IBM InfoSphere Data Replication & Federation
Published: 31st August 2011 | By: Philip Howard
IBM’s data integration products provide three methods for delivering data: ETL (extract, transform and load), which provides bulk (batch) data loading functionality; data federation, which supports virtual data delivery; and data replication, which allows incremental updates. The use of ETL…
Data Migration Report – 2011
Published: 23rd August 2011 | By: Philip Howard
This paper draws from both our latest research and a comparison with the results of our 2007 survey.
Tips for improving the integrity of networks - using application and change control to thwart attackers
Published: 23rd August 2011 | By: Fran Howarth
According to numerous research studies, configuration errors account for 60% to 65% of network downtime.
Where is the Business? - Business intelligence empowered by location
Published: 22nd August 2011 | By: Natalie Newman
Business intelligence supports decision-making but location shows you 'Where is the Business?'
Saphir from Silwood Technology
Published: 18th August 2011 | By: Philip Howard
It is not often that one can give an unequivocal recommendation for a product or technology. There are nearly always some sort of mitigating or offsetting factors...
Building Breakthrough Applications
Published: 18th August 2011 | By: Philip Howard
A breakthrough application changes the way that the user does his work. It doesn't just automate processes: it innovates and alters them, often radically.
Choosing a platform or an application based approach to MDM
Published: 10th August 2011 | By: Philip Howard
In this paper we will discuss the requirement for multi-domain MDM implementations. Rather than consider this in general terms we will illustrate this by means of a number of use cases.
Architecting the security of the next-generation data centre - Why security needs to be a key component early in the design phase
Published: 9th August 2011 | By: Fran Howarth
This document is aimed at those looking at data centre builds, upgrades or consolidation. It provides an introduction to some of the new security challenges of such environments and provides recommendations for implementing security in next-generation dat
Grid-Tools Data Masking
Published: 25th July 2011 | By: Philip Howard
This paper argues that using manual methods for data masking will typically be inadequate, is time consuming and costly.
Uses and benefits of SaaS-based Enterprise Social Networking
Published: 6th July 2011 | By: Roger Whitehead
SaaS-based enterprise social networking is ready for prime time but not yet for organisations that demand high security or close compliance with rules.