CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

individual

Results 276 - 300 of 495Sort Results By: Published Date | Title | Company Name
Published By: Dell Storage     Published Date: Jan 16, 2009
Dickinson Wright PLLC has a long history of success – founded in 1878, the law firm has been serving clients for more than a century. From offices in Michigan and Washington D.C., Dickinson Wright’s 450+ employees deliver comprehensive legal services to organizations of all sizes – from individuals and new ventures to small and large companies to government units.
Tags : 
dell, dickinson wright, equallogic san, storage area networks, legal services, equallogic functionality, storage
    
Dell Storage
Published By: SAS     Published Date: Jun 05, 2017
"The connected customer is an individual who is intimately connected to the data, outcomes, decisions and staff associated with any relationship to an organization.  To create personalized experiences, companies across all industries must pursue a more connected relationship with their customers through technology and processes focused on delivering relevant personalized experiences whenever possible. In this report, Blue Hill explores the key traits associated with supporting the connected customer through the internet of things, and provides guidance on why the internet of things will be essential across the general business landscape. "
Tags : 
    
SAS
Published By: SkillSoft MKG     Published Date: Feb 15, 2011
What value does SkillSoft training provide to individuals and organizations? In late 2010 we asked KnowledgeAdvisors, the world's largest learning analytics firm, to conduct an independent study that would answer this question.
Tags : 
training, skillsoft, elearning, e-learning, employee training
    
SkillSoft MKG
Published By: IBM     Published Date: Jul 24, 2012
View this brief video to discover how customer analytics provides unique insights on an individual customer level that can help prevent high-value customers from leaving and sell additional services to current customers.
Tags : 
customer analytics, customer satisfaction, loyalty, ibm, insights, business technology
    
IBM
Published By: IBM     Published Date: Oct 24, 2012
If you met a valued customer face to face, you'd probably greet the person with a smile and a "hello." You'd want the communication and ongoing discussion to be personal and specific to the individual. Deliver -- Learn to connect with your users.
Tags : 
ibm, analytics, consumer behavior, consumer interaction, communication, email marketing, business technology, internet marketing
    
IBM
Published By: Skillsoft     Published Date: Mar 27, 2015
Everyone wants to win, not everyone knows how. Winning isn’t only important for top executives but for everyone — from the boardroom to the mailroom — who wants to get ahead and help his or her organization. The two are intertwined. For an individual, winning is personal. In the business world, winning is multidimensional. The successful salesperson, for example, helps not only himself but also his company and everyone connected with it. Even the most talented businessperson with the best intentions will get nowhere unless he or she knows how to win in today’s complex business world. Business is a game, and winning that game is a total blast! Download Winning by legendary CEO, Jack Welch with Suzy Welch and learn how to be on the winning team.
Tags : 
leadership, leadership development, succession planning, skills gap, talent gap, leaders, managers, jack welch
    
Skillsoft
Published By: Adobe     Published Date: Aug 02, 2017
Marketers can personalize interactions using information that spans complete anonymity to full authentication, with a middle range in which identified data may be used intermittently. The distinction between anonymous and authenticated hinges on personally identifiable information (PII)—information that can be used alone, in combination, or in context to contact an individual. This information includes unique and partial identifiers such as name, address, phone number, and email address, as well as financial, employment, or other data associated with an individual.
Tags : 
financial services, financial security, data security, cloud security, network security, business protection, adobe
    
Adobe
Published By: McAfee     Published Date: Aug 14, 2014
Network availability and survivability in the face of an attack requires specific tools and processes. Are you using RBAC, hierarchical policy management and individual domain control? Find out which eight features you must deploy now.
Tags : 
network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation, security
    
McAfee
Published By: EMC Converged Platforms     Published Date: May 05, 2016
Hear directly from VCE customers around the globe who modernized their data centers and simplified IT with the portfolio of EMC converged and hyper-converged platforms. Companies such as Fox Sports, Kimpton Hotels, and Kent State University share the stories behind a compelling transformation of their IT environments. This interactive document enables you to drill down into 17 individual company logos to unveil each customer's unique journey.
Tags : 
    
EMC Converged Platforms
Published By: Adobe     Published Date: Jan 26, 2017
Your week is full of deadlines. But in order to meet them, your team often loses hours to exhaustive search and file-sharing practices. Using that time for more creative concepting could make for bigger long-term gains. And Adobe has the tools to help. Adobe Creative Cloud Libraries allow your workgroups to collaborate and share projects across programs and computers—no matter their individual locations. And Adobe Stock seamlessly integrates images for direct placement into apps like Adobe Photoshop, Illustrator, and InDesign. Download Pfeiffer Consulting’s new Adobe Stock Benchmark Reports to learn more about the efficiency and productivity gains linked to using Adobe Stock.
Tags : 
adobe, adobe creative cloud, stock, creative, marketing, design
    
Adobe
Published By: Aerohive Networks     Published Date: May 06, 2015
Learn how organizations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.
Tags : 
wi-fi, security, network security, bandwith limitations, ssid, security management, security policies, secure instant messaging
    
Aerohive Networks
Published By: Cherwell Software     Published Date: Apr 12, 2019
Info-Tech’s Category Reports provide a comprehensive evaluation of popular products in the IT Service Management market. This buyer’s guide is designed to help prospective purchasers make better decisions by leveraging the experiences of real users. The data in this report is collected from real end users, meticulously verified for veracity, exhaustively analyzed, and visualized in easy to understand charts and graphs. Each product is compared and contrasted with all other vendors in their category to create a holistic, unbiased view of the product landscape. Use this report to determine which product is right for your organization. For highly detailed reports on individual products, see Info-Tech’s Product Scorecard.
Tags : 
    
Cherwell Software
Published By: Herman Miller     Published Date: Sep 28, 2016
Throughout the twentieth century, the efficiency of real estate portfolios was quantified primarily in terms of a building’s cost per square foot and the average number of “usable square feet” it provided for each person who worked in it. By these measures, the workplace contributed to an organization’s bottom line by (1) getting smaller and/or (2) fitting more people into the same amount of space. Meanwhile, mobile technologies and new economic and social pressures ushered in new ways of working. By 2011, more than 60 percent of large organizations worldwide had implemented programs and practices that gave people more choice about where, when, and how to do their jobs.2 But although a few new workplace metrics (“collaborative seats per person,” “desk-sharing ratios”) have emerged, the focus on reducing direct costs (through allocating fewer square feet to “assigned seats” in individual offices or workstations) remains paramount
Tags : 
    
Herman Miller
Published By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial “needle in the haystack” – the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model – the CrowdStrike Threat Graph? – to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
    
CrowdStrike
Published By: Fitbit     Published Date: Mar 16, 2017
In a three-year retrospective study that analyzed health care claims and wearable device data from a self-insured employer, Springbuk looked at the potential impact of Fitbit technology as part of a wellness program. The analysis shows that connected health and fitness interventions can close the gap between the everyday actions that change health and drive outcomes for employee health and employer cost. Some of the key findings include: * Employees who opted into the Fitbit program demonstrated significant cost savings when compared to the control group. * Engaged users cost less than non-engaged users. * The opportunity for cost savings is potentially the highest with less active individuals.
Tags : 
    
Fitbit
Published By: Fitbit     Published Date: Mar 21, 2017
Fear not, it is possible to prove the return on investment (ROI) of your wellness program! But don’t take our word for it. Springbuk, a health intelligence platform, recently evaluated the health care claims and wearable device data for a self-insured employer (and Fitbit customer) over a three-year period. View this webinar, Rod Reasen, CEO at Springbuk, walks you through their study and reveals how: - Employees who opted into the company’s wearable program cost less than their counterparts - Total costs for engaged wearable users dropped by 46% vs. 14% for non-engaged individuals - Cost reductions were highest with less active members – encouraging news for all employee populations
Tags : 
    
Fitbit
Published By: McAfee     Published Date: Mar 31, 2017
NSS Labs performed rigorous testing of McAfee Endpoint Security v10.5 across a multitude of attack threat vectors targeting a very dynamic enterprise class endpoint attack surface. In addition, McAfee Endpoint Security v10.5 was evaluated for it's resistance against several evasion categories and false positive testing. This test was conducted free of charge and NSS did not receive any compensation in return for McAfee's participation. Download a complimentary copy ($750 value) of this NSS Labs individual test report that provides detailed information not available elsewhere.
Tags : 
endpoint attack, endpoint protection, security, nss
    
McAfee
Published By: Epson     Published Date: Jun 22, 2018
Digital display devices of every kind have radically changed the way we interact and work in individual and group settings. Those organizations that consider users’ interactions with technology are more successful in improving productivity and increasing tech usefulness in meeting spaces. The single most common and important component in many meeting rooms today is a display technology.
Tags : 
    
Epson
Published By: Henley & Partners     Published Date: Apr 27, 2018
Individuals interested in insuring against political and economic uncertainty, as well as those determined to capitalise on the rapidly changing mix of markets, business ventures and culture on offer around the globe, cannot afford to ignore the value of expanding their residence and citizenship options.
Tags : 
migration, globalization, mobile workers, citizenship, global citizens, investment migration, human resources services, business technology
    
Henley & Partners
Published By: 15five     Published Date: Jul 17, 2019
The best practices for managing employees evolves at a break-neck pace. In 2019, the key distinction for performance management strategies is to focus on the whole employee. This ranges from physical, emotional, and mental well-being to facilitating their personal and professional development. To help you gain a deeper understanding of new trends, we assembled this list of top trends to help you create or refine your employee performance management strategy this year, including: • Developing trust with your employees • The value of people analytics • Individualized support • Learning & development • Diversity & inclusion
Tags : 
    
15five
Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
Trend Micro SaaS
Published By: Business.com     Published Date: Oct 09, 2012
The Internet has commoditized virtually every aspect of business, offering individuals, businesses and consumers any information imaginable with the touch of a few buttons.
Tags : 
business, recruiting software, human resources, software, business technology
    
Business.com
Published By: Cornerstone OnDemand     Published Date: Oct 17, 2014
Being a manager is hard. Being a great manager is even harder. Learn simple things you can do as a manager to increase performance from both individuals and teams. Simple strategies like: • Talk less, listen more • Play to your (and your team's) strengths • Manage teams, not individuals • Accentuate the positive
Tags : 
cornerstone on demand, csod, performance reviews, management, employee, motivation, team performance, reviews
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Oct 17, 2014
Want a better performing team? Of course you do. In business, you rely on the successful performance of teams, but performance reviews only look at the strengths and weaknesses of individuals. How do you bridge the gap? If you want a better performing team, then review them as just that…a team. When you do you can: • See the whole team picture • Drive better team performance • Determine how individual contributions drive team success
Tags : 
cornerstone on demand, csod, performance reviews, management, employee, motivation, team performance, reviews
    
Cornerstone OnDemand
Published By: IBM     Published Date: Jan 10, 2014
IBM conducted more than 1,700 in-depth, face-to-face interviews with CEOs, general managers and senior public sector leaders from around the globe. Our newest CEO Study, the largest of its type ever undertaken, is the latest in the IBM C-suite Study Series. It explores how CEOs are responding to the complexity of increasingly interconnected organizations, markets, societies and governments – what we call the connected economy. Three themes emerged. Today's CEOs must: - Empower employees through values - Engage customers as individuals - Amplify innovation with partnerships Register now to access the insights that can help you lead more effectively through impactful connections with your employees, customers and partners.
Tags : 
social media, b2b, global economy, smarter workforce, talent, talent analytics, human capital, learning organization
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search