Business Process Management
Published: 9th January 2009 | By: Simon Holloway
Process Management is a holistic practice that models an enterprises human and machine tasks and the interactions between them as processes with the view of improving agility and performance.
Exeros
Published: 9th January 2009 | By: Philip Howard
Discovery offers clear technical advantages and has extended capabilities not generally found elsewhere.
Talend Open Studio 3
Published: 30th December 2008 | By: Philip Howard
Talend Open Studio is worth serious consideration in more or less all circumstances.
The importance of an Information Strategy
Published: 23rd December 2008 | By: Philip Howard
The idea of an Information Strategy will be critical to your business success and the key to sustaining your competitive advantage over time.
ShoreTel 8.1 - Unified Communications solution
Published: 3rd December 2008 | By: Bloor Research
ShoreTel has an innovative approach to providing UC solutions based around its distributed ShoreGear voice switches.
Compuware Uniface 9.3
Published: 20th November 2008 | By: Philip Howard
Compuware Uniface continues to gain new customers for not only does the product warrant such an investment, it merits even more widespread consideration.
Protecting Enterprise Data on the Endpoint - a strategic approach
Published: 10th November 2008 | By: Nigel Stanley
This paper explores the protection of enterprise data on endpoint devices.
Business Drivers for Unified Communications - in the Financial Industry
Published: 1st November 2008 | By: Bloor Research
These estimates strongly suggest that companies in the financial sector stand to make significant gains through a strategic commitment to UC.
Business Drivers for Unified Communications - in the Manufacturing Industry
Published: 1st November 2008 | By: Bloor Research
These figures offer compelling evidence that organisations in the manufacturing sector should act swiftly to make a strategic commitment to UC.
Managing data growth on System z
Published: 27th October 2008 | By: Philip Howard
This paper discusses data breakage and access, and then briefly considers how IBM Optim works, particularly with respect to System z.