IT-Analysis.com
IT-Analysis.com Logo
Business Issues Channels Enterprise Services SME Technology
Module Header
Louella FernandesLouella Fernandes
Louella Fernandes
22nd April - Internet of Things: A New Era for Smart Printing?
Simon HollowayThe Holloway Angle
Simon Holloway
18th April - Virgin Media expose private email addresses
Craig WentworthMWD Advisors
Craig Wentworth
17th April - Box's enterprise customers step forward to be counted
Craig WentworthMWD Advisors
Craig Wentworth
16th April - Egnyte the blue touchpaper...
Module Header
SITS14 - The Service Desk & IT Support Show
29th April - 30th April
London, United Kingdom
Ten Steps to Data Quality
8th May - 9th May
London, United Kingdom

View More Events

Introduction

This is a selection of papers on IT-Analysis.com. Would you like to view all papers we currently hold?


Papers from Bloor Research

Published By: Bloor Research
Businesses today have the opportunity to make huge gains by leveraging more data than ever before for both analytics and operations to improve customer service, speed products to market, cut costs and more. They could use lots and lots...
 
Published By: Bloor Research
Identity and access management technologies and services are used to increase security by ensuring that applications and the data they contain are not accessed inappropriately. These services also aid productivity by ensuring that those with the...
 
Published By: Bloor Research
This paper compares different approaches to reporting against the JD Edwards (Oracle) EnterpriseOne and World ERP application suites. It should be noted that the general comments made here would be applicable to any ERP environment...
 
Published By: Bloor Research
Cloud-based applications and services, and software-as-a-service applications in particular, are coming into widespread use by organisations of all sizes. Such applications are used to process and store sensitive information making it imperative...
 
Published By: Bloor Research
Volumes of data created and processed by organisations are spiralling rapidly as ever more information-generating devices, including mobiles and industrial control devices connect to networks. According to the McKinsey Global Institute, the amount...
 
Published By: Bloor Research
By continuously monitoring information flows in real time, organisations will better be able to ward off internal and external threats
 
Published By: Bloor Research
It can be argued that the best and perhaps only real true measure of performance for any computer system is how long it takes to respond to a user's request for information or, en masse, how long it takes to respond to all users' requests. Given...
 
Published By: Bloor Research
Volumes of data are expanding rapidly, and effectively harnessing the data volumes generated by organisations today brings both significant gains as well as challenges. In particular, big data security sets bring specialised challenges owing to…
 
Published By: Bloor Research
Today, all organisations face threats from targeted, sophisticated attacks by well resourced and motivated criminals who are looking to conduct industrial espionage for the purpose of stealing trade secrets or intellectual property, to disrupt...
 
Published By: Bloor Research
Application modernisation is a particularly useful option for bringing legacy Uniface software up-to-date with the latest SOA (Services Oriented Architecture) applications and web services interfaces. You can even add a modern Uniface layer (using...
 
Published By: Bloor Research
This paper is a comparison of two performance testing products: Silk Performer from Micro Focus, which is part of the Silk integrated software quality suite and the market-leading HP LoadRunner (originally acquired when HP bought Mercury, and part...
 
Published By: Bloor Research
Cyberthreats are becoming ever more insidious and affect organisations of all sizes, spanning all industries. In many cases, the organisation will not know that it has been a victim of an attack as today's threats aim to evade...
 
Published By: Bloor Research
One of the first of these (possibly the very first, depending on what you define as an intelligent asset library) has been developed by Atego, which specialises in standards-based development of 'systems of systems'...
 
Published By: Bloor Research
Like most technologies, Business Process Management (BPM) has continued to change and evolve over the years. Since I last did a review of the market for BPMS (Business Process Management, December 2008) and then later BRMS (Business Rules...
 
Published By: Bloor Research
This document provides a snapshot of the current state of the Master Data Management (MDM) market. Master data is data that is shared between computer systems: data such as 'customer',...

Advertisement



Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761
Email: