- Top 10 Recession-Proof IT Jobs
- 7 Hot IT Jobs That Will Land You a Higher Salary
- Link Building Strategies and Tips for 2014
- Top 10 Accessories for Your iPad Air
Network World - Gartner analysts say they have their trademarked Magic Quadrant down to a science.
But plenty of vendors, gored by the quadrant's twin axes of "completeness of vision" and "ability to execute," insist it's all just hocus-pocus.
The idea of using a two-dimensional graph to summarize and visualize potentially complex values isn't unique or new. Many of Gartner's rivals use variations on the grid to evaluate vendors and technologies, and similar graphs are a staple of business schools.
But the Magic Quadrant - a term Gartner first used in 1992 and copyrighted in the late 1990s - has become a tool so widely known that it's routinely parodied.
The Valley of the Geeks Web site (www.valleyofthegeeks.com) recently ran an updated and simplified "Gartner Magick Quadrante" that mapped a variety of celebrities, ranging from Bill Gates to Janet Reno, along with most of the characters from "The Lord of the Rings" and "Harry Potter" to two axes labeled "Payment to Gartner" and "Agreement with Gartner." The quadrants are labeled Finders, Keepers, Losers, Weepers, which are pretty fair summaries of how many people read the Gartner graph.
In a story about "quadrant presentations" last year in the Venture Capital Journal, Dan Goodermote, a partner with ABS Capital Partners, illustrated how, and how easily, the idea is perverted. He showed a quadrant formed by a vertical axis from Evil to Good, and a horizontal axis from Incompetent to Expert. Not surprisingly, "My Company" ended up in the coveted top right panel - both Good and Expert.
Gartner goes to great lengths to dispel precisely this kind of image, at least among its clients. Over the years, says Gartner's current research guru, Betsy Burton, the company has created a rigorous, standardized format and set of procedures, coupled with internal peer review, intended to ground the Magic Quadrant more on hard data and less on gut feelings.
The simple chart is the only visual relief in what is typically a six- to eight-page Magic Quadrant "Research Note," periodically sent out by Gartner to its subscribers, which include technology companies, venture capitalists and other investors, and enterprise network and IT executives. The idea, Burton says, is to create a "picture of a specific market and where it's going."
A case in point is Richard Stiennon, Gartner's research vice president, who spent weeks preparing a June 2003 Magic Quadrant on network firewall vendors. He followed what Burton says is a rigorous, standardized format that among other things spells out the detailed criteria, and their rationale, for judging a vendor's "vision" and its "ability to execute."
Stiennon collected a range of data, some quantifiable, some qualitative, from interviews with vendors and with Gartner's end-user clients, which account for 62% of Gartner's customers, according to the company. Much of the data is packed into spreadsheets, which generate the first outline of the new quadrant.
This time, Stiennon added a new, and critical, criterion: Did the vendor's product do "deep packet inspection" of the network traffic? The change, in effect, directed attention at a just-emerging trend: the so-called application firewall.
"[Existing products] were doing nothing to stop the worms and the application attacks," Stiennon says. "We saw a huge groundswell for a product that could go much deeper [than existing firewalls]."
Stiennon had to defend the addition, and his conclusions, before a peer group. Burton describes this as part of the company's "Socratic method."
The final step before publication is to circulate the conclusions to the vendors to catch any inaccuracies.
Stiennon's quadrant triggered a minor earthquake in the firewall market when it was published. Of the nearly two dozen vendors, not one made it into the top right quadrant, where both execution and vision are highly rated.
"They said 'No one can be a leader in this quadrant unless they have application firewall capabilities,'" says Andrew Stern, vice president of marketing for MagniFire, an Israeli firewall vendor with offices in New York. He adds that, incidentally, MagniFire was one of the first such vendors to claim that its software could do just that.