Papers from Bloor Research
This is a selection of papers on IT-Director.com. Would you like to view all papers we currently hold?
1. Master Data Management
This document provides a snapshot of the current state of the Master Data Management (MDM) market. Master data is data that is shared between computer systems: data domains such as "customer", "product",...
2. Log & Event Management: Novell
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
3. Enterprise Data Protection
The need for Enterprise Data Protection isnow more pressing than ever before.
4. Data Leak Prevention
Data leak prevention can play a significant part in data protection as it prevents unauthorised data leaving an organisation's endpoints.
5. DataDirect Shadow v7
Shadow v7 expands the range of SOA and data connectivity options available to existing System z mainframe users.
6. Master Data Management
This document provides a snapshot of the current state of the Master Data Management (MDM) market.
7. Oracle's Commitment to Accessibility
People with disabilities want to be independent; they want to do things for themselves by themselves. This report investigates Oracle's support of accessibility.
8. Sage 200 BI and Sage 1000 BI Business Software Suites
This paper focuses on using Business Intelligence (BI) in conjunction with the Sage 200 and Sage 1000 business software suites for accounting and CRM customers.
9. Unified information supply at the desktop
This Spotlight paper examines the problems with BI systems, looks at the changes needed and why, and suggests some approaches to meeting the user's demands.
10. Hosting - the business drivers
It is fair to say that many organisations can barely function without the IT systems being available whenever business users require access, typically twenty four hours a day, possibly seven days a week.
11. Securing the Business Infrastructure and the Bloor Assured Business
Every board must have the securing of its infrastructure on its agenda. Failing to implement reasonable security may be deemed to be negligent behaviour if allowed to carry on, and may infringe compliance legislation.
12. Managing Spreadsheets
No matter the popularity of spreadsheets they also, used improperly or incorrectly, or without sufficient control, pose a greater threat to your business than almost anything you can imagine.
13. Accessibility and Usability in Information & Communication Technology
This paper is designed to introduce you to the issues, requirements, solutions benefits around accessibility and usability.