IT-Analysis.com
IT-Analysis.com Logo
Technology
Business Issues Channels Enterprise Services SME Technology
Module Header
Louella FernandesLouella Fernandes
Louella Fernandes
11th April - Managed Print Services: Are SMBs Ready?
Louella FernandesLouella Fernandes
Louella Fernandes
11th April - The Managed Print Services (MPS) Opportunity for SMBs
Simon HollowayThe Holloway Angle
Simon Holloway
11th April - Intellinote - capture anything!
David NorfolkThe Norfolk Punt
David Norfolk
11th April - On the road to Morocco
Philip HowardBloor IM Blog
Philip Howard
10th April - Attunity Gold Client
Module Header
SITS14 - The Service Desk & IT Support Show
29th April - 30th April
London, United Kingdom

View More Events

Introduction

These papers have been filed against the Technology domain. Would you like to view all papers we currently hold?


Papers in Technology

Published By: Quocirca
The MPS market has matured since many organisations inked their first deal. Organisations moving beyond first generation engagements have often reached the end of their cost-cutting phase and are looking for innovation to drive more business value.
 
Published By: Quocirca
Often, Quocirca finds that an organisation has one team, FM, looking after the physical facility of the data centre, with another, IT, looking after the servers, storage and network equipment, along with the software running within it.
 
33. Safyr
Published By: Bloor Research
Safyr (pronounced as in 'sapphire' and previously known as Saphir), from Silwood Technology, provides ERP metadata intelligence to organisations that have implemented one or more of SAP, SAP BW, Oracle E-Business Suite, Siebel, PeopleSoft...
 
Published By: Bloor Research
Businesses today have the opportunity to make huge gains by leveraging more data than ever before for both analytics and operations to improve customer service, speed products to market, cut costs and more. They could use lots and lots...
 
Published By: Bloor Research
Identity and access management technologies and services are used to increase security by ensuring that applications and the data they contain are not accessed inappropriately. These services also aid productivity by ensuring that those with the...
 
Published By: Bloor Research
This paper compares different approaches to reporting against the JD Edwards (Oracle) EnterpriseOne and World ERP application suites. It should be noted that the general comments made here would be applicable to any ERP environment...
 
Published By: Bloor Research
By continuously monitoring information flows in real time, organisations will better be able to ward off internal and external threats
 
Published By: Quocirca
This paper discusses how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. Includes new research amongst 150 enterprises.
 
Published By: Quocirca
This paper should be of interest to all those in roles charged with the responsibility of providing secure access to online resources and to those who want to make the case for rolling out new online services.
 
Published By: Quocirca
The CRD brings new reporting structures into place. A business-driven language, the eXtensible Business Reporting Language (XBRL) is a mandated part of how financial organisations across the EU have to submit their reports to the necessary bodies.
 
Published By: Quocirca
New research, presented in this report, underlines the scale and real impact of the problem, the measures being taken to defend against targeted attacks and how effective they are.
 
Published By: Bloor Research
It can be argued that the best and perhaps only real true measure of performance for any computer system is how long it takes to respond to a user's request for information or, en masse, how long it takes to respond to all users' requests. Given...
 
Published By: Bloor Research
Volumes of data are expanding rapidly, and effectively harnessing the data volumes generated by organisations today brings both significant gains as well as challenges. In particular, big data security sets bring specialised challenges owing to…
 
Published By: Bloor Research
Today, all organisations face threats from targeted, sophisticated attacks by well resourced and motivated criminals who are looking to conduct industrial espionage for the purpose of stealing trade secrets or intellectual property, to disrupt...
 
Published By: Quocirca
This report presents research that underlines the scale of the problem and makes the case for more automation in IT operations management, rather than deploying more and/or cheaper labour.

Advertisement



Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761
Email: