[x] I Accept Cookies

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Find out more here.

Filter Research

  • Research Reports
  • Product Evaluations
  • Spotlights
  • White Papers
  • FULL ARCHIVE

Contact Us

Further Information
If you are interested in any product or service from Bloor:

RSS Feeds

  • Research Publications
  • Analysis & Opinion
  • Events

Home > Research

Bloor Research Library - Our Latest Papers

Bloor has a library of over 750 published research papers which provide incisive but cost effective decision support information. Our research publications can help your organisation by giving you:

Here are some of our latest papers - to see others, please select an option from the right-hand menu or use our search facility.

spacer

The value of big data in security - leveraging big data for intelligence-led security
By: Fran Howarth

This paper discusses the benefits that implementing a security intelligence platform can bring and discusses the essential components that organisations should look for when selecting a system.

spacer

Atego Asset Library
By: David Norfolk

Storing system and software engineering artefacts for large-scale reuse.

spacer

Uniface Modernisation - moving enterprise integration into composite applications without pain
By: David Norfolk

In the current climate, wasting existing resources is not an option and Uniface modernisation allows you to deliver modern web applications that donât compromise the exploitation of web and service orientation models.

spacer

Enhancing security through a trust-based approach - advanced threats require advanced weapons
By: Fran Howarth

By creating a trusted environment in which only known good applications can run, control is handed back to the IT department.

spacer

Micro Focus Silk Performer 2012 - in comparison with HP LoadRunner
By: David Norfolk

The purpose of this report was not to find a âwinnerâ but instead to provide information, to assist with purchasing decisions, that sheds light on the differences and similarities of these tools.

spacer

Data Masking
By: Philip Howard

In this paper we shall discuss why it is important, why you should consider using a tool, and what features you should look for.

spacer

Service Virtualisation
By: Philip Howard

This document represents a snapshot of the current state of the service virtualisation market.

spacer

Master Data Management
By: Andy Hayler

This document provides a snapshot of the current state of the Master Data Management (MDM) market.

spacer

Business Process Management
By: Simon Holloway

Since I last did a review of the market for BPMS it has been interesting to note that many of my predictions for what would happen have mostly come true.

spacer

Challenges and opportunities in the telecommunications sector
By: Fran Howarth

Transformation and consolidation are two of the key challenges, but also opportunities, for telecommunications providers.

spacer

Data profiling: the business case
By: Philip Howard

This paper discusses the benefits of automating the discovery of data quality issues through the use of data profiling technology.

spacer

Security based on trust not fear - ...the importance of a trusted cloud and Internet ecosystem
By: Fran Howarth

To build trust in electronic networks, security needs to be built into a suitable framework, rather than being bolted on.

spacer

Analytics in Telecommunications
By: Philip Howard

In this paper we will describe some of the key analytic areas that are important to telecommunications companies and discuss the argument in favour of using third party analytic application providers.

spacer

uRiKA
By: Philip Howard

uRiKA is an appliance for graph analytics which contains a graph database, but what exactly is a graph database or, for that matter, a graph, and why should you care?

spacer

Exploring Successful Approaches to Test Data Management
By: Philip Howard

Test Data Management (TDM) is about the provisioning of data for non-production environments.

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.