IT-Analysis.com
IT-Analysis.com Logo
Business Issues Regulation
Business Issues Channels Enterprise Services SME Technology
Module Header
Louella FernandesLouella Fernandes
Louella Fernandes
22nd April - Internet of Things: A New Era for Smart Printing?
Simon HollowayThe Holloway Angle
Simon Holloway
18th April - Virgin Media expose private email addresses
Craig WentworthMWD Advisors
Craig Wentworth
17th April - Box's enterprise customers step forward to be counted
Craig WentworthMWD Advisors
Craig Wentworth
16th April - Egnyte the blue touchpaper...
Module Header
SITS14 - The Service Desk & IT Support Show
29th April - 30th April
London, United Kingdom
Ten Steps to Data Quality
8th May - 9th May
London, United Kingdom

View More Events

Introduction

This is a selection of papers on IT-Analysis.com. Would you like to view all papers we currently hold?


Papers from Bloor Research

Published By: Bloor Research
Email is of vital importance as a communications and collaboration tool as it is one of the prime ways that business information is communicated and shared. This makes its storage and archiving a necessity for maintaining and improving productivity.
 
Published By: Bloor Research
The Solvency II Directive for insurance and reinsurance companies in the EU comes into force on December 31st 2012. The Directive mandates a much more stringent approach to capital adequacy, much in the same way that Basel II and the...
 
Published By: Bloor Research
The Solvency II Directive for insurance and reinsurance companies in the EU comes into force on December 31st 2012. The Directive mandates a much more stringent approach to capital adequacy, much in the same way that Basel II and the forthcoming...
 
Published By: Bloor Research
The growth of compliance requirements over the past few years has sometimes been seen as a US-based phenomenon as regulations are implemented to address various corporate failures and scandals over the past decade or so. In fact, compliance,...
 
Published By: Bloor Research
This document provides a snapshot of the current state of the Master Data Management (MDM) market. Master data is data that is shared between computer systems: data domains such as customer, product,...
 
Published By: Bloor Research
There is a great deal of discussion right now about advanced analytics, predictive analytics and in-database analytics. What are these? How does advanced analytics (which we take to include, but not be limited to, predictive analytics) differ...
 
Published By: Bloor Research
What, precisely, do we mean by 'operational data quality'? It is not a single thing. That is, it can be deployed to support a variety of different requirements. Any definition of operational data quality must therefore be broad and...
 
Published By: Bloor Research
Local authorities provide a wide range of services from housing and education to business services and the environment. This means that they handle a substantial amount of sensitive information related to individuals, as well as material...
 
Published By: Bloor Research
Identity Management (IdM) solutions have been evolving since their establishment in the late 90's with the purpose of simplifying the management of user identities and access rights across an organisation's enterprise. Typically, IdM...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
This paper represents a snapshot and brief summary of the log and (security) event management market. A more detailed discussion of this market, together with overviews of each product, a discussion of the issues involved and product...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...

Advertisement



Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761
Email: