a A A+

Reports

Channels to MPS in Europe, 2014

A review of European channel-led managed print services programmes ...

read more

29/09/2014 | Quocirca Channel MPS Market 2014 Public Summary Final.pdf | VIEW

Quocirca

Bridging the big data divide

Part II – The discussions needed between IT and the business Your business is completely dependent on its electronic data. However, due to the way that the business has grown over time and the way that technology has changed continually, much of this data is now spread around in silos of storage with diverse capabilities. As the big data era takes hold, it is time to sit down with the business and sort out what IT can do to provide a fully supportive data platform for the future. ...

read more

24/07/2014 | Pentaho - Bridging the IT business final.pdf | VIEW

Pentaho

Masters of Machines - Business insight from IT operational intelligence

Operational intelligence from the collection and analysis of machine-generated data has often been used purely for the monitoring and management of IT infrastructure, applications and security. However, such data can also provide invaluable new commercial insight into the way a business is performing and enable systems to adjust to customer demand and preferences in real time. This requires tools for the collection and analysis of machine data and interfaces that can open it up to business as well as IT managers. ...

read more

08/07/2014 | Quocirca - Masters of Machines - March 2014 - final.pdf | VIEW

Splunk

Quocirca Managed Print Services Landscape, 2014

This report examines the competitive landscape for MPS and discusses the key market drivers and trends that will shape future generation MPS engagements. ...

read more

30/06/2014 | Quocirca MPS 2014 Summary Final June 2014.pdf | VIEW

Quocirca

What keeps your CEO up at night? The insider threat: solved with DRM

The insider threat, the problem of legitimate users accidentally or intentionally leaking confidential data, is one that many organizations have been complacent about to date. However, awareness is increasing about the threat itself and the shortcomings of ‘traditional’ security tools for mitigating the insider threat. This has led to an increasing interest in digital rights management (DRM), a technology that protects the data itself. ...

read more

23/06/2014 | Quocirca The Insider Threat Solved by DRM June 2014.pdf | VIEW

Fasoo

Managed Print Services in the Cloud

The office workplace has undergone a dramatic change in recent years. The key trends of mobility, BYOD and the cloud have driven users to expect more rapid access to corporate applications and services. The traditional IT delivery model is adapting to support these requirements, with businesses increasingly turning to cloud computing and managed services, attracted by the cost and efficiency benefits. ...

read more

20/06/2014 | Quocirca MPS Cloud June 2014 Final.pdf | VIEW

Kyocera

WANSpeak Musings - Volume VI

In Quocirca's continuing blogging for the WANSpeak site, this latest collection of 12 blogs takes a wander through a variety of different topics. ...

read more

22/05/2014 | Wanspeak volume VI.pdf | VIEW

Silver Peak

Bridging the big data divide

We are entering a new era of the information economy. The advent of ‘big data’, where different types and sources of data need to be brought together and analysed rapidly and effectively, means that new approaches to business analytics are required. For an organisation to gain the most from big data, the business and IT functions need to understand exactly what is needed and what can be done. This report looks at what the business needs to be saying to IT so that IT can provide the business with the capabilities it needs. ...

read more

16/05/2014 | Pentaho - Bridging the big data divide final.pdf | VIEW

Pentaho

Getting to grips with BYOD

Since mobile devices have proliferated as consumer gadgets as well as business tools, individuals are not only more comfortable with technology, they have their own preferences and want to make their own choices for work as well as at home. This ‘bring your own device’ (BYOD) idea started with mobile phones, especially once smartphones became widespread, but has also been quickly embraced for other devices, in particular tablets and, to a lesser extent, notebooks, laptops and PCs. This brings an enormous management headache for organisations, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to. This is where attention needs to be focussed to ensure the most important enterprise assets are properly protected and secured. ...

read more

02/05/2014 | BYOD report final.pdf | VIEW

Oracle

Data Centre Co-location: An easy decision; a difficult choice

For many organisations, co-location is the logical way forward for hosting securing and connecting the IT infrastructure. However not all co-location providers are the same, and it is often the subtle differentiators that can make the difference between a successful or a stressful partnership. ...

read more

30/04/2014 | Datum - Data Centre Co-location - An easy decision - a difficult choice.pdf | VIEW

Datum