ARCHIVE (not public)

November 24, 2009

“Tuning up the Enterprise”

Author Robin Bloor, Partner Sponsored by Oniqua …delivering asset performance optimization and management Productivity can be looked at from two perspectives; the productivity of assets and plant and the productivity of employees. In asset heavy companies the first of these is by far the most important. In this paper we examine Asset Performance Management, the […]

0 Comment
November 24, 2009

Defend Your Data Against Internal Threats

Author Robin Bloor, Partner Sponsored by Zecurion Why Data Encryption is Effective and a Necessity In the world of IT security, the importance of encryption as a means of protecting against data theft has grown significantly in the past 3 years. There are two main reasons for this: 1. The problem of data theft has […]

0 Comment
September 1, 2009

” Small Business Marketing Health Check”

Authors Sanjeev Aggarwal, Partner Laurie McCabe, Partner Sponsored by Campaigner Small Business Economic Outlook and Challenges This report, the first of two, highlights key findings from a survey conducted in July 2009 by Hurwitz & Associates, and is sponsored by Campaigner. The survey investigates how North American small businesses with 1-20 employees are succeeding today, […]

0 Comment
August 31, 2009

“Small Business Put Email Marketing to Work”

Authors Sanjeev Aggarwal, Partner Laurie McCabe, Partner Sponsored by Campaigner Email Marketing Adoption and Characteristics This report, the second of two, highlights key findings from a survey conducted in July 2009 by Hurwitz & Associates, and is sponsored by Campaigner. The survey investigates how North American small businesses with 1-20 employees are succeeding today, and […]

0 Comment
June 1, 2009

“Dealing with the Enterprise Data Threat

AuthorRobin Bloor, Partner Sponsored by ZecurionThe Realities of Data Theft The safest way to rob a bank is to use a computer. There are four compelling advantages to this approach: You don’t risk physical injury or personal harm. If you choose your target wisely, the likelihood of getting caught is low. If you pull off […]

0 Comment
December 1, 2008

“The Killer App for Multicore”

By Robin Bloor, Partner Sponsored by GreenplumWhy the era of parallel database is upon us  It was over 40 years ago that Gordon Moore of Intel suggested that, as chip designprogressed, “the number of transistors that would fit onto an integrated circuit would double every year.” A few years later, in the 1970s, he adjusted […]

0 Comment
May 1, 2008

How Much Does Managing SOA Mean Managing Virtualiztion

Authors Judith Hurwitz, CEO Robin Bloor, Partner Sponsored by EMC The reality is that by combining SOA with virtualization in an intelligent way, we can address this complex customer requirement. Companies increasingly depend on their IT assets to strengthen their ability toreact to changing business conditions. This has been the reality for many decades,but now […]

0 Comment
December 10, 2007

‘The Analysis and Resolution of Identity”

Authors:  Dr. Fern Halper, Partner Robin Bloor, Partner Sponsored by IBM Why there is a need, and how it works When is it important to ascertain a unique, dependable and conclusive identity? In many circumstances, when identity information is used, it isn’t important. If you sell goods or services to someone then the primary interest […]

0 Comment
September 1, 2007

“SOA and the Last Mile”

Author Robin Bloor, Partner Sponsored by OpenSpan Enabling user productivity on the desktop A dirty little secret that escapes the view of many IT professionals and manybusiness managers too, is that the users are what makes business applicationswork. Most business software doesn’t work very well. No matter whether it is builtin-house or bought as a […]

0 Comment