All Research

Automation of Skillsets in Transportation – Conceptual Framework

Automation is expected to impact the trucking industry in a number of ways, not least of which is the effect it will have on truck drivers and operators. However, the...

Special Letter: Unexpected Flows and Interactions in the Data Center of the Future

Data centers are essential to the information economy. As the demand for data centers grows, so too will the problems associated with them. In current data centers, the...

The Great Divide: Overcoming the IT-OT Conflict

Built on conflict and misalignment, the relationship issues between information technology and operational technology teams in the manufacturing industry have a long...

I Spy With My Little Eye: Cyberespionage on Critical Infrastructure

Cyberespionage on critical infrastructure has been a growing interest in the last decade. Using old tactics of spear-phishing, water-holing, and social engineering,...

&#@%-iNg_P4ssw0rds!: Password Fatigue and Government Employees

Passwords and online accounts are now a part of life, though most of us struggle to remember unique passwords for all of our accounts – a phenomenon known as “password...

The Obvious Case: Blockchain in Financial Services

Blockchain technology’s roots are in the financial sector. Now financial institutions and their customers are coming to see the value blockchains can offer them,...

Don’t Let Your Supply Chain Be Held for Ransom

Whether you sell cakes or electronics, if your strategy relies on optimizing inventory then success relies on your supply chain. But what happens when your suppliers are...

Infonomic Growth in Retail

This note explores some of the ways that we can leverage our retail data, how we should treat our most important asset, and standard models to define retail data’s worth....

Hospitality Communications Market Trends & Buyer's Guide

With 95% of Americans owning some variant of a mobile phone the question of the need for a phone in the room continues to be debated. Hospitality communications has...

Identify Opportunities to Mature the Security Architecture

Organizations require an effective security architecture in order to connect security to the business. This blueprint demonstrates Info-Tech’s approach to evaluating the...
  • guided implementation icon
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us