing VSAM files with batch and CICS (entire group) 60% 50% 45% 43% 53% % 30% 29% 34% 27% 24% 22% % 17% 10% Highly Important Somewhat Important Not Important Figure 8. Eight out of 10 respondents said concurrent access is Important CICS insights from IT professionals revealed 11
12 The survey looked at the business issues that drive the organizational need to concurrently share VSAM files between batch and CICS (see Figure 9). The leading issues were technical in nature with Modernizing legacy applications and systems (35 percent) and A need to shrink the batch window (33 percent) as the top issues. Comparing these responses with those of last year s survey, the top two issues are the same but they have swapped places, with Modernizing coming in just ahead of last year s top choice, Need to shrink the batch window. These two comprise, for the second year in a row, the first tier of business issues driving a need for concurrency. Using Web services, A growing number of business-critical applications, Business growth, and A Growing number of transactions followed as second-tier issues. Business issues driving the need for concurrency (Important group) 40% 30% 35% 33% 26% 23% 22% Modernizing legacy applications A need to shrink the batch window Using Web services 20% 10% 18% A growing number of business-critical applications Business growth 0% A growing number of transactions Figure 9. Modernizing is the top issue driving the need for concurrency for the Important group 12 CICS and data access: It s about VSAM and DB2
13 Further analysis shows a significant relationship between the importance of concurrently sharing business-critical data in VSAM files by both batch and CICS and the growth-oriented business issues driving the need for concurrency. These issues of Business growth, A growing number of business-critical applications, A need to shrink the batch window, and Modernizing legacy applications were mentioned more frequently by people who said concurrency is Extremely important or Very important than they were by people who said concurrency is just Somewhat important (see Figure 10). Business issues driving the need for concurrency (Highly Important group) 90% 83% 80% Business growth 70% 50% 30% 10% 0% 67% 58% A growing number of business-critical applications A need to shrink the batch window Modernizing legacy applications and systems Figure 10. Growth issues drive concurrency need for Highly Important group CICS insights from IT professionals revealed 13
14 DB2 usage and its relative importance As mentioned previously, respondents cited DB2 as the second most common data source that their CICS applications rely on. Additional questions explored DB2 usage. When asked what percentage of their organization s business-critical data that is on the mainframe is being stored in DB2, responses revealed a fairly even distribution across the tiers (see Figure 11). Just as many people said they have no business-critical data in DB2 as said they have 75 to 100 percent of their business-critical data in DB2. Percentage of business-critical data on the mainframe that is stored in DB2 (entire group) 1-25% 19% 26-50% 20% 0% 18% Don t know 3% % 18% 51-75% 22% Figure 11. Those with large amounts of data in DB2 equal those with little or none Note that the question was asked about DB2 in relation to the mainframe, but not necessarily in relation to CICS applications specifically. This means the responses might or might not apply to other types of applications that access DB2 data on the mainframe. When asked if the percent of data stored in DB2 was increasing, staying the same, or decreasing, 67 percent of respondents reported an increase, with another 26 percent reporting their levels were staying about the same. Because this question was worded generally, respondents could have been sharing their DB2 usage in relation to CICS, the mainframe, other platforms, or across their entire IT environment. 14 CICS and data access: It s about VSAM and DB2
15 Finally, 77 percent of respondents stated that DB2 is a relational database that is strategic to their organization (see Figure 12). (Oracle was second with 60 percent and MS SQL was third with 42 percent; users could choose multiple answers.) Because of the way the question was worded, respondents could have meant that DB2 was strategic to their organization on the mainframe, off the mainframe, or across their entire IT environment. Strategic relational databases reported in 2012 (entire group) DB2 77% Oracle 60% MS SQL 42% Other 11% None 4% Postgres 0% 0% 20% 40% 60% 80% 100% Figure 12. DB2 and Oracle are the most widely used relational databases While DB2 is a widely used relational database, it has not replaced VSAM s role in serving CICS applications, according to respondents. CICS insights from IT professionals revealed 15
16 Conclusions CICS is still vital to today's IT environment, with the majority of the survey respondents stating that CICS applications are Highly Important to their businesses. Respondents still face key CICS challenges, most heavily focusing on application integration, development, and availability. Application integration with Web services or SOA headed the list. Notable was the surprising lack of approaches for the stated CICS challenges. The overwhelming majority of respondents by a factor of more than 10 said they don't have technologies to address these challenges, suggesting that they are still struggling. When exploring the relationship between CICS and data, respondents said that their CICS applications access business-critical data residing in a variety of sources, but VSAM, followed by DB2, are the primary ones. In a finding that might surprise some, almost all respondents (95 percent) have a portion of their business-critical data in VSAM files being actively updated by batch, and not just being viewed historically. To these respondents, concurrent access for CICS and batch to business-critical data in VSAM files remains a central issue, and its importance is growing. This might be due to organizations' desires to incorporate VSAM-reliant CICS applications into Web services, which increases the pressure to reduce or eliminate the batch window. And while DB2 is used by a majority of respondents either on the mainframe or potentially off the mainframe as well it is not their only data source or perhaps a data source they use at all. Almost 40 percent of respondents said they have less than 25 percent, or even none, of their business-critical data in DB2. Finally, today's CICS applications rely neither solely on VSAM or on DB2. Rather, the two are co-existing in today's business environment to meet the dynamic needs of organizations represented by the survey respondents. If you d like to learn more To learn more about mainframes and CICS applications, see these white papers on H&W's site: Beyond cost cutting: Making mainframe assets work harder for the business today Strategies for modernizing VSAM-reliant CICS applications Overview: Conventional and current alternatives 16 Conclusions
17 Survey methodology and profiles This section discusses the survey approach and profiles the respondents by industry, size of organizations, and job functions. Survey approach The research was conducted as a web survey by Enterprise Systems Media, which publishes Enterprise Tech Journal (formerly called z/journal) in January and February Exclusive rights to the results were purchased by H&W Computer Systems, Inc. Respondents were selected from Enterprise Tech Journal s subscriber base of 25,000 IT professionals. From this, a subset of subscribers with roles related to IT architecture was selected and received the survey. From this subset, 204 responded. Questions in the survey narrowed respondents to only individuals in IT organizations that use both z/os and CICS and have architectural responsibilities. The 110 respondents who met these qualifications formed the basis of the survey results. Commonly accepted standards for statistical analysis were used to ensure validity and significance. Industry profile The survey drew upon a good cross-section of industries, with strong representation from the insurance, financial services and banking, and government sectors (see Figure 13). The Other category (17 percent) showed great diversity, with representatives from such industries as utilities, education, manufacturing, media, and entertainment. Respondents by industry (entire group) Consulting 6% Retail 6% Healthcare 7% Telecom 6% Government 14% Insurance 25% Other 17% Financial 19% Figure 13. Distribution of respondents by industry CICS insights from IT professionals revealed 17
18 For the first time, the 2012 Enterprise Tech Journal survey asked respondents to indicate the total number of employees in their organization. The largest group (43 percent) came from organizations with more than 10,000 total employees. Respondents from companies with 1,000 to 9,999 employees comprised 41 percent of the total, with the smallest number of respondents coming from businesses with fewer than 1,000 employees (see Figure 14). Respondents by total organization size (entire group) Less than % 10,000 or more 43% % 1,000-4,999 23% 5,000-9,999 18% Figure 14. Distribution of respondents by size of total organization Mainframe organization profile Most sizes of mainframe IT organizations were evenly represented in the survey (see Figure 15). The largest percentage of respondents (34 percent) came from IT organizations with mainframe employees, followed equally by IT organizations with 1,000 or more mainframe employees (23 percent) and organizations with fewer than 50 mainframe employees (23 percent). Respondents by mainframe organization size (entire group) Less than 50 23% 1,000 or more 23% % % % Figure 15. Distribution of respondents by size of mainframe organization 18 Survey methodology and profiles
19 Survey data showed that 51 percent of respondents in 2012 are now using CICS Transaction Server release 4.x, up significantly from 30 percent in This year s survey also showed that 40 percent of respondents are still using CICS Transaction Server release 3.x, which is significantly down from 63 percent just last year. Respondents by CICS release (entire group) Other CICS version 9% CICS Transaction Server 4.x 51% CICS Transaction Server 3.x 40% Figure 16. Distribution of respondents by CICS release Job function profile Respondents represented a variety of architecture responsibilities across a range of systems and applications roles. Respondents by job function (entire group) Other with architecture responsibility 4% IT or enterprise architect 21% Systems/infrastructure architect 42% Application architect 33% Figure 17. Distribution of respondents by job function CICS insights from IT professionals revealed 19
20 About H&W Headquartered in Boise, Idaho, H&W has been a leading provider of quality software solutions since H&W creates reliable, technically sound solutions like SYSB-II that provide long-term value. Today, corporations worldwide, including many Global 500 companies, trust H&W for their IT software and services needs. Call or visit North Meeker Pl., Ste. 100 Boise, ID by H&W Computer Systems, Inc. All rights reserved 20
Concurrent VSAM access for batch and CICS: A white paper series
Concurrent VSAM access for batch and CICS: A white paper series Overview: Conventional and current alternatives A white paper from: IBM and CICS are trademarks or registered trademarks of International
More informationConcurrent VSAM access for batch and CICS
Concurrent VSAM access for batch and CICS Transparent VSAM file sharing A white paper from: Finding a better way to solve batch issues: concurrent VSAM file sharing When batch processes cause CICS applications
More informationConcurrent VSAM access for batch and CICS: A white paper series
Concurrent VSAM access for batch and CICS: A white paper series Transparent VSAM file sharing via CICS and batch A white paper from: Finding a better way to solve batch issues: concurrent VSAM file sharing
More informationTripwire State of Container Security Report
RESEARCH Tripwire State of Container Security Report January 2019 FOUNDATIONAL CONTROLS FOR SECURITY, COMPLIANCE & IT OPERATIONS As DevOps continues to drive increased use of containers, security teams
More informationDDN Annual High Performance Computing Trends Survey Reveals Rising Deployment of Flash Tiers & Private/Hybrid Clouds vs.
DDN Annual High Performance Computing Trends Survey Reveals Rising Deployment of Flash Tiers & Private/Hybrid Clouds vs. Public for HPC HPC End Users Cite Mixed I/O as the Most Difficult Performance Challenge
More informationConcurrent VSAM access for batch and CICS: A white paper series
Concurrent VSAM access for batch and CICS: A white paper series VSAM Record-Level Sharing (RLS) A white paper from: IBM, CICS, Db2, and z/os are trademarks or registered trademarks of International Business
More informationDIGITAL TRANSFORMATION IN FINANCIAL SERVICES
DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation
More informationThe power management skills gap
The power management skills gap Do you have the knowledge and expertise to keep energy flowing around your datacentre environment? A recent survey by Freeform Dynamics of 320 senior data centre professionals
More informationThe future of UC&C on mobile
SURVEY REPORT The future of UC&C on mobile Published by 2018 Introduction The future of UC&C on mobile report gives us insight into how operators and manufacturers around the world rate their unified communication
More informationState of SMB IT 1H 2012
TM Voice of IT State of SMB IT 1H 2012 Semi-Annual Report On Small And Medium Business Technology Plans & Purchase Intent Spiceworks Inc., 7300 FM 2222, Bldg 3, Ste 100, Austin, TX 78730 Tel: 1-512-628-8280
More information2017 Windows 10 Enterprise Impact Survey Windows 10 Enterprise Impact Survey
2017 Windows 10 Enterprise Impact Survey 2017 Windows 10 Enterprise Impact Survey 2017 Windows 10 Enterprise Impact Survey Executive Summary This report illuminates IT trends and other key findings uncovered
More informationDaaS Market Report Workspace Services and Desktops-as-a-Service Global Market Trends: The Service Provider Perspective
DaaS Market Report 2017 2017 Workspace Services and Desktops-as-a-Service Global Market Trends: The Service Provider Perspective Survey shows jump in traditional Value Added Resellers (VARs) embracing
More informationDatabases and ERP Selection: Oracle vs SQL Server
DATABASES AND ERP ORACLE VS SQL SELECTION: SERVER Databases and ERP Selection: Oracle vs SQL Server By Rick Veague, Chief Technology Officer, IFS North America An enterprise application like enterprise
More informationBuilding a Threat Intelligence Program
WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351
More informationMarketing Performance in Executive perspective on the strategy and effectiveness of marketing
Executive perspective on the strategy and effectiveness of email marketing Table of Contents Introduction 2 The state of email marketing performance 3 Successfully achieving objectives 4 Most important
More informationGood Technology State of BYOD Report
Good Technology State of BYOD Report New data finds Finance and Healthcare industries dominate BYOD picture and that users are willing to pay device and service plan costs if they can use their own devices
More information2018 Database DevOps Survey DBmaestro 1
2018 Database DevOps Survey 2017 DBmaestro 1 Table of Contents Executive Summary... 3 What Percentage of IT Projects in Your Company Use a DevOps Approach?... 4 Integration of DBAs with DevOps Teams...
More information2017 Site Selectors Guild State of Site Selection Trend Survey Report
2017 Site Selectors Guild State of Site Selection Trend Survey Report December 2017 www.siteselectorsguild.com The Site Selectors Guild is the world s largest association of business location experts.
More informationThe data quality trends report
Report The 2015 email data quality trends report How organizations today are managing and using email Table of contents: Summary...1 Research methodology...1 Key findings...2 Email collection and database
More informationAs Enterprise Mobility Usage Escalates, So Does Security Risk
YOUR SECURITY. CONNECTED WHITE PAPER As Enterprise Mobility Usage Escalates, So Does Security Risk Even as more organizations embrace the use of mobile devices by employees and customers to access services
More informationCloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION
Cloud Computing January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Purpose and Methodology Survey Sample Field Work December 20, 2011 January 9, 2012 Total Respondents 554 Margin of Error +/- 4.2%
More informationThese Are the Top Languages for Enterprise Application Development
These Are the Top Languages for Enterprise Application Development And What That Means for Business August 2018 Enterprises are now free to deploy a polyglot programming language strategy thanks to a decrease
More informationThe Case for Virtualizing Your Oracle Database Deployment
June 2012 The Case for Virtualizing Your Oracle Database Deployment Much has been written about the benefits of virtualization over the last few years. Hypervisor software promises to revolutionize the
More information6th Annual 15miles/Neustar Localeze Local Search Usage Study Conducted by comscore
6th Annual 15miles/Neustar Localeze Local Search Usage Study Conducted by comscore Consumers are adopting mobile devices of all types at a blistering pace. The demand for information on the go is higher
More informationTHE STATE OF IT TRANSFORMATION FOR RETAIL
THE STATE OF IT TRANSFORMATION FOR RETAIL An Analysis by Dell EMC and VMware Dell EMC and VMware are helping IT groups at retail organizations transform to business-focused service providers. The State
More informationRightScale 2018 State of the Cloud Report DATA TO NAVIGATE YOUR MULTI-CLOUD STRATEGY
RightScale 2018 State of the Cloud Report DATA TO NAVIGATE YOUR MULTI-CLOUD STRATEGY RightScale 2018 State of the Cloud Report As Public and Private Cloud Grow, Organizations Focus on Governing Costs Executive
More informationTHE STATE OF CLOUD & DATA PROTECTION 2018
THE STATE OF CLOUD & DATA PROTECTION 2018 Survey Results: 10 Findings on how over 800 IT Pros handle Disaster Recovery & Cloud Adoption. INTRODUCTION The Unitrends 2018 annual survey of IT professionals
More informationTHE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:
June 2013 Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information can be easily transported and lost, while the
More information2016 COOLING THE EDGE SURVEY. Conducted by Vertiv Publication Date: August 30, 2016
2016 COOLING THE EDGE SURVEY Conducted by Vertiv Publication Date: August 30, 2016 TWO STAGE POWER DISTRIBUTION Table of Contents Section I: Methodology Section II: Key Findings 1. Strategic Importance
More informationMOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner
MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use
More informationAUSTRALIA Building Digital Trust with Australian Healthcare Consumers
AUSTRALIA Building Digital Trust with Australian Healthcare Consumers Accenture 2017 Consumer Survey on Healthcare Cybersecurity and Digital Trust 2 Consumers in Australia trust healthcare organisations
More information2018 Mobile Security Report
2018 Mobile Security Report CONTENTS Introduction 3 Businesses suspect their mobile workers are being hacked 4 Cafés, airports and hotels: a hotspot for Wi-Fi related security incidents 5 BYOD: Bring Your
More informationEnabling the Always-On Enterprise
Enabling the Always-On Enterprise Ensure zero downtime and prevent data loss with the right backup and recovery solutions. The IT Solution Experts table of contents Introduction 3 Data, Data Everywhere
More informationSTREAMLINING THE DELIVERY, PROTECTION AND MANAGEMENT OF VIRTUAL DESKTOPS. VMware Workstation and Fusion. A White Paper for IT Professionals
WHITE PAPER NOVEMBER 2016 STREAMLINING THE DELIVERY, PROTECTION AND MANAGEMENT OF VIRTUAL DESKTOPS VMware Workstation and Fusion A White Paper for IT Professionals Table of Contents Overview 3 The Changing
More informationKNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals
KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY Perspectives from U.S. and ese IT Professionals Executive Summary The use of artificial intelligence (AI) and machine learning (ML) in cybersecurity
More informationTRANSACTIONAL BENCHMARK
TRANSACTIONAL EMAIL BENCHMARK REPORT 2018 Transactional Email: Essential to the Cloud Economy Email Is Vital to Modern Apps and Services Email is part of daily life that most of us take for granted. Email
More informationGLOBAL ENCRYPTION TRENDS STUDY
GLOBAL ENCRYPTION TRENDS STUDY April 2017 EXECUTIVE SUMMARY EXECUTIVE SUMMARY Ponemon Institute is pleased to present the findings of the 2017 Global Encryption Trends Study, sponsored by Thales e-security.
More informationUp in the Air: The state of cloud adoption in local government in 2016
Up in the Air: The state of cloud adoption in local government in 2016 Introduction When a Cloud First policy was announced by the Government Digital Service in 2013, the expectation was that from that
More informationModern Compute Is The Foundation For Your IT Transformation
A Forrester Consulting Thought Leadership Paper Commissioned By Dell EMC And Intel February 2018 Modern Compute Is The Foundation For Your IT Transformation Failure To Update Can Stunt Your Growth Table
More information5G Readiness Survey 2017
5G Readiness Survey 2017 An assessment of operators progress on the road to 5G 1 5G READINESS SURVEY 2017: AN ASSESSMENT OF OPERATORS PROGRESS ON THE ROAD TO 5G Are Operators Ready for 5G? 5G next-generation
More informationTREND REPORT. Ethernet, MPLS and SD-WAN: What Decision Makers Really Think
TREND REPORT Ethernet, MPLS and SD-WAN: What Decision Makers Really Think TABLE OF CONTENTS Introduction 3 CH. 1 What IT Pros Think of Ethernet 4 CH. 2 What IT Pros Think of MPLS 8 CH. 3 What IT Pros Think
More informationTREND REPORT. Hosted VoIP: What IT Decision-Makers Really Think
TREND REPORT Hosted VoIP: What IT Decision-Makers Really Think TABLE OF CONTENTS Introduction 3 What IT Pros Think of Hosted VoIP Today CH. 1 4 And What They Expect Tomorrow Exploring the Biggest Drivers,
More informationTHE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES
THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES TABLE OF CONTENTS 3 Introduction 4 Survey Findings 4 Recent Breaches Span a Broad Spectrum 4 Site Downtime and Enterprise
More informationIT Optimization Trends. Summary Results January 2018
IT Optimization Trends Survey Summary Between October 2017 and January 2018, Gatepoint Research invited selected executives to participate in a survey themed IT Optimization Trends. Candidates were invited
More informationMidsize Business Voice Service Spending Steady for 2003
End-User Analysis Midsize Business Voice Service Spending Steady for 23 Abstract: Telecom service providers need to know the voice telecom spending plans of the margin-rich midsize business segment in
More informationCloud Foundry User Survey
Cloud Foundry User Survey Semi-annual snapshot of Cloud Foundry users deployments and productivity April 2018 Introduction Cloud Foundry is the prevailing open source cloud application platform used by
More informationTESTING TRENDS IN 2015: A SURVEY OF SOFTWARE PROFESSIONALS
WHITE PAPER TESTING TRENDS IN 2015: A SURVEY OF SOFTWARE PROFESSIONALS Today s online environments have created a dramatic new set of challenges for the software professionals responsible for the quality
More informationAbstract: Data Protection Cloud Strategies
Enterprise Strategy Group Getting to the bigger truth. Research Report Abstract: Data Protection Cloud Strategies Considerations for Organizations Seeking to Utilize Cloud Services as Part of Their Data
More informationWhy Enterprises Need to Optimize Their Data Centers
White Paper Why Enterprises Need to Optimize Their Data Centers Introduction IT executives have always faced challenges when it comes to delivering the IT services needed to support changing business goals
More informationTrends in Next Generation Data Center Infrastructure. Summary Results January 2018
Trends in Next Generation Data Center Infrastructure Survey Summary Between October 2017 and January 2018 Gatepoint Research invited selected executives to participate in a survey themed Trends in Next
More informationImperva Incapsula Survey: What DDoS Attacks Really Cost Businesses
Survey Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses BY: TIM MATTHEWS 2016, Imperva, Inc. All rights reserved. Imperva and the Imperva logo are trademarks of Imperva, Inc. Contents
More informationImproving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN
Improving Data Governance in Your Organization Faire Co Regional Manger, Information Management Software, ASEAN Topics The Innovation Imperative and Innovating with Information What Is Data Governance?
More informationACHIEVING FIFTH GENERATION CYBER SECURITY
ACHIEVING FIFTH GENERATION CYBER SECURITY A Survey Research Report of IT and Security Professionals MARCH 2018 INTRODUCTION The pursuit of the highest level of cyber security is a top priority for IT and
More informationMeasuring Critical Communications Effectiveness: An Analysis of Private Sector Broadcast Confirmation Data
Measuring Critical Communications Effectiveness: An Analysis of Private Sector Broadcast Confirmation Data Executive Summary Successful crisis management depends on an organization s ability to manage
More informationOverview Guide. Mainframe Connect 15.0
Overview Guide Mainframe Connect 15.0 DOCUMENT ID: DC37572-01-1500-01 LAST REVISED: August 2007 Copyright 1991-2007 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software and
More informationEnd to End Analysis on System z IBM Transaction Analysis Workbench for z/os. James Martin IBM Tools Product SME August 10, 2015
End to End Analysis on System z IBM Transaction Analysis Workbench for z/os James Martin IBM Tools Product SME August 10, 2015 Please note IBM s statements regarding its plans, directions, and intent are
More information2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION
2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION 2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION The annual Jamf Trends Survey looked at Apple in higher education evaluating growth, key drivers
More information270 Total Nodes. 15 Nodes Down 2018 CONTAINER ADOPTION SURVEY. Clusters Running. AWS: us-east-1a 23 nodes. AWS: us-west-1a 62 nodes
AWS: us-east-1a 23 nodes AWS: us-west-1a 62 nodes 20 Clusters Running 2018 CONTAINER ADOPTION SURVEY 6 lumes 270 Total Nodes 15 Nodes Down EXECUTIVE SUMMARY It s clear to most industry watchers that containers
More information34% DOING MORE WITH LESS How Red Hat Enterprise Linux shrinks total cost of ownership (TCO) compared to Windows. I n a study measuring
WHITEPAPER DOING MORE WITH LESS How shrinks total cost of ownership (TCO) compared to Windows I n a study measuring the TCO of Windows and servers, Red Hat Enterprise platforms exhibited 34% lower annual
More informationMobile App Development Market Research Report- Global Forecast to 2022
Report Information More information from: https://www.marketresearchfuture.com/reports/1752 Mobile App Development Market Research Report- Global Forecast to 2022 Report / Search Code: MRFR/ICT/1220-HCRR
More informationConverged Infrastructure Matures And Proves Its Value
A Custom Technology Adoption Profile Commissioned By Hewlett-Packard May 2013 Introduction Converged infrastructure (CI) solutions have been widely adopted by a range of enterprises, and they offer significant
More informationList Strategy. Optimizing Marketing Performance in Ascend2 research conducted in partnership with Return Path. returnpath.
Email List Strategy Optimizing Marketing Performance in 2016 1 Ascend2 research conducted in partnership with Return Path Table of contents Introduction 3 List quality is a priority for marketers 4 Email
More informationChina: User Perceptions and Plans for PCs and PDAs in 2003
End-User Analysis China: User Perceptions and Plans for PCs and PDAs in 2003 Abstract: The majority of the Chinese organizations' IT strategies and budget planning issues remain immature. It would not
More informationCLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS
CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS Introduction The world of cybersecurity is changing. As all aspects of our lives become increasingly connected, businesses have made
More informationAbstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight
ESG Lab Review InterSystems Data Platform: A Unified, Efficient Data Platform for Fast Business Insight Date: April 218 Author: Kerry Dolan, Senior IT Validation Analyst Abstract Enterprise Strategy Group
More informationHealthcare mobility: selecting the right device for better patient care
Healthcare mobility: selecting the right device for better patient care How Fujitsu Mobile Solutions help accelerate digital transformation with human-centric innovation* Fujitsu Thought Leadership Report
More informationState of the Cyber Training Market January 2018
State of the Cyber Training Market January 2018 2018 by CYBERBIT 2018 by CYBERBIT Proprietary CYBERBIT Proprietary Cybersecurity Market Worth 202.36 Billion USD by 2021 Marketandmarkets analysis, 2017
More information2013 Cloud Computing Outlook: Private Cloud Expected to Grow at Twice the Rate of Public Cloud
Private Cloud Expected to Grow at Twice the Rate of Public Cloud In This Paper Security, privacy concerns about the cloud remain SaaS is the most popular cloud service model in use today Microsoft, Google
More informationSDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS
January 2018 Sponsored by Introduction 302 network professionals and IT strategists completed a global survey on Software Defined Networks (SDNs) to gather hard data on SDN adoption and operational challenges.
More informationBackup and Recovery Trends: How Businesses Are Benefiting from Data Protector
White Paper Business Continuity Backup and Recovery Trends: How Businesses Are Benefiting from Data Protector Survey of worldwide backup software customer base conducted through TechValidate Table of Contents
More informationJune 2017 intel.com schneider-electric.com
DCIM Solution Deployment June 2017 intel.com schneider-electric.com DCIM Solution Deployment Introduction Current state of data center management Do you currently have a solution deployed? 20% 80% The
More informationTRUSTED MOBILITY INDEX
TRUSTED MOBILITY INDEX Published May 2012 A GLOBAL STUDY INDEXING CONSUMER CONFIDENCE IN MOBILITY The mobile ecosystem of devices, services and networks is at a critical inflection point. While the mobile
More information2017 RIMS CYBER SURVEY
2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the
More informationIBM s Integrated Data Management Solutions for the DBA
Information Management IBM s Integrated Data Management Solutions for the DBA Stop Stressing and Start Automating! Agenda Daily Woes: Trials and tribulations of the DBA Business Challenges: Beyond the
More informationGLOBAL PKI TRENDS STUDY
2018 GLOBAL PKI TRENDS STUDY Sponsored by Thales esecurity Independently conducted by Ponemon Institute LLC SEPTEMBER 2018 EXECUTIVE SUMMARY #2018GlobalPKI Mi Ponemon Institute is pleased to present the
More informationFundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL
Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day
More informationConcurrent VSAM access for batch and CICS: A white paper series
Concurrent VSAM access for batch and CICS: A white paper series Transactional VSAM (DFSMStvs) A white paper from: IBM, CICS, Db2, and z/os are trademarks or registered trademarks of International Business
More information2017 Essentials Brief: Cloud
2017 Essentials Brief: Cloud www.himssanalytics.com Enabling better health through information technology. Healthcare Information and Management Systems Society (HIMSS) HIMSS is a global, cause-based,
More informationHyTrust government cloud adoption survey
HyTrust government cloud adoption survey Security a top concern with hesitancy to relinquish control of data White Paper HyTrust government cloud adoption survey Security a top concern with hesitancy to
More informationMid-Market Data Center Purchasing Drivers, Priorities and Barriers
Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Featuring Sophia Vargas, Forrester Research Inc. 30 May 2014 Introducing today s presenters: Matt Miszewski Senior Vice President of Sales
More informationUnlock The Value Of Cloud: A Spotlight On IT Executives
A Forrester Consulting Thought Leadership Paper Commissioned By Intel November 2017 Unlock The Value Of Cloud: A Spotlight On IT Executives How To Expand Your Hybrid Cloud With Consistency, High Performance,
More informationHardware Decisions for Embedded Systems Design in Asia/Pacific
End-User Analysis Hardware Decisions for Embedded Systems Design in Asia/Pacific Abstract: Over 900 embedded systems designers in Asia/Pacific responded to our survey of hardware decisions. Currently,
More informationCYBERSECURITY AND THE MIDDLE MARKET
CYBERSECURITY AND THE MIDDLE MARKET The Importance of Cybersecurity and How Middle Market Companies Manage Cyber Risks IN COLLABORATION WITH 2 Concerns about cybersecurity are not matched by plans. IMPORTANCE
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security
More informationEvolution of IT in the Finance Industry. Europe
2011 Evolution of IT in the Finance Industry Europe CONTENTS Evolution of IT in the Finance Industry... 4 Methodology... 6 Focus... 8 Finding 1: Finance Industry Has Mature View on IT Trends...10 Finding
More informationInstitute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI
Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee
More informationSolid State Storage: Trends, Pricing Concerns, and Predictions for the Future
Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future Solid state storage is ready for prime time, or so the latest awareness and usage statistics would indicate. Moreover, a recent
More informationMOVING MISSION IT SERVICES TO THE CLOUD
MOVING MISSION IT SERVICES TO THE CLOUD About half of civilian agency IT officials report they are now implementing mission support and business systems in the cloud. But a new progress report also highlights
More informationUS Consumer Device Preference Report
ANDROID WINDOWS PHONE ANDROID TABLET OTHER MOBILE IPHONE IPAD US Consumer Device Preference Report Q1 2015: Smartphone Conversions Are Finally Here But Where are the Android Users? 45.8 43.2 39.6 39.6
More informationBusiness Resiliency Strategies for the Cloud. Summary Results September 2017
Business Resiliency Strategies for the Cloud Survey Summary Between May and September, 2017, Gatepoint Research invited selected executives to participate in a survey themed Business Resiliency Strategies
More informationSTATE OF THE NETWORK STUDY
10TH ANNUAL STUDY 2017 1 EXECUTIVE SUMMARY The Tenth Annual State of the Network Global Study focuses a lens on the network team s role in security investigations. Results indicate that 88 percent of network
More information- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more
- Samsung Tablet Photo - Tablets Mean Business Survey of IT pros reflects growing trend toward tablets for workforce mobility and more Table of contents Introduction 2 Giving employees what they want pays
More informationWeb Services Take Root in Banks and With Asset Managers
Strategic Planning, M. Knox, W. Andrews, C. Abrams Research Note 18 December 2003 Web Services Take Root in Banks and With Asset Managers Financial-services providers' early Web services implementations
More informationPERCEPTION OF IRELAND AS A DIGITAL ASSET HOSTING LOCATION Surveys Conducted by Host in Ireland
JULY- SEPT 2014 PERCEPTION OF IRELAND AS A DIGITAL ASSET HOSTING LOCATION Surveys Conducted by Host in Ireland www.hostinireland.com Table of Contents 3 Executive Summary 3-7 SURVEY: Strategic Opportunities
More informationIBM Data Virtualization Manager in Detail + Demo Atlanta DB2 User Group Meeting December 7, 2018
IBM Data Virtualization Manager in Detail + Demo Atlanta DB2 User Group Meeting December 7, 2018 Milan Babiak Client Technical Professional, Analytics on Z Systems North America IBM Canada Milan.Babiak@ca.ibm.com
More informationOperationalize Security To Secure Your Data Perimeter
Operationalize Security To Secure Your Data Perimeter GET STARTED Protecting Your Data Without Sacrificing Business Agility Every day, companies generate mountains of data that are critical to their business.
More informationPay-TV services worldwide: trends and forecasts PAY-TV SERVICES WORLDWIDE: TRENDS AND FORECASTS
RESEARCH FORECAST REPORT PAY-TV SERVICES WORLDWIDE: TRENDS AND FORECASTS 2017 2022 MARTIN SCOTT and ROMAN ORVISKY Analysys Mason Limited 2018 About this report This report provides: forecasts for the number
More information` 2017 CloudEndure 1
` 2017 CloudEndure 1 Table of Contents Executive Summary... 3 Production Machines in the Organization... 4 Production Machines Using Disaster Recovery... 5 Workloads Primarily Covered by Disaster Recovery...
More informationTHE CYBERSECURITY LITERACY CONFIDENCE GAP
CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks
More information2013, Healthcare Intelligence Network
Note: This is an authorized excerpt from 2013 Healthcare Benchmarks: Mobile Health. To download the entire report, go to http://store.hin.com/product.asp?itemid=4586 or call 888-446-3530. 2013, Healthcare
More information