CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

aim

Results 301 - 325 of 436Sort Results By: Published Date | Title | Company Name
Published By: Mobify     Published Date: Feb 20, 2015
Mobify’s Mobile Strategy Development Guide is aimed at retailers in the process of developing a mobile strategy or invested in upgrading their current strategy to meet customer expectations and incorporate emerging mobile technology. In our new guide, you’ll discover: - How to build a solid business case to win senior management buy-in - How to effectively assign responsibilities in the strategy development process - How to analyze your competitors’ mobile initiatives for best practices and lessons learned - How to identify the right metrics to measure strategy success
Tags : 
mobile strategy, mobile development, mobile technology, customer engagement, emerging marketing
    
Mobify
Published By: MobileForce Software     Published Date: Nov 19, 2014
GigaOm is seeing a new breed of services that promise to accelerate the mobilization of existing enterprise applications and business processes. Early mobile-application development solutions (MADP) were resource-intensive, requiring custom client code for each supported platform, as well as an on-premise middleware layer to connect mobile clients to enterprise backend systems. In this new model, code-free, configuration solutions - aimed at business analysts and lines of business- are revolutionizing the landscape, consolidating tools and services to simplify cross-platform enablement, and reducing time to deploy and cost tremendously. This report describes mobile-application configuration (MAC) tools, articulates their business value and suggests conditions under which they may be a good choice for an organization.
Tags : 
mobilization, enterprise applications, business processes, development solution, resource-intensive, client code, platform, middleware
    
MobileForce Software
Published By: Gigaom     Published Date: Oct 02, 2019
Hyperconvergence is now at the core of many IT infrastructures. No matter the size of your organization, you need to protect infrastructure, applications, and the data necessary to run your business and compete at its best. There are several solutions to protect your data, retrieve and reuse it when necessary. Ease of use, speed, and efficiency are at the base of modern backup tools, but there is now more to take into account if you want to transform a liability into an asset. In this free 1 hour webinar, GigaOm analyst Enrico Signoretti will be joined by Alan Conboy from Scale Computing and Jon McCarrick from Acronis to talk about modern data protection strategies and solutions aimed at simplifying infrastructure while increasing the value of data. In this 1-hour webinar, you will discover: Why data protection should be integrated into your HCI Data protection options: Snapshots, backups, DR and beyond New threats and new solutions Backup as a tool to make more of your data
Tags : 
    
Gigaom
Published By: AWS     Published Date: Jul 24, 2019
Trupanion, a Seattle-based medical insurance provider for cats and dogs, needed to find data insights quickly. With only 1% of pet owners insured, the process of evaluating a claim to approve or deny payment was manual and time-consuming. Building accurate predictive models for decision-making required manpower, time, and technology that the small company simply did not have. DataRobot Cloud, built on AWS, helped Trupanion create an automated method for building data models using machine learning that reduced the time required to process claims from minutes to seconds. Join our webinar to hear how Trupanion transformed itself into an AI-driven organization, with robust data analysis and data science project prototyping that empowered the company to make better decisions and optimize business processes in less time and at a reduced cost. Join our webinar to learn: Why you don’t need to be an expert in data science to create accurate predictive models. How you can build and deploy pr
Tags : 
    
AWS
Published By: SAP     Published Date: Jun 04, 2010
Small and medium-sized businesses (SMBs) around the world are facing a competitive environment more intense than ever. Changes in the economic environment that began in 2008 (and earlier in some places) have altered business fundamentals forever. Larger competitors are increasingly interested in capturing the customers that SMBs previously were able to claim uncontested. Download now to learn more.
Tags : 
sap, smb, economic environment, lean, revenue
    
SAP
Published By: SAP     Published Date: Jun 30, 2011
This paper aims to discuss the various capability acquisition and it solution deployment options and provide a perspective on how to evaluate the suitability of those options, given an enterprise's situation, and to get the best outcome.
Tags : 
sap, competitive positioning, solution landscape, risk tolerance, shared service center, bpo, bpu, application performance
    
SAP
Published By: Drobo     Published Date: Feb 14, 2012
Storage does not have to be costly SMBs take advantage of new technology on the market.
Tags : 
storage, networking, mac, windows, linux, drivers, provisioning, reclaimation
    
Drobo
Published By: IBM     Published Date: May 27, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today, it is a business imperative. In addition to providing solutions to insurance companies’ long-standing business challenges, big data inspires new ways to transform processes, organizations and many aspects of the insurance industry as we know it.
Tags : 
ibm, big data, insurance, insurance technology, big data solutions, business value, financial data, risk data
    
IBM
Published By: IBM     Published Date: May 27, 2014
Big data and analytics help insurance companies identify the next best action for customers. With the right solutions, companies can extract, integrate and analyze a large volume and variety of data, from call-center notes and voice recordings to web chats, telematics and social media
Tags : 
ibm, big data, analytics, insurance, insurance industry, big data solutions, integration, risk assessment
    
IBM
Published By: IBM     Published Date: Feb 24, 2015
Big data and analytics help insurance companies identify the next best action for customers. With the right solutions, companies can extract, integrate and analyze a large volume and variety of data, from call-center notes and voice recordings to web chats, telematics and social media.
Tags : 
big data, ibm, claims operations, customer service
    
IBM
Published By: IBM Watson Health     Published Date: Feb 28, 2017
IBM Watson Health aims to transform the drug development process for life sciences – from research to commercialization. IBM Watson for Drug Discovery helps accelerate breakthroughs by enabling researchers to quickly analyze, identify, and prioritize new therapeutic targets and drug combinations for future study.
Tags : 
ibm, watson, watson health, drug discovery, information technology
    
IBM Watson Health
Published By: IBM     Published Date: Dec 15, 2016
BM Watson Health aims to transform the drug development process for life sciences – from research to commercialization. IBM Watson for Drug Discovery helps accelerate breakthroughs by enabling researchers to quickly analyze, identify, and prioritize new therapeutic targets and drug combinations for future study.
Tags : 
ibm, watson, watson health, drug discovery, information technology
    
IBM
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
With cybercriminals threatening nations globally, cybersecurity is taking a front seat in many regions. Most notably, the European Union (EU) has adopted regulations to combat the threats. Against the backdrop of increasingly sophisticated cyberattacks, the EU has set forth rules and procedures for enhanced cybersecurity, along with penalties for noncompliance, in the form of the General Data Protection Regulation (GDPR). This new body of mandated policies and procedures aims to protect EU member personal information collected and/or stored by organizations. Read more in the GDPR business brief.
Tags : 
data, gdpr, global, nationally, cybercriminals
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
Accor is one of the world's largest travel, tourism and corporate services companies. With over 4,000 hotels worldwide, Accor Hotels covers all segments from economy to upscale. Sofitel, Novotel and Motel 6 are just a few of Accor's hotel brands. Accor's online relationship marketing strategy aims to convert prospects into customers and build customer value through increasing the depth of relationships and growing revenues from repeat bookings, cross-sales, up-sales and referrals.
Tags : 
neolane, accor hotels, online relationship marketing strategy, improve reactivity rates, campaign personalization, collaborative content management, crm software, custom content
    
Neolane, Inc.
Published By: McAfee Inc     Published Date: Nov 16, 2009
With all the benefits and opportunities the Internet provides, it can also be a very inhospitable place, requiring organizations' constant vigilance to protect themselves from attack. To better understand important security issues affecting organizations today, IDC recently completed a survey of more than 260 IT and Firewall managers and executives in the US and Europe that aimed to profile their organization's firewall deployments.
Tags : 
mcafee, email protection, firewall, it security, midsize, global threat intelligence, security, data protection
    
McAfee Inc
Published By: IBM     Published Date: Apr 23, 2013
The current business environment is still characterized by skittishness, tenuous demand and sporadic growth. It’s no surprise then, that 60% of CFOs plan to make major changes to critical finance practices and processes, according to the 2010 IBM Global CFO Study. In fact, 70% of CFOs claim to be taking a more prominent role in enterprise decision making beyond the traditional role of finance. Yet many CFOs admit to significant gaps in their ability to deliver on this expanded agenda, particularly in their ability to measure and monitor business performance. The IBM study found that those companies that invest in capabilities to expand their business insight are better able to anticipate and react to the unpredictable external forces affecting the economy.
Tags : 
dynamic planning, forecasting, financial forecasting, finance, cfo, enterprise
    
IBM
Published By: Esker     Published Date: Jun 29, 2015
So why are so many organizations’ accounts payable (AP) departments still using antiquated invoicing tools? A new IOFM study aimed to find out exactly that.
Tags : 
measuring, reporting, technology adoption, accounts payable, finance
    
Esker
Published By: Avalara     Published Date: Jan 28, 2014
For years, “tax-free online shopping” has brought customers to the web in droves, all while raising the ire of brick-and-mortar retailers claiming an unfair price advantage to sellers offering prices free of sales tax. At the center of these debates lies the small to medium business, attempting to navigate changing sales tax requirements, and facing increased scrutiny under these new rules. Sales tax compliance is becoming a sticky wicket, as state and local governments revise tax laws to increase revenue, and Congress considers granting states the authority to make remote sellers charge sales tax. This Definitive Guide lays out sales and use tax basics as well as commonly misunderstood elements of sales tax compliance, to provide you a one-stop reference for all things sales and use tax related. The last two sections include a state-by-state summary of sales tax rules and regulations, and a glossary of terms. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices, audit, compliance, website development, enterprise applications
    
Avalara
Published By: Webroot Inc     Published Date: Jan 14, 2015
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 7 Ultimate Edition (64-bit) during January 2014. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products.
Tags : 
endpoint performance, performance testing, security software, security
    
Webroot Inc
Published By: Webroot Inc     Published Date: Aug 01, 2015
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 8.1 (64-bit) during July and August 2015. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. Testing was performed on all products using 13 performance metrics, including: installation time, boot time, CPU Usage, Memory Usage, Browse Time and many others. Does your endpoint security measure up?
Tags : 
endpoint performance, software security, endpoint security products, performance metrics, security
    
Webroot Inc
Published By: Aimia     Published Date: Mar 25, 2014
Identify the most important inflection points along your customer journey from curious newcomers to brand loyalists. In this Retail Brief, learn the 10 most important loyalty moments of truth — and offer a few guidelines for getting them right.
Tags : 
aimia, inflection points, marketing, customer loyalty, customer interaction, loyalty program. post-purchase service, interaction data, purchase cycle
    
Aimia
Published By: Aimia     Published Date: May 09, 2014
Learn about the best practices for retaining customer loyalty and see what measures your organization should take to strategically improve of customer loyalty programs.
Tags : 
aimia, customer loyalty, customer loyalty programs, marketing, branding, customer engagement, customer interaction, crm & customer care
    
Aimia
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search