Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary.
|
|
|
- Jesse Nelson
- 10 years ago
- Views:
Transcription
1 Industry Research Publication Date: 11 November 2009 ID Number: G Government 2.0: Gartner Definition Andrea Di Maio Given the increasing confusion and hype surrounding Government 2.0, it is important to reflect about the key characteristics of this phenomenon. Strategic planners, department heads and CIOs need to understand the differences compared with previous technologyenabled changes in order to equip themselves with the right capabilities and competencies. Key Findings There are multiple definitions of Government 2.0, but they all focus on specific aspects, such as the use of social media or the provision of public data platforms. Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary. The characteristics of Government 2.0 are very different from those of e-government, mostly because they require government business and IT leaders to relinquish their control. Recommendations Government strategic planners and CIOs must look at Government 2.0 as a continuous transformation process that is characterized by the progressive socialization and commoditization of data, processes and services. They must focus on: Publishing and maintaining open (public) data in raw format as required by relevant open government policies and directives. Identifying patterns emerging from information created outside the perimeter of their enterprise. Empowering employees to engage with external communities to help identify those patterns. Developing a road map to incorporate the impact of those patterns into operations and service delivery models. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.
2 ANALYSIS The term "Government 2.0" is being widely used today in government and the IT industry to describe the use of Web 2.0 (see Note 1) technologies, both internally and externally, to increase collaboration and transparency and potentially transform the way government agencies relate to citizens and operate. A synonym that is also gaining popularity is "open government," which stresses data openness and citizen engagement. Several definitions associate Government 2.0 with the use of social media, both inside and outside government. A more intriguing definition, introduced by Tim O'Reilly, is "government as a platform," but this turns out to be an oversimplification (see Note 2) Although we do not believe that the term "Government 2.0" is a particularly useful characterization of the kind of transformation that social media and other Web 2.0 technologies are making possible, we recognize that it is gaining sufficient traction in industry to require a definition that helps our clients capture its real meaning and potential. Gartner defines Government 2.0 as the use of information technology to socialize and commoditize government services, processes and data. Socialization With Web 2.0 and the emergence of social networks, Internet users are turning from content consumers into content brokers and providers. Bloggers, wiki editors, Facebook users, LinkedIn group creators, and so forth contribute to creating, organizing and rating information that is changing the way people make their purchasing decisions, relate to service providers and interact with government. The socialization of information has multiple facets: From government to citizens, through open government data initiatives that aim at increasing transparency and allowing third parties to aggregate data to create public value From citizens to government, through information that is or can be pertinent to several government processes, but is generally created for a different purpose than communicating with or influencing government Inside government, through the use of internal or consumer collaboration platforms that enable government employees to socialize knowledge One important characteristic of Government 2.0 is that the boundaries between these facets are blurred. For instance, government employees can mash up open government data with citizengenerated data and socialize the results with both citizens and other employees, who can in turn rate and further transform such data. Because this information is created and managed by individuals in different roles, it is most appropriate to refer to it as being created and managed by the "collective" (see Note 3). While at an earlier stage socialization primarily concerns information, at a future stage it will affect services, because socialized information will determine how government services are combined and consumed, and because alternative or complementary services will emerge from the collective. Areas that are most susceptible to this transformation include welfare, healthcare, education and public safety. Publication Date: 11 November 2009/ID Number: G Page 2 of 6
3 We already have witnessed the socialization of government data through open government data initiatives as well as the increasing use of external data to support government processes. These processes will not be limited to public data but will extend to personal data that citizens may decide to store in locations other than government agencies themselves (see "The Case for Citizen Data Vaults"). Moreover, application contests such as Apps for Democracy or Apps for America show a trend toward engaging the public at large in developing new applications. The next evolutionary step will be the socialization of government services and processes by engaging individuals as well as online communities to perform part of existing government processes or transform them by leveraging external data and applications. Commoditization During the past several years, government organizations in many jurisdictions have pursued, with different degrees of success, a rationalization and consolidation strategy aimed at reducing the diversity of infrastructures and horizontal, non-mission-specific applications to cut costs and complexity. More recently, the emergence of cloud computing (see Note 4) is pushing these organizations to examine how much they can meet their requirements by adopting solutions that are used by other industries and in some cases by consumers. Early examples of commoditization include the use of consumer-class social media such as Facebook, LinkedIn or Twitter to support internal and external collaboration goals, the adoption of cloud-based applications such as Google Gmail or salesforce.com, and the move of some government workloads onto cloud-based infrastructure. As discussed in previous research (see "Government in the Cloud: Much More Than Computing"), the socialization of information and the emergence of crowdsourcing models to engage new stakeholders (such as citizens) in government service delivery and decision-making processes are closely related to the commoditization of applications and business processes made possible by cloud computing. Therefore, commoditization will gradually move from infrastructure and applications to business processes, although at a pace that is influenced by slowly evolving regulations. As a consequence, resources for innovation will focus more explicitly on areas that are missionspecific and not candidates for commoditization. Characteristics of Government 2.0 It is citizen-driven. Government 2.0 requires an outside-in approach. Citizens will process and transform government information and configure the services they want to use, integrating them with information and services outside the perimeter of government. Similarly, government processes will be increasingly impacted by such external information. It is employee-centric. Government 2.0 also requires a bottom-up approach. Employees must be empowered to use seamless collaboration, to challenge existing procedures and to be innovative while remaining accountable. As social networks imply peer-to-peer communication, only the involvement of individuals will create the necessary connection with constituents and provide sufficient elements to articulate an actual agency social media strategy. It keeps evolving. Government-driven communities must be sustained with compelling purpose and content to continue to thrive. However, the transient nature of external social networks calls for an iterative process in which employees continuously look for what matters to them and their jobs. Social networks will aggregate around specific issues and may come and go as constituents see fit. It is transformational. Despite its evolutionary nature, Government 2.0 fundamentally transforms the way government delivers its services to constituents, manages and executes its processes, Publication Date: 11 November 2009/ID Number: G Page 3 of 6
4 and uses data by establishing a two-way relationship between government and its constituents based on greater transparency coupled with the ability to engage with constituents on their turf. It requires a blend of planning and nurturing. It is almost impossible to determine the business (or public) value of Government 2.0 in general or social media in particular without understanding which purposes would be compelling enough to engage employees and constituents. Before starting any initiative, it is imperative to identify existing or nascent communities, understand their behavior, and evaluate to what extent they can be leveraged to develop a government initiative. It needs Pattern-Based Strategy capabilities. Much information that is relevant to government service delivery and operations will be available outside the perimeter of government organizations themselves. This implies actively seeking internal and external patterns that may have an impact on organizational strategy or operations, hence evolving information-based disciplines. Patterns can be seen in activities that people engage in or from processes that occur in or around organizations (see "Introducing Pattern-Based Strategy"). It calls for a new management style. An outside-in, bottom-up approach to transformation challenges existing processes and requires managers to let their employee experiment with external engagement and social media. As a consequence, it is necessary to measure employee performances, not by the output they produce according to existing procedures, but by how they contribute to the policy outcomes that their agency is responsible for (see "Citizen-Driven Government Must Be Employee-Centric, Too"). Government 2.0 Versus E-Government In 2000 (see "What Is E-Government? Gartner's Definitions"), Gartner defined e-government as the transformation of public-sector internal and external relationships through Net-enabled operations, IT and communications to optimize government service delivery, constituency participation and governance. Parts of this definition apply to Government 2.0, since its goals are indeed to improve the way governments deliver services, engage constituents and perform overall governance. However, the fundamental difference is the blurring between internal and external relationships, which leads to three goals of e-government overlapping. Government 2.0 is people-centric, as technology supports a blurring of roles for individuals who are both employees and citizens, and information producers and consumers, hence making the distinction between internal and external collaboration quite artificial. Further, engaging external resources or citizen-driven communities, while addressing the goal of participation, helps at the same time to improve service delivery and internal governance processes. Another important difference is that, while e-government uses primarily enterprise, domainspecific technologies, Government 2.0 is based on the use of increasingly commoditized technology, as well as on consumer technology. RECOMMENDED READING "Moving From Citizen-Centric to Citizen-Driven Government" "Citizen-Driven Government Must Be Employee-Centric, Too" "How Governments Can Use Social Networks" "Use a Gartner Governance Model to More Safely Empower Grassroots Social Media Efforts" "Introducing Pattern-Based Strategy" Publication Date: 11 November 2009/ID Number: G Page 4 of 6
5 Note 1 Web 2.0 Web 2.0 refers to networked applications built using Web technologies and design principles that may exploit community-based development and social networking, and that may also exploit new Web-based business models. Note 2 About Government as a Platform A discussion about the pros and cons of the O'Reilly definition can be found at Note 3 Collective The collective is composed of individuals, groups, communities, mobs, markets and firms that shape the direction of society and business. The collective is not new, but technology has made the collective more powerful. Affordable and accessible technology has enabled individuals and communities to come together in a new way and has enabled change to happen more rapidly. Note 4 Cloud Computing Cloud computing refers to a style of computing where scalable and elastic IT-related capabilities are provided "as a service" to external customers using Internet technologies. Publication Date: 11 November 2009/ID Number: G Page 5 of 6
6 REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Publication Date: 11 November 2009/ID Number: G Page 6 of 6
Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets
Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research
When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud
Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing
The What, Why and When of Cloud Computing
Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.
The Current State of Agile Method Adoption
Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand
Research Agenda and Key Issues for Converged Infrastructure, 2006
Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the
Key Issues for Data Management and Integration, 2006
Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity
Successful EA Change Management Requires Five Key Elements
Research Publication Date: 26 December 2007 ID Number: G00153908 Successful EA Change Management Requires Five Key Elements Richard Buchanan Change, in all its many aspects, is a critical aspect of the
The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.
Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives
Key Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.
Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing
The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption
Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references
Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products
Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most
Gartner Clarifies the Definition of the Term 'Enterprise Architecture'
Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,
Cloud, SaaS, Hosting and Other Off-Premises Computing Models
Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,
Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students
Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New
Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing
Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very
IT asset management (ITAM) will proliferate in midsize and large companies.
Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter
Business Intelligence Focus Shifts From Tactical to Strategic
Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth
2010 FEI Technology Study: CPM and BI Show Improvement From 2009
Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management
The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools
Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration
The Five Competencies of MRM 'Re-' Defined
Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management
Eight Critical Forces Shape Enterprise Data Center Strategies
Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects
Q&A: The Many Aspects of Private Cloud Computing
Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner
Now Is the Time for Security at the Application Level
Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now
Data in the Cloud: The Changing Nature of Managing Data Delivery
Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play
Real-Time Decisions Need Corporate Performance Management
Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends
Deliver Process-Driven Business Intelligence With a Balanced BI Platform
Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations
Overcoming the Gap Between Business Intelligence and Decision Support
Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision
2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities
Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial
Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process
Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research
Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.
Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based
Managing IT Risks During Cost-Cutting Periods
Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks
Discovering the Value of Unified Communications
Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions
Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes.
Research Publication Date: 28 August 2008 ID Number: G00159897 HR Self-Service Applications Defined James Holincheck In this research, we discuss the different types of HR self-service and strategies for
BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle
Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement
Gartner Defines Enterprise Information Architecture
Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit
Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game
Research Publication Date: 23 November 2010 ID Number: G00208615 Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game Brian Burke, Mary Mesaglio The U.K.'s
IT Operational Considerations for Cloud Computing
Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.
Research. Mastering Master Data Management
Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has
Key Issues for Business Intelligence and Performance Management Initiatives, 2008
Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management
Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users
Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor
Roundup of Business Intelligence and Information Management Research, 1Q08
Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our
Private Cloud Computing: An Essential Overview
Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan
The Seven Building Blocks of MDM: A Framework for Success
Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)
IT Architecture Is Not Enterprise Architecture
Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use
CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance
Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are
Business Intelligence Platform Usage and Quality Dynamics, 2008
Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's
Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality
Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers
Risk Intelligence: Applying KM to Information Risk Management
Research Publication Date: 19 September 2007 ID Number: G00151742 Risk Intelligence: Applying KM to Information Risk Management French Caldwell Risk intelligence is the alignment of information governance
2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase
Research Publication Date: 20 April 2010 ID Number: G00176029 2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase John E. Van Decker, Cathy Tornbohm This Gartner Financial
The Six Triggers for Using Data Center Infrastructure Management Tools
G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using
Gartner's View on 'Bring Your Own' in Client Computing
G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting
Toolkit: Reduce Dependence on Desk-Side Support Technicians
Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life
Make the maturity model part of the effort to educate senior management, so they understand the phases of the EIM journey.
Research Publication Date: 5 December 2008 ID Number: G00160425 Gartner Introduces the EIM Maturity Model David Newman, Debra Logan Organizations cannot implement enterprise information management (EIM)
The Role of Enterprise Architecture in Technology Research
Research Publication Date: 26 December 2007 ID Number: G00153117 The Role of Enterprise Architecture in Technology Research Brian Burke Enterprise architects are often tasked with identifying disruptive
An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success
Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical
Governance Is an Essential Building Block for Enterprise Information Management
Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways
How To Create A Cloud Computing System
G00230221 Five Cloud Computing Trends That Will Affect Your Cloud Strategy Through 2015 Published: 10 February 2012 Analyst(s): David W. Cearley, David Mitchell Smith In this Impact Assessment, we focus
ERP, SCM and CRM: Suites Define the Packaged Application Market
Research Publication Date: 25 July 2008 ID Number: G00158827 ERP, SCM and CRM: Suites Define the Packaged Application Market Yvonne Genovese, Jeff Woods, James Holincheck, Nigel Rayner, Michael Maoz Users
Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity
Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the
Assessing the Security Risks of Cloud Computing
Research Publication Date: 3 June 2008 ID Number: G00157782 Assessing the Security Risks of Cloud Computing Jay Heiser, Mark Nicolett Organizations considering cloud-based services must understand the
Organizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
Gartner's Business Intelligence and Performance Management Framework
Research Publication Date: 9 October 2006 ID Number: G00142827 Gartner's Business Intelligence and Performance Management Framework Bill Hostmann, Nigel Rayner, Ted Friedman The use of business intelligence
How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits
Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with
Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships
Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving
2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise
Research Publication Date: 23 July 2009 ID Number: G00169733 2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise John E. Van Decker Extensible Business Reporting Language (XBRL) will be a requirement
Best Practices for Confirming Software Inventories in Software Asset Management
Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the
Mainframe Modernization: When Migration Is the Answer
Research Publication Date: 8 January 2010 ID Number: G00171622 Mainframe Modernization: When Migration Is the Answer Dale Vecchio Mainframe migrations can be executed in a number of ways. Which choice
Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in
Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must
The IT Service Desk Market Is Ready for SaaS
Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service
In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand
Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable
Document the IT Service Portfolio Before Creating the IT Service Catalog
Research Publication Date: 8 January 2009 ID Number: G00163200 Document the IT Service Portfolio Before Creating the IT Service Catalog Debra Curtis, Kris Brittain IT service portfolios and IT service
Organizational Structure: Business Intelligence and Information Management
Research Publication Date: 14 April 2006 ID Number: G00138940 Organizational Structure: Business Intelligence and Information Management Betsy Burton, Lee Geishecker, Bill Hostmann, Ted Friedman, David
How BPM Can Enhance the Eight Building Blocks of CRM
Research Publication Date: 6 April 2007 ID Number: G00146588 How BPM Can Enhance the Eight Building Blocks of CRM Marc Kerremans, Jim Davies Business process management (BPM) should complement an organization's
Case Study: Denmark's Achievements With Healthcare Information Exchange
Industry Research Publication Date: 30 May 2006 ID Number: G00139713 Case Study: Denmark's Achievements With Healthcare Information Exchange Jonathan Edwards Through careful use of IT, the Danish health
Cloud IaaS: Service-Level Agreements
G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of
User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009
Dataquest Publication Date: 23 February 2009 ID Number: G00165376 User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Chris Pang Gartner surveyed nearly
Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing
Research Publication Date: 19 July 2011 ID Number: G00214537 Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing Benoit J. Lheureux Paper manufacturer Mohawk Fine Papers needed
Containers and Modules: Is This the Future of the Data Center?
Research Publication Date: 8 April 2011 ID Number: G00211139 Containers and Modules: Is This the Future of the Data Center? David J. Cappuccio Modular and container-based data centers have emerged as yet
