Papers from Bloor Research
This is a selection of papers on IT-Director.com. Would you like to view all papers we currently hold?
1. EMC Data Domain Replicator
EMC Data Domain has extended the capabilities of its in-line deduplication appliances, which typically reduce data backup storage by around 95%, to gain greater savings when replicating to remote locations over a wide area network (WAN). In this...
2. No Software. No Source Code. No Problem.
The use of complex software is now part of daily business life. Unfortunately cyber criminals are taking advantage of this to spread malware and to attack systems with the aim of stealing information, money and intellectual...
3. Identity Management as a Service
Identity Management (IdM) solutions have been evolving since their establishment in the late 90's with the purpose of simplifying the management of user identities and access rights across an organisation's enterprise. Typically, IdM...
4. DataDirect Shadow v7
Shadow v7 expands the range of SOA and data connectivity options available to existing System z mainframe users.
5. Master Data Management
This document provides a snapshot of the current state of the Master Data Management (MDM) market.
6. Oracle's Commitment to Accessibility
People with disabilities want to be independent; they want to do things for themselves by themselves. This report investigates Oracle's support of accessibility.
7. Sage 200 BI and Sage 1000 BI Business Software Suites
This paper focuses on using Business Intelligence (BI) in conjunction with the Sage 200 and Sage 1000 business software suites for accounting and CRM customers.
8. Unified information supply at the desktop
This Spotlight paper examines the problems with BI systems, looks at the changes needed and why, and suggests some approaches to meeting the user's demands.
9. Hosting - the business drivers
It is fair to say that many organisations can barely function without the IT systems being available whenever business users require access, typically twenty four hours a day, possibly seven days a week.
10. Securing the Business Infrastructure and the Bloor Assured Business
Every board must have the securing of its infrastructure on its agenda. Failing to implement reasonable security may be deemed to be negligent behaviour if allowed to carry on, and may infringe compliance legislation.
11. Managing Spreadsheets
No matter the popularity of spreadsheets they also, used improperly or incorrectly, or without sufficient control, pose a greater threat to your business than almost anything you can imagine.
12. Accessibility and Usability in Information & Communication Technology
This paper is designed to introduce you to the issues, requirements, solutions benefits around accessibility and usability.