All Research

Trump vs. Xi: Causes and Outcomes in the US/China Era

In this week's discussion, we'll look at the relationship between China and the US and their leaders through four lenses: the current landscape facing them both, causes...

Blockchain: Foundational Technology of the Future

This research note covers the rising level of interest and investment in the blockchain technology space and the reasons blockchain may surpass “disruption” and actually...

Continuous Improvement May Not Be Good Enough

The idea of continuous improvement in application enhancement, rather than the periodic deployment of major changes, is gaining much support. This is a particularly...

BCP Business Process Workarounds and Recovery Checklists

A template BCP playbook with workarounds, checklists, and response procedures to support the high-level BCP recovery workflow.

Cyber Insurance for Healthcare – Ensuring Your Parachute Is Packed Properly

Cybersecurity is a complex and rapidly evolving industry for which insurance providers often have poor powers of prediction. The following considerations and...

Succeed With Digital Strategy Execution

The devil is in the details: ensure you have a strong roadmap of enabling applications and technologies to support the enterprise digital strategy once it has been created.
  • guided implementation icon

Architect Your Big Data Environment

Ever since the term “big data” was coined in 1997, organizations have had difficulty successfully creating the costly infrastructure and managing the large volumes of...
  • guided implementation icon

Asia Letter, Q4 2017: North Korea in the News, South Korea in a Bind

In this issue of the Asia Letter, Scott Foster again delivers what he seems best at: a pragmatic, smart, and surprising view of Asian plans and interests you will not...

Information Security Pressure Analysis Tool

Use the Information Security Pressure Analysis Tool to assess the security risks your organization faces, evaluate stakeholder attitudes to information security, and...

Terminator Versus Iron Man: Showdown of Security Products

Trends in security products supporting humans rather than replacing them.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us