Computing’s primary research is conducted amongst its own audience of senior IT professionals. We use a rigorous research methodology, encompassing individual depth interviews (IDIs), focus groups, and major quantitative studies: these are not 'surveys' – we test our findings with leading CIOs and industry practitioners and we are totally independent.
Our aim is to establish clear truths of how IT is changing, what is driving that change and who is making the critical decisions, so we can provide our audience with a baseline of knowledge that penetrates past vendor hype and pundit prediction.
Computing Research forms the bedrock of our conference programme: funded by our event partners, Computing Research provides analyst grade data free of charge to registered users.
As corporate data has become more mobile and more distributed it has also become significantly more difficult to secure. This difficulty has led to some incredibly high-profile raids on corporate data and the profile of data security rising to a new level among company executives and consumers alike. The Computing Data Security and Risk Management Review 2015 discusses how data security is now at the very top of the corporate agenda and why it arrived there as well as where the responsibility for security should reside. We also discuss how organisations are reaching and maintaining a balance between greater security and the flexibility necessary to retain employees, avoid the use of insecure workarounds and meet business objectives. The types of threats are discussed, as is the attitude towards outsourcing aspects of data security. The review concludes with a detailed discussion of the information security gap – what it is, why it exists and how businesses are attempting to bridge it.
Cloud services, and to a lesser extent co-location, are heading rapidly towards mainstream adoption, which is having a considerable effect on the in-house data centre. The Computing Data Centre Audit 2015 summarises the results of a comprehensive research programme undertaken during the third quarter of 2015. In it we look at the impact of cloud and colo and find that while some organisations are consolidating or reducing capacity, the majority expect spending to increase, although new skills will be required as the data centre becomes an element of a larger whole rather than the centre of operations.
The separation of development and operations in business organisations makes so little sense that one is led to wonder how it ever came about. This separation hinders communication, fosters resentment and undermines trust – all of which results in a slower software delivery across the business. The Computing DevOps Review 2015 summarises the results of a comprehensive research programme undertaken during the second quarter of 2015. It begins with a discussion of the definitions and perceptions of DevOps and the factors leading businesses to consider it. It examines the benefits of DevOps and fundamentals of a successful approach along with the difficulties faced by businesses when trying to reshape their organisations. The review concludes with a discussion of what DevOps actually looks like in reality for the organisations who are making these changes.
The drive for ever greater levels of mobility within UK enterprises is showing no signs of abating. Indeed, 2015 has seen a maturing of enterprise mobility as a greater number of businesses move past the introductory phases of mobility such as developing policies on BYOD and making decisions about platforms. As strategies mature, organisations are grappling with the nuts and bolts of integrating mobile applications with other infrastructure and building a mobile architecture that is secure and yet sufficiently agile to deal with the changing face of mobility in the years ahead. The Computing Enterprise Mobility Review 2015 looks in depth at the benefits that organisations are achieving – or hope to achieve – from increased mobility, with a focus on apps and platforms.
Big Data hype has now been firmly replaced by real case studies and usage of advanced analytics, agile storage and data centralisation. In particular, more developed real-time analytics are pushing increasing numbers of organisations to take the Big Data plunge, driven by both the prospect of speedy gains from internal efficiencies and a longer term prospect of speculative analysis of external data to potentially open up new markets and opportunities. The pace of democratisation of data analytics is increasing, with huge implications for businesses. When decision-making is truly data-driven and access to analytics is not restricted to a few personnel, everything can happen faster, making businesses more agile and efficient. Greater empowerment for a greater number of employees could be a very positive thing and potentially lead to changes in the traditional corporate hierarchies with which we are all so familiar.
The pressure on the data centre has never been greater. Exponentially increasing quantities of data need to be analysed in real time and secured from those who might have ill intent. Data also has to be stored, managed and secured in a way that satisfies industry and government regulators. The Computing Data Centre Audit 2014 summarises the results of a comprehensive research programme undertaken by Computing during the third quarter of 2014. The review contains some unique insights from highranking IT decision makers into how the data centre is coping with the escalating demands placed upon it.
Computing Research recently undertook a major research project with one clear objective: to provide a better understanding of the decision-making process for large-scale IT procurement in the UK. Of particular interest to us was the role of different IT and business decision-makers at each stage of the procurement process.
The interwoven mega-trends of the cloud, social media, big data and the rise of the smartphone and tablet have worked together to render traditional network perimeter security models ineffective. The Data Security and Risk Management Review 2014 establishes how business organisations are adapting their security strategies, taking a more targeted approach informed by maturing risk assessment processes. It looks at the trade-offs between security and performance, the changing areas of vulnerability and of the threats themselves. It investigates the most popular solutions and includes an analysis of the security partners that businesses are choosing.
Enterprise mobility is at once presenting business organisations with huge potential gains and also huge challenges. This review looks at the difficulties facing organisations as they navigate the relationship between the enablement of users and the need for data control, and discusses the policies that they are putting in place to achieve both objectives.
The market for big data processing and analytics changed significantly over the 12 months prior to the publication of this report. Awareness of the benefits has increased alongside other factors such the maturity of cloud platforms and availability of open-source big data solutions. The Computing Big Data Review 2014 summarises the results of a comprehensive research programme with the findings compared with those published 12 months earlier to discover the direction of travel.
The review contains some unique insights into the specific challenges companies face and the benefits they are reaping with enterprise mobility. It discusses how the enterprise mobility ecosystem has evolved, what it looks like today and where it may be headed. Key highlights from the research include: Attitudes to mobile working have evolved from “cautious” and “resistant to change” to “strategy driven” and “forward thinking”; Key drivers of mobility projects are efficiency, productivity and the simple desire not to be left behind as technology and expectations evolve; Organisations are tending to approach mobility projects from a viewpoint of security and control rather than enablement of the user.
The Big Data Review 2013 summarises the results of a comprehensive research programme undertaken during the first quarter of 2013. Highlights from the research include:
Big data projects are being driven largely by IT teams rather than the areas of the business standing to gain the most from them; A significant shortage of skills in big data analytics is hampering wider take up; Customer data is by far the fastest growing domain, and increasing numbers of organisations are describing their attitude to data management as “customer driven”.
Central to the success of IT sales and marketing is a need to build an intimate understanding of the target buyer: Who are they? How do they buy? What processes do they follow? What are their challenges, priorities and objectives? This review provides B2B technology sales and marketing professionals with a unique insight into how customers buy; the key drivers and influences behind IT purchasing; and the intricacies of the buying process itself. Of particular interest will be the roles of various IT and business decision-makers at each stage in the procurement process, the information and assurances they look for and the information sources they turn to.