Tools for Data Migration
Published: 12th September 2013 | By: Philip Howard
This paper discusses the various types of tools that may or should be used to support successful data migrations.
Considerations for maximising analytic performance
Published: 5th September 2013 | By: Philip Howard
Bloor Research was asked to compare the performance capabilities of the leading business analytic platforms.
Master Data Management Market Update – 2013
Published: 19th August 2013 | By: Andy Hayler
This document provides a snapshot of the current state of the Master Data Management (MDM) market.
CSI Tools - Access Governance for Identities in SAP Environments
Published: 19th August 2013 | By: Fran Howarth
CSI Tools provide the automation required to solve the access governance problems that are inherent in SAP environments.
Information optimisation
Published: 5th August 2013 | By: Philip Howard
Maximising your information resources means being able to access all of your data, regardless of where it resides and irrespective of the format it may be in.
Thinking holistically about query environments
Published: 26th July 2013 | By: Philip Howard
This paper is about how business intelligence complements analytic processes and applications - and how both of these are complemented by data governance.
Reducing the risk of development failure - with cost-effective capture and management of requirements
Published: 18th July 2013 | By: David Norfolk
Requirements management has been around for a long time as a systems engineering discipline, but it's suddenly getting interesting again.
The importance of performance to DevOps
Published: 18th July 2013 | By: Philip Howard
Production performance is not normally a functional requirement for application development projects but, in our minds, it should be.
Trimble Field Service Management
Published: 1st July 2013 | By: Philip Howard
While Trimble's solutions have their history in location or position-centric solutions it is arguable that work-centric or worker-centric might be more apt descriptions for its Field Service Management division.
Blended security threats need a unified response - the need for an integrated, cloud-based threat vector management platform
Published: 25th June 2013 | By: Fran Howarth
Security threats are becoming increasingly complex, sophisticated and targeted and no organisation is immune.