Papers from Bloor Research
This is a selection of papers on IT-Director.com. Would you like to view all papers we currently hold?
1. Sage ERP X3
Sage targets Sage ERP X3 at companies with 200"2000 employees with a core market from 100 to 500. Support for the product is provided locally either direct from Sage or through a Sage Business Partner. The product is one of the first...
2. Identity Management as a Service
Identity Management (IdM) solutions have been evolving since their establishment in the late 90's with the purpose of simplifying the management of user identities and access rights across an organisation's enterprise. Typically, IdM...
3. DataDirect Shadow v7
Shadow v7 expands the range of SOA and data connectivity options available to existing System z mainframe users.
4. SEEBURGER RFID Gateway/SCM Portal
RFID Gateway/SCM Portal builds upon the solid base of the Business Integration Server.
5. Master Data Management
This document provides a snapshot of the current state of the Master Data Management (MDM) market.
6. Oracle's Commitment to Accessibility
People with disabilities want to be independent; they want to do things for themselves by themselves. This report investigates Oracle's support of accessibility.
7. Sage 200 BI and Sage 1000 BI Business Software Suites
This paper focuses on using Business Intelligence (BI) in conjunction with the Sage 200 and Sage 1000 business software suites for accounting and CRM customers.
8. Unified information supply at the desktop
This Spotlight paper examines the problems with BI systems, looks at the changes needed and why, and suggests some approaches to meeting the user's demands.
9. Hosting - the business drivers
It is fair to say that many organisations can barely function without the IT systems being available whenever business users require access, typically twenty four hours a day, possibly seven days a week.
10. Securing the Business Infrastructure and the Bloor Assured Business
Every board must have the securing of its infrastructure on its agenda. Failing to implement reasonable security may be deemed to be negligent behaviour if allowed to carry on, and may infringe compliance legislation.
11. Managing Spreadsheets
No matter the popularity of spreadsheets they also, used improperly or incorrectly, or without sufficient control, pose a greater threat to your business than almost anything you can imagine.
12. Accessibility and Usability in Information & Communication Technology
This paper is designed to introduce you to the issues, requirements, solutions benefits around accessibility and usability.