CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

capabilities

Results 201 - 225 of 1638Sort Results By: Published Date | Title | Company Name
Published By: MicroStrategy     Published Date: Aug 12, 2012
Hear how Whole Foods Market is using Mobile Business Intelligence to balance both individual store effectiveness and regional uniqueness while promoting the efficiencies of "oneness."
Tags : 
microstrategy, mobile, wholefoods, oneness
    
MicroStrategy
Published By: Webroot     Published Date: Nov 02, 2012
Download this information to familiarize yourself technically with the components and capabilities of Webroot® SecureAnywhereTM Business - Endpoint Protection.
Tags : 
endpoint security, endpoint protection, it security, malware solutions, malware, malware protection, security, business technology
    
Webroot
Published By: Red Hat     Published Date: Feb 01, 2013
IDC looked at the growing capabilities of open source KVM as a hypervisor for Linux and Windows. In particular, they noted that oVirt, commercially supported by Red Hat with Red Hat Enterprise Virtualization, has emerged as the open source standard for base KVM management.
Tags : 
idc, red hat, virtualization, enterprise grade, server virtualization, deployment method, virtual servers, operating system, cloud system, multihypervisor adoption, data management, cloud computing
    
Red Hat
Published By: Red Hat     Published Date: Jan 01, 2013
Using Red Hat middleware, virtualization, and platform technologies, consultant Booz Allen Hamilton helped the U.S. Department of Defense save $5.1 million through fiscal year 2015. The solution replaced a complex legacy system that could not scale to meet modern demands.
Tags : 
idc, red hat, department of defense, technology consulting, supports elasticity, flexibility, private cloud, elastic infrastructure, increase agility, increase flexibility, automatic scaling, automatic process execution, configurationg management, monitoring capabilities, cloud computing, infrastructure
    
Red Hat
Published By: Oracle     Published Date: Aug 09, 2013
The beauty of the cloud is that you can get up and running fast. The following e-book will provide you a greater insight into Oracle HCM Cloud Services that are a new generation of cloud-based human capital management applications from the global leader in HR management software. Oracle HCM Cloud Services offer many powerful features and capabilities to accelerate your time to value.
Tags : 
hcm, cloud, cloud services, human resources
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
The beauty of the cloud is that you can get up and running fast. The following e-book will provide you a greater insight into Oracle HCM Cloud Services that are a new generation of cloud-based juman capital management applications from the global leader in HR management software. Oracle HCM Cloud Services offer many powerful features and capabilities to accelerate your time to value.
Tags : 
hcm, cloud, cloud services, enterprise applications, human resource technology, business technology
    
Oracle
Published By: Panasonic     Published Date: Aug 04, 2016
Field service organizations are leveraging mobile technology to enhance their service capabilities and provide more value for their customers. Mobility is the new normal for enterprise, line-of-business applications like field service. If your organization still relies on manual data entry or paper-based processes, or if your mobile technology is aging and out of date, you have put your own business at a competitive disadvantage.
Tags : 
mobility, mobile computing, enterprise, technology, efficiency, business technology
    
Panasonic
Published By: Box     Published Date: Nov 24, 2015
With the cloud being an essential part of so many IT organizations, best practices have emerged to help IT evaluate the right vendors’ ability to meet mission critical security needs. Download this whitepaper to learn the best practices for determining file sharing provider’s capabilities and see how it will allow you to select the right vendor to meet mission critical operational and security needs.
Tags : 
file sharing, file sharing providers, secure files, security needs, security, enterprise applications
    
Box
Published By: FusionOps     Published Date: Jun 15, 2016
Bimodal capabilities, customer intimacy and advanced analytics can all be enabled by digital technologies, allowing supply chains to be both cost-effective and innovation-driven. This research explores the implications of these leading trends for chief supply chain officers.
Tags : 
    
FusionOps
Published By: Workfront     Published Date: Mar 10, 2017
AdRoll Increases Production Tasks by 10% per Person, per Sprint with Workfront Agile Capabilities
Tags : 
workfront, adroll, marketing work management, agile marketing, mwm
    
Workfront
Published By: IBM APAC     Published Date: May 18, 2017
In the age of digital transformation and hybrid cloud, business expectations for seamless, personalized, always-on service run high. Technological advances such as cognitive capabilities and automation are blurring business distinctions and empowering competitors to emerge from any industry and geography. Staying ahead requires a willingness to change course and embrace constant reinvention.
Tags : 
saas, service, technology
    
IBM APAC
Published By: RSM US     Published Date: Feb 08, 2019
The term outsourcing can have a negative connotation, conjuring images of layoffs and relocating jobs to third parties in remote locations. However, outsourcing can take many forms, and finance and accounting outsourcing (FAO) does not always mean the displacing of the finance back office. Specifically, FAO leverages digital technology to complement and support the back office, streamlining processes while providing enhanced transaction processing, reporting and analytics capabilities. It also allows key resources to focus on strategy, analysis and decision-making.
Tags : 
    
RSM US
Published By: RSM US     Published Date: Feb 08, 2019
As your nonprofit organization grows, your needs grow commensurately, often outpacing your managed service providers’ capabilities. To better safeguard your organization’s future, your managed service providers should exhibit these five key components:
Tags : 
    
RSM US
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe, qos, security
    
Rohde & Schwarz Cybersecurity
Published By: Automation Anywhere     Published Date: May 23, 2019
So you’re interested in cognitive RPA? You’re not alone. Almost half of enterprises implementing RPA in the next six months will be doing so with RPA solutions that offer cognitive capabilities. But just as the processes you can automate using cognitive RPA are more complex, implementing the software itself can be tricky. To find out more about how Automation Anywhere can help, download this whitepaper today.
Tags : 
    
Automation Anywhere
Published By: Intel     Published Date: Jul 17, 2019
Managing a large, diverse, and geographically dispersed fleet of client systems can be complex and time-consuming. With the increasing prevalence of smart, connected devices that are beginning to appear within the enterprise across industries, technology service organizations will face an explosive demand for a consistent approach to device management and security. Using Intel AMT, service organizations can take simple and effective steps to enable more manageable client systems. They can streamline operations and create a consistent approach to managing a broad spectrum of devices. Powerful platform capabilities can help service organizations meet user needs, minimize downtime, and safeguard the enterprise. Service organizations can draw upon available solution reference architectures, implementation guides, and readily available tools from Intel and others to successfully activate Intel AMT and begin to realize its major benefits.
Tags : 
    
Intel
Published By: Absolute Software     Published Date: May 31, 2016
The US healthcare industry has historically lagged behind others in the maturity of security capabilities, only recently catching up on data security and privacy in response to HIPAA. But there is a wide range of other mounting risks unique to healthcare that S&R pros in healthcare can’t ignore — greater regulatory pressure, increasing targeted attacks, the frightening uncertainty of IoT security, and global economic pressures. This report outlines the most important security capabilities for security leaders in this sector to implement in the face of these challenges.
Tags : 
healthcare, security capabilities, data security, best practices, security, access control, anti spyware, application security
    
Absolute Software
Published By: IBM APAC     Published Date: Apr 26, 2017
Find out how you can take advantage of hybrid cloud by extending or migrating workloads using secure and seamless networking capabilities offered by VMware. All of this is available on secure, single-tenant IBM Bluemix bare metal servers on IBM Cloud, giving you the utmost control.
Tags : 
cloud, ibm, hybrid cloud, vmware, agility
    
IBM APAC
Published By: IBM APAC     Published Date: Apr 26, 2017
Find out how you can take advantage of hybrid cloud by extending or migrating workloads using secure and seamless networking capabilities offered by VMware. All of this is available on secure, single-tenant IBM Bluemix bare metal servers on IBM Cloud, giving you the utmost control.
Tags : 
virtualisation, cloud, vmware, ibm, ibm cloud, hybrid cloud, secure environment
    
IBM APAC
Published By: Entrust Datacard     Published Date: Jul 23, 2019
Advanced key and certificate management enables the use of digital credentials even in the most demanding of security environments. Such solutions enable users, regardless of whether they are internal or external to their network, to benefit from both basic and enhanced capabilities in a consistent and secure manner. This document was created to assist organizations in the selection of the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed. This is not intended to be an exhaustive list. It is meant as a starting place to assist you in your review process. Introduction
Tags : 
    
Entrust Datacard
Published By: IBM UK - ISM&S Storage     Published Date: Nov 17, 2011
Working with CVSI to deploy IBM Tivoli, BladeCenter and System Storage technologies
Tags : 
data growth, data, storage, blade, back up, backup, tivoli, rpo, rto, end-to-end, service, cvsi, storage mangement, storage manager, bladecenter, data protection, protection, recovery, infrastructure
    
IBM UK - ISM&S Storage
Published By: IBM     Published Date: Feb 23, 2012
Built on IBM's market-leading business rules management system and enhanced with capabilities for detecting time-based events, this offering drives more responsive actions to business opportunities or risk conditions, increasing the value of each customer, partner and internal interaction.
Tags : 
ibm, technology, information technology, it management, data management, data center, project management
    
IBM
Published By: Adobe     Published Date: May 13, 2015
In 2015, AgilOne, Microsoft and Pegasystems entered an already crowded market of multichannel marketers to choose from. Capabilities across the board expanded, making it harder for multichannel campaign management vendors to prove big competitive differences.
Tags : 
multichannel campaign management, magic quadrant, choosing the right mcm, which mcm, evaluation of mcm providers, adobe mcm, emerging marketing, marketing research
    
Adobe
Published By: Adobe     Published Date: Oct 29, 2015
This white paper will help you assess your organisation’s current data driven marketing capabilities and will teach you what you need to do to deliver exceptional customer experiences with positive ROI.
Tags : 
data-driven marketing, online marketing, digital marketing, digital maturity, marketing, analytics, data mining, customer relationship, customer engagement
    
Adobe
Published By: Adobe     Published Date: Oct 29, 2015
This white paper will help you assess your organisation’s current data driven marketing capabilities and will teach you what you need to do to deliver exceptional customer experiences with positive ROI.
Tags : 
data-driven marketing, online marketing, digital marketing, digital maturity, marketing, analytics, data mining, customer relationship, customer engagement
    
Adobe
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search