Industry insider news for Australia's technology resellers
International Data Corporation
These search results are from across the Techday Network of sites
‘Radical’ cloud services transforming Philippines IT outsourcing market
The IT outsourcing market in the Philippines is in the midst of a fundamental shift caused by cloud services that are key to its growth.
Smartwatches forecast to dominate wearables market by 2022
It’s been hyped about for years, but according to IDC smartwatches are finally beginning to make an impact on the wearables market.
IDC says there’s a silver lining behind ongoing PC decline
Despite the personal computing devices market posting another decline in 2017, IDC says there are a number of positive aspects to take advantage of.
Blockchain spending to surge 90% in 2018 with 60% on IT services
APAC spent around US$148m on blockchain solutions in 2017, with 2018's forecast almost double that and IT services taking the lion's share.
Detachable tablets return to growth while slate tablets continue decline
Growth for the overall year just remained positive with 1.6 percent year over year growth in 2017, a sharp drop from the 24 percent growth in 2016.
No sign of wear in the wearables market with double digit growth
IDC forecasts vendors will ship a total of 121.7 million wearable devices this year alone, a whopping 16.6 percent increase last year's efforts.
IT spending by AU educational institutions to exceed US$1.6b
Educational institutions in Australia are loosening the purse strings in a move the IDC says is in response to ‘dramatic changes' in student demands.
Traditional PC market declines but fares better than expected
Worldwide shipments of traditional PCs declined in the first quarter of 2017, but surprisingly the figures are more positive than expected.
Global wearables market grows 17.9 percent - and we have a new leader
The worldwide wearables market continued its rapid rise in the first quarter of 2017 (1Q17) with multiple companies experiencing triple digit growth.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?