All Research

How to Measure Throughput and Win the Business’ Trust

The business needs IT to deliver more projects and work orders every day. Common activity and velocity-based metrics used by application development leaders do not create...

Life Without a PMP Certification: You Would Think I Offered to Practice Dentistry Without a License

It’s been a long time since I made the decision NOT to get the PMP certification. It’s been about six months since I changed my mind, went through the process, and wrote...

Agifall: The Portfolio Strikes Back

Executive decision makers are increasingly frustrated by the lack of timeline commitment coming from Agile projects. The leaders are reclaiming their ability to do their...

Prototype One Pager

Use this template to create a one-pager that summarizes your prototyping results and helps you build a budget pitch.

Puzzle Solving for Hybrid-Cloud, Multi-Cloud, and Containers in a Virtual World

With the advent of containers in the emerging technology space and accompanying market excitement, there is much confusion over how to manage applications in legacy...

Eight Recommendations to Ease the Stress of Offboarding IT Staff

Offboarding is an emotional roller coaster. Regardless of cause or reason, people will be upset. Leverage Info-Tech’s best practices and consult with HR to establish a...

How Small Enterprises Should Buy Cloud Services

Small enterprise IT has been slow to adopt cloud technologies due to security concerns. Don’t let potential risks derail your efforts to optimize, expand, and transform...

Reduce the Likelihood and Impact of a Breach in the Chemical Sector by Focusing on the End Users

While all industries are at risk of being targeted by threat actors of any kind, the chemical sector is at an increased risk due to the sensitive information they store...

Develop a Security Operations Strategy – Phases 1-3

Threat management has become resource-intensive, requiring continuous monitoring, collection, and analysis of significant volumes of event data. Implement a next-gen...

Develop a Security Operations Strategy – Phase 1: Assess Operational Requirements

Assess current prevention, detection, analysis, and response capabilities.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us