CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

adoption

Results 301 - 325 of 943Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management, identity, security, wireless, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management, identity, security, wireless, cloud computing
    
CA Technologies
Published By: Entrust Datacard     Published Date: Jun 09, 2017
The rapid adoption of Office 365 means that work created using the Microsoft product contains a large amount of the business world’s sensitive information. In fact, in most enterprises using Office 365, more than half of that highly valuable information — including business plans, sales data, product designs, M&A details and financial forecasts — is contained within Excel, PowerPoint, Word, Outlook and other Microsoft software. Securing the information created with its products has emerged as a primary concern for CSOs, CIOs, IT departments and other C-level executives.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jun 09, 2017
Learn why mobile is the future of enterprise authentication. Discover how mobile: • Elicits stronger, more convenient authentication • Promotes quicker and better user adoption • Future-proofs your organization
Tags : 
    
Entrust Datacard
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
Some organizations have carefully crafted strategies for cloud technology adoption; but for most, their journey to the cloud has been an ad hoc affair. Many have deployed applications in a number of different clouds: public clouds, private clouds, and even combinations of the two. While public and private clouds demonstrate how effective they can be in enabling companies to deploy applications quickly, hybrid cloud strategies prove the value of hosting applications in both cloud and on-premises environments. Similarly, SaaS offerings transform the way businesses interact with customers, partners, and vendors.
Tags : 
cloud, public, private, technology, organizations, strategies, business
    
F5 Networks Inc
Published By: Citrix Systems     Published Date: Jul 28, 2015
This white paper explores the evolution of secure remote access requirements, focusing in particular on the impact of user mobility and growing adoption to bring your own device (BYOD) practices.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Sep 17, 2015
A range of business issues are driving IT towards desktop virtualization. One solution-Citrix XenDesktop with FlexCast technology-helps IT teams empower their workforces, one project at a time. See the trends driving the adoption of virtual desktops and the top use cases IT teams are deploying today.
Tags : 
citrix, xendesktop, it management, virtual desktop, software development, platforms
    
Citrix Systems
Published By: Kofax     Published Date: Oct 20, 2011
In this report, we look at the drivers for ECM investment, the adoption of collaborative technologies, use of outsourcing, user priorities, views of the future as regards cloud and open source, and spend intentions for the next 12 months.
Tags : 
kofax, business, finance, ecm, investment, report, technology
    
Kofax
Published By: Brainshark     Published Date: Mar 22, 2013
With unprecedented adoption among businesses and consumers, the iPad is quickly becoming the preferred device for mobile sales professionals. Find out how enterprise adoption of iPads gives organizations an advantage when in sales and marketing.
Tags : 
ipads, enterprise, powerpoint, sales, marketing, iphone, apple, smartphone, tablets, mobile, mobility, presentations, mobile sales professionals, mobile presentations, powerpoint presentations, ipad presentations, slideshark, brainshark, enterprise sales, sales enablement
    
Brainshark
Published By: Teradata     Published Date: Jul 30, 2013
This paper examines the obstacles that make interactive customer management a challenge for many insurance carriers. It describes how they can create a more customer-centric business by using a sophisticated analytics platform to uncover valuable insights into their business and provides concrete examples of specific areas where insurers gain value. The adoption of a customer-centric approach need not be accomplished all at once. Rather, it can be managed and self-funded by following a roadmap that delivers incremental capabilities and revenue.
Tags : 
insurance policies, integrated data warehousing, interactive customer management, customer management, insurance carriers
    
Teradata
Published By: RelayHealth     Published Date: Mar 29, 2013
Widespread electronic health record (EHR) adoption has ushered in a pivotal moment in laying the groundwork for health information exchange (HIE).
Tags : 
meaningful use, hie, health information exchange, ehr, electronic health records, connectivity, care coordination, population health
    
RelayHealth
Published By: NetApp     Published Date: Nov 26, 2014
IT organizations need the right tools and technologies to make hybrid cloud strategies a flexible and efficient reality for their organizations. Learn how to address inhibitors to cloud adoption, recognize data challenges in the cloud and seamlessly move data in the cloud.
Tags : 
cloud, netapp, hybrid cloud, cloud adoption, data center
    
NetApp
Published By: Red Hat     Published Date: Sep 25, 2014
When a company sells services to a consumer audience primarily through a Web user interface (UI), that Web UI had better be online and available, all the time, especially if you are an airline. Such is the real-world scenario that faces Chris Skretowski, Linux Specialist at Devon, United Kingdom-based Flybe, Europe's largest regional airline. Despite being a relatively small IT function, it powers a regional airline with over 1,700 employees and 55 aircraft, and the company has big ambitions, driven top down by a new CEO who believes that technology adoption and use can make a real difference in the company's bottom line. Having a board that is supportive of IT as a strategic business driver means there is lots of open air ahead for Skretowski, who is responsible for all the Linux infrastructure that front ends the company's missioncritical Web presence. Flybe was one of the 21 companies that were interviewed for quantitative results on their operations as part of an IDC ROI analys
Tags : 
web user interface, it function, it infrastructure, roi analysis, it management, data management
    
Red Hat
Published By: Red Hat     Published Date: Sep 25, 2014
Today’s mega IT trends – cloud computing, big data, mobile and social media –have dramatically altered how enterprises work, requiring datacenters to find new, more flexible and cost effective ways to meet computing demands. For most datacenters, the path toward tomorrow's compute paradigm mandates an investment in standardization and consolidation as well as a more robust adoption of enterprise virtualization software, along with cloud system software to extend that virtualized infrastructure into a true private cloud environment. Linux has emerged as one of the key elements to a modernization program for a datacenter.
Tags : 
datacenter, modernization, enterprise virtualization, infrastructure, private cloud enviornment, it management, data management, data center
    
Red Hat
Published By: NetApp     Published Date: Sep 11, 2014
"VMware Horizon View is an enterprise-class desktop virtualization solution that delivers virtualized or remote desktops and applications to end users through a single platform. Horizon View is a tightly integrated, end-to-end solution built on the industry-leading virtualization platform, VMware vSphere. Although Horizon View enables levels of availability and agility of desktop services unmatched by traditional PCs, the complexity of deploying and managing thousands of virtual desktops in a VMware environment can be daunting without the right tools. Storage is often the leading cause of end-user performance problems. The NetApp all-flash FAS solution with the FAS8000 platform solves the performance problems commonly found in VDI deployments. In this reference architecture, NetApp tested VMware Horizon View user and administrator workloads to demonstrate how the NetApp all-flash FAS solution eliminates the most common barriers to virtual desktop adoption. The testing covered common
Tags : 
virtualization platform, remote desktop and applications, fas solution, storage utilization
    
NetApp
Published By: Kontiki     Published Date: Sep 16, 2014
Learn how to reach and engage remote employees within your organization and see how this will strengthen employee engagement, create personal connection with executives, and increase collaboration between teams and employees.
Tags : 
employee engagement, adoptions trends, solutions, best practices, video webcasting, internal communication, company-wide participation, employee monitoring software, employee performance management, elearning
    
Kontiki
Published By: AppDynamics     Published Date: Sep 21, 2017
IDC’s research shows enterprises around the world are using multicloud strategies to optimize the performance of modern and existing legacy applications running on-premises, in public cloud services, and on legacy systems. In the early days of enterprise cloud adoption, many organizations focused their cloud strategies on enabling net-new cloud-native applications written to take advantage of dynamic cloud infrastructure and pay-as-you-go consumption-based cost models. Early success with these implementations is convincing more and more enterprises to expand their cloud footprint and to migrate existing applications to cloud in order to enhance end-user experiences, optimize cloud resource utilization and costs, and create a more flexible and agile business environment.
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Sep 21, 2017
Technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
    
AppDynamics
Published By: MobileIron     Published Date: May 07, 2018
The global BYOD and enterprise mobility market continues to experience impressive growth. Preparing for this transformation is more than just a matter of security. It’s a matter of leveraging the people, processes and tools needed to become a Mobile First organization that’s ready to explore a whole new opportunity landscape. This BYOD guide is a great first step toward achieving your mobile transformation by implementing a successful BYOD program. By following the recommendations in this guide, you can deliver a program that meets the needs and preferences of mobile workers, while upholding corporate security and budget requirements. But the true success of any BYOD program depends on its long-term sustainability, which means you must ensure the security of your corporate data, drive user adoption by supporting employees’ device preferences and maintain a flexible technology portfolio that enables business innovation.
Tags : 
guide, byod, mobility, landscape, organization, program, mobile
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
Ready or not, the global mobility trend is forcing enterprises to enable a modern, mobile workforce with business productivity tools on any device, regardless of the underlying operating system. As enterprise users increasingly demand the ability to use their own mobile devices and desktops for modern work, IT is quickly impacted by end-user technology decisions. Enterprises can no longer ignore this reality, especially given the explosive global demand for mobile devices. Considering that smartphone adoption is expected to grow from 1.47 billion devices in 2016 to more than 1.7 billion in 2021, it’s clear that organizations need a comprehensive way to quickly onboard and secure a vast range of employee devices coming into the enterprise.
Tags : 
endpoint, management, business, workforce, desktop, device, mobile
    
MobileIron
Published By: athenahealth     Published Date: Jun 08, 2015
This whitepaper serves as a guide to identifying an under-performing EHR and replacing it with a solution that delivers results. It offers answers to a number of common questions about EHR adoption and replacement and demonstrates how the right EHR can help practices get more money and more control, freeing up physicians to focus on patient care.
Tags : 
ehr, electronic health records, ehr adoption, ehr replacement, information technology, practice management
    
athenahealth
Published By: Okta     Published Date: Jul 25, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications, business technology, cloud computing
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and provisioning solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: U.S. Cellular     Published Date: Aug 23, 2016
Primary internet connections fail for a variety of reasons: severe weather, downed poles and lines or simply heavier than usual network congestion. Business continuity solutions provide businesses with back-up internet access via a cellular network when primary Wide Area Network (WAN) connections fail or are over-loaded. These solutions enable businesses to: Maintain seamless, uninterrupted access to the internet Process credit card transactions Access to important information stored online This paper will provide an overview of business continuity solutions, examples of in-use scenarios and a path to adoption in an easy to understand and digestible way. Download now.
Tags : 
    
U.S. Cellular
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search