Research


Bloor has a library of over 800 published research papers that provide incisive but cost effective decision support information. Our research publications can help your organisation by giving you:

  • Greater insight into the business issues technology is addressing
  • Thorough concise reviews on technologies and the issues they address, with comparisons between all the vendors and the ways in which they solve the problems
  • Detailed evaluations of individual IT solutions, effectively communicating their value and the issues they address.

Here are some of our latest papers—to see others, please select an option from the right-hand menu or use our search facility.

Cover for Practices for Enhancing Data Security - a survey of organisations in the UK and the US

Practices for Enhancing Data Security - a survey of organisations in the UK and the US
By: Fran Howarth

This report is based on a survey of 200 organisations in the UK and the US, all of which have more than 1,000 employees.

Cover for Uniface for High Productivity Mobile Development

Uniface for High Productivity Mobile Development
By: David Norfolk

The prime use case for Mobile Development in Uniface is the addition of a mobile channel to existing Enterprise applications.

Cover for Application rationalisation, retirement and archiving: why and how?

Application rationalisation, retirement and archiving: why and how?
By: Philip Howard

In this paper we discuss how to approach application rationalisation and retirement, and related best practices.

Cover for Ancelus

Ancelus
By: Philip Howard

Ancelus is an ACID compliant database with extreme performance characteristics, developed and marketed by Time Compression Strategies Corporation (TCSC).

Cover for Supply Chain Management in the 21st century

Supply Chain Management in the 21st century
By: Simon Holloway

Logistics is the management of the flow of goods between the point of origin and the point of consumption in order to meet some requirements of customers

Cover for Test Case Generation

Test Case Generation
By: Philip Howard

In this paper we compare and examine the different vendor products that are available in the market for this purpose.

Cover for The need for active response to advanced threats - passive remediation is insufficient

The need for active response to advanced threats - passive remediation is insufficient
By: Fran Howarth

Today's advanced attacks are increasingly pernicious. Organisations need to be proactive in seeking out incidents that have occurred and in actively removing threats.

Cover for NuoDB Swifts Release 2.1

NuoDB Swifts Release 2.1
By: Philip Howard

NuoDB is a very interesting product, both from a conceptual and an architectural point of view.

Cover for Advanced threat protection and remediation

Advanced threat protection and remediation
By: Fran Howarth

Attacks cannot be defeated with protective technologies alone, given today's technology and the sophistication of attackers, some attacks will always get through.

Cover for Defending against the rogue - unwanted users, devices and applications

Defending against the rogue - unwanted users, devices and applications
By: Fran Howarth

Next-generation NAC technologies are essential tools in the security arsenal of any organisation for protecting the network from harm and keeping data safe.

Cover for IBM: enhanced 360° view

IBM: enhanced 360° view
By: Philip Howard

This paper briefly considers relevant IBM technologies and solutions in the context of the requirements discussed

Cover for Automated test case generation

Automated test case generation
By: Philip Howard

In this paper we focus on automating the testing process, it is there where we believe that the greatest savings and efficiencies can be achieved.

Cover for IBM: enhanced 360° view

IBM: enhanced 360° view
By: Philip Howard

IBM is in the vanguard for what it calls an enhanced 360° view and it is clearly well positioned to capitalise on the future growth of this market.

Cover for Extending a 360° view

Extending a 360° view
By: Philip Howard

In this paper we will discuss why we believe that extending the traditional 360° view makes sense and we will give some uses that demonstrate why the extended it represents an opportunity.

Cover for Document Content Security

Document Content Security
By: Fran Howarth

Preventing malicious documents from traversing networks will help considerably in preventing security breaches.