Gartner Incorporation

Articles about Gartner Incorporation


    Keeping costs under control

    Jul 21, 2013 IT expenditure is under more scrutiny than ever, even in sectors where cost was not traditionally an issue. But how can CIOs best manage IT budgets, accurately account for spending across the company, and keep the reins when buying decisions are increasingly shifting outside of IT


    BYOD self-support growing

    Jul 15, 2013 Enterprise driven self-support systems for BYOD users are a growing trend in the enterprise landscape in the region, but while there have been some successes, it has been within a very tightly controlled framework, according to Gartner.


    Unlocking ERP Value

    Jun 22, 2013 As resellers look to increase the value they can offer to clients and move up the value stack, they are looking more and more towards ERP software


    Fit to burst

    Jun 18, 2013 Cloud bursting will be a hot topic in the region and could hold the answer for enterprises that need extra computing capabilities at certain times of the year.


    BYOD or bust

    Jun 18, 2013 Enterprises must pull their heads out of the sand and begin to implement a BYOD policy


    One third of office and email in the cloud by 2017

    Jun 16, 2013 Gartner predicts cloud-based office productivity and email to cater to one third of enterprise users by 2017


    Data growth driving storage solutions

    Jun 16, 2013 Growing volumes of corporate data and the demands of analytics is driving development of new solutions for enterprise storage.


    Keeping ahead of innovation

    Jun 13, 2013 With the combination of several major new advances in technology opening up the possibilities for new solutions, and IT departments coming under pressure to enable business transformation.


    Petabyte potential: harnessing the data flood

    Apr 24, 2013 Companies must start treating their data as an asset rather than a burden, writes Piers Ford.


    Policing the network: who accesses what?

    Apr 22, 2013 Access controls and identity management experts look at what kinds of authentication and access controls enterprises can and should implement, how they work and how they protect the network against unauthorised intrusions.