Reg Reader Studies: the results are in
Free research downloads
Mobile Security and Responsibility
Taking the right attitude to secure mobile technology
Published: Jan 2006
When companies extend their business IT operations to mobile employees, their risks are increased as valuable software, data and devices are taken out of the protected perimeter of the office, and placed in the pockets, pouches and briefcases of users. Business processes may run more efficiently, and employer and employee have more flexibility in how they conduct the working practices, but do both parties gives sufficient attention to their responsibilities? There is a tendency to believe that where there are challenges with a particular use of technology, the solution is to apply yet more technology, but this is of little benefit if the attitudes to its use are complacent or irresponsible.
The Good, the Bad and the Ugly: IT Supplier Impact and Performance Survey
Published: Jan 2006
Well, the results are in, and they show Sun was the company with the most favourable impression amongst our readers. Microsoft, despite its all-pervasiveness, was the least mentioned vendor in the top five, but had the largest proportion of "unimpressed" punters.
The Register Barometer: 10 month review
Published: Oct 2005
Little change in attitudes over the last 10 months, reflecting stability and inward focus of most IT shops to work on efficiency of their existing environment rather than looking to innovate.
Email Criticality, Support and Migration
Published: Jul 2005
The findings demonstrate how central email has become to modern business. For example, two thirds of respondents said that email was critical to the sales process. Likewise, 90 per cent of respondents reckoned email important or critical in the customer services arena.
Mobile Devices and Users
Keep mobile working safe, secure and under control
Published: Jun 2005
Working with technology outside the office brings many challenges. Use of laptops has grown from limited user communities to widespread desktop replacement and broad deployment. The complexity of managing these devices outside the walls of the office is something IT departments have learned to address. Remote connection has extended from fixed location dial-in to wireless on the move, and smart handheld devices such as PDAs have become networked, converging with mobile phones. This larger and more diverse community of mobile users and their devices increases the demands on the IT function which has to secure the device, data and connection to the network, keeping control of corporate assets, while at the same time supporting mobile user productivity.
Communication & Collaboration
Published: Jun 2005
Security Barometer Survey: The Psychology of Security
Published: May 2005
IT security is high on the agenda of most companies, and so it should be. There are a number of discrepancies however, largely driven by psychological factors. Of particular significance is that existing security policies are seemingly doing little to improve the security of organisations. They should not be seen as an end in themselves, and may be in need of urgent review.
Windows and Linux on the Desktop: A Register Reader Study
Published: Apr 2005
A survey of Register readers, carried out by analysts Quocirca, reveals you love Linux on the desktop, but you love Windows XP too.
IT Security – Bridging the Gap
Resolving the Paradox of IT Security
Published: Aug 2004
There is a paradox at the heart of corporate IT security. Despite a clear idea that IT security works best when considered within the strategic context of a corporate security policy, companies are deploying products tactically rather than implementing comprehensive security solutions.
Published: Jul 2004
Quocirca asked readers of The Register who work for UK channel organisations (resellers) for their views on the relationship they have with their suppliers (IT vendors). We got some interesting results.
Email: Business or Pleasure?
Mission criticality meets personal interest
Published: Jun 2004
We all take email for granted, but rarely have time to consider how much we have come to rely on it for both business and personal communications. This short report looks at the importance of email and how it is used based on feedback from IT professionals working at the sharp end.
Barometer Study - End of Year 2003 Checkpoint
Published: Jan 2004
At the end of 2003, QuoCirca surveyed more than 2000 Reg readers on the state of play in the IT industry and their thoughts on the future.
The majority of respondents were not ivory tower theorists, highly analytical strategists or 40,000ft executives, but practitioners and managers working at the "sharp end". Now, you can download the report for free [PDF]
Server-Based and Thin Client Computing: Promise and Practicalities
Published: Oct 2003
Managing distributed client server environments and the ever-evolving personal computer can be a challenge.
Introducing a degree of centralisation through a Server Based Computing (SBC) approach can help. But does this approach sit comfortably with modern Web architectures, mobile technology and enterprise applications?
In this report, we consider some of the problems and concerns of IT professionals and the potential for modern Access Infrastructure Software and Thin Client devices to assist in overcoming them.
Sponsored: Global DDoS threat landscape report