Computing’s primary research is conducted amongst its own audience of senior IT professionals. We use a rigorous research methodology, encompassing individual depth interviews (IDIs), focus groups, and major quantitative studies: these are not 'surveys' – we test our findings with leading CIOs and industry practitioners and we are totally independent.
Our aim is to establish clear truths of how IT is changing, what is driving that change and who is making the critical decisions, so we can provide our audience with a baseline of knowledge that penetrates past vendor hype and pundit prediction.
Computing Research forms the bedrock of our conference programme: funded by our event partners, Computing Research provides analyst grade data free of charge to registered users.
The pressure on the data centre has never been greater. Exponentially increasing quantities of data need to be analysed in real time and secured from those who might have ill intent. Data also has to be stored, managed and secured in a way that satisfies industry and government regulators. The Computing Data Centre Audit 2014 summarises the results of a comprehensive research programme undertaken by Computing during the third quarter of 2014. The review contains some unique insights from highranking IT decision makers into how the data centre is coping with the escalating demands placed upon it.
Computing Research recently undertook a major research project with one clear objective: to provide a better understanding of the decision-making process for large-scale IT procurement in the UK. Of particular interest to us was the role of different IT and business decision-makers at each stage of the procurement process.
The interwoven mega-trends of the cloud, social media, big data and the rise of the smartphone and tablet have worked together to render traditional network perimeter security models ineffective. The Data Security and Risk Management Review 2014 establishes how business organisations are adapting their security strategies, taking a more targeted approach informed by maturing risk assessment processes. It looks at the trade-offs between security and performance, the changing areas of vulnerability and of the threats themselves. It investigates the most popular solutions and includes an analysis of the security partners that businesses are choosing.
Enterprise mobility is at once presenting business organisations with huge potential gains and also huge challenges. This review looks at the difficulties facing organisations as they navigate the relationship between the enablement of users and the need for data control, and discusses the policies that they are putting in place to achieve both objectives.
The market for big data processing and analytics changed significantly over the 12 months prior to the publication of this report. Awareness of the benefits has increased alongside other factors such the maturity of cloud platforms and availability of open-source big data solutions. The Computing Big Data Review 2014 summarises the results of a comprehensive research programme with the findings compared with those published 12 months earlier to discover the direction of travel.
The review contains some unique insights into the specific challenges companies face and the benefits they are reaping with enterprise mobility. It discusses how the enterprise mobility ecosystem has evolved, what it looks like today and where it may be headed. Key highlights from the research include: Attitudes to mobile working have evolved from “cautious” and “resistant to change” to “strategy driven” and “forward thinking”; Key drivers of mobility projects are efficiency, productivity and the simple desire not to be left behind as technology and expectations evolve; Organisations are tending to approach mobility projects from a viewpoint of security and control rather than enablement of the user.
The Big Data Review 2013 summarises the results of a comprehensive research programme undertaken during the first quarter of 2013. Highlights from the research include:
Big data projects are being driven largely by IT teams rather than the areas of the business standing to gain the most from them; A significant shortage of skills in big data analytics is hampering wider take up; Customer data is by far the fastest growing domain, and increasing numbers of organisations are describing their attitude to data management as “customer driven”.
Central to the success of IT sales and marketing is a need to build an intimate understanding of the target buyer: Who are they? How do they buy? What processes do they follow? What are their challenges, priorities and objectives? This review provides B2B technology sales and marketing professionals with a unique insight into how customers buy; the key drivers and influences behind IT purchasing; and the intricacies of the buying process itself. Of particular interest will be the roles of various IT and business decision-makers at each stage in the procurement process, the information and assurances they look for and the information sources they turn to.