CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

information management

Results 301 - 325 of 663Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Feb 02, 2009
Learn how IBM’s change data capture technology can be used in conjunction with IBM’s performance management solutions from Cognos to provide access to the trusted information that systems and employees need to make informed decisions at the speed of business.
Tags : 
ibm, information management software, performance management, business intelligence, ibm cognos, bi-ready data, departmental reporting with ibm cognos, in-memory data store
    
IBM
Published By: IBM     Published Date: Jul 10, 2009
With the economy in constant fluctuation, this white paper is especially timely. “Enhancing your infrastructure in an uncertain economy to support your SOA business initiatives” defines the challenges facing IT executives, and outlines actions they can take now to cut costs, increase productivity and get more out of existing IT investments.
Tags : 
soa, ibm, cost cutting, service oriented architecture, roi, return on investment, plug and play, real time data
    
IBM
Published By: IBM     Published Date: Aug 31, 2009
IBM and SAP® have a unique partnership that was established with the goal of delivering the very best enterprise IT solutions to SAP customers.
Tags : 
ibm, db2 9, sap, information management, sap, deep compression, db2 multi-dimensional clustering, db2 database partitioning feature
    
IBM
Published By: IBM     Published Date: Oct 23, 2009
In the IBM white paper, "Achieving end-to-end information security: Five critical steps," you'll learn a more sophisticated approach to information security.
Tags : 
data security, ibm, information security, data retention, service management, security management, risk management, tivoli
    
IBM
Published By: IBM     Published Date: Oct 29, 2009
Learn more about the role of today's midmarket CIO and what they are doing to achieve three primary goals -- make innovation real, raise the ROI of IT and expand business impact.
Tags : 
ibm, cio, mmdg, midmarket, chief information officer, innovation, roi, business management
    
IBM
Published By: IBM     Published Date: Nov 17, 2009
This paper provides an overview of what is required to create an environment to leverage information dynamically for innovation and competitive advantage.
Tags : 
content management, information management, data integration, ibm, li campaign, ibm li, leveraging information, data management
    
IBM
Published By: IBM     Published Date: Nov 17, 2009
his executive level brochure provides the strategy behind Information on Demand (IOD), the 5 entry points to IOD and includes a summary of the 2008, information market analyst Ovum's independent evaluation of IBM's Information On Demand initiative which declared IBM to be at the "vanguard of the unified information management revolution."
Tags : 
information on demand, soa, enterprise data management, enterprise content management, ibm, performance management, information agenda, ovum
    
IBM
Published By: IBM     Published Date: Nov 17, 2009
The information agenda is intended to map out corporate business and technology goals and to create a roadmap to ensure that companies can leverage their corporate information as a strategic asset in the pursuit of these goals.
Tags : 
ium evaluation, ibm, information on demand, uim, iod, information management, scential, filenet
    
IBM
Published By: Stratus Technologies     Published Date: Feb 12, 2008
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Tags : 
risk management, vulnerability, info management, information management, best practices, disaster recovery, stratus, stratus technologies
    
Stratus Technologies
Published By: netForensics     Published Date: Jan 04, 2008
As incidents of identity theft and fraud skyrocket, companies are scrambling to keep up with complex attacks and effectively safeguard consumer information. If you store, process, or transmit cardholder data, comprehensive visibility, actionable intelligence and the ability to respond rapidly to threats has become paramount.
Tags : 
pci, pci dss, pci compliance, customer data, data protection, credit card, cardholder, identity theft
    
netForensics
Published By: netForensics     Published Date: Jan 04, 2008
Securing Federal information and systems is an ongoing challenge. By implementing comprehensive security compliance management methods for data collection, retention, monitoring and reporting, federal agencies can successfully demonstrate a sound framework that meets FISMA requirements.
Tags : 
fisma, fisma compliance, information protection, data protection, monitoring, information management, regulations, regulatory compliance
    
netForensics
Published By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : 
monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management
    
netForensics
Published By: HP VMware     Published Date: Mar 03, 2008
This white paper, created for solutions architects, engineers, and project managers, contains planning information to help customers effectively plan a VMware Infrastructure running on HP ProLiant servers, HP StorageWorks storage solutions, and HP ProLiant Essentials management software components.
Tags : 
hp vmware, vmware, infrastructure, virtual, virtual server, virtualization
    
HP VMware
Published By: Proofpoint     Published Date: Apr 06, 2012
Gartner, Inc. positions Proofpoint in the Challengers quadrant in its 2011 Magic Quadrant for the Enterprise Information Archiving (email archiving, file archiving, social media archiving, retention management, eDiscovery, search, legal hold) market.
Tags : 
gartner, email archiving, archive email, eia magic quadrant, gartner, search, ediscovery, legal hold
    
Proofpoint
Published By: LockLizard     Published Date: Dec 09, 2008
The Austin Diagnostic Clinic had to protect confidential information contained in their management documents so that it could be made available to physicians who could not make it to management meetings.
Tags : 
pdf security, document security, pdf document security, security, application security, password management, security management
    
LockLizard
Published By: Cisco     Published Date: Jan 29, 2009
In a marketplace where too many products and services are chasing too little demand, businesses face a daunting challenge: do everything possible to attract and retain customers.The stakes are high.
Tags : 
cisco, customer satisfaction, crm, customer attrition, retain customers, customer infidelity, trouble-free shopping experience, knowing your customer
    
Cisco
Published By: Catapult     Published Date: Apr 23, 2009
Software-as-a-Service is changing the way companies purchase technology solutions. Rather than securing large capital budgets and tying up IT labor for months, business executives can now address mission critical initiatives with subscription-based software solutions that scale with their business and can be implemented in little to no time.
Tags : 
saas, software-as-a-setvice, on-demand, catapult, on-premise application, management solution, vpn, version lock‐in
    
Catapult
Published By: Catapult.     Published Date: Apr 23, 2009
As a software provider for a product information management solution, we were experiencing a myriad of problems supporting and servicing our on premise application – too many versions to maintain, test, install and upgrade. It was becoming increasingly difficult to support our existing customers, let alone sell to new customers.  The following information is a compilation of our research.
Tags : 
saas, software-as-a-setvice, on-demand, catapult, on-premise application, management solution, vpn, version lock‐in
    
Catapult.
Published By: Epicor     Published Date: Feb 22, 2010
This paper outlines how the five lean principles are all supported and enhanced by comprehensive information control and the management tools that an end-to-end enterprise software suite delivers.
Tags : 
epicor, erp, enterprise resource planning, lean manufacturing, enterprise software, productivity, tco, collaboration
    
Epicor
Published By: IBM Corporation     Published Date: Apr 26, 2010
Register now to access a Smart Archive Strategy Library of assets that will help you make a case for the unified collection and classification of content and data.
Tags : 
ibm filenet, mail archiving, sharepoint archiving, file share archiving, backup and recovery, smart archive, information management, storage management
    
IBM Corporation
Published By: PC Mall     Published Date: Mar 27, 2012
IBM's enterprise content management solutions are designed to help users dramatically reduce the costs associated with producing, storing and retrieving content and can also help mitigate risk associated with managing information appropriately.
Tags : 
ibm, content, content management, reduce, costs, information management, lifecycle, knowledge management
    
PC Mall
Published By: SAS     Published Date: Jun 05, 2017
From cars to factories to cities, many governments are already collecting information from citizens and connected devices that send and receive data over the internet of things (IoT). While analysts expect the IoT to soar to tens of billions of devices by 2020, no one knows how many or what new types of intelligent devices will emerge. But we do know that traditional approaches to data management and analytics may not be sufficient for sustaining value in this new, connected world
Tags : 
    
SAS
Published By: NetIQ     Published Date: Jul 27, 2011
Listen in as Andras Cser, Principal Analyst at Forrester Research, speaks about trends he is seeing in the Identity & Access Management (IAM) market, and specifically about the challenges and benefits of user provisioning.
Tags : 
active directory, ad administration, netiq, compliance, active directory administration, user provisioning, reduce administrative priviledge, itpa
    
NetIQ
Published By: IBM Software     Published Date: Jul 06, 2011
Transform your businesses to be smarter, greener and more cost effective by renewing your Software Subscription and Support. Watch our video and learn about the benefits of renewing on-time direct from Debbie Landers, Vice President, Worldwide Client Support, Information Management Software.
Tags : 
information management, green, renewal, renew, on-time direct, debbie landers, cost effective, software subscription and support
    
IBM Software
Published By: Tealium     Published Date: Mar 12, 2014
In this paper, Web Analytics Demystified presents an approach towards big data that has the potential to simplify the quest for whole customer data and improve your companys odds of success.
Tags : 
tealium, big data, data analytics, business analytics, information technology, data distribution, tag management systems, marketing
    
Tealium
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search