Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

InformationWeek

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.

Headquarters: 2 Penn Plaza, 15th Floor, New York, NY, 10121 United States
Our Website: http://www.informationweek.com


Latest Content From InformationWeek

Research Report: InformationWeek Special Issue: February 2013

by InformationWeekFeb 20, 2013

Disaster Recovery Roadblocks: Don't let data, WAN and integration challenges get in the way of automated failover.
Why Automation's A Good Thing: The conventional wisdom is wrong. It's smart, affordable and good for IT.
Data Points: Find out more from our recent State of Storage Survey.


Research Report: Informed CIO: Identity Management

by InformationWeekJun 01, 2009

Identity Management: 10 Questions to Ask

In today’s global business operating environments, where organizational and geographical boundaries are crossed hundreds of times a day to get the job done, there’s a critical need for standardized identity management. CIOs should keep an eye on government and private-sector federation initiatives—including the GSA’s E-Authentication program, the Liberty Alliance Identity Assurance Framework (LIAF) and the Transglobal Secure Collaboration Program (TSCP)—that will eventually have a direct impact on enterprise networks and business operations, especially within companies looking to do business with government entities. The TSCP specifically focuses on government strategic roadmaps to ensure consistent aerospace and defense contractor interpretation of requirements, implementation timelines, compliance targets and other factors.

On the tools side, hundreds of companies want your IdM business. On one end of the spectrum are large vendors like CA and IBM that offer multiple modules to cover many IdM needs. Buying best-of-breed products from smaller players and relying on internal staff and consultants to make everything work together is another method that may gain more adherents as the abovementioned standards progress. Comprehensive IdM is major undertaking, but companies can start small, perhaps with a technology popular with end users—single sign-on comes to mind-—to get business buy-in. Meanwhile, do a risk assessment and start cleaning up directories and laying the groundwork to integrate the elements of IdM: Authentication, authorization and access control, user provisioning/deprovisioning, role mapping, and auditing and reporting. Prioritize projects based on risks that can be addressed quickly and provide a visible benefit to the business. Here are some questions to consider. (C080509)


Research Report: Informed CIO: Storage Automation

by InformationWeekAug 01, 2009

Storage Automation: 8 Questions to Ask Before Buying

Implementing automation tools and processes requires an upfront investment in funding, planning and integrity testing. But the business will reap benefits both immediately and as the footprint and complexity of storage services increase. Operationally, data protection activities, such as snapping clones and replication pairs, can often be readily automated and pay instant dividends by enhancing recoverability in the event of a data loss or corruption event. For instance, a clone of an Oracle database can be taken after a batch cycle has been completed and the database is quiesced or in hot-backup mode. Once the database is in a “backup ready” state, the automation task can be performed to create a clone of the data on a storage array. When completed, the database is restarted and resumes transaction processing. The clone can then be used to back up the Oracle database, or just as insurance against loss. The best thing is, all of this activity can be performed without human intervention and at any time of the day or night.

Not all storage tasks can be easily encapsulated and automated, of course. Activities such as provisioning and configuration, for example, require some degree of human intervention and decision-making. But by developing and documenting mature policies and procedures for storage functions that don’t require staff to be hands-on, and then seeking tools that can automate these processes reliably and consistently, CIOs can not only reduce costs but improve service execution and insulate the critical storage function against risk. (C110709)


Research Report: Research: Choosing a Smartphone

by InformationWeekNov 30, 2008

The Smartphone To Own

The enterprise smartphone is no longer simply a compact, mobile e-mail device slash
fashion item; it’s quickly becoming an essential tool for corporate applications, collaboration, and personal media, in many cases eclipsing the laptop as the device of choice for mobile professionals.

To help enterprise IT groups balance their requirements and future mobility plans with demands from employees wowed by flashy new features, InformationWeek Analytics surveyed 688 business technology professionals to get a sense of current enterprise requirements and plans for smartphone deployments.We also sent a request for information to the seven leading manufacturers of enterprise-class smartphones; Apple, HTC, Motorola, Nokia, Palm, Research in Motion, and Samsung. Five of the vendors—HTC, Motorola, Nokia, Palm, and Samsung—responded; information on devices from Apple and RIM was compiled from company Web sites, press reports, and other sources.

Comments from survey respondents indicate concerns around security, complexity, and the pressure to support consumer-class devices. “I find that security of data and transmissions from/to mobile devices is still not discussed or understood widely enough.This poses dangers for rolling them out more broadly,” says one poll respondent. Another adds, “Employees have a strong preference for 3G iPhones and the wide variety of business applications already available on the Apple App Store.”

And it’s not solely a U.S. phenomenon by any means. “The line between personal- and
company-supplied [devices] is blurring; at this point, IT only provisions these in the UK because they expect them there,” says one respondent. “We definitely do not purchase iPhones for employees as those devices can be used so extensively for personal content.”

Clearly, there is some disconnect between IT departments, the employees they support, and the device vendors selling to them.This report will examine the current requirements and future plans of enterprises, based on survey responses; provide an overview of devices currently on the market, from RFI responses and independent research; look forward to trends in enterprise smartphones for 2009; and offer advice on how IT can enable mobile users while protecting the business and its data. (381108)

Survey Name: InformationWeek Analytics Smartphone Survey
Survey Date: October 2008
Region: North America
Number of Respondents: 688


Research Report: Research: E-Mail Archiving

by InformationWeekNov 01, 2008

E-Mail Archives: Essential For Today’s Business

Every good courtroom drama shows a beleaguered attorney sifting through mountains of paper in search of a damning document that will sink the opposition's case like a depth charge.These days, that beleaguered attorney is more likely to be sitting in front of a computer screen, trying to filter terabytes of data with complex search queries.

It may be less cinematic, but it's reality.

It's also the reason so many enterprises are investigating e-mail archives.These products are essential for any organization that faces regulations, compliance mandates, and litigation … in other words, most everyone. E-mail is the prime target of information requests, whether an SEC audit, an internal investigation, or a lawsuit, so CIOs need to get their hands on relevant messages as quickly as possible. E-mail archives can help.These products capture all messages and attachments, store them on disk, and index them for administrative and end-user searches. Archives also have other benefits.They can lighten the load on production mail servers, give users virtually unlimited inboxes, and help IT properly manage retention and disposition policies.

This report analyzes responses from more than 800 business technology professionals; examines the role of e-mail archives in the enterprise; discusses on-premises vs. service-based offerings; and provides best-practice guidelines for deployment, retention/disposition of messages, and e-discovery. We also provide in-depth profiles of 35 e-mail archive products and services, including informative features tables. (271008)

Survey Name: InformationWeek Analytics E-Mail Archiving Study
Survey Date: July 2008
Region: North America
Number of Respondents: 864


Research Report: Research: Remote Application Delivery

by InformationWeekJun 01, 2009

Anywhere, Anytime: Enabling Fast Remote Application Delivery

We just dodged a tsunami of demand for remote access to desktop applications—had the H1N1 flu pandemic proved deadly on a wide scale in the United States, governments and large enterprises were set to pull the trigger on massive telework contingency plans. So what, you say? The Federal Mobility 2.0 study released by the Telework Exchange reported that 1,250,980 federal employees were eligible to telework in July 2008, with that number growing. Most, 78%, use VPNs or remote-access clients. Add in state and local government and private-sector teleworkers, and our collective application delivery system could have been a high-profile casualty.

Other trends that force servers to work harder to manage sessions, like virtualization, cloud computing, the Webification of enterprise applications and porting of business apps to smartphones, as well as the movement toward data center consolidation, are also straining our ability to deliver applications with even acceptable response times. Forget about snappy.

In our InformationWeek Analytics Application Delivery survey, we asked business technology professionals in-depth questions about their strategies to improve application performance over distance. A large majority, 89%, support multiple sites, and many are undertaking data center consolidation—reflective of trends we're seeing in the marketplace. Setting up branch and remote sites in a hub-and-spoke distribution pattern around regional data centers is good for redundancy of operations and data management, but potentially a nightmare for IT groups that must deliver Web applications, legacy client/server software, remote desktops and other tools for doing business efficiently and securely.

Can today's app delivery mechanisms help? Our survey says yes. Most organizations using application delivery techniques are satisfied and have seen real benefits in terms of better performance, lower network utilization and increased reliability with a trimmed-down total cost of ownership. Advances on the technology front help, too. One example: Integrating teleworkers into application delivery systems no longer means putting pricey appliances in home offices; many of the symmetric optimizations and local caching features once found only in hardware can now be handled via desktop software, a welcome innovation. And, respondents expect to increase their use of application delivery technologies as streaming media and remote desktops become more prevalent. (690509)

Survey Name: InformationWeek Application Delivery Survey
Survey Date: March 2009
Region: North America
Number of Respondents: 267


Research Report: .NET Apps Put to the Test

by InformationWeekJul 12, 2011

Unit testing is a popular practice in which small tests are written to quickly validate the operation of a unit of code. Typically, a project will have hundreds if not thousands of tests to validate the code.

Unit testing is an automatic tool that can catch regressions--unwanted changes in previously working code--introduced during development and refactoring. However, it won’t guarantee the quality and correctness of your software.


Research Report: "A" Is For Audit-Proof

by InformationWeekSep 01, 2008

Could you benefit from an Active Directory security compliance assurance tool? Sure, but policy comes first.


Research Report: (At Least) One Thing You Don't Know About Cloud Backup

by InformationWeekJul 03, 2013

You Don't Know the Cutting Edge of Cloud Backup

Once upon a time (say, five years ago), IT departments that sent backups to low-cost cloud file services were ahead of the curve -- mainly because the norm was shipping hard drives and tapes to fireproof safes. Since then, the number and variety of cloud backup options and features have grown significantly. If you're still using cloud backup like a remote FTP site, you're doing it wrong.

In this report, we'll debut results of our new InformationWeek Cloud Storage Survey; all respondents screened in by indicating involvement with management of storage technologies, projects or processes, so they know what they're talking about. We'll also lay out the many benefits that all-size organizations can get from cloud backup services for very little money and effort. You may not know what you're missing. (S7130713)

Survey Name   InformationWeek Cloud Storage Survey
Survey Date   May 2013
Region   North America
Number of Respondents    259
Purpose   To comprehensively assess the current state of cloud storage use in the ­enterprise


Research Report: 0%: Pay Freeze (Annual Salary Survey)

by InformationWeekMar 31, 2010

No pay raise this year.


Zero.


In 2010, for the first time in the last 11 years of InformationWeek’s annual U.S. IT Salary Survey, the median raise for IT professionals is 0%, according to the 20,492 IT pros who responded between November and January. That flat pay holds true for IT managers and staffers, for both their base salaries and total compensation, which includes bonuses. It holds true for IT consultants and contractors, too. If stock options were the sign of the economic times at the start of the last decade, the salary freeze is the symbol for the start of this one.