Search Gartner

Are you a Gartner client?

to search within your MyGartner experience.
171 results

Executive Summary: Extreme Performance Management: Managing High Achievers and Underperformers

12 February 2014 |  1 April 2010

| 

An indicator for tomorrow’s extremes in performance is the degree of engagement today. Assess those who demonstrate the greatest interest in their work and you will find those who are most likely to be tomorrow’s high achievers. By contrast, those who are showing least interest are ...

Analyst(s): Andrew R. Walker

Executive Summary: The Advantages, Economics and Value of Reuse

12 February 2014 |  1 July 2010

| 

The idea of reuse in IT has been around since the 1990s. Leaders are redefining this idea, tying it directly to business performance rather than restricting it to technology. The result is new tools that create business advantage, change IT economics and generate new sources of value. ...

Analyst(s): Mark P. McDonald

Executive Summary: The Business-Oriented Technical Professional

12 February 2014 |  1 September 2010

| 

The role of IT is evolving from an internal service provider at the heritage stage of maturity to a business leader and peer in meeting external customer needs at the pervasive stage of maturity. To make this journey successfully depends on building a business-capable IT workforce. ...

Analyst(s): Andrew R. Walker Andy Rowsell-Jones

Executive Summary: Reimagining IT: The 2011 CIO Agenda

1 January 2011

| 

Modest budget growth and growing legacy requirements have forced CIOs and IT to make heavy operational commitments. New lighter-weight technologies and IT models enable CIOs to reimagine IT and focus on two objectives that elude many IT organizations: growth and strategic impact. ...

Analyst(s): Mark P. McDonald Dave Aron

Executive Summary: Leading People Through Periods of Unplanned Demand

1 February 2011

| 

CIOs must develop strategies to respond to the spikes in unplanned demand that plague IT. With IT environments becoming leaner, this means sustaining critical priorities while adapting to additional work requirements. The problem for many CIOs is that they may already be operating ...

Analyst(s): Heather Colella Diane Berry

Executive Summary: Optimizing IT Assets: Is Cloud Computing the Answer?

1 February 2011

| 

Changing markets and new technology are raising the bar on IT asset performance. Approaching IT asset investment as a planned journey allows CIOs to optimize their investment decisions. This report addresses the question, What are CIOs doing to optimize their IT assets? “Optimizing ...

Analyst(s): Andy Rowsell-Jones Barbara Gomolski

Executive Summary: A Different Theory of the Firm and IT: Comprehensive Value and Dynamic Capabilities

1 April 2011

| 

If you were creating a company from scratch, would you immediately copy the processes, practices and structures of today’s enterprises, or would you do something different? Either way, you would start with the need to create value, but then the idea of value may change, broadening ...

Analyst(s): Mark P. McDonald Jeffrey Cole

Executive Summary: Don't Waste a Crisis: Becoming an Engaged IT Organization

1 March 2011

| 

A crisis can strike anytime. IT organizations focused solely on supplying expected services cannot react to a crisis quickly or effectively, and so they risk becoming commoditized or obsolete. The business-engaged IT organization, however, uses a crisis as an opportunity to help ...

Analyst(s): Patrick Meehan Leigh McMullen Jacques Begin

Executive Summary: Masters of Innovation: What CIOs Can Learn From the World's Best Innovators

1 May 2011

| 

It’s long been known that innovation is not achieved through business-as-usual practices. Yet a majority of enterprises still struggle to support it. This report studies master innovators—individuals who create breakthrough results through serial innovation—and analyzes how CIOs ...

Analyst(s): Mary Mesaglio Dave Aron Cristina Lazaro

Executive Summary: Benefits Realization: The Gift That Keeps On Giving

1 September 2011

| 

The only reason to make business investments, including IT-intensive ones, is to generate business value (the benefits). But most enterprises and their IT organizations have weak benefits realization practices. This weakness is becoming more of an issue as IT-intensive investments ...

Analyst(s): Dave Aron Michael Smith

Executive Summary: Managing Strategic Partnerships

1 June 2011

| 

To support business value and innovation-focused initiatives, CIOs are expanding their use of partnerships as they conduct traditional run-the-business activities. The increased complexities inherent in these partnerships, which generate high business value, cannot be effectively ...

Analyst(s): Partha Iyengar Heather Colella William R. Snyder

Executive Summary: Capturing Business Value From Mass-Market Mobile Technologies

1 August 2011

| 

The “consumerization” of IT with mobile devices and their ecosystem of applications—what this report calls “mass-market mobility”—has gone into overdrive. CIOs need to focus on how these devices drive innovation and create business value, carefully balancing device and data control ...

Analyst(s): Andy Rowsell-Jones Nick Jones Monica Basso

CIO Power Politics Executive Summary

1 October 2011

| 

Leadership and power go hand in hand. CIOs often have significant positional power, yet typically they must deal with an array of enterprise stakeholders with equal or superior power. Many CIOs view power as inherently negative, rather than as an asset essential to strong leadership. ...

Analyst(s): Tina Nunno Heather Colella

Executive Summary: Building the IT Brand: Impacting the Front Office and Beyond

1 October 2011

| 

CEOs expect technology to power the business into adjacent markets and channels. To be successful in this mission, CIOs must build a strong IT “brand” as credible providers of front-office and customer-facing business solutions. Branding is not normally part of IT’s lexicon, and this ...

Analyst(s): Patrick Meehan Leigh McMullen

Executive Summary: New Skills for the New IT

1 November 2011

| 

With almost half of CIOs planning to move most applications and infrastructure to the cloud over the next four years, and with the rapid rise of social media and new digital technologies, CIOs have an opportunity to re-imagine IT. As the automation of operational processes and the ...

Analyst(s): John P. Roberts Lily Mok

Executive Summary: Amplifying the Enterprise: The 2012 CIO Agenda

1 January 2012

| 

Technology’s role in the enterprise is increasing. This does not mean, however, that the role of the IT organization is increasing. CIOs concentrating on IT as a force of operational automation, integration and control are losing ground to executives who see technology as a business ...

Analyst(s): Mark P. McDonald Dave Aron

Executive Summary: Apple: At the Vanguard of Change?

1 December 2011

| 

Apple is at the forefront of a wave of consumer-focused vendors that IT is increasingly being asked to support. The company’s business model does not follow that of the traditional IT enterprise vendor; therefore, Apple has not been a vendor of choice for most IT organizations. Still, ...

Analyst(s): Mary Mesaglio Ken Dulaney Michael A. Silver

Executive Summary: Sustainable Enterprise Change

1 February 2012

| 

As enterprises face increased pressure to change, traditional management practices no longer provide an effective solution. When an enterprise tries to cope with too much change for too long, it becomes fatigued and less able to take on new change, no matter how important. Fortunately, ...

Analyst(s): Lee Weldon Richard Hunter Cassio Dreyfuss

Prevention Is Futile in 2020: Protect Information Via Pervasive Monitoring and Collective Intelligence

27 January 2016 |  30 May 2013

| 

Information security can no longer prevent advanced targeted attacks. IT will not own the majority of user devices or services that users consume. Too much information security spending has focused on the prevention of attacks and not enough has gone into security monitoring and ...

Analyst(s): Neil MacDonald

High-Tech Tuesday Webinar: The Rise of the Business Buyer — Fact or Fiction?

5 August 2015 |  13 March 2014

| 

Who's Buying Technology? Business or IT? IT Is Now "Everyone's IT" Key Issues A Brief Walk Through History Demand Is Growing From Outside of IT It's a Lot of Money And It Isn't Held by Marketing Key Issues That's Not All That Has Changed The B2B Buying Process Has Changed Cross-Functional ...

Analyst(s): Derry N. Finkeldey

Top 10 Mobile Technologies and Capabilities for 2015 and 2016

16 October 2015 |  12 February 2014

| 

Organizations wishing to unlock the full potential of mobility must master a wide range of technologies and skills, many of which are currently unfamiliar to IT staff. The business and technical opportunities enabled by our "top 10" mobile technologies and skills should be explicitly ...

Analyst(s): Nick Jones

Digital Business Forever Changes How Risk and Security Deliver Value

24 August 2015 |  10 April 2014

| 

Digital business takes advantage of technologies that are outside of traditional enterprise control in dynamic environments, with little stability or predictability. Risk and security departments are no longer the defenders of the organization; they are the facilitators of a balance ...

Analyst(s): Paul E. Proctor Andrew Walls

Five Steps to Best Practices in Supply Chain Benchmarking: From Numbers to Action

30 December 2016 |  28 March 2014

| 

The reasons to do a benchmark study are often unclear, and the stated goals are often only part of the story, making it hard to achieve the benefits. The benchmarking effort typically takes longer and is significantly more difficult than anticipated. Finding a good comparison peer ...

Analyst(s): Debra Hofman Debashis Tarafdar Jane Barrett

Top U.S. Supply Chain Graduate University Programs, 2014

12 January 2016 |  16 September 2014

| 

University supply chain programs' relevance to modern supply chain organizations has improved markedly through a combination of applied course work and more frequent and applied work experience. A combination of program scope, internship and co-op participation, and perceived value ...

Analyst(s): Dana Stiffler Karen Carter

Five Golden Rules for Creating Effective Security Policy

7 January 2016 |  17 September 2014

| 

Security policies that are developed by the security team in isolation alienate the rest of the organization and lead to high levels of resistance and counterproductivity. A rigid policy unnecessarily removes your ability to consider multiple options to hard or complex problems. ...

Analyst(s): Rob McMillan Jay Heiser