Skip to main content
Main Menu
  • Enterprise performance management - the EPM index

    Measuring how well an organisation is performing is a basic need, requiring full visibility of various processes and workflows including the needs and inputs of partners and other stakeholders, as well as an effective means of monitoring and measuring how these variables work to produce an end result. The research behind this report shows that most organisations still have much to do, with disconnects between key steps and a lack of inclusion of essential stakeholders across processes.

    View this Report
  • Light touch, firm impression

    Switch from paper systems to IT but keep to the business process script: Mobile technologies have become cheaper to buy and have greater performance, functionality and capacity than ever before. This can encourage over-complicated products to be used for mobile applications. These will have higher direct costs in maintenance, support or training, and higher indirect costs from the unnecessary complexity of the user experience. This is especially noticeable in the automation of simple, traditionally paper-based, processes. Done well, the use of appropriate mobile technology can pay dividends, but beware the pitfalls.

    View this Report
  • Beating IT recession blues

    Companies have to remain competitive, but the recent years of prosperity have made this less of a driving need in many industries. Most organisations think they can outperform their rivals, and many believe that their approach to IT can play a significant part in this. There is a link between the performance and capabilities of the IT function and overall business performance, but not everybody is aware of this, or takes advantage of it.

    View this Report
  • From body shop to mind shop

    IT departments rarely have the luxury of spare capacity or sufficient knowledge of all the products and technologies that the rest of their organisation expects. However, IT is an integral part of most businesses, and supporting diverse or specialised technologies and understanding their impact on the business is a necessity. Organisations not only require help from third parties, they need it to be focussed, expert and cost effective, and based on a long term partnership to ensure that internal and external staff work effectively together.

    View this Report
  • Managed hosting in Europe - June 2009

    The term "managed hosting" describes the provision of a ready to use IT stack including hardware and infrastructure software for the deployment of applications. Providers house the infrastructure in central data centres accessed by customers over the internet. In the past this has usually been on the basis of hardware servers dedicated to individual customers, however the increasing use of virtualisation has allowed managed hosting providers to reduce costs by sharing infrastructure between customers, creating the earliest versions of what the industry now refers to as compute clouds. Computing platforms provisioned and managed by specialists provide higher service levels, greater ease of secure access and more manageable costs than many organisations are able to achieve internally.

    View this Report
  • Fuelling the engine

    Across the mid-market, inefficiencies are compounded by the lack of visibility into pertinent data, of processes being adequately and flexibly automated, and for the performance of the business to be monitored on a constant basis. Without such capabilities, businesses will find it difficult to survive the current financial conditions - yet creating an environment where information can be easily aggregated and viewed has never been easier. Also, business performance can be easily monitored with small proactive, and even reactive, actions ensuring effective responses to market forces and enabling organisations to compete with local and more global business threats.

    View this Report
  • Removing the complexity from information protection

    With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. To protect themselves from financial and reputational damage, encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move. They can also add value by allowing the secure sharing of information among authorised users and by enabling more secure remote working.

    View this Report
  • Social networking and systems management - an unlikley combination?

    Can social networking actually be useful? There are plenty of claims made about Twitter's usefulness for getting concise messages to a broad audience or using LinkedIn to track down old colleagues who may be able make an introduction to a new prospect. But what about direct benefits - such as finding quick solutions to problems or getting better deals on products?

    View this Article
  • Policy everywhere, with little to link it

    As Quocirca discusses in its freely available report "Content Security for the Next Decade" policies that define the way data must be handled are fundamental to good e-security practice, but where do you store the associated e-security policies? A written set of policies for handling data should be the starting point and such a document should be readily available to all employees and, where relevant, external data users for a given organisation. But policy can be enforced through a range of security tools in various parts of the IT infrastructure and this can lead to policy needing to be defined in several places.

    View this Article
  • Multi-videoconferencing for the many

    Travel budgets are being squeezed - gone are the days of leaping on the nearest plane and flying first class to have a 2 hour meeting on the other side of the pond, However, top-end videoconferencing suites, although highly effective, are not widespread in use as yet, generally due to the high costs of tele-immersion systems, and the need for dedicated rooms and managed high-bandwidth connections.

    View this Article

Pages