ARCHIVE (not public)

September 1, 2007

“Dynamic Warehousing and Beyond”

Authors Dr. Fern Halper, Partner Robin Bloor, Partner Driving Business Value through End-to-End Analytics Business Intelligence can be defined as “the provision of timely and relevantinformation to the business from the data gathered by operational systems oravailable from external sources.” The goal of BI is ultimately to help anorganization use information to become more successful. […]

0 Comment
July 1, 2007

“Client Management: A Maturity Framework”

Author Robin Bloor, Partner Sponsored by CA From fragmented management to business driven management How the client domain became chaotic is not a mystery. The PC was the mostdisruptive technology that businesses ever had the opportunity to exploit. At first itwas a stand-alone device that made typewriters and adding machines redundant.Then it was a connected […]

0 Comment
July 1, 2007

“Delivering Embeded Database Solutons for Small and Medium-sized Businesses

Authors Nigel Stanley, Senior Analyst Marcia Kaufman, Partner Sponsored by Pervasive Over the past few years relational databases have become more complex as the major vendors build more features in an attempt to make their products attractive to buyers. Line of business applications are the life blood of many small and medium- sized organizations. Many […]

0 Comment
April 1, 2007

Creating Efficient Business Processes with CEBP

Author Robin Bloor, Partner Sponsored by Avaya The next stage in the evolution of business applications Communications Enabled Business Processes (CEBP) is an important innovation in the automation of human communications within business applications. Until now, such automation has largely been confined to providing Call Center systems and to unified communications products that target the […]

0 Comment
March 1, 2007

“The Extraordinary Failure of Anti-Virus Technology”

AuthorRobin Bloor, Partner Sponsored by SecureWave In 1989 there were about 30 known viruses, a mere handful compared with today’s figures of more than 200,000. Anti-virus technology fails to prevent computers from virus infections. And because it fails, it inadvertently assists many security woes that plague the computer population. Because viruses spread, hackers find it […]

0 Comment
December 1, 2006

“Information as a Service: IBM Information Server”

Author Judith Hurwitz, President & CEO The lack of a single view of the customer across the various lines of business can lead to missed opportunities for the business and dissatisfied customers. When two companies merge, inconsistencies in data and data definitions often become more obvious and more troubling to the business. The management team […]

0 Comment
October 1, 2006

“21st Century Workloads Running the World with Workload Automation”

AuthorsRobin Bloor, Partner Sponsored by CA The multi-dimensional aspects of contemporary IT require job scheduling to take a quantum leap. Here’s why… All things that can be automated will be automated. Beyond the careful choreography of sophisticated workflow, managing myriad simultaneous requests puts unprecedented demand on the software that must schedule and perpetually deliver against […]

0 Comment
September 1, 2006

“The Value of a Strong Partnering Ecosystem”

AuthorsJudith Hurwitz, President & CEOMarcia Kaufman, Partner Sponsored by IBM Successful partnering takes a concentrated effort by all parties to ensure that a partnership is more than a signed contract with no follow through. It may not be initially apparent why an ecosystem is so important to all of the constituents involved in bringing products […]

0 Comment
September 1, 2006

“The Advent of the Graylist Approach to Computer Protection”

AuthorRobin Bloor, Partner Sponsored by Bit9 From the outset, the AV software vendors took the wrong approach to stopping malware.In the past 20 years, Anti-Virus technology has grown to become an industry in its own right with revenues just below $4 billion. Nevertheless the viruses that AV software is supposed to protect us against still […]

0 Comment
April 1, 2006

“Patch Economics 101”

AuthorCarol Baroudi, Partner Security vulnerabilities at financial institutions … cause serious damage to the brand beyond an actual exploit. Enterprises rely on their networked systems for all of their business needs. Banks rely on networks for their ATMs, cities for their 911 service, and trains, planes, hotels and hospitals for daily operations. When these systems […]

0 Comment