Feeds

IT vendors: Who’s hot and who’s not?

Your chance to name – or shame

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Roll up, roll up to the third instalment of The Register’s Good, Bad and Ugly IT Vendor study, where you get the chance to express your views about the purveyors of IT goods and services that you use in your business. Whether you want to praise good performance or castigate failure, now’s the chance to sit down with a cuppa and make those views known to the world.

It's not just vendors either – we also take the opportunity to find out just how relevant (or indeed not) are some of the topics we see in the media. So, if you’re fed up with people banging on about Cloud, or wondering why nobody discusses the real issues you face day to day, do let us know and we will add your views to the mix.

The survey should take no more than 10 minutes to complete, though do feel free to take a bit longer if you want to express yourself in more detail. The last couple of years have garnered many thousands of responses, and we'll be comparing this year's views against past surveys to see how things are changing.

The survey is awaiting your input right here.

Over the next few weeks, we'll collate, distill and feed back your opinions and experiences. So make sure to check in and find out what your peers are thinking. Last year's responses are available in the Reg Library (no registration required). ®

Remote control for virtualized desktops

More from The Register

next story
BIG FAT Lies: Porky Pies about obesity
What really shortens lives? Reading this sort of crap in the papers
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.