Gartner, Align Thyself
- 14 December, 2001 12:40
When Gartner's current CIO took the helm and called attention to terminal misalignment, was it a case of the emperor's new clothes? Here's a candid look at where Gartner's been and where it's going.
- Learn how a prominent analyst firm recognised its own alignment problems.
- Understand the processes it developed to recover strategic alignment.
- Get a behind the scenes look at the IT operations of the A¼ber-analysts Gartner, one of the world's most influential information technology research and consulting companies, makes its living dispensing advice on technology, strategy and business.
-IT alignment. So it is profoundly ironic that the company recently faced its own misalignment woes. During the late 1990s, the consultancy suffered from a chronic lack of communication between its IT department and its far-flung business units. That disconnect cost the company millions of dollars every year, in the estimation of its own CIO and other observers.
These troubles were exacerbated by a no-holds-barred acquisition strategy that went awry in the dust of the dotcom bust last spring. Like some of its clients, Gartner saw its market valuation and share price drop, and it had to sell off and take a loss on some of what it swallowed during the boom-time feeding frenzy. The company is now applying its own advice internally and using the lessons it learned in restoring alignment between its own IT department and its business side to meet the recession-time challenges of restoring investor confidence and bolstering its bread-and-butter research revenue.
Here is the story of how Gartner dug itself into a hole and how it is digging out.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Managing the Rapid Rise in Database Growth: 2011 IOUG Survey on Database Manageability
- Maximising productivity without sacrificing security
- Moving to a Private Cloud? Infrastructure Really Matters!
- In Control at Layer 2: A Tectonic Shift in Network Security
- NetApp FAS6240 Clustered SAN Champion of Champions
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Spear-Phishing Email: Most Favored APT Attack Bait
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
IDC: Delivering Customer Value with Enterprise Flash Deployments
When it comes to flash, “one size does not fit all.” IDC examines recent flash trends in enterprise storage deployments. This includes: highlighting how SSDs are filling in gaps of existing storage systems when coupled with intelligent archiving and automated tiering, the pros and cons of different SSD approaches, and tips to overcome concerns of reliability, manageability and scalability.
Advanced Targeted Attacks
The new threat landscape has changed. Cybercriminals are aggressively pursuing valuable data assets, such as financial transaction information, product design blueprints, user credentials to sensitive systems, and other intellectual property. Simply put, the cyber offense has outpaced the defensive technologies used by most companies today. Find out more on how to protect against the next generation of cyber-attacks.