You are not logged in:
Log In | Register
Main Navigation (Explore Website):
Further Information
If you are interested in any product or service from Bloor:
Home > Research
Bloor has a library of over 750 published research papers which provide incisive but cost effective decision support information. Our research publications can help your organisation by giving you:
Here are some of our latest papers - to see others, please select an option from the right-hand menu or use our search facility.
The value of big data in security - leveraging big data for intelligence-led security
By: Fran Howarth
This paper discusses the benefits that implementing a security intelligence platform can bring and discusses the essential components that organisations should look for when selecting a system.
Atego Asset Library
By: David Norfolk
Storing system and software engineering artefacts for large-scale reuse.
Uniface Modernisation - moving enterprise integration into composite applications without pain
By: David Norfolk
In the current climate, wasting existing resources is not an option and Uniface modernisation allows you to deliver modern web applications that donât compromise the exploitation of web and service orientation models.
Enhancing security through a trust-based approach - advanced threats require advanced weapons
By: Fran Howarth
By creating a trusted environment in which only known good applications can run, control is handed back to the IT department.
Micro Focus Silk Performer 2012 - in comparison with HP LoadRunner
By: David Norfolk
The purpose of this report was not to find a âwinnerâ but instead to provide information, to assist with purchasing decisions, that sheds light on the differences and similarities of these tools.
Data Masking
By: Philip Howard
In this paper we shall discuss why it is important, why you should consider using a tool, and what features you should look for.
Service Virtualisation
By: Philip Howard
This document represents a snapshot of the current state of the service virtualisation market.
Master Data Management
By: Andy Hayler
This document provides a snapshot of the current state of the Master Data Management (MDM) market.
Business Process Management
By: Simon Holloway
Since I last did a review of the market for BPMS it has been interesting to note that many of my predictions for what would happen have mostly come true.
Challenges and opportunities in the telecommunications sector
By: Fran Howarth
Transformation and consolidation are two of the key challenges, but also opportunities, for telecommunications providers.
Data profiling: the business case
By: Philip Howard
This paper discusses the benefits of automating the discovery of data quality issues through the use of data profiling technology.
Security based on trust not fear - ...the importance of a trusted cloud and Internet ecosystem
By: Fran Howarth
To build trust in electronic networks, security needs to be built into a suitable framework, rather than being bolted on.
Analytics in Telecommunications
By: Philip Howard
In this paper we will describe some of the key analytic areas that are important to telecommunications companies and discuss the argument in favour of using third party analytic application providers.
uRiKA
By: Philip Howard
uRiKA is an appliance for graph analytics which contains a graph database, but what exactly is a graph database or, for that matter, a graph, and why should you care?
Exploring Successful Approaches to Test Data Management
By: Philip Howard
Test Data Management (TDM) is about the provisioning of data for non-production environments.