Downloads

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
This file demonstrates the technique explained in the article A super easy way to generate new records from multi-value columns using Excel Power Query.

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
This special report from ZDNet and TechRepublic examines the current and future role of edge computing.

Companies are moving away from traditional bases of distributed computing instead opting for IoT (Internet of Things) sensors, cameras, remote devices, servers, and networks at the edges of their enterprises.

In 2018, Tech Pro Research surveyed technology professionals to find out why they implemented or planned to implement these edge computing technologies, what areas delivered the greatest benefit from edge computing, and what were the greatest edge computing implementation challenges.

Survey respondents answered the following questions:
  • For what business purposes/applications are you using or do you plan to use edge computing?
  • In which area are you seeing the greatest business benefit/payback from edge computing?
  • What are your greatest challenges in implementing edge computing?
  • How is edge computing most affecting your central data center?
  • Are you using cloud services with your edge computing implementation?
Survey results show that 52% of respondents currently use edge computing technologies, and 51% of respondents plan to employ edge computing technologies within the next 12 months.

Edge solutions vary by marketplace. According to survey respondents, 52% use edge computing for mobile devices and laptops, and 47% use it for remote servers and networks.

In the future, companies will expand their scope of edge computing by investing in IoT-based technologies that assist with enterprise physical security, monitoring, and automated equipment.

Facility management and security are two major focus areas for companies deploying or planning to deploy edge technology. The ability to monitor and maintain equipment located at remote sites without traveling to perform maintenance, as well as the capability to monitor and manage physical facilities in real-time, speaks to edge computing's vast appeal.

Implementation of edge computing solutions is an area where vendors can offer value-added services to help corporate clients.

This report contains all the data, plus analysis, from the survey. For details on future Tech Pro Research surveys, follow us on Facebook, Twitter, or LinkedIn.

To read all the results from the survey, plus analysis, download the full report.

Every month, Tech Pro Research releases an original research report on a different topic related to business technology. Here are some past reports:

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
With Security in Your Code, It's Game Over for Threats! Contrast Community Edition is a free product that assesses open source & custom software code for vulnerabilities, provides remediation guidance early in the SDLC, and blocks attacks when applications move into production. No security expertise is required, so it’s game over for threats as development organizations break free and move fast. This all is accomplished with an innovative security-as-code approach that fits with the way software is built and deployed today.

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
  1. Easily monitor network traffic
  2. Monitor flow data for traffic alongside fault, availability, and performance of network devices.
  3. Identify top talkers within minutes
  4. Determine which users, applications, or protocols are utilizing the most bandwidth.
  5. Prioritize network bandwidth utilization
  6. Use CBQoS to measure effectiveness and implement policies.

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
Just one bug in your code and Security cracks down! Contrast Community Edition is a free product that assesses open source & custom software code for vulnerabilities, provides remediation guidance early in the SDLC, and blocks attacks when applications move into production. No security expertise is required, so development organizations can break free and move fast. This all is accomplished with an innovative security-as-code approach that fits with the way software is built and deployed today.

My Tweets

Last Articles

EUC Weekly Digest – January 19, 2019

Interesting EUC items from last week: Citrix VDA Download Citrix Connection Quality Indicator...

Open source has a problem with monetization, not AWS

Open sourcerors keep wrongly trying to blame AWS for their inability to effectively monetize open...

Bug bounty programs: Everything you thought you knew is wrong

One common criticism of bug bounty programs is that very few hackers actually make money. Not only...

How to troubleshoot remotely with the Vuforia Chalk augmented reality app

Solve problems faster--without travel--with this mobile, video-based augmented reality solution.

How to troubleshoot remotely with the Vuforia Chalk AR app

Solve problems faster--without travel--using this mobile, video-based augmented reality solution.

3 things businesses should know about Google's G Suite price increase

Google is raising prices for G Suite Basic and G Suite Business productivity suites for the first...

Windows 10's troubled 1809 update is headed your way after months of fixing showstopping bugs

Windows 10 computers started receiving the new version of the OS via Windows Update yesterday,...

Open source Spectrum library enables edge processing of images for faster performance

Spectrum can be used to perform image processing on smartphones before uploading data to servers,...

VirtualBox 6.0 brings a much needed upgrade to the UI

VirtualBox 6.0 is out and includes a number of improvements including a new file manager, more...

Microsoft fixes Windows 10's Wi-Fi hotspot problems and closes app snooping loophole

The flaws and a tranche of others were resolved by three bundles of updates for Windows 10 that...

  • EUC Weekly Digest – January 19, 2019

    Saturday, 19 January 2019 12:30
  • Open source has a problem with monetization, not AWS

    Friday, 18 January 2019 18:30
  • Bug bounty programs: Everything you thought you knew is wrong

    Friday, 18 January 2019 18:30
  • How to troubleshoot remotely with the Vuforia Chalk augmented reality app

    Friday, 18 January 2019 16:30
  • How to troubleshoot remotely with the Vuforia Chalk AR app

    Friday, 18 January 2019 16:30
  • 3 things businesses should know about Google's G Suite price increase

    Thursday, 17 January 2019 15:30
  • Windows 10's troubled 1809 update is headed your way after months of fixing showstopping bugs

    Thursday, 17 January 2019 14:30
  • Open source Spectrum library enables edge processing of images for faster performance

    Thursday, 17 January 2019 13:30
  • VirtualBox 6.0 brings a much needed upgrade to the UI

    Wednesday, 16 January 2019 19:30
  • Microsoft fixes Windows 10's Wi-Fi hotspot problems and closes app snooping loophole

    Wednesday, 16 January 2019 18:30