Feeds

Reg Reader Studies: the results are in

Free research downloads

  • alert
  • submit to reddit

High performance access to file storage

Mobile Security and Responsibility
Taking the right attitude to secure mobile technology

Published: Jan 2006

When companies extend their business IT operations to mobile employees, their risks are increased as valuable software, data and devices are taken out of the protected perimeter of the office, and placed in the pockets, pouches and briefcases of users. Business processes may run more efficiently, and employer and employee have more flexibility in how they conduct the working practices, but do both parties gives sufficient attention to their responsibilities? There is a tendency to believe that where there are challenges with a particular use of technology, the solution is to apply yet more technology, but this is of little benefit if the attitudes to its use are complacent or irresponsible.

Download the report for free [PDF]

The Good, the Bad and the Ugly: IT Supplier Impact and Performance Survey

Published: Jan 2006

Well, the results are in, and they show Sun was the company with the most favourable impression amongst our readers. Microsoft, despite its all-pervasiveness, was the least mentioned vendor in the top five, but had the largest proportion of "unimpressed" punters.

Download the report for free [PDF]

The Register Barometer: 10 month review

Published: Oct 2005

Little change in attitudes over the last 10 months, reflecting stability and inward focus of most IT shops to work on efficiency of their existing environment rather than looking to innovate.

Download the report for free [PDF]

Email Criticality, Support and Migration

Published: Jul 2005

The findings demonstrate how central email has become to modern business. For example, two thirds of respondents said that email was critical to the sales process. Likewise, 90 per cent of respondents reckoned email important or critical in the customer services arena.

Download the report for free [PDF]

Mobile Devices and Users
Keep mobile working safe, secure and under control

Published: Jun 2005

Working with technology outside the office brings many challenges. Use of laptops has grown from limited user communities to widespread desktop replacement and broad deployment. The complexity of managing these devices outside the walls of the office is something IT departments have learned to address. Remote connection has extended from fixed location dial-in to wireless on the move, and smart handheld devices such as PDAs have become networked, converging with mobile phones. This larger and more diverse community of mobile users and their devices increases the demands on the IT function which has to secure the device, data and connection to the network, keeping control of corporate assets, while at the same time supporting mobile user productivity.

Download the report for free [PDF]

Communication & Collaboration

Published: Jun 2005

Download the report for free [PDF]

Security Barometer Survey: The Psychology of Security

Published: May 2005

IT security is high on the agenda of most companies, and so it should be. There are a number of discrepancies however, largely driven by psychological factors. Of particular significance is that existing security policies are seemingly doing little to improve the security of organisations. They should not be seen as an end in themselves, and may be in need of urgent review.

Download the report for free here, with a supplementary slideset available here [Both PDF]

Windows and Linux on the Desktop: A Register Reader Study

Published: Apr 2005

A survey of Register readers, carried out by analysts Quocirca, reveals you love Linux on the desktop, but you love Windows XP too.

Download the report for free [PDF]

IT Security – Bridging the Gap
Resolving the Paradox of IT Security

Published: Aug 2004

There is a paradox at the heart of corporate IT security. Despite a clear idea that IT security works best when considered within the strategic context of a corporate security policy, companies are deploying products tactically rather than implementing comprehensive security solutions.

Download the report for free [PDF]

Reseller-supplier relationships

Published: Jul 2004

Quocirca asked readers of The Register who work for UK channel organisations (resellers) for their views on the relationship they have with their suppliers (IT vendors). We got some interesting results.

Download the report for free [PDF]

Email: Business or Pleasure?
Mission criticality meets personal interest

Published: Jun 2004

We all take email for granted, but rarely have time to consider how much we have come to rely on it for both business and personal communications. This short report looks at the importance of email and how it is used based on feedback from IT professionals working at the sharp end.

Download the report for free [PDF]

Barometer Study - End of Year 2003 Checkpoint

Published: Jan 2004

At the end of 2003, QuoCirca surveyed more than 2000 Reg readers on the state of play in the IT industry and their thoughts on the future.

The majority of respondents were not ivory tower theorists, highly analytical strategists or 40,000ft executives, but practitioners and managers working at the "sharp end". Now, you can download the report for free [PDF]

Server-Based and Thin Client Computing: Promise and Practicalities

Published: Oct 2003

Managing distributed client server environments and the ever-evolving personal computer can be a challenge.

Introducing a degree of centralisation through a Server Based Computing (SBC) approach can help. But does this approach sit comfortably with modern Web architectures, mobile technology and enterprise applications?

In this report, we consider some of the problems and concerns of IT professionals and the potential for modern Access Infrastructure Software and Thin Client devices to assist in overcoming them.

Download this report for free [PDF] - UK A4 | US Letter

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.