Infrastructure & Operations - Research Notes

Disaster Recovery Primary Site Restoration: Home Sweet Home

Establishing operations at the recovery site is only the first half of the work involved in disaster recovery. At some point, services and systems must be returned to...

How to Test Your DRP

Do not wait until the DRP is put into action to discover weaknesses in disaster recovery processes. Run a full test of the enterprise's DRP to uncover flaws before an...

Videoconferencing: Target Travel Cost Reductions

Geographically distributed enterprises are realizing tangible travel savings and productivity benefits following the implementation of videoconferencing systems. Learn...

India for Outsourced IT Services

IT professionals who are interested in outsourcing application development, maintenance, or helpdesk services offshore have many geographic locations to choose from....

The Philippines for Outsourced IT Services

IT professionals who are interested in outsourcing application development, maintenance, or helpdesk services offshore have many geographic locations to choose from. The...

China for Outsourced IT Services

IT professionals who are interested in outsourcing application development, maintenance, or helpdesk services offshore have a myriad of geographic locations to choose...

How to Know When to Replace Help Desk Software

Knowing when to move on from well-worn help desk software is an important turning point for IT. Keeping an underperforming solution is costing the team time and money....

Beyond Beginner Help Desk Performance Metrics

Defining help desk performance metrics can be difficult. Organizations with dedicated help desk environments must take the time to develop a performance tracking system...

Laptops: Still Getting Stolen, Still Costing Organizations

(By Info-Tech Analyst James Quin- Printed with permission from Processor magazine www.processor.com). About two and half years ago, Info-Tech authored a note entitled...

IT Security 101

IT security is often overlooked and misunderstood by enterprises. Many feel that they have nothing worth stealing and any money spent on security is a wasted investment....
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us