Gartner RPE2 Methodology Overview
|
|
|
- Hester Hutchinson
- 10 years ago
- Views:
Transcription
1 CONTENTS Introduction 2 RPE2 Background 3 RPE2 Definition 4 RPE2 Workload Extensions 5 Recommended Uses for RPE2 5 Server Consolidation Projects 6 Server Purchase Assessments 7 Filling in Benchmark Gaps 7 Chargeback 8 Conclusion 8 Industry Benchmarks 9 Gartner RPE2
2 Among the Gartner research and advisory products are tools to help clients understand and compare various characteristics of server systems, including pricing, features and performance. Our server performance estimates are powered by a methodology called Relative Performance Estimate 2 (RPE2). RPE2 provides rapid approximate assessments of relative server performance. These performance estimates aid in comparing servers, making server recommendations or purchase decisions, analyzing server consolidation and technology refresh scenarios, capacity planning, and defining chargeback valuations. This overview serves as an important reference for users of RPE2. It explains how the performance estimates are derived and how they can be utilized. Introduction Comparing the performance of computer systems can be a difficult task. Unlike most other high-technology and mass consumer products, servers have little objective information available to help users quantify performance capabilities in absolute or relative terms. Server manufacturers are not obligated to provide standardized performance data on products, as they are with power characteristics. In the absence of mandatory standards for specifying server performance, the IT industry has evolved a number of performance benchmarks. Some of these benchmarks are regulated by industry consortiums, others are created by individual hardware or software vendors, and still others are created by third-party companies or individuals. Benchmarks vary in terms of the workloads simulated, the runtime complexity involved, the system characteristics measured and the rules applied for testing and reporting results. Ideas International was acquired in 2012 by Gartner, Inc. The acquisition includes proprietary methodologies such as RPE2. Users who require performance estimates often find available benchmark results inadequate. Common reasons for this inadequacy include: Data is not available for the specific product(s) users wish to evaluate. Data that is available focuses on only a subset of system performance or does not reflect the workload(s) users intend to run. Data is only available from a source with a possible conflict of interest, such as a seller promoting the purchase of a specific product. 2
3 The chances that relevant benchmark data will not be found are greater when users are trying to compare servers from different manufacturers, different architectures or different generations. In the absence of comprehensive, relevant and comparable data from manufacturers, we created a theoretical performance estimate called RPE2. The objective of RPE2 is to provide users with comparable performance information for server products. RPE2 accomplishes this by incorporating the following: A composite workload profile Coverage of all x86, IA-64 and RISC server variants from the leading global manufacturers Coverage of current and obsolete server models RPE2 is a theoretical performance estimate and not an actual observed measurement of server performance. It is largely based on published benchmark results and relative performance ratings from server manufacturers. Like any single metric, RPE2 can provide useful information, but it can also be misapplied. Later in this document we will be discussing recommended ways of using the relative performance data as support for server selection or for various aspects of operational planning. RPE2 Background The original performance ranking data for enabling architecture-independent server comparisons was introduced in the late 1990s. This ranking series, known as RPE, was based purely on a single lightweight online transaction processing (OLTP) workload. The focus on a single benchmark workload presented a number of limitations and risks. So in order to better represent and expand the wide breadth of workloads and software stacks being deployed on servers and to increase the pool of reference benchmark data points, a composite benchmark methodology was initiated. In 2005, the new enhanced ranking methodology, RPE2, was introduced as the replacement performance ranking series for server comparisons and consolidation tools. 3
4 RPE2 Definition RPE2 is a composite benchmark, meaning that server performance characteristics are captured and calibrated against multiple workload profiles represented by a mix of industry benchmarks that have the widest technology coverage. The published or estimated performance points for each server processor option are aggregated by calculating a geometric mean value. In the standard RPE2, all components are weighted equally to prevent RPE2 from skewing toward a single benchmark or workload type. Other weighting options are described below. A composite mix benchmark offers the following advantages: The multiple components represent a broader range of workloads and server architecture characteristics. Multiple components enable the impact of benchmark life cycles to be managed in a less disruptive manner; benchmark substitution can be handled within the existing framework, and the overall spectrum of results can be kept broadly consistent. Multiple components increase the likelihood that more absolute performance values contribute directly to the composite. Multiple components enable the incorporation of additional components and mitigate the enforced loss of a single component. The initial RPE2 benchmark set was selected from all available industry and ISV benchmarks based on how complete their coverage was for the major manufacturers and server architectures, and the extent of their published results. The current RPE2 set includes the following six benchmark inputs in its calculation: SAP SD Two-Tier, TPC-C, TPC-H, SPECjbb2005, and two SPEC CPU2006 components. As additional performance points for missing technologies appear in other existing benchmarks, or if new industry benchmarks are developed that potentially satisfy our selection criteria, they will also be considered for inclusion within the RPE2 composite. The primary objective for RPE2 is to reflect benchmarked server family relationships and vendor ranking data on a benchmark component-by-component basis. The RPE2 calculation process extrapolates and interpolates the best-case performance data from multiple benchmark sources, including relative performance data provided by server manufacturers. By representing a broader spectrum of measured outcomes, the RPE2 values are more representative of overall server capability and the range of applications now being consolidated on virtualized server environments. 4
5 The RPE2 performance rankings are designed to provide users with the most accurate and comprehensive coverage of available server performance. RPE2 data covers all processor configuration options for x86, IA-64 and RISC servers for major vendors from 1997 onward over 24,000 configurations in all. RPE2 also has several other virtues not found in any other performance-ranking data: Independence. RPE2 was developed and is maintained by an independent analyst company. Transparency. RPE2 is the only composite benchmark mix that is fully documented. Comprehensiveness. RPE2 is the only composite ranking that incorporates multiple workload types and covers all major technologies and architectures. Durability. RPE2 is designed to adapt to the availability and life cycle of the individual benchmark components; RPE2 continues even when constituent benchmarks change, become obsolete or are replaced. RPE2 Workload Extensions In 2010, RPE2 was expanded to include Workload Extensions. Workload Extensions use different weightings of the constituent benchmark components of RPE2 in order to highlight performance within specific workload profiles. The following RPE2 Workload Extensions were created: RPE2-ERP, highlighting the SAP SD Two-Tier component RPE2-Java, highlighting the SPECjbb2005 component RPE2-OLTP, highlighting the TPC-C component RPE2-Compute-Intensive, highlighting the SPEC CPU2006 components Recommended Uses For RPE2 Users can leverage RPE2 performance data in the following situations: When the performance data they want is not published or is too difficult to obtain When they want a quick performance assessment to get them into the right range or to narrow a list of servers for deeper evaluation When they want an independent comparison to verify the reasonableness of data provided by a third party (for example, a nonpublic performance comparison provided by a manufacturer) When they need a relative performance ratio in order to estimate or extrapolate some other benchmark or metric When they need an index to compare dissimilar systems for a business purpose, such as a rating to use in a chargeback system 5
6 While RPE2 provides a readily accessible, inclusive and convenient measure of server performance, quantitative benchmarking of specific workloads on target servers will likely provide higher accuracy than RPE2 in terms of predicting performance. We recommend that, when they exist, users should utilize workloador application-specific performance benchmarks over RPE2 to estimate the performance of those workloads on specific servers. Before reviewing RPE2 usage in more detail, RPE2 should be placed into the context of its primary sources. Because RPE2 values are mainly derived from benchmarks and other information provided by manufacturers, the caveats that the manufacturers apply to their own performance data must also apply to RPE2. Therefore, the following cautionary statements apply to RPE2: The source data may include manufacturer performance rankings, which are largely based on estimates rather than actual performance measurements. RPE2 and RPE2 Workload Extensions are based on benchmarks that include a mix of workloads with different characteristics, and these may not be representative of a user s intended workload. The published benchmark results used in the calculation of RPE2 are generally tuned by manufacturers for maximum possible performance, and, therefore, they may be dependent on specific hardware configurations, software packages and/ or kernel, middleware and database settings in the software stack. The following sections review each of the RPE2 usage scenarios in more detail. Note that Gartner also provides tools to undertake many of these specific tasks Server Consolidation Projects Typically there are four major practical problems with server consolidation projects: 1. The number of servers needing to be analyzed and/or replaced is overwhelmingly large perhaps many hundreds or thousands. 2. The environment is likely to consist of a wide mix of products with different architectures from various manufacturers, making objective, relative comparisons difficult. 3. Many installed servers are likely to be older or obsolete models for which manufacturer product lists or server management databases have no information. 4. Consolidation projects must be financially justified up front; quick rough estimates of scope and cost are needed before the time or money is available to perform in-depth analysis and consolidation planning. 6
7 In light of these challenges, how do you estimate how many servers can be consolidated on a given platform, and/or which servers are appropriate targets for consolidating a specific inventory? We offer a solution that addresses these questions: ServerCAR (Server Consolidation Analysis Resource). The Server Consolidation online tool covers a very comprehensive list of servers (over 24,000 entries), along with their associated RPE2 values and environmental profiles, dating from 1997 onward. Server Consolidation enables users to calculate the aggregate performance, memory and environmental details (such as power, heat output and rack space) of installed servers and then determine replacement options irrespective of the server technologies involved. Server Purchase Assessments RPE2 data is utilized by the Gartner Technology Planner for Technical Professionals and the IDEAS Competitive Profiles information services. These services offer comprehensive coverage of the comparative features, pricing and performance characteristics of a wide range of enterprise servers sold across major global markets. They use RPE2 data to identify which servers are likely to compete with each other based on their performance profile. This capability can be useful as a quick server shortlisting function. Filling in Benchmark Gaps Probably the most effective use of RPE2 data is for filling in gaps in benchmark coverage. A user will often know which benchmark is a good surrogate for his or her workload. However, the result pool for that benchmark may not include data on the specific server model the user intends to buy (or has already purchased). In this instance, adjusting the benchmark result of a tested model by the RPE2 ratio of the target to the tested model will give a good estimate of the target absolute benchmark value. This process assumes that the two models (tested and target) are from the same server family and are reasonably close in age and chip or core count. The further apart the models are within the range ranking table, the less reliable the estimated outcome will be. Extrapolations of this nature can best be used as part of purchase assessments, as described previously, or for making capacity planning estimates in the absence of application-specific sizing tools. 7
8 Chargeback RPE2 data can be used as an independent contributor to the establishment of chargeback rates. In such instances, this data can serve as a useful way of converting metered computing resources on various platforms into a harmonized charge-out algorithm. Conclusion While many server performance benchmarks exist, they frequently offer insufficient or inappropriate data for making sound assessments of relative server performance. RPE2 provides an accurate, independent and quick source of performance estimates to address this issue. RPE2 was developed to fill the extensive vacuum of missing performance information left by the server manufacturers. When used in conjunction with other Gartner services, RPE2 data effectively supplements industry benchmark information and serves as a productivity aid for making rapid approximate assessments. To learn how to access RPE2 or to discuss any questions you might have, please contact your Gartner account executive. 8
9 Industry Benchmarks The following provides some background on the industry-standard benchmarks referenced in this overview. Transaction Processing Performance Council (TPC) The TPC is a nonprofit organization that develops transaction-processing and database benchmarks. Generally, TPC benchmark results must be audited before they become official, and TPC benchmarks are among the few that require full disclosure of system price along with performance. Gartner is an associate member of the TPC. For more information, consult the TPC website at TPC-C. First released in 1992, this OLTP benchmark has been run on servers of many different architectures. The TPC-C test suite simulates an online orderprocessing system, executing transactions such as storing orders into a database and checking the status of existing orders. This benchmark tests not only the compute capabilities of the processor, but also the performance and capacity of memory and I/O. The longevity of TPC-C makes it useful for comparing the performance of older servers against the performance of current systems. TPC-E. In 2007, the TPC introduced a transaction-oriented benchmark that was intended to supplant TPC-C. As of April 2012, published results have been limited to a subset of architectures and technologies. Until TPC-E results are published on a broader set of products, the benchmark has limited usefulness for a composite benchmark like RPE2 that covers a wide variety of server architectures. TPC-H. TPC-H is an ad hoc decision support benchmark that simulates complex search queries presented to a large database. To account for performance variances associated with the data-set size, TPC-H can be run across six different scales (database sizes) that range from 100 GB to 30 TB. Both the hardware configured and the database software deployed are significant contributors to TPC-H performance. 9
10 Industry Benchmarks Standard Performance Evaluation Corporation (SPEC) The nonprofit SPEC develops a number of benchmark suites that test specific subsystems of server hardware and software. Gartner is a member of the Open Systems Group (OSG) of SPEC. For more information, consult the SPEC website at SPEC CPU2006. SPEC CPU2006 runs compute-intensive workloads and consists of two benchmark suites: INT for measuring compute-intensive integer performance, and FP for measuring compute-intensive floating-point performance. The data used by the floating-point tests generally does not completely fit within internal processor caches; thus, these tests also stress the processor s cache/memory hierarchy. The SPEC CPU2006 suite replaced an earlier CPU2000 suite, which itself was the successor of an earlier SPEC CPU benchmark. SPECjbb2005. SPECjbb benchmarks evaluate the performance of servers running typical Java business applications, as well as aspects of the Java virtual machine (JVM). They simulate a three-tier client/server system and report results in bops (business operations per second). In addition to testing the processor and memory, these benchmarks also stress the operating system and JVM components. SAP Standard Application Benchmarks Unlike the benchmarks from SPEC and the TPC, the SAP benchmarks are controlled by a single company (SAP) and its partners, rather than an industry consortium. These benchmarks are designed to test the hardware and database performance of SAP applications and components. For more information, consult the SAP benchmarks website at SAP Sales and Distribution (SD) Two-Tier. This benchmark quantifies the performance of the SAP SD application, one of the many SAP application solutions. It measures a system with a database, server(s) and some form of SAP s enterprise resource planning (ERP) software. 10
11 GARTNER HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A Europe Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Japan Headquarters Gartner Japan, Ltd. Atago Green Hills MORI Tower 5F Atago, Minato-ku Tokyo JAPAN Latin America Headquarters Gartner do Brasil S/C Ltda Av. Das Nações Unidas 12551, 25 Unit 2501 A São Paulo BRAZIL ABOUT GARTNER Gartner, Inc. (NYSE: IT) is the world s leading information technology research and advisory company. We deliver the technology-related insight necessary for our clients to make the right decisions, every day. From CIOs and senior IT leaders in corporations and government agencies, to business leaders in high-tech and telecom enterprises and professional services firms, to technology investors, we are the valuable partner to clients in 12,000 distinct organizations. Through the resources of Gartner Research, Gartner Executive Programs, Gartner Consulting and Gartner Events, we work with every client to research, analyze and interpret the business of IT within the context of their individual role. Founded in 1979, Gartner is headquartered in Stamford, Connecticut, U.S.A., and has 5,200 associates, including 1,280 research analysts and consultants, and clients in 85 countries Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, [email protected] or visit gartner.com. Produced by Gartner Marketing Communications HTGRPE2OVRBROC080112
The Six Triggers for Using Data Center Infrastructure Management Tools
G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using
Agenda for Supply Chain Strategy and Enablers, 2012
G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling
Recognize the Importance of Digital Marketing
Recognize the Importance of Digital Marketing Laura McLellan, Lead Author Laura McLellan, Laura McLellan serves CMOs and other marketing executives, sharing how digital strategies are being integrated
Gartner Research Methodologies. Technology-related insights for your critical business decisions
Gartner Research Methodologies Technology-related insights for your critical business decisions Why research matters As digitalization continues to transform the way organizations do business, every technology
Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets
Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research
Private Cloud Computing: An Essential Overview
Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan
2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities
Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial
The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools
Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration
Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons
Industry Research G00232987 Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Published: 28 March 2012 Analyst(s): Ron Bonig When Vrije Universiteit in Amsterdam implemented
Q&A: The Many Aspects of Private Cloud Computing
Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner
Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing
Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very
Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost
G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures
The Four New Ps of Marketing That CMOs and CIOs Should Consider
G00227185 The Four New Ps of Marketing That CMOs and CIOs Should Consider Published: 18 May 2012 Analyst(s): Kimberly Collins Four new Ps of marketing align people and processes across the marketing ecosystem,
Data in the Cloud: The Changing Nature of Managing Data Delivery
Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play
Business Intelligence Platform Usage and Quality Dynamics, 2008
Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's
GARTNER EXP CIO TOOLKIT: THE FIRST 100 DAYS. Executive Summary
GARTNER EXP CIO TOOLKIT: THE FIRST 100 DAYS Executive Summary Gartner EXP is an exclusive, membership-based organization of more than 3,000 CIOs and senior IT leaders worldwide. Members benefits from the
Gamification Meets Analytics With Kaggle
G00228640 Gamification Meets Analytics With Kaggle Published: 1 June 2012 Analyst(s): Rita L. Sallam This note describes how Kaggle is bringing "the collective" to "the predictive" to help companies overcome
IT asset management (ITAM) will proliferate in midsize and large companies.
Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter
Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products
Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most
Business Intelligence Focus Shifts From Tactical to Strategic
Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth
2010 FEI Technology Study: CPM and BI Show Improvement From 2009
Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management
Best Practices for Confirming Software Inventories in Software Asset Management
Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the
Key Issues for Business Intelligence and Performance Management Initiatives, 2008
Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management
How To Create A Cloud Computing System
G00230221 Five Cloud Computing Trends That Will Affect Your Cloud Strategy Through 2015 Published: 10 February 2012 Analyst(s): David W. Cearley, David Mitchell Smith In this Impact Assessment, we focus
BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle
Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement
Gartner's View on 'Bring Your Own' in Client Computing
G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting
Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users
Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor
Research Agenda and Key Issues for Converged Infrastructure, 2006
Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the
The Current State of Agile Method Adoption
Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand
Eight Critical Forces Shape Enterprise Data Center Strategies
Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects
Deliver Process-Driven Business Intelligence With a Balanced BI Platform
Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations
Discovering the Value of Unified Communications
Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions
Toolkit: Reduce Dependence on Desk-Side Support Technicians
Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life
Solution Path: Threats and Vulnerabilities
Solution Path: Threats and Vulnerabilities Published: 24 January 2012 Burton IT1 Research G00226331 Analyst(s): Dan Blum This solution path helps Gartner clients develop a strategy and program for managing
When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud
Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing
Key Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption
Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references
GARTNER FOR TECHNOLOGY INVESTORS
GARTNER FOR TECHNOLOGY INVESTORS INVESTORS NEED TO KNOW MORE New globalization trends are impacting the strategies of investment professionals, rearranging priorities and posing new things to consider.
NAC Strategies for Supporting BYOD Environments
G00226204 NAC Strategies for Supporting BYOD Environments Published: 22 December 2011 Analyst(s): Lawrence Orans, John Pescatore Network access control (NAC) will be a key element in a flexible approach
Flipping to Digital Leadership
Gartner Executive Programs Flipping to Digital Leadership Insights from the 2015 Gartner CIO Agenda Report About the Gartner CIO Agenda Report The annual Gartner CIO Agenda Report is informed by the world
Emerging PC Life Cycle Configuration Management Vendors
Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market
Now Is the Time for Security at the Application Level
Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now
Singapore Empowers Land Transport Planners With Data Warehouse
G00219502 Singapore Empowers Land Transport Planners With Data Warehouse Published: 18 October 2011 Analyst(s): Eric Thoo The Land Transport Authority (LTA) of Singapore wanted to improve planning and
The Next Generation of Functionality for Marketing Resource Management
G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management
Successful EA Change Management Requires Five Key Elements
Research Publication Date: 26 December 2007 ID Number: G00153908 Successful EA Change Management Requires Five Key Elements Richard Buchanan Change, in all its many aspects, is a critical aspect of the
Key Issues for Data Management and Integration, 2006
Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity
Prepare for the Inevitable With an Effective Security Incident Response Plan
G00236455 Prepare for the Inevitable With an Effective Security Incident Response Plan Published: 19 July 2012 Analyst(s): Rob McMillan A serious security incident is a question of "when," not "if," for
Ensure Emerging Trends and Technologies Advance Your Marketing Strategy
Ensure Emerging Trends and Technologies Advance Your Marketing Strategy Richard Fouts, Jackie Fenn and Gartner Fellow Lead Author Richard Fouts, Richard Fouts guides digital marketers on best practices
The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.
Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives
The Five Competencies of MRM 'Re-' Defined
Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management
Cloud IaaS: Service-Level Agreements
G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of
For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.
Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing
2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise
Research Publication Date: 23 July 2009 ID Number: G00169733 2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise John E. Van Decker Extensible Business Reporting Language (XBRL) will be a requirement
Organizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
Overcoming the Gap Between Business Intelligence and Decision Support
Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision
Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process
Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research
How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits
Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with
Containers and Modules: Is This the Future of the Data Center?
Research Publication Date: 8 April 2011 ID Number: G00211139 Containers and Modules: Is This the Future of the Data Center? David J. Cappuccio Modular and container-based data centers have emerged as yet
The What, Why and When of Cloud Computing
Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.
Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in
Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must
Roundup of Business Intelligence and Information Management Research, 1Q08
Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our
Gartner Updates Its Definition of IT Infrastructure Utility
Research Publication Date: 23 April 2004 ID Number: M-22-2393 Gartner Updates Its Definition of IT Infrastructure Utility Claudio Da Rold Our new definition of IT infrastructure utility clears away some
Managing IT Risks During Cost-Cutting Periods
Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks
Understanding Vulnerability Management Life Cycle Functions
Research Publication Date: 24 January 2011 ID Number: G00210104 Understanding Vulnerability Management Life Cycle Functions Mark Nicolett We provide guidance on the elements of an effective vulnerability
X.509 Certificate Management: Avoiding Downtime and Brand Damage
G00226426 X.509 Certificate Management: Avoiding Downtime and Brand Damage Published: 4 November 2011 Analyst(s): Eric Ouellet, Vic Wheatman Organizations are often not aware of the scope or the validity
Tips for Evaluators: Better Business Intelligence RFPs
Research Publication Date: 11 May 2009 ID Number: G00167840 Tips for Evaluators: Better Business Intelligence RFPs James Richardson Many of the business intelligence (BI) RFP data-collection exercises
The Electronic Signature Market Is Poised to Take Off
G00234939 The Electronic Signature Market Is Poised to Take Off Published: 21 May 2012 Analyst(s): Gregg Kreizman Growth in the e-signature market is becoming viral, and there are significant benefits
IT Architecture Is Not Enterprise Architecture
Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use
Gartner Clarifies the Definition of the Term 'Enterprise Architecture'
Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,
Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary.
Industry Research Publication Date: 11 November 2009 ID Number: G00172423 Government 2.0: Gartner Definition Andrea Di Maio Given the increasing confusion and hype surrounding Government 2.0, it is important
What to Consider When Designing Next-Generation Data Centers
Research Publication Date: 10 September 2010 ID Number: G00201044 What to Consider When Designing Next-Generation Data Centers David J. Cappuccio Leading-edge data centers are designed for flexibility,
Research. Mastering Master Data Management
Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has
Cloud, SaaS, Hosting and Other Off-Premises Computing Models
Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,
Mainframe Modernization: When Migration Is the Answer
Research Publication Date: 8 January 2010 ID Number: G00171622 Mainframe Modernization: When Migration Is the Answer Dale Vecchio Mainframe migrations can be executed in a number of ways. Which choice
Gartner Defines Enterprise Information Architecture
Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit
Case Study: Lexmark Uses MDM to Turn Information Into a Business Asset
G00217757 Case Study: Lexmark Uses MDM to Turn Information Into a Business Asset Published: 22 December 2011 Analyst(s): Bill O'Kane Lexmark International undertook a master data management (MDM) program
2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase
Research Publication Date: 20 April 2010 ID Number: G00176029 2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase John E. Van Decker, Cathy Tornbohm This Gartner Financial
