IT-Analysis.com
IT-Analysis.com Logo
Technology Infrastructure
Business Issues Channels Enterprise Services SME Technology
Module Header
Craig WentworthMWD Advisors
Craig Wentworth
16th April - Egnyte the blue touchpaper...
Louella FernandesLouella Fernandes
Louella Fernandes
11th April - Managed Print Services: Are SMBs Ready?
Louella FernandesLouella Fernandes
Louella Fernandes
11th April - The Managed Print Services (MPS) Opportunity for SMBs
Simon HollowayThe Holloway Angle
Simon Holloway
11th April - Intellinote - capture anything!
David NorfolkThe Norfolk Punt
David Norfolk
11th April - On the road to Morocco
Module Header
SITS14 - The Service Desk & IT Support Show
29th April - 30th April
London, United Kingdom

View More Events

Introduction

This is a selection of papers on IT-Analysis.com. Would you like to view all papers we currently hold?


Papers from Bloor Research

Published By: Bloor Research
Transformation and consolidation are two of the key challenges, but also opportunities, for telecommunications providers. They must transform from providers of commodity voice services to seek opportunities presented by emerging technologies,...
 
Published By: Bloor Research
In this paper we will consider the need for, and benefits of, implementing information architecture and we will discuss how Sybase PowerDesigner, Version 16, enables that pro­cess. Briefly, Sybase PowerDesigner has 20+ years history of providing...
 
Published By: Bloor Research
Rather than being an inhibitor to take up of cloud computing, the use of cloud services can actually improve an organisation's security stance. Cloud delivery is suitable for a range of security services from basic ones such as malware protection...
 
Published By: Bloor Research
There is much work to be done in providing true data governance solutions. While standard data cleansing, data profiling, master data management and spreadsheet management products are widespread there are a large number of other capabilities...
 
Published By: Bloor Research
In December 2010 the media was alive with stories of hacktivists attacking payment websites including Visa, MasterCard and PayPal in response to those organisation's refusal to take payments in support of the WikiLeaks website. Every day we...
 
Published By: Bloor Research
It is often the case in large enterprises that multiple data marts are deployed, along with a central enterprise data warehouse acting as a system of record. While these data marts serve the requirements of the departments or divisions that...
 
Published By: Bloor Research
The use of complex software is now part of daily business life. Unfortunately cyber criminals are taking advantage of this to spread malware and to attack systems with the aim of stealing information, money and intellectual...
 
Published By: Bloor Research
Data integration has sometimes been portrayed as a necessary evil, a cost centre, a time sink, or in other unflattering terms. Conversely, some vendors, consultants, pundits and analysts have positioned various integration models and...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There is a great deal of discussion right now about advanced analytics, predictive analytics and in-database analytics. What are these? How does advanced analytics (which we take to include, but not be limited to, predictive analytics) differ...

Advertisement



Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761
Email: