
Comparative costs and uses of Data Integration Platforms
Published: 7th August 2008 | By: Philip Howard
This paper examines how data integration platforms are being used: what types of integration tasks they are being used for, on what scale, and whether this differs by product or vendor.

RFID Middleware
Published: 14th July 2008 | By: Simon Holloway
This market update will look at the RFD middleware space; the first area in the Bloor RFID stack and is software related.

Data Migration Market Update 2008
Published: 6th June 2008 | By: Philip Howard
Data migration is a very large subset of the data integration market. According to our research the market for data migration was significantly in excess of $5bn last year.

Endpoint Data Protection
Published: 4th June 2008 | By: Nigel Stanley
By failing to secure its endpoints an organisation and its executives could be subjected to reputational damage as well as legal actions.

RFID Middleware – From RFID to Sensory Network middleware for the edge
Published: 23rd May 2008 | By: Simon Holloway
Having previously introduced the different categories that make up the components of an RFID solution, we take a look at the first layer of software - RFID middleware.

Data Integration Platforms
Published: 5th May 2008 | By: Philip Howard
This update focuses on data integration platforms suitable for deployment on an enterprise-wide basis.

Enterprise Data Protection
Published: 22nd April 2008 | By: Nigel Stanley
Enterprise Data Protection is a new and evolving market place that represents the coming together of leak and loss prevention technologies.

Data Leak Prevention
Published: 18th April 2008 | By: Nigel Stanley
Data loss is a prevalent problem that has resulted in significant reputational and legal issues for many organisations. It is desirable to stop data leaking in the first place...

Data Encryption
Published: 18th April 2008 | By: Nigel Stanley
Encryption is the process of taking a piece of data (the plain text) and obscuring it so that unauthorised people cannot view the original information (this is called cipher text).