Feeds

Reg Reader Studies: the results are in

Free research downloads

  • alert
  • submit to reddit

Remote control for virtualized desktops

Mobile Security and Responsibility
Taking the right attitude to secure mobile technology

Published: Jan 2006

When companies extend their business IT operations to mobile employees, their risks are increased as valuable software, data and devices are taken out of the protected perimeter of the office, and placed in the pockets, pouches and briefcases of users. Business processes may run more efficiently, and employer and employee have more flexibility in how they conduct the working practices, but do both parties gives sufficient attention to their responsibilities? There is a tendency to believe that where there are challenges with a particular use of technology, the solution is to apply yet more technology, but this is of little benefit if the attitudes to its use are complacent or irresponsible.

Download the report for free [PDF]

The Good, the Bad and the Ugly: IT Supplier Impact and Performance Survey

Published: Jan 2006

Well, the results are in, and they show Sun was the company with the most favourable impression amongst our readers. Microsoft, despite its all-pervasiveness, was the least mentioned vendor in the top five, but had the largest proportion of "unimpressed" punters.

Download the report for free [PDF]

The Register Barometer: 10 month review

Published: Oct 2005

Little change in attitudes over the last 10 months, reflecting stability and inward focus of most IT shops to work on efficiency of their existing environment rather than looking to innovate.

Download the report for free [PDF]

Email Criticality, Support and Migration

Published: Jul 2005

The findings demonstrate how central email has become to modern business. For example, two thirds of respondents said that email was critical to the sales process. Likewise, 90 per cent of respondents reckoned email important or critical in the customer services arena.

Download the report for free [PDF]

Mobile Devices and Users
Keep mobile working safe, secure and under control

Published: Jun 2005

Working with technology outside the office brings many challenges. Use of laptops has grown from limited user communities to widespread desktop replacement and broad deployment. The complexity of managing these devices outside the walls of the office is something IT departments have learned to address. Remote connection has extended from fixed location dial-in to wireless on the move, and smart handheld devices such as PDAs have become networked, converging with mobile phones. This larger and more diverse community of mobile users and their devices increases the demands on the IT function which has to secure the device, data and connection to the network, keeping control of corporate assets, while at the same time supporting mobile user productivity.

Download the report for free [PDF]

Communication & Collaboration

Published: Jun 2005

Download the report for free [PDF]

Security Barometer Survey: The Psychology of Security

Published: May 2005

IT security is high on the agenda of most companies, and so it should be. There are a number of discrepancies however, largely driven by psychological factors. Of particular significance is that existing security policies are seemingly doing little to improve the security of organisations. They should not be seen as an end in themselves, and may be in need of urgent review.

Download the report for free here, with a supplementary slideset available here [Both PDF]

Windows and Linux on the Desktop: A Register Reader Study

Published: Apr 2005

A survey of Register readers, carried out by analysts Quocirca, reveals you love Linux on the desktop, but you love Windows XP too.

Download the report for free [PDF]

IT Security – Bridging the Gap
Resolving the Paradox of IT Security

Published: Aug 2004

There is a paradox at the heart of corporate IT security. Despite a clear idea that IT security works best when considered within the strategic context of a corporate security policy, companies are deploying products tactically rather than implementing comprehensive security solutions.

Download the report for free [PDF]

Reseller-supplier relationships

Published: Jul 2004

Quocirca asked readers of The Register who work for UK channel organisations (resellers) for their views on the relationship they have with their suppliers (IT vendors). We got some interesting results.

Download the report for free [PDF]

Email: Business or Pleasure?
Mission criticality meets personal interest

Published: Jun 2004

We all take email for granted, but rarely have time to consider how much we have come to rely on it for both business and personal communications. This short report looks at the importance of email and how it is used based on feedback from IT professionals working at the sharp end.

Download the report for free [PDF]

Barometer Study - End of Year 2003 Checkpoint

Published: Jan 2004

At the end of 2003, QuoCirca surveyed more than 2000 Reg readers on the state of play in the IT industry and their thoughts on the future.

The majority of respondents were not ivory tower theorists, highly analytical strategists or 40,000ft executives, but practitioners and managers working at the "sharp end". Now, you can download the report for free [PDF]

Server-Based and Thin Client Computing: Promise and Practicalities

Published: Oct 2003

Managing distributed client server environments and the ever-evolving personal computer can be a challenge.

Introducing a degree of centralisation through a Server Based Computing (SBC) approach can help. But does this approach sit comfortably with modern Web architectures, mobile technology and enterprise applications?

In this report, we consider some of the problems and concerns of IT professionals and the potential for modern Access Infrastructure Software and Thin Client devices to assist in overcoming them.

Download this report for free [PDF] - UK A4 | US Letter

Internet Security Threat Report 2014

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?