CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

hr technology

Results 51 - 75 of 660Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile threats, security, cloud, application, technology, solution, networking
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
secure web gateway, web-based threats, web, solution, technology, networking, security, business technology
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas, security, technology, data management
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, wireless
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, appliance, virtual, physical, saas, hybrid, access control, application security
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Several years ago, a transformation in IT began to take place; a transformation from an IT-centric view of technology to a business-centric view of technology that Forrester refers to as business technology (BT). This transformation has a profound impact on the role of the CIO. The CIO must now view himself or herself as a business enabler. He or she must focus on continuously aligning with business objectives, improving delivery capability to support business processes that bring new products and services to market more quickly, fostering innovation, and reducing costs through improved performance. In this custom Technology Adoption Profile (TAP), the data confirms this trend.
Tags : 
security, technology, business technology, cio, application security, email security, internet security, network security appliance
    
Blue Coat Systems
Published By: Oracle     Published Date: Aug 09, 2013
As an HR leader, what keeps you up at night? Is it meeting your executives’ demands for a greater contribution to the company’s strategic vision? Is it the requests to cut operational costs while simultaneously increasing efficiency? Most likely it’s the daunting combination of the two. HR success today means: • Streamlining core HR processes to eliminate waste and increase staff productivity • Ensuring that your talent strategy aligns with company goals and drives bottom line success • Investing in the right technology to ensure both local agility and global scalability
Tags : 
oracle hcm, human resources
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
As an HR leader, what keeps you up at night? Is it meeting your executives’ demands for a greater contribution to the company’s strategic vision? Is it the requests to cut operational costs while simultaneously increasing efficiency? Most likely it’s the daunting combination of the two. HR success today means: • Streamlining core HR processes to eliminate waste and increase staff productivity • Ensuring that your talent strategy aligns with company goals and drives bottom line success • Investing in the right technology to ensure both local agility and global scalability
Tags : 
oracle hcm, enterprise applications, human resource technology, business technology
    
Oracle
Published By: Box     Published Date: Nov 24, 2015
Breakthroughs in collaboration technology are helping companies of all sizes foster engagement with employees, customers, and partners. However, some organizations are still struggling to align all facets of their organization and as a result misalignment between teams is still a likely scenario. Download this whitepaper to learn how online collaboration can help push productivity in order to allow your organization a competitive edge as a result of increased productivity and a positive return-on-investment.
Tags : 
collaboration technology, customer engagement, productivity, competitive edge, return on investment, security, enterprise applications
    
Box
Published By: Panasonic Business Mobility Solutions     Published Date: Sep 08, 2016
Today there’s no such thing as “one size fits all” when it comes to enterprise mobile computing for field services workers. While the business benefits of automation are clear (e.g. decreased downtime, increased customer satisfaction), selecting the right mobile device mix for the job is becoming more complex. This whitepaper examines three challenges organizations face when considering a mobile device deployment for field workers: 1. Integrating new mobile devices with legacy technology 2. Adapting to multi-generational workforces 3. Choosing the right mobile device for the job. Learn how to tackle these challenges and make technology decisions that improve worker productivity and help manage costs.
Tags : 
mobile workforce, laptops, tablet, mobile computing, productivity, rugged, mobile handheld, mobile scanner
    
Panasonic Business Mobility Solutions
Published By: Panasonic Business Mobility Solutions     Published Date: Nov 15, 2016
As the food industry races to comply with the FDA Food Safety Modernization Act (FSMA), manufacturers are working to adopt more robust track and trace processes. A critical component to achieving compliance is the integration of automated data capture solutions throughout all stages of food production—from farm to table. This whitepaper examines technology considerations food manufacturers should weigh when implementing these systems, along with how to tackle the subsequent challenges that are sure to arise. Once the U.S. food industry understands how mobile solutions can enable track & traceability, manufacturers will be equipped with an efficient solution that not only helps to achieve regulatory compliance, but also improves overall business efficiencies.
Tags : 
    
Panasonic Business Mobility Solutions
Published By: Conduent     Published Date: Jul 23, 2019
In this eBook, we’ve distilled the key information into a “decision guide” to help you head in the right direction with your technology planning. The guide walks you through the five main options for your technology and overviews the benefits and challenges related to each — so you can weigh the pros and cons and make the best technology choices for your organization. Complete the form at right to get your copy today.
Tags : 
    
Conduent
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
DPI software is made to inspect packets at high wire speeds and a critical factor is the throughput and resources required. Keeping the amount of resources that integrated DPI and application classification technology requires low is critical. The fewer cores (on a multi-core processor) and the less on-board memory an engine needs, the better. Multi-threading provides almost linear scalability on multi-core systems. In addition, highly-optimized flow tracking is required for handling millions of concurrent subscribers.
Tags : 
detection, rate, performance, efficiency, accuracy, encrypted apps, integration, metadata
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe
    
Rohde & Schwarz Cybersecurity
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged identity, accounts and credentials are core, critical assets for enterprises that must be highly protected through a combination of technology and processes which are enabled by privileged access management. Delivering that protection is instrumental in breaking the data breach kill chain, helping to prevent attacks and mitigating the impact of those that do occur.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
CA Technologies
Published By: LifeSize, a division of Logitech     Published Date: Aug 25, 2011
This survey shows that technology has evolved in such a way that telework centers' function can translate to work station in employee's homes.
Tags : 
lifesize, video conferencing, multimedia presentation, productivity, high definition
    
LifeSize, a division of Logitech
Published By: Puppet     Published Date: Mar 09, 2017
DevOps cuts deep and wide through industries, company sizes, and technology environments. Yet, DevOps is never done — it’s about continual learning and improvement rather than an end state. Puppet is here to help. We draw on the success stories and lessons learned at organizations that are already driving improved performance and better business outcomes with their DevOps initiatives. This handbook captures five essential phases for mapping out a DevOps journey: 1. Build the business case for DevOps. 2. Address the biggest challenges to DevOps success. 3. Develop a performance-driven team structure. 4. Choose the right Tools and processes. 5. Plan your key implementation phases.
Tags : 
    
Puppet
Published By: Evariant     Published Date: Nov 14, 2016
Changing healthcare market forces, such as value-based care models, consolidation, and payer mix erosion, have propagated declining margins and fueled hyper-competition among healthcare organizations vying for market share. In this new world, determining effective patient engagement strategies has become paramount for hospitals and health systems as they strive to acquire, retain, and re-activate patients, and, ultimately, drive revenue. Now, more than ever, it is critical that healthcare organizations create and maintain positive, lasting relationships with their patients, both current and prospective, working to attract them into their network and keep them there.
Tags : 
healthcare crm, ehr, healthcare technology, marketing, patient acquisition, patient engagement
    
Evariant
Published By: Oracle     Published Date: Mar 28, 2017
Hotels and resorts with function space may well have an opportunity to boost their overall property revenue, given the escalating demand for function space and the fact that many of them have already maximized the value of their guest rooms through sophisticated revenue management capabilities. Success generally starts with a next-generation technology solution that can empower sales and catering personnel. Success also requires having in place the right organizational resources, business processes and performance metrics.
Tags : 
hotels, resorts, function, space, oracle, metrics
    
Oracle
Published By: Q2 eBanking     Published Date: Jul 30, 2017
To thrive in today’s marketplace, FIs can meet the mobile-first challenge by offering a unified digital experience and highly relevant offers while expanding digital-first design to mobile businesses. A technology partner like Q2 will help. We will help you execute with the speed, agility, and accuracy to meet today’s pace of change and offer the digital experience your consumer, business, or corporate users demand.
Tags : 
    
Q2 eBanking
Published By: Red Hat     Published Date: Feb 25, 2019
Business-critical applications need a platform that is proven to be stable. Red Hat®Enterprise Linux® frees you to deliver meaningful business results through technology by providing exceptional reliability and military-grade security. With a Red Hat Enterprise Linux Server subscription, you gain access to the industry's most extensive ecosystem of partners, customers, and experts that supports and accelerates your success. Read the datasheet to learn more.
Tags : 
    
Red Hat
Published By: Workday Italy     Published Date: Feb 04, 2019
Lo studio di Deloitte ""Human Capital Trends 2018"" ha rilevato che per la forza lavoro odierna le carriere non sono più definite dai ruoli e dalle competenze, bensì dalla flessibilità di apprendimento. Per soddisfare queste nuove aspettative di carriera, la tua organizzazione necessita di nuove strategie per la forza lavoro e di approcci diversi nei confronti dell'apprendimento, della performance enablement e dello sviluppo della carriera. Scopri le informazioni principali nel report per scoprire le origini del cambiamento nelle aspettative di carriera e il modo in cui puoi: Utilizzare strumenti basati sui dati e sull'apprendimento dinamico per migliorare l'esperienza dei dipendenti Ridefinire le carriere in un mondo del lavoro in continuo cambiamento Sfidare i pregiudizi sull'età e coinvolgere lavoratori di ogni generazione
Tags : 
workday, workforce technology, digital strategy
    
Workday Italy
Published By: Workday Italy     Published Date: Feb 18, 2019
Con la moderna tecnologia cloud, le medie imprese possono gestire le HR in modo più strategico anche con budget limitati. Grazie alle innovazioni della tecnologia cloud, ora esiste un'alternativa che può aiutare le aziende più piccole a crescere e rimanere competitive. Scarica il white paper per scoprirla.
Tags : 
workday, workforce technology, digital strategy
    
Workday Italy
Published By: Workday Spain     Published Date: Feb 04, 2019
Lea en el informe de Deloitte información sobre los tres pasos fundamentales que ayudarán a las organizaciones emergentes a mejorar su plantilla: Redefinir las carreras profesionales como experiencias en lugar de considerarlas series de puestos Personalizar programas de capacitación del desempeño Seguir el ritmo de las innovaciones tecnológicas
Tags : 
workday, workforce technology, digital strategy
    
Workday Spain
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search