Uniface Modernisation - moving enterprise integration into composite applications without pain
Published: 14th November 2012 | By: David Norfolk
In the current climate, wasting existing resources is not an option and Uniface modernisation allows you to deliver modern web applications that don't compromise the exploitation of web and service orientation models.
Enhancing security through a trust-based approach - advanced threats require advanced weapons
Published: 7th November 2012 | By: Fran Howarth
By creating a trusted environment in which only known good applications can run, control is handed back to the IT department.
Micro Focus Silk Performer 2012 - in comparison with HP LoadRunner
Published: 30th October 2012 | By: David Norfolk
The purpose of this report was not to find a 'winner' but instead to provide information, to assist with purchasing decisions, that sheds light on the differences and similarities of these tools.
Data Masking
Published: 3rd October 2012 | By: Philip Howard
In this paper we shall discuss why it is important, why you should consider using a tool, and what features you should look for.
Service Virtualisation Market Update
Published: 1st October 2012 | By: Philip Howard
This document represents a snapshot of the current state of the service virtualisation market.
Business Process Management
Published: 13th September 2012 | By: Simon Holloway
Since I last did a review of the market for BPMS it has been interesting to note that many of my predictions for what would happen have mostly come true.
Master Data Management Market Update – 2012
Published: 13th September 2012 | By: Andy Hayler
This document provides a snapshot of the current state of the Master Data Management (MDM) market.
Challenges and opportunities in the telecommunications sector
Published: 6th September 2012 | By: Fran Howarth
Transformation and consolidation are two of the key challenges, but also opportunities, for telecommunications providers.
Security based on trust not fear - ...the importance of a trusted cloud and Internet ecosystem
Published: 30th August 2012 | By: Fran Howarth
To build trust in electronic networks, security needs to be built into a suitable framework, rather than being bolted on.
Data profiling: the business case
Published: 30th August 2012 | By: Philip Howard
This paper discusses the benefits of automating the discovery of data quality issues through the use of data profiling technology.