CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

information system

Results 176 - 200 of 441Sort Results By: Published Date | Title | Company Name
Published By: SAP Inc.     Published Date: Jul 28, 2009
From everyday tactical choices to long-term strategy, timely, well-informed decisions make the difference between costly missteps and confident growth. This paper examines how you can gain access to accurate information and visibility across your company from efficient integrated IT systems – and use that information to make faster, smarter decisions. In turn, the right decisions lead to better operations and a stronger competitive position.
Tags : 
sap, information visibility, integrated it systems, enterprise applications
    
SAP Inc.
Published By: Pentaho     Published Date: Mar 08, 2016
If you’re evaluating big data integration platforms, you know that with the increasing number of tools and technologies out there, it can be difficult to separate meaningful information from the hype, and identify the right technology to solve your unique big data problem. This analyst research provides a concise overview of big data integration technologies, and reviews key things to consider when creating an integrated big data environment that blends new technologies with existing BI systems to meet your business goals. Read the Buyer’s Guide to Big Data Integration by CITO Research to learn: • What tools are most useful for working with Big Data, Hadoop, and existing transactional databases • How to create an effective “data supply chain” • How to succeed with complex data on-boarding using automation for more reliable data ingestion • The best ways to connect, transport, and transform data for data exploration, analytics and compliance
Tags : 
data, buyer guide, integration, technology, platform, research, enterprise applications
    
Pentaho
Published By: Oracle     Published Date: Apr 03, 2012
Although more than two-thirds of confidential information is regulated through database management systems, no computer security program offers adequate protection for the databases against the main threats affecting them today. Oracle, the leader in databases technologies, offers security solutions for the protection of all layers of the database.
Tags : 
grid computing, oracle, database applications, enterprise applications, java, virtualization, infrastructure
    
Oracle
Published By: Allscripts     Published Date: May 01, 2014
Meaningful Use Stage 2 increases many of the thresholds that were in Stage 1, but the main focus of Stage 2 is on exchanging structured information among providers and patients. With less than 7% of EHR vendors certified, are your systems and providers ready?
Tags : 
allscripts, ehr certification, portal challenges, cpoe adoption, direct messaging, technology upgrade, replacements, cloud reporting
    
Allscripts
Published By: Sage     Published Date: Oct 29, 2014
Accountants typically spend a great deal of time in the compilation of ?nancial statements for compliance purposes and for measuring the historical performance of a company. However, all of the data in the balance sheet and income statement is generated from historical information in the accounting system. To be useful in helping to improve the ?nancial performance of a company, the raw ?nancial data needs to be distilled into useful information so that it can be used in making strategic decisions.
Tags : 
financial statements, historical performance, compliance, income statement, accounting system, financial performance
    
Sage
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Published By: Tenable     Published Date: Jan 25, 2019
"This whitepaper from the SANS Institute focuses on the growing use and benefits derived from information technology (IT) and operational technology (OT) convergence which includes more effective management and operation of contemporary control systems. IT/OT convergence carries unique challenges that make managing and securing an industrial control system (ICS) more difficult. This is due to greater technical complexity, expanded risks and new threats to more than just business operations. This paper explores the issues that arise with the blending of IT and OT into combined cyber-physical systems where risks must be identifed and managed. Download this report to get answers to these questions: -Why are digital asset inventories critical for IT/OT security risk management? -How does knowledge about risks and vulnerabilities to IT/OT systems lead to better risk management? -Can applying even a few of Center for Internet Security (CIS) Controls make a marked difference in the securit
Tags : 
    
Tenable
Published By: Riverbed     Published Date: Feb 26, 2015
To increase agility while lowering costs, IT organizations are using virtualization and cloud-based infrastructure services to consolidate and reduce the number of physical servers and data centers across the enterprise. IDC estimates that, by 2015, more than 20 percent of the information running through servers will do so on virtualized systems. This percentage increases along with the size of the company, with some larger organizations using 100 percent virtualized systems. IDC predicts that, over the next decade, the amount of information managed by enterprise data centers will grow by a factor of 50.
Tags : 
increase agility, virtualization, infrastructure, the cloud, cloud based, consolidation, it management, cloud computing
    
Riverbed
Published By: Tact     Published Date: Sep 06, 2016
Did you know that sales reps typically waste up to 16 hours per week on non-selling tasks? If your sales team is spending too much time on non-selling tasks, logging sales activities to Salesforce, hunting for customer information and documents, or copy-pasting data between separate systems, they might resist the rise of mobile CRM solutions like Salesforce1. However, it’s important to figure out how to enable these teams in the field, as 55% of salespeople will access sales applications exclusively through smartphones or tablets by the end of 2016. It’s not surprising that salespeople will increase their use of mobile apps 125% from 2015-2017. In this whitepaper from Tact, you’ll learn 1) common challenges facing field sales teams, 2) a framework for thinking about mobile sales productivity, 3) essential characteristics for evaluating mobile sales solutions, and 4) key trends in mobile sales.
Tags : 
salesforce, salesforce.com, crm, sales productivity, sales enablement, salesforce adoption, crm adoption, sales management
    
Tact
Published By: HP     Published Date: Oct 09, 2008
In an effort to stay ahead of the competition, companies have poured capital resources into information technology. In many cases, this has been done on a group-by-group basis, with each line of business creating its own infrastructure silo. Each silo had its own systems, servers, storage, licenses, and support teams—and each shouldered the total cost of owning and operating a standalone infrastructure.Learn more by downloading this paper.
Tags : 
mission critical, it virtualization, storage, data management
    
HP
Published By: TriGeo Network Security     Published Date: Oct 03, 2008
It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. What’s surprising to many is that this technology can play a significant role in actively defending networks. This whitepaper explains precisely how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide unprecedented network visibility, security and control.
Tags : 
trigeo whitepaper, siem, log management, security event management, automated remediation, active response, correlation, compliance
    
TriGeo Network Security
Published By: NetApp Exchange Upgrade     Published Date: Dec 17, 2008
Regardless of industry or geographic location, business information is exploding on a massive scale—affecting primary, secondary, and archival storage systems. The sheer quantity of data being amassed is outpacing organizations' ability to keep tabs on it, maintain corporate compliance, meet strict government regulation, and even simply house it in a useful format that can provide invaluable history and knowledge. Learn more today.
Tags : 
netapp, microsoft exchange server 2007, netapp networked storage, storage systems, storage infrastructure, microsoft exchange deployments, server virtualization, scalability limitations
    
NetApp Exchange Upgrade
Published By: VMware     Published Date: Feb 26, 2009
VMware Virtual Infrastructure and CA Recovery Management (CA ARCserve Backup and CA Xosoft products) team up to deliver higher availability and risk-resistance for business-critical information and applications, while lowering management and operational costs and complexity.
Tags : 
vmware, it infrastructure, virtual infrastructure, ca recovery management, business critical information, business continuity, disaster recovery, high availability
    
VMware
Published By: VMware/Intel Server Refresh and Cost Savings     Published Date: Jan 27, 2009
Frustrated by the costs of maintain ever larger data centers-or building new ones-many companies are exploring virtualization. Virtualization lets your IT staff turn your data center into an internal cloud of computing resources controlled by a single virtual data center operating system (VDC-OS).
Tags : 
vmware, virtualization, server virtualization, data center, fc san, fibre, networkattached storage, nas
    
VMware/Intel Server Refresh and Cost Savings
Published By: VMware/Intel Server Refresh and Cost Savings     Published Date: Oct 23, 2007
Today's use of virtualization technology allows IT professionals to automatically manage the resources of the physical server to efficiently support multiple operating systems, each supporting different applications. This IDC Technology Assessment presents IDC's view of how virtualization technologies are impacting and will continue to impact operating environments and the operating environment market near- and long-term.
Tags : 
vmware, operating environments, virtualization, x86, server virtualization, data center, fc san, fibre
    
VMware/Intel Server Refresh and Cost Savings
Published By: VMware/Intel Server Refresh and Cost Savings     Published Date: Feb 16, 2007
VMware virtualization enables customers to reduce their server TCO and quickly delivers signification ROI. This paper describes commonly used TCO models and looks at several case studies that apply TCO models to virtualization projects. Learn more.
Tags : 
vmware, virtualization, tco, cpu, it infrastructure, server virtualization, data center, fc san
    
VMware/Intel Server Refresh and Cost Savings
Published By: EMC Corporation     Published Date: Aug 05, 2014
To develop the visibility, agility and speed to deal with advanced threats, traditional security strategies for monitoring, often based around security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics. In particular, four fundamental capabilites are required: 1. Pervasive visibility 2. Deeper analytics 3. Massive scalability 4. Unified view Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security
    
EMC Corporation
Published By: Epicor HCM     Published Date: Sep 26, 2012
In this white paper you will learn how to make the business case for a new HRIS to senior executives.
Tags : 
hris upgrade, hris implementation, human resources, hr systems, human resources information systems, human resource technology
    
Epicor HCM
Published By: Workforce Software     Published Date: Apr 03, 2012
We will go over a brief introduction of what workforce analytics is, and take a look at why it is sometimes so difficult to get the information we need out of our HR or Business Intelligence systems. We will also dive into the important metrics we should consider as HR professionals and what metrics will ultimately drive your business forward.
Tags : 
human resources, hr management, workforce software, workforce analytics, employees, business analytics
    
Workforce Software
Published By: McAfee     Published Date: Feb 06, 2013
This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.
Tags : 
big data, big security data, mcafee siem, intrusion detection systems, security monitoring, anti spyware, anti virus, application security
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
HIPAA and HITECH require individually identifiable protected health information (PHI) be secured. The unfortunate reality for IT professionals is that these acts of Congress aren't prescriptive regarding what needs to be done about computer systems.
Tags : 
best database security solution, database activity monitoring, hipaa compliance, hitech compliance, phi, ephi, vulnerability manager for databases, anti spam
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Databases store companies’ most valuable information assets, but in most cases they’re poorly protected. It’s important to secure databases as well as or better than other systems in the enterprise. But it’s not that simple.
Tags : 
real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention, authentication and access control, database security, anti spam
    
McAfee
Published By: McAfee     Published Date: Apr 16, 2014
This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting.
Tags : 
sans, siem, information and event correlation, critical security controls, reporting, security
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search