All Research

Build a Vendor Security Assessment Service – Phase 3: Deploy and Monitor Process

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you implement the process and develop metrics to measure effectiveness.

Prepare for Cognitive Service Management – Executive Brief

Read our concise Executive Brief to find out why you should prepare for cognitive service management, review Info-Tech’s methodology, and understand how we can support you...

Prepare for Cognitive Service Management

Natural language processing and machine learning technologies have led to AI-assisted toolsets that promise dramatic IT operations improvements. Don’t fall prey to the...

Prepare for Cognitive Service Management – Storyboard

This blueprint introduces AI tools that affect IT operations, including chatbots and machine learning applications. It is useful for clients exploring these emerging...

Behind 5G

We’re about to start seeing the rollout of the first 5G wireless systems, starting with Verizon in four US markets and moving through multiple carriers worldwide over the...

IT/Cloud Demand Billing & Accounting Analyst

Use this role description template to create an Cloud Demand Billing & Accounting role for both on-premises and cloud environments.

Red Hat Customers Should Be Reeling From IBM’s Buyout

The announcement that IBM is taking over Red Hat may be welcome news to beleaguered and beaten down IBM shareholders, but it should strike a stark warning bell for Red Hat...

Focus Group Facilitation Guide Driver Definitions

This printable handout can be used during a focus group activity to remind your staff of the drivers that contribute to employee engagement.

Engagement Progress One-Pager

This one-page template presents an at-a-glance summary of recent milestones around employee engagement to help you keep your engagement program top of mind for your team...

Improve Security Governance With a Security Steering Committee

Successful information security governance requires a venue to address security concerns with participation across the entire business. Without access to requisite details...
  • guided implementation icon
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us