Data and applications
Published: 21st January 2014 | By: Philip Howard
We hear increasingly about "the data-driven enterprise", where information is regarded as more and more critical to decision making.
The state of play for identity management services - evidence from organisations in Germany and the UK
Published: 6th December 2013 | By: Fran Howarth
The results of this survey show that interest in the use of SaaS applications among organisations in Germany and the UK is increasing.
Content assurance and advanced threat protection for valuable business documents - assuring the safety and integrity of files and documents
Published: 20th November 2013 | By: Fran Howarth
This document aims to highlight the security risks associated with documents and to show why taking such threats seriously is vital for the success of any organisation.
Understanding information landscapes
Published: 8th November 2013 | By: Philip Howard
In this paper we are going to discuss how to gain an understanding of your whole information landscape.
Software tool capabilities for data migration
Published: 13th September 2013 | By: Philip Howard
In this paper the discussion remains as it was in our original paper but we have added a section on Pandora and updated our conclusions.
Considerations for maximising analytic performance
Published: 5th September 2013 | By: Philip Howard
Bloor Research was asked to compare the performance capabilities of the leading business analytic platforms.
Information optimisation
Published: 5th August 2013 | By: Philip Howard
Maximising your information resources means being able to access all of your data, regardless of where it resides and irrespective of the format it may be in.
Thinking holistically about query environments
Published: 26th July 2013 | By: Philip Howard
This paper is about how business intelligence complements analytic processes and applications - and how both of these are complemented by data governance.
Reducing the risk of development failure - with cost-effective capture and management of requirements
Published: 18th July 2013 | By: David Norfolk
Requirements management has been around for a long time as a systems engineering discipline, but it's suddenly getting interesting again.
Blended security threats need a unified response - the need for an integrated, cloud-based threat vector management platform
Published: 25th June 2013 | By: Fran Howarth
Security threats are becoming increasingly complex, sophisticated and targeted and no organisation is immune.