Toolkit: Tutorial: Comparing Wireless Broadband Technologies for the Enterprise Campus
|
|
- Felicity Riley
- 8 years ago
- Views:
Transcription
1 Gartner for IT Leaders Publication Date: 22 September 2006 ID Number: G Toolkit: Tutorial: Comparing Wireless Broadband Technologies for the Enterprise Campus Robin Simpson Since early 2005, colleges and universities worldwide have been among the first organizations to deploy large-scale based Wi-Fi mesh networks to provide Internet and intranet access for their students and staff. As in business, the laptop has become an important student tool in many educational institutions, with applications including online access to course materials and research, audio and video streaming of lectures and tutorials, distribution and submission of assignments via , and collaboration among students and staff. However, as in business, voice remains the No. 1 mobile application for personal and academic use. Because most students today arrive on campus with their own mobile phone, some institutions have also begun to provide infrastructure to improve cellular coverage in-building and across the campus. The same technologies can be applied to almost any kind of large business or government precinct with outdoor and indoor areas from head offices or factory complexes to shopping malls, city halls and airports. Key Findings Businesses face the same mobile application, work-style and infrastructure issues as colleges and universities, so they should study the campus wireless network design and deployment lessons learned by those institutions. A single network technology fixed or wireless cannot satisfy all campus mobile connectivity needs. A hybrid network will be required for the foreseeable future. Enterprises should consider partnerships with public infrastructure operators for largearea campus deployments to minimize capital and operational costs especially for voice services. Enterprises that own or control their buildings and campus surroundings have two things every wireless operator wants: real estate for antennas and base stations, and right of way for backhaul two valuable commodities when building a wireless network. Predictions WiMAX will not be a viable campus Wi-Fi backhaul technology until WiMAX will not be a viable mobile wireless broadband access technology before Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.
2 Recommendations Supplement your fixed wireless LAN with a wireless WAN and wireless mesh network strategy for campus mobile broadband. Use wireless LAN or wireless mesh for short-term or temporary campus wireless deployments, such as open days, conferences and sporting events and use the experiences gained to plan permanent installations. Publication Date: 22 September 2006/ID Number: G Page 2 of 7
3 ANALYSIS The Technologies Available for Campus Wireless Wi-Fi technology conforming to at least the b and g standards is built into almost every enterprise laptop today, and an increasing number of enterprise-class PDAs and cell phones, as a low-cost or no-cost option. Thus, from the point of view of the end user at least, it is an ideal low-cost network access technology. However, Wi-Fi is not the only choice for the campus network infrastructure itself, particularly if coverage of a large geographic area is required Wi- Fi mesh, WiMAX, proprietary wireless broadband access or even 3G cellular networks may all have a place. Comparing the Available Technologies for Access and Backhaul Table 1 shows the wireless broadband technologies that can be used for campus deployment. Table 1. Wireless Broadband Technologies for Campus Deployment Technology Strengths Weaknesses Future Fixed Wi-Fi LAN ( a,b,g) Low-cost consumer premises equipment (CPE) for b and g now included in many laptops PC Card CPE available Low-cost infrastructure Relatively easy and fast to deploy "Free" industrial, scientific and medical (ISM) band spectrum Strong standards and very competitive vendor market Ideal for access Useful for backhaul and bridging a good for capacity and channel management High, symmetrical bandwidth Data usage is free within the campus network Limited range (100 m) Not very scalable to large networks No standards-based roaming No cell-to-cell mobility Limited channels for b and g a has channel or licensing issues in some countries The 2.4GHz ISM band used by b and g is prone to interference from other Wi-Fi networks, or from consumer technologies like Zigbee or Bluetooth Battery and processor hungry at higher bandwidths Access point capacity can limit voice capacity n standard, when agreed, will support greater than 100-Mbps throughput may be overshadowed by WiMAX at least for backhaul and outdoor coverage of large areas Publication Date: 22 September 2006/ID Number: G Page 3 of 7
4 Technology Strengths Weaknesses Future Wi-Fi Mesh ( plus proprietary extensions) Low-cost CPE for b and g now included in many laptops PC Card CPE available Low-cost infrastructure that is highly scalable to large areas Easy and very fast to deploy "Free" ISM band spectrum Ideal for access and backhaul b, g can be used for access along with a for mesh backhaul High, symmetrical bandwidth Data usage free Proprietary IEEE s mesh standard still under development Single vendor lock-in for supply and support No guarantee that vendors will support eventual s standard No standards-based roaming No cell-to-cell mobility The 2.4GHz ISM band used by b and g is prone to interference from other Wi-Fi networks, or from consumer technologies like Zigbee or Bluetooth Battery and processor hungry at higher bandwidths Voice performance can be poor because multihop mesh backhaul architecture leads to congestion and latency issues WiMAX may be used for Wi-Fi Mesh backhaul, with Wi-Fi used for access may be overshadowed by WiMAX, at least for backhaul and outdoor coverage of large areas 3G Cellular (wideband code division multiple access [WCDMA] and code division multiple access [CDMA] 1xEVDO) Wide range of PC Card CPE and mobile terminals available Increasing numbers of vendors offering laptops with built-in PCI Express 3G CPE Uses operator-owned infrastructure (no capex) Excellent range (5~20 km) means coverage likely to be better than Wi-Fi Provides high-quality voice as well as data Battery efficient Full mobility, including cell-to-cell handoff at vehicular speeds Relatively expensive CPE Asymmetric, relatively low bandwidth ( Kbps) Coverage may be limited to high-population-density areas Requires operator to buy expensive licensed spectrum Expensive for data usage unless you get a "flat-rate" contract Even then, "fair-use" data limits may be an issue Premature laptop obsolescence if not firmware upgradable to High Speed Packet Downlink Access (HSDPA) and High-Speed Uplink Packet Access (HSUPA) Most PC vendors will include built-in PCI Express 3G CPE The next evolution of 3G called HSDPA will bring data rates of 300-Kbps uplink and 2- to 3-Mbps downlink by 2007 HSUPA will lift uplink speeds to 1 to 2 Mbps by G Long-Term Evolution (LTE) will bring data rates of up to 100 Mbps but may not be deployed until 2012 or later Publication Date: 22 September 2006/ID Number: G Page 4 of 7
5 Technology Strengths Weaknesses Future Mobile WiMAX ( ) Time Division, Code Division Multiple Access (TD-CDMA) and Proprietary WBA (Examples include iburst, IP Wireless, Navini, Flarion, Soma) Source: Gartner (September 2006) 2- to 10-Mbps bandwidth, symmetrical at option of operator Highly scalable Base stations much less expensive than cellular or proprietary wireless broadband access (WBA) Excellent range (5 to 20 km) Very competitive vendor market Full mobility, including cell-to-cell handoff at vehicular speeds Ideal for backhaul and for access by 2008 Typically 1-Mbps asymmetric bandwidth Scalable Excellent range (5 to 20 km) Full mobility, including cell-to-cell handoff at vehicular speeds Battery efficient Available now, wellestablished and proven in commercial deployment Ideal for access No mobile CPE and terminals available yet Mobile WiMAX certification process has not begun Requires operator to buy expensive licensed spectrum Battery efficiency not known yet Not available yet, relatively unproven in commercial deployment Relatively expensive base stations Limited choice of CPE and terminals, usually from only one vendor Will likely follow the same path to commoditization as Wi- Fi, including effectively free CPE in laptops by 2009 Likely to be a common public infrastructure by 2010, but not ubiquitous Bandwidth will steadily increase Ideal for access once CPE costs approach zero Window of opportunity until mobile WiMAX is ready for widespread commercial deployment in 2008 Future will depend on finalization of the IEEE standard for mobile wireless broadband Why Not Go All-Wireless Now, Both In-Building and Outdoors? With the current hype about Wi-Fi and WiMAX, many clients planning new purpose-built offices, office moves or refurbishments have asked us whether they should avoid installing fixed wires altogether by deploying all-wireless network access. Despite recent advances, our advice remains the same: Enterprises will need both fixed and wireless infrastructure for the foreseeable future. It is certainly true that, as work becomes more mobile, there will be more and more demand for wireless connectivity in our offices, but the fact remains that wired infrastructure will provide the best price/performance for the near future, fundamentally because wireless is a shared medium. End users who today enjoy 100-Mbps or even 1-Gbps fixed network connectivity at their desktop will be very disappointed if they become one of 10 people sharing the 54-Mbps (or even 108-Mbps) theoretical total throughput of a typical access point. Even if 90% of enterprise applications work satisfactorily with the bandwidth delivered by wireless, most organizations will have some desktop applications that demand greater bandwidth or quality of service. A few simple examples include: Publication Date: 22 September 2006/ID Number: G Page 5 of 7
6 Media-rich interactions, such as videoconferencing or virtual collaboration. The limited latency and aggregate throughput of wireless even today means you can only get six to 10 simultaneous voice sessions into an access point. It is unlikely that a wireless access point could support more than one or two simultaneous videoconferences. File transfer tasks, such as backing up the 60GB disk on a desktop or laptop. Such intense traffic generated by a single user badly degrades the performance of a shared network designed to cope with shorts bursts of traffic from multiple users. Applications using large datasets, such as computer-aided design, geographic information systems, video editing, high-resolution digital photography and digital publishing. Thus, most office environments will need wires and fiber as well as wireless for the foreseeable future. RECOMMENDED READING "Toolkit: Checklist: Choosing Wireless Broadband Technologies for the Enterprise Campus" "Cell-Fi Handsets Not Yet Ready for Mainstream Business Use" "3G Wireless Notebooks Will Be a Futile Gold Rush" "Distributed Antenna Systems Support Enterprise In-Building Wireless Strategy" "When Wireless Broadband Makes Sense for Enterprise Use and the Available Technologies" Acronym Key and Glossary Terms 3G CPE Cell-Fi WBA Wi-Fi WiMAX Wireless Mesh WLAN The third-generation cellular wireless networks, which support increased voice capacity and peak data speeds up to 2 Mbps in fixed locations and up to 384 Kbps at pedestrian speeds. Consumer premises equipment the hardware interface to the network; for wireless networks, typically a built-in wireless modem or PC Card wireless modem. A dual-mode mobile terminal that includes two radios: one for connection to cellular voice networks and one for connection to Wi-Fi networks. Wireless broadband access a generic term for broadband access using any wireless technology. Wireless Fidelity certification by the Wi-Fi Alliance of a, b or g standards compliance and interoperability. Worldwide Interoperability for Microwave Access broadband wireless technology based on the IEEE standards. A mesh topology network based on Wi-Fi standards but typically linked together by proprietary extensions today. The Wi-Fi Alliance Task Group s is developing a proposal for consideration as an IEEE standard. A network that connects devices or LAN segments using radio (the unlicensed 2.4GHz and 5GHz bands), instead of physical cables. Publication Date: 22 September 2006/ID Number: G Page 6 of 7
7 REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Publication Date: 22 September 2006/ID Number: G Page 7 of 7
Toolkit: Checklist: Choosing Wireless Broadband Technologies for the Enterprise Campus
Gartner for IT Leaders Publication Date: 22 September 2006 ID Number: G00143395 Toolkit: Checklist: Choosing Wireless Broadband Technologies for the Enterprise Campus Robin Simpson Wi-Fi mesh solutions
More informationResearch Agenda and Key Issues for Converged Infrastructure, 2006
Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the
More informationClients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in
Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must
More informationResearch. Key Issues for Software as a Service, 2009
Research Publication Date: 6 February 2009 ID Number: G00164873 Key Issues for Software as a Service, 2009 Robert P. Desisto, Ben Pring As organizations' capital budgets dry up, clients evaluating SaaS
More informationCost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products
Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most
More informationQ&A: The Many Aspects of Private Cloud Computing
Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner
More informationThe Lack of a CRM Strategy Will Hinder Health Insurer Growth
Industry Research Publication Date: 15 October 2008 ID Number: G00162107 The Lack of a CRM Strategy Will Hinder Health Insurer Growth Joanne Galimi The Gartner 2008 healthcare payer application survey
More informationDeliver Process-Driven Business Intelligence With a Balanced BI Platform
Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations
More informationKey Issues for Data Management and Integration, 2006
Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity
More informationEight Critical Forces Shape Enterprise Data Center Strategies
Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects
More informationLTE, WLAN, BLUETOOTHB
LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed
More informationIT asset management (ITAM) will proliferate in midsize and large companies.
Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter
More informationIT Operational Considerations for Cloud Computing
Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.
More informationToolkit: Reduce Dependence on Desk-Side Support Technicians
Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life
More informationVendor Focus for IBM Global Services: Consulting Services for Cloud Computing
Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very
More informationKey Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
More informationCase Study: A K-12 Portal Project at the Miami-Dade County Public Schools
Industry Research Publication Date: 31 December 2007 ID Number: G00154138 Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Bill Rust The Miami-Dade County Public Schools a school
More informationCloud E-Mail Decision-Making Criteria for Educational Organizations
Research Publication Date: 10 June 2011 ID Number: G00213675 Cloud E-Mail Decision-Making Criteria for Educational Organizations Matthew W. Cain Educational organizations sometimes struggle to choose between
More informationThe Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption
Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references
More informationKey Issues for Business Intelligence and Performance Management Initiatives, 2008
Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management
More informationThe What, Why and When of Cloud Computing
Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.
More informationKnowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets
Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research
More informationBest Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control
Research Publication Date: 12 February 2008 ID Number: G00154811 Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control Steve Blood Companies spend too much on IP-PBXs
More informationThe Five Competencies of MRM 'Re-' Defined
Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management
More informationWhen to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud
Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing
More informationQ&A: How Can ERP Recurring Costs Be Contained?
Research Publication Date: 18 December 2008 ID Number: G00163030 Q&A: How Can ERP Recurring Costs Be Contained? Peter Wesche Driven by increased pressure for cost containment, attendees at the 2008 Financial
More informationXBRL Will Enhance Corporate Disclosure and Corporate Performance Management
Research Publication Date: 23 April 2008 ID Number: G00156910 XBRL Will Enhance Corporate Disclosure and Corporate Performance Management Nigel Rayner, Neil Chandler Extensible Business Reporting Language
More informationThe Current State of Agile Method Adoption
Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand
More informationAn outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success
Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical
More informationBusiness Intelligence Platform Usage and Quality Dynamics, 2008
Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's
More informationBEA Customers Should Seek Contractual Protections Before Acquisition by Oracle
Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement
More informationResponsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users
Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor
More informationIntegrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process
Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research
More informationFor cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.
Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing
More information2010 FEI Technology Study: CPM and BI Show Improvement From 2009
Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management
More informationCloud, SaaS, Hosting and Other Off-Premises Computing Models
Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,
More informationPredicts 2008: The Market for Servers and Operating Systems Continues to Evolve
Research Publication Date: 6 December 2007 ID Number: G00152575 Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve John Enck, Philip Dawson, George J. Weiss, Rakesh Kumar,
More informationDiscovering the Value of Unified Communications
Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions
More informationThe EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.
Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives
More informationIron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.
Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based
More informationPrivate Cloud Computing: An Essential Overview
Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan
More informationManaging IT Risks During Cost-Cutting Periods
Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks
More informationReal-Time Decisions Need Corporate Performance Management
Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends
More informationThe IT Service Desk Market Is Ready for SaaS
Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service
More informationBest Practices for Confirming Software Inventories in Software Asset Management
Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the
More informationCloud IaaS: Service-Level Agreements
G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of
More informationCost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending?
Industry Research Publication Date: 11 February 2009 ID Number: G00164764 Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Jeff Vining Government CIOs are under increasing
More informationHow Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits
Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with
More informationGartner Updates Its Definition of IT Infrastructure Utility
Research Publication Date: 23 April 2004 ID Number: M-22-2393 Gartner Updates Its Definition of IT Infrastructure Utility Claudio Da Rold Our new definition of IT infrastructure utility clears away some
More informationDocument the IT Service Portfolio Before Creating the IT Service Catalog
Research Publication Date: 8 January 2009 ID Number: G00163200 Document the IT Service Portfolio Before Creating the IT Service Catalog Debra Curtis, Kris Brittain IT service portfolios and IT service
More informationThe Value of Integrating Configuration Management Databases With Enterprise Architecture Tools
Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration
More informationCase Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students
Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New
More informationResearch. Mastering Master Data Management
Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has
More informationBusiness Intelligence Focus Shifts From Tactical to Strategic
Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth
More informationTactical Guideline: Minimizing Risk in E-Mail Hosting Relationships
Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving
More informationEmbrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy
Research Publication Date: 19 August 2010 ID Number: G00205618 Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Johan Jacobs Customers are insisting on multiple methods to
More informationOrganizations Should Implement Web Application Security Scanning
Research Publication Date: 21 September 2005 ID Number: G00130869 Organizations Should Implement Web Application Security Scanning Amrit T. Williams, Neil MacDonald Web applications are prone to vulnerabilities
More informationOvercoming the Gap Between Business Intelligence and Decision Support
Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision
More informationCDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance
Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are
More informationRepurposing Old PCs as Thin Clients as a Way to Save Money
Research Publication Date: 30 March 2009 ID Number: G00166341 Repurposing Old PCs as Thin Clients as a Way to Save Money Mark A. Margevicius, Stephen Kleynhans Tough economic times are forcing customers
More informationOrganizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
More informationUse These Guidelines for Making Better CRM Consulting Provider Selections
Research Publication Date: 7 July 2006 ID Number: G00141062 Use These Guidelines for Making Better CRM Consulting Provider Selections Matthew Goldman, Ed Thompson, Lorrie Scardino Gartner sees many inconsistencies
More informationThe Six Triggers for Using Data Center Infrastructure Management Tools
G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using
More informationData Center Redesign Yields an 80%-Plus Reduction in Energy Usage
Research Publication Date: 10 August 2011 ID Number: G00213049 Data Center Redesign Yields an 80%-Plus Reduction in Energy Usage Jay E. Pultz The National Renewable Energy Laboratory's (NREL's) data center
More informationEmerging PC Life Cycle Configuration Management Vendors
Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market
More informationMicrosoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality
Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers
More informationNow Is the Time for Security at the Application Level
Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now
More informationNGFWs will be most effective when working in conjunction with other layers of security controls.
Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such
More informationData in the Cloud: The Changing Nature of Managing Data Delivery
Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play
More informationModify Your Storage Backup Plan to Improve Data Management and Reduce Cost
G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures
More informationIT Architecture Is Not Enterprise Architecture
Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use
More information2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities
Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial
More informationSuccessful EA Change Management Requires Five Key Elements
Research Publication Date: 26 December 2007 ID Number: G00153908 Successful EA Change Management Requires Five Key Elements Richard Buchanan Change, in all its many aspects, is a critical aspect of the
More informationIn the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand
Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable
More informationGartner Clarifies the Definition of the Term 'Enterprise Architecture'
Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,
More informationCase Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game
Research Publication Date: 23 November 2010 ID Number: G00208615 Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game Brian Burke, Mary Mesaglio The U.K.'s
More informationContainers and Modules: Is This the Future of the Data Center?
Research Publication Date: 8 April 2011 ID Number: G00211139 Containers and Modules: Is This the Future of the Data Center? David J. Cappuccio Modular and container-based data centers have emerged as yet
More informationThe Seven Building Blocks of MDM: A Framework for Success
Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)
More informationEHR Advantages and Disadvantages
Industry Research Publication Date: 3 February 2010 ID Number: G00174011 The Limits of Certification and Guarantees in Buying Electronic Health Records in the U.S. Wes Rishel It is important not to rely
More informationTips for Evaluators: Better Business Intelligence RFPs
Research Publication Date: 11 May 2009 ID Number: G00167840 Tips for Evaluators: Better Business Intelligence RFPs James Richardson Many of the business intelligence (BI) RFP data-collection exercises
More informationHow BPM Can Enhance the Eight Building Blocks of CRM
Research Publication Date: 6 April 2007 ID Number: G00146588 How BPM Can Enhance the Eight Building Blocks of CRM Marc Kerremans, Jim Davies Business process management (BPM) should complement an organization's
More informationAgenda for Supply Chain Strategy and Enablers, 2012
G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling
More informationGovernment 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary.
Industry Research Publication Date: 11 November 2009 ID Number: G00172423 Government 2.0: Gartner Definition Andrea Di Maio Given the increasing confusion and hype surrounding Government 2.0, it is important
More informationGartner Defines Enterprise Information Architecture
Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit
More informationThe Next Generation of Functionality for Marketing Resource Management
G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management
More informationUser Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009
Dataquest Publication Date: 23 February 2009 ID Number: G00165376 User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Chris Pang Gartner surveyed nearly
More informationCase Study: Denmark's Achievements With Healthcare Information Exchange
Industry Research Publication Date: 30 May 2006 ID Number: G00139713 Case Study: Denmark's Achievements With Healthcare Information Exchange Jonathan Edwards Through careful use of IT, the Danish health
More informationRisk Intelligence: Applying KM to Information Risk Management
Research Publication Date: 19 September 2007 ID Number: G00151742 Risk Intelligence: Applying KM to Information Risk Management French Caldwell Risk intelligence is the alignment of information governance
More informationBackup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity
Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the
More informationKey Issues for Consumer Goods Manufacturers, 2011
Industry Research Publication Date: 1 March 2011 ID Number: G00210698 Key Issues for Consumer Goods Manufacturers, 2011 Don Scheibenreif, Dale Hagemeyer Gartner's 2011 consumer goods manufacturing research
More informationInvest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement.
Research Publication Date: 29 April 2008 ID Number: G00154802 Key Metrics for IT Service and Support David M. Coyle, Kris Brittain To evaluate IT service and support performance, senior management must
More informationGartner's View on 'Bring Your Own' in Client Computing
G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting
More informationERP, SCM and CRM: Suites Define the Packaged Application Market
Research Publication Date: 25 July 2008 ID Number: G00158827 ERP, SCM and CRM: Suites Define the Packaged Application Market Yvonne Genovese, Jeff Woods, James Holincheck, Nigel Rayner, Michael Maoz Users
More information2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase
Research Publication Date: 20 April 2010 ID Number: G00176029 2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase John E. Van Decker, Cathy Tornbohm This Gartner Financial
More informationData Center Consolidation in Western Europe Faces Limitations
Research Publication Date: 19 September 2006 ID Number: G00143179 Data Center Consolidation in Western Europe Faces Limitations Rakesh Kumar Organizations embarking on pan-european data center site consolidation
More informationConsider Identity and Access Management as a Process, Not a Technology
Research Publication Date: 2 September 2005 ID Number: G00129998 Consider and Management as a Process, Not a Technology Earl L. Perkins, Ant Allan This Research Note complements earlier Gartner research
More informationMicrosoft and Google Jostle Over Cloud-Based E-Mail and Collaboration
Research Publication Date: 24 March 2008 ID Number: G00156216 Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Tom Austin Both Google and Microsoft come up short in terms of delivering
More informationMarketScope for IT Governance, Risk and Compliance Management, 2008
Research Publication Date: 11 February 2008 ID Number: G00154941 MarketScope for IT Governance, Risk and Compliance Management, 2008 Paul E. Proctor, Mark Nicolett, French Caldwell The IT GRCM market was
More informationTransactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes.
Research Publication Date: 28 August 2008 ID Number: G00159897 HR Self-Service Applications Defined James Holincheck In this research, we discuss the different types of HR self-service and strategies for
More informationEnabling Notebook Users with Wide-Area Broadband Access
QUALCOMM Incorporated September, 2005 Table of Contents Executive Summary.............................................. 1 Introduction................................................... 1 Market Drivers
More information