CICS insights from IT professionals revealed

Size: px
Start display at page:

Download "CICS insights from IT professionals revealed"

Transcription

1 CICS insights from IT professionals revealed A CICS survey analysis report from:

2 IBM, CICS, and z/os are registered trademarks of International Business Machines Corporation in the United States, other countries, or both. All other products mentioned herein may be service marks, trademarks, or registered trademarks of their respective companies. 2

3 Contents Introduction Summary of findings CICS in today s business environment How important is CICS? CICS challenges and technologies to address them How does CICS access business-critical data? CICS and data access: It s about VSAM and DB The place that VSAM holds with CICS DB2 usage and its relative importance Conclusions Survey methodology and profiles Survey approach Industry profile Mainframe organization profile Job function profile Survey data charts Figure 1: CICS is still important in today s mainframe environment Figure 2: CICS is Highly Important to 90% of respondents Figure 3: Top CICS challenges focus on application integration, development, and availability.. 7 Figure 4: The majority of respondents have not found technologies to solve CICS challenges.. 7 Figure 5: 99% of respondents access business-critical data using CICS Figure 6: VSAM and DB2 are the most used data sources for CICS applications Figure 7: Respondents saying % of VSAM data is accessed using batch is increasing. 10 Figure 8: Eight out of 10 respondents said concurrent access is Important Figure 9: Modernizing is the top issue driving the need for concurrency for the Important group 12 Figure 10: Growth issues drive concurrency need for Highly Important group Figure 11: Those with large amounts of data in DB2 equal those with little or none Figure 12: DB2 and Oracle are the most widely used relational databases Survey data profiles Figure 13: Distribution of respondents by industry Figure 14: Distribution of respondents by size of total organization Figure 15: Distribution of respondents by size of mainframe organization Figure 16: Distribution of respondents by CICS release Figure 17: Distribution of respondents by job function CICS insights from IT professionals revealed 3

4 Introduction Much of the world s business-critical data is still stored on mainframes.the Arcati 2013 Mainframe User Survey found that almost half of respondents have more enterprise data on mainframes than on other platforms. The Arcati survey also showed that about 67 percent of respondents reported at least 40 percent of their enterprise data resides on the mainframe. 1 At the core of many of these global business systems are CICS applications, which IBM estimates handle more than 30 billion transactions a day and that process $1 trillion of business each week worldwide. Enterprise Tech Journal (formerly named z/journal) has explored the state of CICS usage in today's organizations by conducting a CICS survey. The survey targets IT professionals with architecture responsibilities and explores the challenges, strategies, and successful approaches in organizations that use CICS. The results of the 2012 survey are presented in this report, which also discusses the significance of the data in relation to today s CICS environment. The report also compares 2012 findings with the 2011 and 2010 survey results and acknowledges any significant differences. The report addresses these topics from both a survey respondent and an H&W perspective. Summary of findings Survey responses drew a picture of CICS in the contemporary mainframe environment from a cross-section of industries and organizational sizes. CICS applications are clearly integral to business-critical data systems for the majority of survey respondents. When asked about the importance of CICS applications to their business, nine out of 10 respondents stated they are Highly Important, with 70 percent choosing Extremely important. Although CICS applications are still very important to respondents businesses, they can also pose challenges. The top tier challenges were application integration, availability, and development, with Application integration with Web services or SOA most frequently selected. To understand the comprehensive CICS landscape, the survey sought information about the relationship between CICS and its data sources. A full 88 percent of respondents said that their CICS applications rely on VSAM files, with another 79 percent citing DB2. Every organization represented in the survey maintains a portion of its business-critical data in VSAM files, and the percentage of respondents to whom concurrent access to VSAM and batch is important has been rising year over year since Respondents who cited concurrent access as being Highly Important also cited growth-focused reasons for the ranking. 1. Lillycrop, Mark and Trevor Eddolls. The 2013 Mainframe User Survey. Arcati Mainframe Yearbook 2013, (accessed January 22, 2013). 4 Introduction

5 CICS in today s business environment The survey asked several new questions about the importance of CICS and the challenges it presents. Responses showed that CICS still plays a major role in accessing businesses-critical data. The survey also presents new information on specific technologies being used to address important business issues. How important is CICS? More than half (54 percent) of the survey respondents said that at least 51 percent of their businesscritical applications are used online through CICS, with the largest number of respondents saying 51 to 75 percent (see Figure 1). Percentage of business-critical applications used online through CICS (entire group) 1-25% 20% Don t know 1% % 22% 26-50% 25% 51-75% 32% Figure 1. CICS is still important in today s mainframe environment Respondents are also keeping up with the latest CICS releases. The adoption of CICS release 4.x is steadily increasing while the use of CICS 3.x has been declining over the past three years. CICS insights from IT professionals revealed 5

6 When asked about the importance of CICS applications to their business, nine out of 10 respondents fell in the Highly Important group, with 70 percent choosing Extremely important (see Figure 2). (The Highly Important group consists of everyone who answered Extremely important or Very important.) Further analysis showed a significant relationship between the importance of CICS to the respondents and the CICS release they are using. Importance of CICS applications to organization (entire group) Somewhat important 9% Very important 21% Extremely important 70% Figure 2. CICS is Highly Important to 90% of respondents CICS challenges and technologies to address them This year s survey explored challenges specific to CICS and the technologies respondents use to address those challenges. Respondents were given a list of the top CICS challenges and asked to choose which of those challenges their organization currently faces (see Figure 3). Results split into two distinct tiers, with the first tier focused on application issues related to integration, development, and availability. The challenge most often cited was Application integration with Web services or SOA. The second tier of responses focused on performance, as well as transaction volume. 6 CICS in today s business environment

7 Top CICS challenges (entire group) Application integration with Web services or SOA Application development including updates, maintenance, and interface modernization Application availability Application integration with other platforms or systems 51% 44% 42% 41% 0% 20% 40% 60% 80% 100% Figure 3. Top CICS challenges are focused on application integration, development, and availability To better understand how the respondents addressed their current CICS challenges, the survey asked them to list the specific technologies they use to address them. It is important to note that a response of None was given more than 10 times as often as any single, named technology. This seems to indicate that while respondents are facing challenges, they are struggling to find solutions. The following chart (see Figure 4) lists the 10 solutions cited most often by respondents. Technologies used to address top CICS challenges (entire group) Omegamon 16 Websphere 15 MQ Series 13 CICS Tools CICS Web Services 9 9 CPU upgrade Human Resources Web services, SOA CICS Transaction Gateway In-house development Figure 4. The majority of respondents have not found technologies to solve CICS challenges CICS insights from IT professionals revealed 7

8 How does CICS access business-critical data? The survey also asked new questions about CICS and business-critical data on the mainframe, and what types of file structures or access methods that CICS relies on. About eight out of 10 respondents said that more than half of their business-critical data is accessed through the mainframe. The majority of respondents (62 percent) said that more than half of their business-critical data on the mainframe is being accessed by CICS (see Figure 5). Percent of business-critical data on the mainframe that is accessed by CICS (entire group) 1-25% 16% Don t know 1% 26-50% 21% 51-75% 28% % 34% Figure 5. 99% of respondents access business-critical data using CICS Further analysis showed a significant relationship between the degree of importance and the percentage of mainframe data being accessed by CICS. Those who said that CICS is Extremely important also more frequently reported that more than 50 percent of their organization s businesscritical data stored on the mainframe is being accessed by CICS. 8 How does CICS access business-critical data?

9 Respondents chose VSAM and DB2 as the most common types of file structures and data access methods that their CICS applications rely on (see Figure 6). CICS file structures and access methods (entire group) VSAM 88% DB2 79% Oracle IMS 26% 25% DL/1 18% ADABAS 10% 0% 20% 40% 60% 80% 100% Figure 6. VSAM and DB2 are the most used data sources for CICS applications A significant majority (88 percent) said that their CICS applications rely on VSAM files. The second most given response was DB2 (79 percent) followed by Oracle at 26 percent. CICS insights from IT professionals revealed 9

10 CICS and data access: It s about VSAM and DB2 Survey results show VSAM and DB2 as the most dominant data access methods for IT organizations. In exploring these two data sources further, the study revealed steady trends, issues of increasing importance, and new findings. The place that VSAM holds with CICS VSAM files continue to store large amounts of business-critical data. Almost all respondents (96 percent) said that some portion of their business-critical data is stored in VSAM. This VSAM data is not just being viewed historically; 95 percent said that some portion of their business-critical data in VSAM files is being accessed by batch. In fact, the number of respondents who said that 76 to 100 percent of their business-critical data in VSAM is accessed using batch has increased year over year since 2010 (see Figure 7). Percent of business-critical data in VSAM files that is accessed using batch (entire group) % 20% 22% 25% % 26-50% 1-25% 0% 0% 0% 1% 28% 22% 21% 23% 19% 24% 27% 25% 35% Don t know 2% 2% 4% 0% 10% 20% 30% 40% Figure 7. Respondents saying % of VSAM data is accessed using batch is increasing 10 CICS and data access: It s about VSAM and DB2

11 When respondents were asked how important it is for their organization s business-critical data that is in VSAM files to be shared concurrently by both batch jobs and CICS, the results showed a significant increase over 2011 and 2010 (see Figure 8). In 2012, 53 percent reported concurrency to be Highly Important, compared to 43 percent in 2011 and 45 percent in Importance of concurrently sharing VSAM files with batch and CICS (entire group) 60% 50% 45% 43% 53% % 30% 29% 34% 27% 24% 22% % 17% 10% Highly Important Somewhat Important Not Important Figure 8. Eight out of 10 respondents said concurrent access is Important CICS insights from IT professionals revealed 11

12 The survey looked at the business issues that drive the organizational need to concurrently share VSAM files between batch and CICS (see Figure 9). The leading issues were technical in nature with Modernizing legacy applications and systems (35 percent) and A need to shrink the batch window (33 percent) as the top issues. Comparing these responses with those of last year s survey, the top two issues are the same but they have swapped places, with Modernizing coming in just ahead of last year s top choice, Need to shrink the batch window. These two comprise, for the second year in a row, the first tier of business issues driving a need for concurrency. Using Web services, A growing number of business-critical applications, Business growth, and A Growing number of transactions followed as second-tier issues. Business issues driving the need for concurrency (Important group) 40% 30% 35% 33% 26% 23% 22% Modernizing legacy applications A need to shrink the batch window Using Web services 20% 10% 18% A growing number of business-critical applications Business growth 0% A growing number of transactions Figure 9. Modernizing is the top issue driving the need for concurrency for the Important group 12 CICS and data access: It s about VSAM and DB2

13 Further analysis shows a significant relationship between the importance of concurrently sharing business-critical data in VSAM files by both batch and CICS and the growth-oriented business issues driving the need for concurrency. These issues of Business growth, A growing number of business-critical applications, A need to shrink the batch window, and Modernizing legacy applications were mentioned more frequently by people who said concurrency is Extremely important or Very important than they were by people who said concurrency is just Somewhat important (see Figure 10). Business issues driving the need for concurrency (Highly Important group) 90% 83% 80% Business growth 70% 50% 30% 10% 0% 67% 58% A growing number of business-critical applications A need to shrink the batch window Modernizing legacy applications and systems Figure 10. Growth issues drive concurrency need for Highly Important group CICS insights from IT professionals revealed 13

14 DB2 usage and its relative importance As mentioned previously, respondents cited DB2 as the second most common data source that their CICS applications rely on. Additional questions explored DB2 usage. When asked what percentage of their organization s business-critical data that is on the mainframe is being stored in DB2, responses revealed a fairly even distribution across the tiers (see Figure 11). Just as many people said they have no business-critical data in DB2 as said they have 75 to 100 percent of their business-critical data in DB2. Percentage of business-critical data on the mainframe that is stored in DB2 (entire group) 1-25% 19% 26-50% 20% 0% 18% Don t know 3% % 18% 51-75% 22% Figure 11. Those with large amounts of data in DB2 equal those with little or none Note that the question was asked about DB2 in relation to the mainframe, but not necessarily in relation to CICS applications specifically. This means the responses might or might not apply to other types of applications that access DB2 data on the mainframe. When asked if the percent of data stored in DB2 was increasing, staying the same, or decreasing, 67 percent of respondents reported an increase, with another 26 percent reporting their levels were staying about the same. Because this question was worded generally, respondents could have been sharing their DB2 usage in relation to CICS, the mainframe, other platforms, or across their entire IT environment. 14 CICS and data access: It s about VSAM and DB2

15 Finally, 77 percent of respondents stated that DB2 is a relational database that is strategic to their organization (see Figure 12). (Oracle was second with 60 percent and MS SQL was third with 42 percent; users could choose multiple answers.) Because of the way the question was worded, respondents could have meant that DB2 was strategic to their organization on the mainframe, off the mainframe, or across their entire IT environment. Strategic relational databases reported in 2012 (entire group) DB2 77% Oracle 60% MS SQL 42% Other 11% None 4% Postgres 0% 0% 20% 40% 60% 80% 100% Figure 12. DB2 and Oracle are the most widely used relational databases While DB2 is a widely used relational database, it has not replaced VSAM s role in serving CICS applications, according to respondents. CICS insights from IT professionals revealed 15

16 Conclusions CICS is still vital to today's IT environment, with the majority of the survey respondents stating that CICS applications are Highly Important to their businesses. Respondents still face key CICS challenges, most heavily focusing on application integration, development, and availability. Application integration with Web services or SOA headed the list. Notable was the surprising lack of approaches for the stated CICS challenges. The overwhelming majority of respondents by a factor of more than 10 said they don't have technologies to address these challenges, suggesting that they are still struggling. When exploring the relationship between CICS and data, respondents said that their CICS applications access business-critical data residing in a variety of sources, but VSAM, followed by DB2, are the primary ones. In a finding that might surprise some, almost all respondents (95 percent) have a portion of their business-critical data in VSAM files being actively updated by batch, and not just being viewed historically. To these respondents, concurrent access for CICS and batch to business-critical data in VSAM files remains a central issue, and its importance is growing. This might be due to organizations' desires to incorporate VSAM-reliant CICS applications into Web services, which increases the pressure to reduce or eliminate the batch window. And while DB2 is used by a majority of respondents either on the mainframe or potentially off the mainframe as well it is not their only data source or perhaps a data source they use at all. Almost 40 percent of respondents said they have less than 25 percent, or even none, of their business-critical data in DB2. Finally, today's CICS applications rely neither solely on VSAM or on DB2. Rather, the two are co-existing in today's business environment to meet the dynamic needs of organizations represented by the survey respondents. If you d like to learn more To learn more about mainframes and CICS applications, see these white papers on H&W's site: Beyond cost cutting: Making mainframe assets work harder for the business today Strategies for modernizing VSAM-reliant CICS applications Overview: Conventional and current alternatives 16 Conclusions

17 Survey methodology and profiles This section discusses the survey approach and profiles the respondents by industry, size of organizations, and job functions. Survey approach The research was conducted as a web survey by Enterprise Systems Media, which publishes Enterprise Tech Journal (formerly called z/journal) in January and February Exclusive rights to the results were purchased by H&W Computer Systems, Inc. Respondents were selected from Enterprise Tech Journal s subscriber base of 25,000 IT professionals. From this, a subset of subscribers with roles related to IT architecture was selected and received the survey. From this subset, 204 responded. Questions in the survey narrowed respondents to only individuals in IT organizations that use both z/os and CICS and have architectural responsibilities. The 110 respondents who met these qualifications formed the basis of the survey results. Commonly accepted standards for statistical analysis were used to ensure validity and significance. Industry profile The survey drew upon a good cross-section of industries, with strong representation from the insurance, financial services and banking, and government sectors (see Figure 13). The Other category (17 percent) showed great diversity, with representatives from such industries as utilities, education, manufacturing, media, and entertainment. Respondents by industry (entire group) Consulting 6% Retail 6% Healthcare 7% Telecom 6% Government 14% Insurance 25% Other 17% Financial 19% Figure 13. Distribution of respondents by industry CICS insights from IT professionals revealed 17

18 For the first time, the 2012 Enterprise Tech Journal survey asked respondents to indicate the total number of employees in their organization. The largest group (43 percent) came from organizations with more than 10,000 total employees. Respondents from companies with 1,000 to 9,999 employees comprised 41 percent of the total, with the smallest number of respondents coming from businesses with fewer than 1,000 employees (see Figure 14). Respondents by total organization size (entire group) Less than % 10,000 or more 43% % 1,000-4,999 23% 5,000-9,999 18% Figure 14. Distribution of respondents by size of total organization Mainframe organization profile Most sizes of mainframe IT organizations were evenly represented in the survey (see Figure 15). The largest percentage of respondents (34 percent) came from IT organizations with mainframe employees, followed equally by IT organizations with 1,000 or more mainframe employees (23 percent) and organizations with fewer than 50 mainframe employees (23 percent). Respondents by mainframe organization size (entire group) Less than 50 23% 1,000 or more 23% % % % Figure 15. Distribution of respondents by size of mainframe organization 18 Survey methodology and profiles

19 Survey data showed that 51 percent of respondents in 2012 are now using CICS Transaction Server release 4.x, up significantly from 30 percent in This year s survey also showed that 40 percent of respondents are still using CICS Transaction Server release 3.x, which is significantly down from 63 percent just last year. Respondents by CICS release (entire group) Other CICS version 9% CICS Transaction Server 4.x 51% CICS Transaction Server 3.x 40% Figure 16. Distribution of respondents by CICS release Job function profile Respondents represented a variety of architecture responsibilities across a range of systems and applications roles. Respondents by job function (entire group) Other with architecture responsibility 4% IT or enterprise architect 21% Systems/infrastructure architect 42% Application architect 33% Figure 17. Distribution of respondents by job function CICS insights from IT professionals revealed 19

20 About H&W Headquartered in Boise, Idaho, H&W has been a leading provider of quality software solutions since H&W creates reliable, technically sound solutions like SYSB-II that provide long-term value. Today, corporations worldwide, including many Global 500 companies, trust H&W for their IT software and services needs. Call or visit North Meeker Pl., Ste. 100 Boise, ID by H&W Computer Systems, Inc. All rights reserved 20

Concurrent VSAM access for batch and CICS: A white paper series

Concurrent VSAM access for batch and CICS: A white paper series Concurrent VSAM access for batch and CICS: A white paper series Overview: Conventional and current alternatives A white paper from: IBM and CICS are trademarks or registered trademarks of International

More information

Concurrent VSAM access for batch and CICS

Concurrent VSAM access for batch and CICS Concurrent VSAM access for batch and CICS Transparent VSAM file sharing A white paper from: Finding a better way to solve batch issues: concurrent VSAM file sharing When batch processes cause CICS applications

More information

Concurrent VSAM access for batch and CICS: A white paper series

Concurrent VSAM access for batch and CICS: A white paper series Concurrent VSAM access for batch and CICS: A white paper series Transparent VSAM file sharing via CICS and batch A white paper from: Finding a better way to solve batch issues: concurrent VSAM file sharing

More information

Tripwire State of Container Security Report

Tripwire State of Container Security Report RESEARCH Tripwire State of Container Security Report January 2019 FOUNDATIONAL CONTROLS FOR SECURITY, COMPLIANCE & IT OPERATIONS As DevOps continues to drive increased use of containers, security teams

More information

DDN Annual High Performance Computing Trends Survey Reveals Rising Deployment of Flash Tiers & Private/Hybrid Clouds vs.

DDN Annual High Performance Computing Trends Survey Reveals Rising Deployment of Flash Tiers & Private/Hybrid Clouds vs. DDN Annual High Performance Computing Trends Survey Reveals Rising Deployment of Flash Tiers & Private/Hybrid Clouds vs. Public for HPC HPC End Users Cite Mixed I/O as the Most Difficult Performance Challenge

More information

Concurrent VSAM access for batch and CICS: A white paper series

Concurrent VSAM access for batch and CICS: A white paper series Concurrent VSAM access for batch and CICS: A white paper series VSAM Record-Level Sharing (RLS) A white paper from: IBM, CICS, Db2, and z/os are trademarks or registered trademarks of International Business

More information

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation

More information

The power management skills gap

The power management skills gap The power management skills gap Do you have the knowledge and expertise to keep energy flowing around your datacentre environment? A recent survey by Freeform Dynamics of 320 senior data centre professionals

More information

The future of UC&C on mobile

The future of UC&C on mobile SURVEY REPORT The future of UC&C on mobile Published by 2018 Introduction The future of UC&C on mobile report gives us insight into how operators and manufacturers around the world rate their unified communication

More information

State of SMB IT 1H 2012

State of SMB IT 1H 2012 TM Voice of IT State of SMB IT 1H 2012 Semi-Annual Report On Small And Medium Business Technology Plans & Purchase Intent Spiceworks Inc., 7300 FM 2222, Bldg 3, Ste 100, Austin, TX 78730 Tel: 1-512-628-8280

More information

2017 Windows 10 Enterprise Impact Survey Windows 10 Enterprise Impact Survey

2017 Windows 10 Enterprise Impact Survey Windows 10 Enterprise Impact Survey 2017 Windows 10 Enterprise Impact Survey 2017 Windows 10 Enterprise Impact Survey 2017 Windows 10 Enterprise Impact Survey Executive Summary This report illuminates IT trends and other key findings uncovered

More information

DaaS Market Report Workspace Services and Desktops-as-a-Service Global Market Trends: The Service Provider Perspective

DaaS Market Report Workspace Services and Desktops-as-a-Service Global Market Trends: The Service Provider Perspective DaaS Market Report 2017 2017 Workspace Services and Desktops-as-a-Service Global Market Trends: The Service Provider Perspective Survey shows jump in traditional Value Added Resellers (VARs) embracing

More information

Databases and ERP Selection: Oracle vs SQL Server

Databases and ERP Selection: Oracle vs SQL Server DATABASES AND ERP ORACLE VS SQL SELECTION: SERVER Databases and ERP Selection: Oracle vs SQL Server By Rick Veague, Chief Technology Officer, IFS North America An enterprise application like enterprise

More information

Building a Threat Intelligence Program

Building a Threat Intelligence Program WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351

More information

Marketing Performance in Executive perspective on the strategy and effectiveness of marketing

Marketing Performance in Executive perspective on the strategy and effectiveness of  marketing Executive perspective on the strategy and effectiveness of email marketing Table of Contents Introduction 2 The state of email marketing performance 3 Successfully achieving objectives 4 Most important

More information

Good Technology State of BYOD Report

Good Technology State of BYOD Report Good Technology State of BYOD Report New data finds Finance and Healthcare industries dominate BYOD picture and that users are willing to pay device and service plan costs if they can use their own devices

More information

2018 Database DevOps Survey DBmaestro 1

2018 Database DevOps Survey DBmaestro 1 2018 Database DevOps Survey 2017 DBmaestro 1 Table of Contents Executive Summary... 3 What Percentage of IT Projects in Your Company Use a DevOps Approach?... 4 Integration of DBAs with DevOps Teams...

More information

2017 Site Selectors Guild State of Site Selection Trend Survey Report

2017 Site Selectors Guild State of Site Selection Trend Survey Report 2017 Site Selectors Guild State of Site Selection Trend Survey Report December 2017 www.siteselectorsguild.com The Site Selectors Guild is the world s largest association of business location experts.

More information

The data quality trends report

The data quality trends report Report The 2015 email data quality trends report How organizations today are managing and using email Table of contents: Summary...1 Research methodology...1 Key findings...2 Email collection and database

More information

As Enterprise Mobility Usage Escalates, So Does Security Risk

As Enterprise Mobility Usage Escalates, So Does Security Risk YOUR SECURITY. CONNECTED WHITE PAPER As Enterprise Mobility Usage Escalates, So Does Security Risk Even as more organizations embrace the use of mobile devices by employees and customers to access services

More information

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Cloud Computing January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Purpose and Methodology Survey Sample Field Work December 20, 2011 January 9, 2012 Total Respondents 554 Margin of Error +/- 4.2%

More information

These Are the Top Languages for Enterprise Application Development

These Are the Top Languages for Enterprise Application Development These Are the Top Languages for Enterprise Application Development And What That Means for Business August 2018 Enterprises are now free to deploy a polyglot programming language strategy thanks to a decrease

More information

The Case for Virtualizing Your Oracle Database Deployment

The Case for Virtualizing Your Oracle Database Deployment June 2012 The Case for Virtualizing Your Oracle Database Deployment Much has been written about the benefits of virtualization over the last few years. Hypervisor software promises to revolutionize the

More information

6th Annual 15miles/Neustar Localeze Local Search Usage Study Conducted by comscore

6th Annual 15miles/Neustar Localeze Local Search Usage Study Conducted by comscore 6th Annual 15miles/Neustar Localeze Local Search Usage Study Conducted by comscore Consumers are adopting mobile devices of all types at a blistering pace. The demand for information on the go is higher

More information

THE STATE OF IT TRANSFORMATION FOR RETAIL

THE STATE OF IT TRANSFORMATION FOR RETAIL THE STATE OF IT TRANSFORMATION FOR RETAIL An Analysis by Dell EMC and VMware Dell EMC and VMware are helping IT groups at retail organizations transform to business-focused service providers. The State

More information

RightScale 2018 State of the Cloud Report DATA TO NAVIGATE YOUR MULTI-CLOUD STRATEGY

RightScale 2018 State of the Cloud Report DATA TO NAVIGATE YOUR MULTI-CLOUD STRATEGY RightScale 2018 State of the Cloud Report DATA TO NAVIGATE YOUR MULTI-CLOUD STRATEGY RightScale 2018 State of the Cloud Report As Public and Private Cloud Grow, Organizations Focus on Governing Costs Executive

More information

THE STATE OF CLOUD & DATA PROTECTION 2018

THE STATE OF CLOUD & DATA PROTECTION 2018 THE STATE OF CLOUD & DATA PROTECTION 2018 Survey Results: 10 Findings on how over 800 IT Pros handle Disaster Recovery & Cloud Adoption. INTRODUCTION The Unitrends 2018 annual survey of IT professionals

More information

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: June 2013 Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information can be easily transported and lost, while the

More information

2016 COOLING THE EDGE SURVEY. Conducted by Vertiv Publication Date: August 30, 2016

2016 COOLING THE EDGE SURVEY. Conducted by Vertiv Publication Date: August 30, 2016 2016 COOLING THE EDGE SURVEY Conducted by Vertiv Publication Date: August 30, 2016 TWO STAGE POWER DISTRIBUTION Table of Contents Section I: Methodology Section II: Key Findings 1. Strategic Importance

More information

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use

More information

AUSTRALIA Building Digital Trust with Australian Healthcare Consumers

AUSTRALIA Building Digital Trust with Australian Healthcare Consumers AUSTRALIA Building Digital Trust with Australian Healthcare Consumers Accenture 2017 Consumer Survey on Healthcare Cybersecurity and Digital Trust 2 Consumers in Australia trust healthcare organisations

More information

2018 Mobile Security Report

2018 Mobile Security Report 2018 Mobile Security Report CONTENTS Introduction 3 Businesses suspect their mobile workers are being hacked 4 Cafés, airports and hotels: a hotspot for Wi-Fi related security incidents 5 BYOD: Bring Your

More information

Enabling the Always-On Enterprise

Enabling the Always-On Enterprise Enabling the Always-On Enterprise Ensure zero downtime and prevent data loss with the right backup and recovery solutions. The IT Solution Experts table of contents Introduction 3 Data, Data Everywhere

More information

STREAMLINING THE DELIVERY, PROTECTION AND MANAGEMENT OF VIRTUAL DESKTOPS. VMware Workstation and Fusion. A White Paper for IT Professionals

STREAMLINING THE DELIVERY, PROTECTION AND MANAGEMENT OF VIRTUAL DESKTOPS. VMware Workstation and Fusion. A White Paper for IT Professionals WHITE PAPER NOVEMBER 2016 STREAMLINING THE DELIVERY, PROTECTION AND MANAGEMENT OF VIRTUAL DESKTOPS VMware Workstation and Fusion A White Paper for IT Professionals Table of Contents Overview 3 The Changing

More information

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY Perspectives from U.S. and ese IT Professionals Executive Summary The use of artificial intelligence (AI) and machine learning (ML) in cybersecurity

More information

TRANSACTIONAL BENCHMARK

TRANSACTIONAL  BENCHMARK TRANSACTIONAL EMAIL BENCHMARK REPORT 2018 Transactional Email: Essential to the Cloud Economy Email Is Vital to Modern Apps and Services Email is part of daily life that most of us take for granted. Email

More information

GLOBAL ENCRYPTION TRENDS STUDY

GLOBAL ENCRYPTION TRENDS STUDY GLOBAL ENCRYPTION TRENDS STUDY April 2017 EXECUTIVE SUMMARY EXECUTIVE SUMMARY Ponemon Institute is pleased to present the findings of the 2017 Global Encryption Trends Study, sponsored by Thales e-security.

More information

Up in the Air: The state of cloud adoption in local government in 2016

Up in the Air: The state of cloud adoption in local government in 2016 Up in the Air: The state of cloud adoption in local government in 2016 Introduction When a Cloud First policy was announced by the Government Digital Service in 2013, the expectation was that from that

More information

Modern Compute Is The Foundation For Your IT Transformation

Modern Compute Is The Foundation For Your IT Transformation A Forrester Consulting Thought Leadership Paper Commissioned By Dell EMC And Intel February 2018 Modern Compute Is The Foundation For Your IT Transformation Failure To Update Can Stunt Your Growth Table

More information

5G Readiness Survey 2017

5G Readiness Survey 2017 5G Readiness Survey 2017 An assessment of operators progress on the road to 5G 1 5G READINESS SURVEY 2017: AN ASSESSMENT OF OPERATORS PROGRESS ON THE ROAD TO 5G Are Operators Ready for 5G? 5G next-generation

More information

TREND REPORT. Ethernet, MPLS and SD-WAN: What Decision Makers Really Think

TREND REPORT. Ethernet, MPLS and SD-WAN: What Decision Makers Really Think TREND REPORT Ethernet, MPLS and SD-WAN: What Decision Makers Really Think TABLE OF CONTENTS Introduction 3 CH. 1 What IT Pros Think of Ethernet 4 CH. 2 What IT Pros Think of MPLS 8 CH. 3 What IT Pros Think

More information

TREND REPORT. Hosted VoIP: What IT Decision-Makers Really Think

TREND REPORT. Hosted VoIP: What IT Decision-Makers Really Think TREND REPORT Hosted VoIP: What IT Decision-Makers Really Think TABLE OF CONTENTS Introduction 3 What IT Pros Think of Hosted VoIP Today CH. 1 4 And What They Expect Tomorrow Exploring the Biggest Drivers,

More information

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES TABLE OF CONTENTS 3 Introduction 4 Survey Findings 4 Recent Breaches Span a Broad Spectrum 4 Site Downtime and Enterprise

More information

IT Optimization Trends. Summary Results January 2018

IT Optimization Trends. Summary Results January 2018 IT Optimization Trends Survey Summary Between October 2017 and January 2018, Gatepoint Research invited selected executives to participate in a survey themed IT Optimization Trends. Candidates were invited

More information

Midsize Business Voice Service Spending Steady for 2003

Midsize Business Voice Service Spending Steady for 2003 End-User Analysis Midsize Business Voice Service Spending Steady for 23 Abstract: Telecom service providers need to know the voice telecom spending plans of the margin-rich midsize business segment in

More information

Cloud Foundry User Survey

Cloud Foundry User Survey Cloud Foundry User Survey Semi-annual snapshot of Cloud Foundry users deployments and productivity April 2018 Introduction Cloud Foundry is the prevailing open source cloud application platform used by

More information

TESTING TRENDS IN 2015: A SURVEY OF SOFTWARE PROFESSIONALS

TESTING TRENDS IN 2015: A SURVEY OF SOFTWARE PROFESSIONALS WHITE PAPER TESTING TRENDS IN 2015: A SURVEY OF SOFTWARE PROFESSIONALS Today s online environments have created a dramatic new set of challenges for the software professionals responsible for the quality

More information

Abstract: Data Protection Cloud Strategies

Abstract: Data Protection Cloud Strategies Enterprise Strategy Group Getting to the bigger truth. Research Report Abstract: Data Protection Cloud Strategies Considerations for Organizations Seeking to Utilize Cloud Services as Part of Their Data

More information

Why Enterprises Need to Optimize Their Data Centers

Why Enterprises Need to Optimize Their Data Centers White Paper Why Enterprises Need to Optimize Their Data Centers Introduction IT executives have always faced challenges when it comes to delivering the IT services needed to support changing business goals

More information

Trends in Next Generation Data Center Infrastructure. Summary Results January 2018

Trends in Next Generation Data Center Infrastructure. Summary Results January 2018 Trends in Next Generation Data Center Infrastructure Survey Summary Between October 2017 and January 2018 Gatepoint Research invited selected executives to participate in a survey themed Trends in Next

More information

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses Survey Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses BY: TIM MATTHEWS 2016, Imperva, Inc. All rights reserved. Imperva and the Imperva logo are trademarks of Imperva, Inc. Contents

More information

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN Improving Data Governance in Your Organization Faire Co Regional Manger, Information Management Software, ASEAN Topics The Innovation Imperative and Innovating with Information What Is Data Governance?

More information

ACHIEVING FIFTH GENERATION CYBER SECURITY

ACHIEVING FIFTH GENERATION CYBER SECURITY ACHIEVING FIFTH GENERATION CYBER SECURITY A Survey Research Report of IT and Security Professionals MARCH 2018 INTRODUCTION The pursuit of the highest level of cyber security is a top priority for IT and

More information

Measuring Critical Communications Effectiveness: An Analysis of Private Sector Broadcast Confirmation Data

Measuring Critical Communications Effectiveness: An Analysis of Private Sector Broadcast Confirmation Data Measuring Critical Communications Effectiveness: An Analysis of Private Sector Broadcast Confirmation Data Executive Summary Successful crisis management depends on an organization s ability to manage

More information

Overview Guide. Mainframe Connect 15.0

Overview Guide. Mainframe Connect 15.0 Overview Guide Mainframe Connect 15.0 DOCUMENT ID: DC37572-01-1500-01 LAST REVISED: August 2007 Copyright 1991-2007 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software and

More information

End to End Analysis on System z IBM Transaction Analysis Workbench for z/os. James Martin IBM Tools Product SME August 10, 2015

End to End Analysis on System z IBM Transaction Analysis Workbench for z/os. James Martin IBM Tools Product SME August 10, 2015 End to End Analysis on System z IBM Transaction Analysis Workbench for z/os James Martin IBM Tools Product SME August 10, 2015 Please note IBM s statements regarding its plans, directions, and intent are

More information

2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION

2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION 2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION 2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION The annual Jamf Trends Survey looked at Apple in higher education evaluating growth, key drivers

More information

270 Total Nodes. 15 Nodes Down 2018 CONTAINER ADOPTION SURVEY. Clusters Running. AWS: us-east-1a 23 nodes. AWS: us-west-1a 62 nodes

270 Total Nodes. 15 Nodes Down 2018 CONTAINER ADOPTION SURVEY. Clusters Running. AWS: us-east-1a 23 nodes. AWS: us-west-1a 62 nodes AWS: us-east-1a 23 nodes AWS: us-west-1a 62 nodes 20 Clusters Running 2018 CONTAINER ADOPTION SURVEY 6 lumes 270 Total Nodes 15 Nodes Down EXECUTIVE SUMMARY It s clear to most industry watchers that containers

More information

34% DOING MORE WITH LESS How Red Hat Enterprise Linux shrinks total cost of ownership (TCO) compared to Windows. I n a study measuring

34% DOING MORE WITH LESS How Red Hat Enterprise Linux shrinks total cost of ownership (TCO) compared to Windows. I n a study measuring WHITEPAPER DOING MORE WITH LESS How shrinks total cost of ownership (TCO) compared to Windows I n a study measuring the TCO of Windows and servers, Red Hat Enterprise platforms exhibited 34% lower annual

More information

Mobile App Development Market Research Report- Global Forecast to 2022

Mobile App Development Market Research Report- Global Forecast to 2022 Report Information More information from: https://www.marketresearchfuture.com/reports/1752 Mobile App Development Market Research Report- Global Forecast to 2022 Report / Search Code: MRFR/ICT/1220-HCRR

More information

Converged Infrastructure Matures And Proves Its Value

Converged Infrastructure Matures And Proves Its Value A Custom Technology Adoption Profile Commissioned By Hewlett-Packard May 2013 Introduction Converged infrastructure (CI) solutions have been widely adopted by a range of enterprises, and they offer significant

More information

List Strategy. Optimizing Marketing Performance in Ascend2 research conducted in partnership with Return Path. returnpath.

List Strategy. Optimizing Marketing Performance in Ascend2 research conducted in partnership with Return Path. returnpath. Email List Strategy Optimizing Marketing Performance in 2016 1 Ascend2 research conducted in partnership with Return Path Table of contents Introduction 3 List quality is a priority for marketers 4 Email

More information

China: User Perceptions and Plans for PCs and PDAs in 2003

China: User Perceptions and Plans for PCs and PDAs in 2003 End-User Analysis China: User Perceptions and Plans for PCs and PDAs in 2003 Abstract: The majority of the Chinese organizations' IT strategies and budget planning issues remain immature. It would not

More information

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS Introduction The world of cybersecurity is changing. As all aspects of our lives become increasingly connected, businesses have made

More information

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight ESG Lab Review InterSystems Data Platform: A Unified, Efficient Data Platform for Fast Business Insight Date: April 218 Author: Kerry Dolan, Senior IT Validation Analyst Abstract Enterprise Strategy Group

More information

Healthcare mobility: selecting the right device for better patient care

Healthcare mobility: selecting the right device for better patient care Healthcare mobility: selecting the right device for better patient care How Fujitsu Mobile Solutions help accelerate digital transformation with human-centric innovation* Fujitsu Thought Leadership Report

More information

State of the Cyber Training Market January 2018

State of the Cyber Training Market January 2018 State of the Cyber Training Market January 2018 2018 by CYBERBIT 2018 by CYBERBIT Proprietary CYBERBIT Proprietary Cybersecurity Market Worth 202.36 Billion USD by 2021 Marketandmarkets analysis, 2017

More information

2013 Cloud Computing Outlook: Private Cloud Expected to Grow at Twice the Rate of Public Cloud

2013 Cloud Computing Outlook: Private Cloud Expected to Grow at Twice the Rate of Public Cloud Private Cloud Expected to Grow at Twice the Rate of Public Cloud In This Paper Security, privacy concerns about the cloud remain SaaS is the most popular cloud service model in use today Microsoft, Google

More information

SDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS

SDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS January 2018 Sponsored by Introduction 302 network professionals and IT strategists completed a global survey on Software Defined Networks (SDNs) to gather hard data on SDN adoption and operational challenges.

More information

Backup and Recovery Trends: How Businesses Are Benefiting from Data Protector

Backup and Recovery Trends: How Businesses Are Benefiting from Data Protector White Paper Business Continuity Backup and Recovery Trends: How Businesses Are Benefiting from Data Protector Survey of worldwide backup software customer base conducted through TechValidate Table of Contents

More information

June 2017 intel.com schneider-electric.com

June 2017 intel.com schneider-electric.com DCIM Solution Deployment June 2017 intel.com schneider-electric.com DCIM Solution Deployment Introduction Current state of data center management Do you currently have a solution deployed? 20% 80% The

More information

TRUSTED MOBILITY INDEX

TRUSTED MOBILITY INDEX TRUSTED MOBILITY INDEX Published May 2012 A GLOBAL STUDY INDEXING CONSUMER CONFIDENCE IN MOBILITY The mobile ecosystem of devices, services and networks is at a critical inflection point. While the mobile

More information

2017 RIMS CYBER SURVEY

2017 RIMS CYBER SURVEY 2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the

More information

IBM s Integrated Data Management Solutions for the DBA

IBM s Integrated Data Management Solutions for the DBA Information Management IBM s Integrated Data Management Solutions for the DBA Stop Stressing and Start Automating! Agenda Daily Woes: Trials and tribulations of the DBA Business Challenges: Beyond the

More information

GLOBAL PKI TRENDS STUDY

GLOBAL PKI TRENDS STUDY 2018 GLOBAL PKI TRENDS STUDY Sponsored by Thales esecurity Independently conducted by Ponemon Institute LLC SEPTEMBER 2018 EXECUTIVE SUMMARY #2018GlobalPKI Mi Ponemon Institute is pleased to present the

More information

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day

More information

Concurrent VSAM access for batch and CICS: A white paper series

Concurrent VSAM access for batch and CICS: A white paper series Concurrent VSAM access for batch and CICS: A white paper series Transactional VSAM (DFSMStvs) A white paper from: IBM, CICS, Db2, and z/os are trademarks or registered trademarks of International Business

More information

2017 Essentials Brief: Cloud

2017 Essentials Brief: Cloud 2017 Essentials Brief: Cloud www.himssanalytics.com Enabling better health through information technology. Healthcare Information and Management Systems Society (HIMSS) HIMSS is a global, cause-based,

More information

HyTrust government cloud adoption survey

HyTrust government cloud adoption survey HyTrust government cloud adoption survey Security a top concern with hesitancy to relinquish control of data White Paper HyTrust government cloud adoption survey Security a top concern with hesitancy to

More information

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Featuring Sophia Vargas, Forrester Research Inc. 30 May 2014 Introducing today s presenters: Matt Miszewski Senior Vice President of Sales

More information

Unlock The Value Of Cloud: A Spotlight On IT Executives

Unlock The Value Of Cloud: A Spotlight On IT Executives A Forrester Consulting Thought Leadership Paper Commissioned By Intel November 2017 Unlock The Value Of Cloud: A Spotlight On IT Executives How To Expand Your Hybrid Cloud With Consistency, High Performance,

More information

Hardware Decisions for Embedded Systems Design in Asia/Pacific

Hardware Decisions for Embedded Systems Design in Asia/Pacific End-User Analysis Hardware Decisions for Embedded Systems Design in Asia/Pacific Abstract: Over 900 embedded systems designers in Asia/Pacific responded to our survey of hardware decisions. Currently,

More information

CYBERSECURITY AND THE MIDDLE MARKET

CYBERSECURITY AND THE MIDDLE MARKET CYBERSECURITY AND THE MIDDLE MARKET The Importance of Cybersecurity and How Middle Market Companies Manage Cyber Risks IN COLLABORATION WITH 2 Concerns about cybersecurity are not matched by plans. IMPORTANCE

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security

More information

Evolution of IT in the Finance Industry. Europe

Evolution of IT in the Finance Industry. Europe 2011 Evolution of IT in the Finance Industry Europe CONTENTS Evolution of IT in the Finance Industry... 4 Methodology... 6 Focus... 8 Finding 1: Finance Industry Has Mature View on IT Trends...10 Finding

More information

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee

More information

Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future

Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future Solid state storage is ready for prime time, or so the latest awareness and usage statistics would indicate. Moreover, a recent

More information

MOVING MISSION IT SERVICES TO THE CLOUD

MOVING MISSION IT SERVICES TO THE CLOUD MOVING MISSION IT SERVICES TO THE CLOUD About half of civilian agency IT officials report they are now implementing mission support and business systems in the cloud. But a new progress report also highlights

More information

US Consumer Device Preference Report

US Consumer Device Preference Report ANDROID WINDOWS PHONE ANDROID TABLET OTHER MOBILE IPHONE IPAD US Consumer Device Preference Report Q1 2015: Smartphone Conversions Are Finally Here But Where are the Android Users? 45.8 43.2 39.6 39.6

More information

Business Resiliency Strategies for the Cloud. Summary Results September 2017

Business Resiliency Strategies for the Cloud. Summary Results September 2017 Business Resiliency Strategies for the Cloud Survey Summary Between May and September, 2017, Gatepoint Research invited selected executives to participate in a survey themed Business Resiliency Strategies

More information

STATE OF THE NETWORK STUDY

STATE OF THE NETWORK STUDY 10TH ANNUAL STUDY 2017 1 EXECUTIVE SUMMARY The Tenth Annual State of the Network Global Study focuses a lens on the network team s role in security investigations. Results indicate that 88 percent of network

More information

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more - Samsung Tablet Photo - Tablets Mean Business Survey of IT pros reflects growing trend toward tablets for workforce mobility and more Table of contents Introduction 2 Giving employees what they want pays

More information

Web Services Take Root in Banks and With Asset Managers

Web Services Take Root in Banks and With Asset Managers Strategic Planning, M. Knox, W. Andrews, C. Abrams Research Note 18 December 2003 Web Services Take Root in Banks and With Asset Managers Financial-services providers' early Web services implementations

More information

PERCEPTION OF IRELAND AS A DIGITAL ASSET HOSTING LOCATION Surveys Conducted by Host in Ireland

PERCEPTION OF IRELAND AS A DIGITAL ASSET HOSTING LOCATION Surveys Conducted by Host in Ireland JULY- SEPT 2014 PERCEPTION OF IRELAND AS A DIGITAL ASSET HOSTING LOCATION Surveys Conducted by Host in Ireland www.hostinireland.com Table of Contents 3 Executive Summary 3-7 SURVEY: Strategic Opportunities

More information

IBM Data Virtualization Manager in Detail + Demo Atlanta DB2 User Group Meeting December 7, 2018

IBM Data Virtualization Manager in Detail + Demo Atlanta DB2 User Group Meeting December 7, 2018 IBM Data Virtualization Manager in Detail + Demo Atlanta DB2 User Group Meeting December 7, 2018 Milan Babiak Client Technical Professional, Analytics on Z Systems North America IBM Canada Milan.Babiak@ca.ibm.com

More information

Operationalize Security To Secure Your Data Perimeter

Operationalize Security To Secure Your Data Perimeter Operationalize Security To Secure Your Data Perimeter GET STARTED Protecting Your Data Without Sacrificing Business Agility Every day, companies generate mountains of data that are critical to their business.

More information

Pay-TV services worldwide: trends and forecasts PAY-TV SERVICES WORLDWIDE: TRENDS AND FORECASTS

Pay-TV services worldwide: trends and forecasts PAY-TV SERVICES WORLDWIDE: TRENDS AND FORECASTS RESEARCH FORECAST REPORT PAY-TV SERVICES WORLDWIDE: TRENDS AND FORECASTS 2017 2022 MARTIN SCOTT and ROMAN ORVISKY Analysys Mason Limited 2018 About this report This report provides: forecasts for the number

More information

` 2017 CloudEndure 1

` 2017 CloudEndure 1 ` 2017 CloudEndure 1 Table of Contents Executive Summary... 3 Production Machines in the Organization... 4 Production Machines Using Disaster Recovery... 5 Workloads Primarily Covered by Disaster Recovery...

More information

THE CYBERSECURITY LITERACY CONFIDENCE GAP

THE CYBERSECURITY LITERACY CONFIDENCE GAP CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks

More information

2013, Healthcare Intelligence Network

2013, Healthcare Intelligence Network Note: This is an authorized excerpt from 2013 Healthcare Benchmarks: Mobile Health. To download the entire report, go to http://store.hin.com/product.asp?itemid=4586 or call 888-446-3530. 2013, Healthcare

More information