CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

evaluation

Results 451 - 461 of 461Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Sep 09, 2008
Today, companies have more at risk than ever before. To stay in business, they must evolve their traditional business continuity programs to include continuous enhancements. They must also provide continuous service and support to their customers, suppliers, stockholders and stakeholders. The best approach requires a detailed analysis of both business and technical requirements, an understanding of available options, and a deep inspection of the many variables that will support their ultimate strategy.
Tags : 
business continuity, ibm, information, protection, risk, ibm mi
    
IBM
Published By: Tidal Software     Published Date: Sep 03, 2008
IT groups must support many applications and servers across multiple platforms that frequently operate independently of each other. However, coordinating job scheduling across all these applications and networks is often required to optimize resource utilization. The traditional approach of applying more staff, toolkits, and rudimentary scheduling software to cobble together automated batch processing solutions becomes cost-prohibitive, inefficient, and error-prone, as the number of moving parts increases and the environment becomes more heterogeneous.
Tags : 
job scheduling, job scheduler, batch scheduling, batch processing, cron, workload automation, application scheduling, enterprise scheduling
    
Tidal Software
Published By: Burton Group     Published Date: Jul 07, 2008
The identity federation market enjoys an exceptional supply of products. With well over a dozen products available to enterprise customers, most architects have more choices than time will allow for evaluation. This abundance of products is partly the result of the inherent difficulty of developing a truly multipurpose federation server. Although federation products are similar in name, each has its own personality and idiosyncrasies that make it suitable for certain environments but insufficient in others.
Tags : 
fim, federated identity management, identity federation, access control, identity management, passport, burton group, networking
    
Burton Group
Published By: AT&T     Published Date: Jun 25, 2008
Whether you’re implementing new technologies, upgrading existing infrastructure or evaluating current needs, consultants can help you identify and document the gap between your current situation and a desired future state. When an assessment is done correctly, it can provide a solid foundation for successful implementation and improvement. The consultant first interviews stakeholders, analyzes data, and compares your business against best practices or specific industry competitors.
Tags : 
consulting, consult, consultant, management, expert, expertise, guidance, implementation
    
AT&T
Published By: IBM     Published Date: Jun 17, 2008
Portals are becoming integral enablers of business and IT innovation for many organizations. From first-generation content aggregation portals to more sophisticated enterprise process portals, organizations have used portal solutions to improve productivity, streamline business processes, enable new Web-based product and service delivery models, and provide IT with a powerful platform for new and composite application development.
Tags : 
ibm, corporate portal, portal, portals, idc, business process automation, tco, productivity
    
IBM
Published By: Diligent Technologies     Published Date: Apr 11, 2008
This document is intended for the use of Enterprise1 Storage Professionals, focused on Data Protection — Backup, Restore,DR and Archive operations — who are interested in evaluating the potential impact of de-duplication technologies to their business. There is much hyperbole associated with de-duplication. The purpose of this document is to help readers distill the essence from the hype, as the basis for sound decision-making.
Tags : 
diligent, diligent technologies, deduplication, de-duplication, data center, datacenter, data protection, storage
    
Diligent Technologies
Published By: WebEx Communications     Published Date: Dec 14, 2007
Through remote desktop sharing WebEx Support Center enables companies to manage and resolve remote support issues — whether they be external customer-driven or internal user-driven. Support personnel can initiate a session with a remote user by sending them an e-mail or providing a URL.Download this Paper to Learn More About a Support Center.
Tags : 
customer support, helpdesk, help desk, technical support, remote access, roi, spend management, cut costs
    
WebEx Communications
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
Russell Stover Candies outsourced its legacy information systems. However, two years later, they were unhappy with their chosen outsourcing provider and faced multiple ERP challenges. To help navigate these challenges, the company hired a seasoned IT executive. Find out why, after an exhaustive evaluation process, he selected OneNeck IT Services.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, russell stover, rsc, whitman's
    
OneNeck IT Services
Published By: Cognos     Published Date: Jun 19, 2007
The Performance Manager, Proven Strategies for Turning Information into Higher Business Performance, strengthens the partnership between decision-makers and the people who provide the information that drives better decisions. It suggests 42 decisions areas, or information sweet spots, to help you understand your data, plan, and monitor your performance.
Tags : 
performance, business analytics, business metrics, evaluation, analyze, analytical applications, cognos, business intelligence
    
Cognos
Published By: Cognos     Published Date: Jun 19, 2007
This paper looks at research into the link between visual perception and understanding, and translates the findings into practical techniques that you can use to communicate more clearly with your data.
Tags : 
visual communication, visual perception, graph, graphical representation, graphs, presentations, evaluation, presentation
    
Cognos
Published By: Trapeze Networks     Published Date: Apr 16, 2007
This analyst report written by Stan Schatt, VP & Research Director, Networking at ABI Research  helps you decipher the WLAN security alphabet soup, understand architectural approaches to WLAN security, upcoming standards for roaming, load balancing and management frame encryption, and key security requirements that you should consider for you next WLAN deployment.
Tags : 
wi-fi, wireless, wlan, remote technologies, roaming, encryption, access point, service set identification
    
Trapeze Networks
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19     Next   End
Search