Find An Analyst

Browse

Name Coverage Area
Lakehal,Bruno PCs, Laptops & Handheld Devices
Lam,Lai-Ling Print Markets & Management
Landers,Garth Servers & Storage
Landry,Susan Application Development & Integration
Digital Workplace
Laney,Douglas Data Management & Integration
Business Intelligence
Laracuenta,Raymond Small & Midsize Business
IT Management
Lassman,Jay Networking & Communications Equipment
Lau,Raymond Servers & Storage - Comparative Hardware
Lawson,Craig Security & Privacy
Lee,Ben Semiconductors
Leeb-Du Toit,Rand IT Management
Lefebure,Steven Healthcare
Lehong,Hung IT Management
Leong,Lydia Outsourcing & IT Services
Networking & Communications Services
Leow,Adrian Mobile & Wireless
Lerner,Andrew Networking & Communications Equipment
Lewis,Bryan Semiconductors
Lheureux,Benoit J. Application Development & Integration
Li,Yulan Print Markets & Management
Light,Matt Application Development & Integration
Linden,Alexander Business Intelligence
Lisica,James Supply Chain
Litan,Avivah Security & Privacy
Liu,Peter Networking & Communications Equipment
Liu,Venecia K Media
Networking & Communications Services
Lo,Twiggy Outsourcing & IT Services
Logan,Debra Digital Workplace
Data Management & Integration
Regulatory Compliance
Longwood,Jim Outsourcing & IT Services
Lopez,Jorge IT Management
Lord,Katherine IT Operations
Lord,Paul Supply Chain
Loveland,Jennifer Supply Chain
Lovelock,John-David Healthcare
Low,Suzie Servers & Storage
Lowans,Brian Security & Privacy
Lowendahl,Jan-Martin Education
Lu,Ck PCs, Laptops & Handheld Devices
Lupino,Theresa Consumer Technologies
Lutman,William Mobile & Wireless
PCs, Laptops & Handheld Devices
Gartner, Inc.

Become a Client

Call us now at:

+1-800-213-4848 Or
Contact us Online

RESEARCH

MORE

WEBINARS

MORE
  • 01 Sep 2015

    Top Security Trends for 2015 - 2016 EDT: 9:00 a.m. & 12:00 p.m. | PDT: 6:00 a.m. & 9:00 a.m. | GMT: 13:00 & 16:00 During 2014 we've seen profound changes in cybersecurity, altering planning, delivery, operations and management in an attempt to keep up with new and increasing threats to the enterprise. Traditional approaches to IT security have limited impact and require changes as well. This webinar will review the lessons learned and inform listeners to use the past to create the future.
  • 01 Sep 2015

    Key Success Factors of Mergers & Acquisitions by TSPs EDT: 11:00 a.m. | PDT: 8:00 a.m. | GMT: 15:00 Mergers and acquisitions (M&As) among technology and service providers (TSPs) can provide many long-term benefits, but often face challenges with short-term messaging, sales and marketing momentum, and product positioning. This webinar discusses key strategies that TSPs can utilize to avoid the pitfalls and reap the benefits of the deal. Learn ways to improve internal and external communication, maintain progress with customers and prospects, and shape product roadmap decisions.