CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

desk

Results 151 - 175 of 1075Sort Results By: Published Date | Title | Company Name
Published By: Marketo, INC.     Published Date: Sep 25, 2008
Listen to this free podcast at your desk or on the road and learn the business challenges and problems causing B2B companies to look at marketing automation ... the near-term and longer-term ROI benefits to expect... what key features and capabilities you should look for in a B2B marketing automation system... and more.  Find out what marketing automation can do for your organization—and how to choose the system that’s right for you. Download this free 15-minute podcast now.
Tags : 
promo code: wp1, marketing automation, marketo, eloqua, salesforce, saas, crm, customer relationship management
    
Marketo, INC.
Published By: Dell Software     Published Date: Jul 18, 2012
Save with computer power management
Tags : 
energy, saving, environmental, reduce energy, power management, white paper, business technology
    
Dell Software
Published By: ScriptLogic     Published Date: Jan 11, 2012
This paper outlines the potential cost and energy savings available when effective power management is exercised across the client computers.
Tags : 
network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
    
ScriptLogic
Published By: NEC     Published Date: Nov 20, 2013
How to Support BYOD without Putting Your Company at Risk
Tags : 
nec, byod, bring your own device, daas, desktops as a service, it management
    
NEC
Published By: CA Mainframe     Published Date: Sep 12, 2008
This White Paper discusses end-to-end application performance management in the context of the impact to the business. It then highlights CA’s application quality and performance manage­ment solutions for both Web and mainframe applications, with particular focus on the integration of CA Wily with AQM Solutions’ TRILOGexpert APCTM for TriTuneTM with Performance Desktop.  It concludes with the Enterprise Management Associates (EMA) perspective on the market in general, and on the CA solution in particular.
Tags : 
ca mainframe, application performace management, quality management, application quality, mainframe
    
CA Mainframe
Published By: NetApp     Published Date: Feb 15, 2017
How can hybrid-flash array users benefit from a move to all-flash? This case study profiles a large European organization that moved their VMware server and desktop environments from hybrid-flash to NetApp AFF all-flash systems
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Zendesk     Published Date: Aug 22, 2017
Zendesk helps its customers increase agency efficiency and CSAT ratings, improve ROI, and more. Use our Forrester estimator to calculate the economic benefits Zendesk can bring.
Tags : 
customer support software, customer service tool, customer relationship, multichannel support tool, customer support vendor evaluation, knowledge base management, help desk software, help desk portal
    
Zendesk
Published By: RingCentral     Published Date: May 22, 2014
Traditional phone systems, aka, PBX were designed for a time when people primarily worked from desk phones; well before the Internet restructured our patterns of communication and general lifestyles. Many businesses feel entrenched with the systems they have, but as contracts expire and systems get harder to maintain options are considered. Explore the top 5 hidden costs of the PBX, including costs in upgrades, maintenance and service calls, the strain on IT budgets, accumulation of service charges, connecting office locations and difficulty planning for growth and the future.
Tags : 
ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes
    
RingCentral
Published By: SitePal     Published Date: Jul 02, 2007
Discover the benefits and potential pitfalls of using speaking avatars (virtual animated characters) for your small business websites. Learn the best practices to use to increase conversions with a talking character!
Tags : 
conversion analysis, landing page, landing pages, content personalization, ecommerce, e-commerce, e-business, live support
    
SitePal
Published By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
best practices, security, technology, next gen
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, networking, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: PC Mall     Published Date: Mar 24, 2012
Use this eGuide to help find the right equipment for you.
Tags : 
scanners, photo scanners, best, review, compare, prices, flatbed scanners, color scanners
    
PC Mall
Published By: NEC     Published Date: Aug 25, 2009
This is a case study which shows how Voorhees College implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC to provide students, faculty and staff in five locations with software-based voice and desktop communications tools to achieve a 40 percent savings over its previous traditional telephony solution.
Tags : 
voorhees, nec, desktop communications, communications, service orientated, widearea network, wan, unified communications architecture
    
NEC
Published By: Cherwell Software     Published Date: Jan 28, 2019
In 2017, Arriva’s UK operations underwent a major IT transformation project to centralize its IT department and 13-strong service desk team. Arriva launched an RFP to find a single solution that could replace its disparate tools and fully unite the separate IT services departments. Three vendors were involved in the tender, but Alan found that Cherwell immediately stood out as the right choice and chose its IT Service Management solution.
Tags : 
    
Cherwell Software
Published By: IBM     Published Date: Jul 14, 2016
Workiva commissioned Forrester Consulting to conduct a Total Economic ImpactTM study and examine the potential return on investment (ROI) enterprises may realize by deploying Wdesk for Controls Management. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Wdesk on their organizations and how it can be leveraged to optimize the processes necessary to deliver Sarbanes-Oxley (SOX) compliance. This in-depth financial summary finds a 238% three-year, risk-adjusted ROI for a large auto parts retailer. Key outcomes include reduced the effort required to formulate and update processes and controls for SOX compliance resulting in a three-year benefit of $190,568, and simplified audit efforts with improved audit trails in financial controls, delivering three-year present value benefits of $128,965.
Tags : 
cloud reporting, business management, economic impact, forrester, consulting, business technology, data center
    
IBM
Published By: Zendesk     Published Date: Aug 26, 2016
This white paper provides a full analysis on how Zendesk successfully helped Trustpilot with customer service needs.
Tags : 
    
Zendesk
Published By: Cherwell Software     Published Date: Jan 28, 2019
Domino’s was heavily reliant on a legacy service desk tool. When Karen Copley was hired to oversee all aspects of service delivery for the organisation, she immediately recognised that this tool needed to be replaced. According to Karen, it offered no way to obtain management information. There was also limited automation capabilities. In addition, at this time, Domino’s wanted to mature its service desk operation by adhering to ITIL® framework best practices. “We decided we needed a more robust, ITIL® framework compliant service desk tool. I knew Cherwell® Service Management software was in the Gartner Magic Quadrant, and I had read good things about the company. I therefore decided to invite Cherwell Software and a couple of other vendors to bid for the business.”
Tags : 
    
Cherwell Software
Published By: Cherwell Software     Published Date: Jan 28, 2019
As the company continued to expand, the decision was taken in 2011 to find a different package to support its international service desk operations across Europe, the US, India and Australia. Hollister launched a competitive tender to find the right solution for its needs and explored several options as part of the selection process. Mike and the team were immediately impressed by Cherwell, both by the working culture and the flexibility and ease of use of its solutions.
Tags : 
    
Cherwell Software
Published By: VMware AirWatch     Published Date: Feb 21, 2017
By implementing the VMware App Volumes™ application management solution, OGL built a multitenant VDI environment that delivers an extensive range of applications to customers in real time, with full application functionality on any device, while also reducing OpEx and CapEx. Download this case study to learn how OGL Computer addressed these issues and more with VMware App Volumes: • Scale VDI service for more customers and applications. • Reduce expenses of Citrix VDI solution delivery. • Deliver and manage applications dynamically, in real time. • Give users desktop access on any Internet-connected device.
Tags : 
    
VMware AirWatch
Published By: Okta     Published Date: Mar 10, 2016
Rotary Simplifies Online Access for Members with Okta. Learn how Rotary achieved $300k annual savings and a 75% reduction in help-desk tickets with Okta.
Tags : 
    
Okta
Published By: Freshdesk Inc.     Published Date: Dec 26, 2011
How a leading player in the Airlines Communications Industry scaled up their customer support to meet an increasing product line and customer base.
Tags : 
customer service, help desk software
    
Freshdesk Inc.
Published By: Zendesk     Published Date: Aug 26, 2016
This white paper provides a full analysis on how Zendesk successfully helped Trustpilot with customer service needs.
Tags : 
    
Zendesk
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search