Forrester Research - News, Features, and Slideshows
The emergence of Apple Pay has led some technology early adopters to predict that mobile payments will dominate U.S. consumer spending in the next decade.
By Matt Hamblen | 18 November, 2014 08:20
Over the next four years, data center traffic is expected to nearly triple, largely thanks to a booming cloud computing industry.
By Sharon Gaudin | 05 November, 2014 14:22
Forrester has cut its worldwide IT spending forecast for this year, saying growth will be 3.3 per cent in US dollars, rather than 6.2 per cent. Total spending will be $US2.2 trillion.
By Chris Kanaracus | 14 August, 2014 06:26
IBM hopes to expand its customer base and sell to executives outside of IT, including marketers, with a new set of consulting services that can be bought online with a credit card.
By Chris Kanaracus | 07 August, 2014 03:49
A private Cloud looks and acts like a public Cloud, giving your corporation all the speed, agility and cost savings promised by Cloud technology, only it's single-tenant, and that tenant is you, right? Well, that's the goal, but it's not quite the reality yet for most enterprises.
By Christine Burns | 03 June, 2013 11:17
Windows 8 faces a number of hurdles in the enterprise, but the biggest reason it won't replace the current corporate champion, Windows 7, is simple: IT shops don't think it's worth the upgrade hassle.
By Gregg Keizer | 17 May, 2013 14:43
Whitepapers about Forrester Research
How do you ensure you are choosing the right threat intelligence solution for your organization? The recent Forrester Research, Inc. report, “Use Actionable Threat Intelligence to Protect Your Digital Business,” describes the characteristics of effective threat intelligence and what to look for in a threat intelligence vendor (August 2014).
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
Bolstered by favorable economics, today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
- Sony looking for ways to distribute 'The Interview' online
- Sony hack was 'cyber vandalism,' not act of war, says Obama
- US rejects North Korea offer to investigate Sony hack, reaches out to China
- North Korea wants joint probe into Sony hack, warns of consequences if not
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Twitter parody of North Korea's mouthpiece not afraid to crow over Sony's capitulation
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Buckle up IT: The enterprise needs you for cloud adoption
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
- Microsoft hits Windows tech support scammers with lawsuit