CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

level

Results 401 - 425 of 1810Sort Results By: Published Date | Title | Company Name
Published By: WorkBook from Deltek     Published Date: Jul 20, 2018
One of the agency biggest challenges is juggling multiple projects across departments while retaining complete visibility into finances, pipelines and resources management. Most agencies use multiple systems to handle each of these processes. According to The Drum Lab rats, to have “one integrated and user-friendly connected system would be the ideal solution.” Five leading agencies tested the WorkBook Agency Management system in a recent Drums Labs workshop. Testers quickly discovered the wealth of functionality, the high level of usability and the full integration that WorkBook provides to agency businesses.
Tags : 
    
WorkBook from Deltek
Published By: Virgin Pulse     Published Date: Jun 02, 2017
This report includes analysis from behavior and data scientists to help you understand why your employees may not be working at optimal levels and discover ways to address this growing problem.
Tags : 
presenteeism, employee presenteeism, workforce presenteeism, job presenteeism, presenteeism in the workplace, worker productivity, workforce productivity
    
Virgin Pulse
Published By: Intel     Published Date: May 19, 2017
An unprecedented level of network traffic is driving enterprises and communications service providers (CommSPs) to look for equipment that delivers greater operational agility and economics.
Tags : 
infrastructure, data, software, nfv, intel, network architecture, virtualization
    
Intel
Published By: Intel     Published Date: May 24, 2017
An unprecedented level of network traffic is driving enterprises and communications service providers (CommSPs) to look for equipment that delivers greater operational agility and economics.
Tags : 
    
Intel
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 11, 2017
When organizations are managing sales performance, it is critical to balance and align each enablement and operational component. Misalignment – or too much focus on one element –can dramatically detract from performance levels and the ability to measure results. An organization may temporarily need to emphasize a particular component when it sees a challenge, but ultimately success depends on striking the correct balance across all SPM components.
Tags : 
goals and objectives, competency model, onboarding and certification, coaching, review process, sales activities, metrics, compensation
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
By creating a connected field service ecosystem, organizations can increase their response time, reduce mean time-to-resolution and eventually, power a more predictive service model. This will enable a new level of field service productivity and cost-savings from increased efficiencies. Organizations will also be able to provide exceptional customer experiences consistently. Customer disruption and asset downtime will be minimized, and organizations will be able to empower their field service resources with insight into the issue before they arrive at the customer site. All thanks to a unified field service and IoT strategy.
Tags : 
internet of things, iot, daily activity, industry innovation, field service, organization management, device efficiency, telecommunications
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017     Published Date: Jul 12, 2017
As we turn our attention to 2017, HR leaders have their destinies and those of the modern workforce firmly in their hands. Businesses have never faced such extreme levels of uncertainty. On a macroeconomic level, they are still unclear on how and when the UK’s “Brexit” from Europe will proceed while trying to predict how a political outsider in the White House will affect global markets. Meanwhile, they are seeing their success threatened by disruptive upstarts and their operating models challenged by employees’ cry for new ways of working.
Tags : 
human resources, employee engagement, talent management
    
Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017
Published By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 12, 2017
Corporations today are focused on employee engagement – but the task of keeping employees engaged is not that easy. Recent research shows that 38 percent of the respondents to PwC’s Annual CEO Survey see effective performance management as a critical factor when they were asked “what aspects of their talent strategy would make the greatest impact on attracting, retaining and engaging the people you need to remain relevant and competitive.”1 Achieving simultaneous growth in top-line revenue and bottom-line profitability has come, and likely will continue to come, through greater levels of workforce efficiency.
Tags : 
cloud, cloud computing, performance management, survey, employee engagement, efficiency
    
Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
control, visibility, customer, financial risk, web fraud, bots, infrastructure
    
Akamai Technologies Australia
Published By: Schneider Electric     Published Date: Apr 16, 2018
"Institute of Electrical and Electronics Engineers (IEEE) standard 1584 has been the de facto standard for calculating the arc energy levels at different points in a power system. However, NFPA 70E provides the option of using the Arc Flash Hazard PPE Category task tables for PPE selection. Which is right for you, and what do you need to know about each option? Find answers in our white paper, which describes how both types of analysis systems work and how to be sure you are using the tables correctly."
Tags : 
arc flash, nfpa 70e compliance, ieee, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation, solutions, ppe, tables, arc flash hazard, osha, electrical safety
    
Schneider Electric
Published By: Schneider Electric     Published Date: May 04, 2018
Wireless technology is increasingly used in machine safety applications. New solutions introduce mobility and offer higher levels of flexibility and safety for plant floor operators. This eBook explores how modern wireless implementations can increase user safety and mobility, reduce installation costs, and boost productivity.
Tags : 
keywords, packaging, oem, smart machines, food & beverage, bottling, conveying, industrial automation, energy, robotics
    
Schneider Electric
Published By: Monetate     Published Date: Oct 12, 2018
Product recommendations are a proven way for marketers to drive sales, boosting the revenue potential of every shopping experience and increasing customer engagement overall. However, most current recommendations tools have not kept up with the level of personalisation that customers have come to expect, and they often fall short of the precision that marketing teams need to create meaningful business impact. It may be time to reevaluate whether your solution is doing all it can to meet the needs of your customers and your team.
Tags : 
product, recommendation, solution, customer, experience, monetate
    
Monetate
Published By: First Advantage     Published Date: May 01, 2018
In the face of compressed margins, what avenues exist for multi-family providers to build revenue? The answer is found in taking full advantage of the benefits of lower vacancies and high demand by maximizing operational efficiency–and background screening can help! Below we outline best practices for three main routes to building stronger revenues. 1. Squeezing value out of lower vacancies 2. Taking technology to the next level 3. Maximizing revenue while protecting against risk
Tags : 
    
First Advantage
Published By: TIBCO Software     Published Date: Aug 13, 2018
Despite being knowledgeable about their industry and experienced in running their organizations, the majority of business users lack expertise in analytics and visualization techniques—but that doesn't stop them from wanting to have a go. But making tools easier and more widely accessible is only part of the answer. A better approach is to work both sides of the gap. To make tools that can empower business users to discover and unlock value in their data—and that extend capabilities for experts, so they can share the analytics workload, improve efficiency, and focus on higher level work.
Tags : 
    
TIBCO Software
Published By: Splunk     Published Date: Aug 21, 2018
Due to recent cyberattacks, security operations centers (SOCs) have had to focus on a holistic and cohesive security strategy by consolidating the right people, processes and technology to mitigate and remediate attacks. This white paper, “The Five Essential Capabilities of an Analytics-Driven SOC”, dives into the necessity of SOCs to be analytics driven and how it helps IT and business leaders assess their own risk levels. Download this white paper to to learn about: *How advanced analytics and machine learning are now critical hallmarks of the modern security platform *How proactively hunting and investigating threats can shore up defenses *Why adaptive security architectures, like Splunk’s, are needed to prevent, detect and respond to attacks in today’s security landscape
Tags : 
    
Splunk
Published By: UL     Published Date: Sep 12, 2018
Performance textiles and fabrics are rapidly bringing apparel and footwear products into the 21st century. Manufacturers today are innovating at breakneck speed and bringing to the market synthetic textiles and fabrics with enhanced performance characteristics, or that feature embedded fibers or topical applications. This has led to the widespread introduction of advanced performance apparel and footwear that offer you new levels of comfort and safety. At the same time, sorting through claims regarding the performance characteristics of these advanced textiles and fabrics can present real challenges for manufacturers, retailers and you. At a minimum, the myriad of vague, conflicting or unsubstantiated marketing claims and characterizations used to promote these materials often result in frustration and disappointment. And fraudulent representations can unnecessarily expose apparel manufacturers and retail buyers to potentially hazardous chemicals and other risks.
Tags : 
    
UL
Published By: Lenovo - APAC     Published Date: Jan 28, 2019
Asian ICT infrastructure investment is exploding as businesses review and modernise their data-centre architectures to keep up with the service demands of a growing and increasingly sophisticated population. Demand for cloud services, particularly to support big-data analytics initiatives, is driving this trend. Frost & Sullivan, for example, believes the Asia-Pacific cloud computing market will grow at 28.4 percent annually through 2022. Despite this growth, many businesses are also rapidly realising that public cloud is not the best solution for every need as theydo not always offer the same level of visibility, performance, and control as on-premises infrastructure.This reality is pushing many companies towards the middle ground of hybrid IT, in which applications and infrastructure are distributed across public cloud and self-managed data centre infrastructure. Read about Medical company Mutoh and how it took advantage of the latest technology.
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Feb 11, 2019
Asian ICT infrastructure investment is exploding as businesses review and modernise their data-centre architectures to keep up with the service demands of a growing and increasingly sophisticated population. Demand for cloud services, particularly to support big-data analytics initiatives, is driving this trend. Frost & Sullivan, for example, believes the Asia-Pacific cloud computing market will grow at 28.4 percent annually through 2022. Despite this growth, many businesses are also rapidly realising that public cloud is not the best solution for every need as theydo not always offer the same level of visibility, performance, and control as on-premises infrastructure.This reality is pushing many companies towards the middle ground of hybrid IT, in which applications and infrastructure are distributed across public cloud and self-managed data centre infrastructure. Read about Medical company Mutoh and how it took advantage of the latest technology.
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Aug 13, 2019
Find out why it’s harder than ever to keep data secure, as well as what could be causing security breaches. Plus see how to mitigate this risk using end-to-end solutions in this infographic. Learn how Lenovo’s ThinkShield solutions, combine cutting-edge security solutions to protect your devices from cyber-attack, throughout their lifecycle. Making all the difference with true, end-to-end protection at the device, identity, online and data levels.
Tags : 
    
Lenovo - APAC
Published By: Fortinet EMEA     Published Date: Dec 11, 2018
If you’re dealing with the high cost and complexities of delivering reliable wide area connectivity over traditional carrier-based networks, you’re probably considering some form of software-defined wide area networking (SD-WAN). With the variety of constraints that you face, selecting the right SD-WAN solution for your enterprise may require a few compromises. Security, however, should not be one of them. There are various models for combining SD-WAN and network security, but only one that can truly be called “secure SD-WAN.” Fortinet, the most trusted name in network security, has leveraged its industry-leading FortiGate Next Generation Firewall (NGFW) to deliver integrated best-of-breed SD-WAN capabilities. Powered by the new FortiOS 6.0 operating system, SD-WANenabled FortiGate solutions provide the right level of service for every application, while ensuring effective protection from advanced evolving threats across your distributed enterprise.
Tags : 
    
Fortinet EMEA
Published By: Gigamon     Published Date: Dec 13, 2018
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now. 
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 21, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
The IT pendulum is swinging to distributed computing environments, network perimeters are dissolving, and compute is being distributed across various parts of organizations’ infrastructure—including, at times, their extended ecosystem. As a result, organizations need to ensure the appropriate levels of visibility and security at these remote locations, without dramatically increasing staff or tools. They need to invest in solutions that can scale to provide increased coverage and visibility, but that also ensure efficient use of resources. By implementing a common distributed data services layer as part of a comprehensive security operations and analytics platform architecture (SOAPA) and network operations architecture, organizations can reduce costs, mitigate risks, and improve operational efficiency.
Tags : 
    
Gigamon
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search