CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

information system

Results 201 - 225 of 442Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Apr 16, 2014
This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting.
Tags : 
sans, siem, information and event correlation, critical security controls, reporting, security
    
McAfee
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Information security professionals who want to want to understand how to protect their systems from Heartbleed vulnerability should read this paper!
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: Cisco     Published Date: Dec 21, 2016
The Federal Risk and Authorization Management Program (FedRAMP) provides a cost-effective, risk-based approach for the adoption and use of cloud services by U.S. government agencies. FedRAMP processes are designed to assist federal government agencies in meeting Federal Information Security Management Act (FISMA) requirements for cloud systems. By standardizing on security assessment, authorization, and continuous monitoring for cloud products and services, this program delivers costs savings, accelerated adoption, and increased confidence in security to U.S. government agencies that are adopting cloud technologies.
Tags : 
    
Cisco
Published By: STARLIMS     Published Date: Apr 16, 2014
Learn how Laboratory Information Systems (LIS) are becoming outdated and see how they are being replaced by Information Management Systems that can provide flexible management capabilities that provide informatics solutions.
Tags : 
starlims, lims, laboratories, lis systems, software testing
    
STARLIMS
Published By: STARLIMS     Published Date: Apr 16, 2014
Learn how a Laboratory Information Management System can improve trace evidence management in the crime lab, but will also help analysts with data entry, documentation, and quality control.
Tags : 
starlims, lims, trace evidence management, crime lab, quality control, it management, data management
    
STARLIMS
Published By: STARLIMS     Published Date: Apr 16, 2014
Learn how a Laboratory Information Management System reduced turnaround time for all system functions by an average of 50% for a pharmaceutical manufacturer.
Tags : 
starlims, flexible electronic canvas, lims, data management
    
STARLIMS
Published By: Xangati     Published Date: Sep 01, 2015
If you are a healthcare professional, then you and your organization are caught between the horns of compliance and improving the patient experience. With the Health Information Technology for Economic and Clinical Health Act (HITECH) now in full effect, the days of lax enforcement are over. First-time penalties or violations can reach up to $250,000. The transition to EMR/EHR use, along with all of the systems and equipment upgrading that entails, will be done and done well Ė or else. Penalties can also extend to your organizationís business associates.
Tags : 
performance management, information technology, cloud and systems virtualization
    
Xangati
Published By: OnBase by Hyland     Published Date: Jun 10, 2015
The role of enterprise content management (ECM) as a centralized document repository is well established. However, the value of ECM increases exponentially when it is leveraged as an information hub between line-of-business (LOB) systems to facilitate key processes, keep data in sync and maximize investments in existing applications.
Tags : 
enterprise content management, ecm, enterprise information hub, line of business systems, it management, knowledge management, enterprise applications, data management
    
OnBase by Hyland
Published By: OnBase by Hyland     Published Date: Jun 29, 2015
Manage medical imaging and documentation better by presenting patient information Ė in context Ė in one location. Read on to see how a flexible, enterprise patient viewer helps healthcare IT ensure patient and clinician satisfaction while supporting the marketís healthcare delivery and payment system initiatives.
Tags : 
medical imaging, patient information, enterprise patient viewer, healthcare it, security, it management, enterprise applications
    
OnBase by Hyland
Published By: Cherwell Software     Published Date: Apr 24, 2019
Each year, a total of 180,000 IT service tickets are created and processed. These include requests and incidents of all kinds, such as the provision of the flight information displays, an employee request for a laptop, through to IT equipment for an airline customer. The Airportís IT team therefore decided to undertake a complex and ambitious project, entitled ďITSM 2020,Ē which aimed to establish a uniform and future-oriented IT service management system that would effectively and efficiently serve all areas of Munich Airport. Munich Airport evaluated various bidders in a two stage process conducted on the basis of the European Union tendering procedures. Cherwell was able to hold its own against other ITSM solutions both technically and in terms of price.
Tags : 
    
Cherwell Software
Published By: Ciena     Published Date: Jun 12, 2017
In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow.
Tags : 
sdn, nfv, packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud
    
Ciena
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatchģ's leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Anaplan     Published Date: Mar 29, 2018
The concept of integrated business planning ó closing gaps in an organizationís various planning functions and aligning operations and strategy with its financial performance ó has existed in various forms for decades. What has changed is creation of planning platforms that can handle the fluidity of data to erase silos and enterprise borders where once there were multiple geographies, departments, time zones, languages and currencies. All elements of business are managing the avalanche of information coming to them. Just like connecting disparate people, we also must connect data that resides in various systems, applications and tools.
Tags : 
afp, ibp, business, organizations, enterprise, data, systems
    
Anaplan
Published By: Anaplan     Published Date: Sep 07, 2018
The concept of integrated business planning ó closing gaps in an organizationís various planning functions and aligning operations and strategy with its inancial performance ó has existed in various forms for decades. What has changed is creation of planning platforms that can handle the luidity of data to erase silos and enterprise borders where once there were multiple geographies, departments, time zones, languages and currencies. All elements of business are managing the avalanche of information coming to them. Just like connecting disparate people, we also must connect data that resides in various systems, applications and tools.
Tags : 
    
Anaplan
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Atrius Health Chief Information Security Officer Chris Diguette oversees security for Atrius Health, the largest physician-led healthcare provider in the northeastern US. The organization is recognized nationally for its use of health information technology. Diguette is also CIO of the VNA Care Network, a home healthcare provider and subsidiary of Atrius Health. As CISO, Diguette and his team work to implement and maintain a security infrastructure that safeguards the organizationís critical health information systems and applications, such as its Epic Systems Electronic Medical Records (EMR) system and the personal data of more than 675,000 patients at 29 facilities in eastern and central Massachusetts.
Tags : 
artius, health, chief, information, security, officer, organization
    
McAfee EMEA
Published By: Tidal Software     Published Date: Sep 03, 2008
Staples’ information systems play a critical role in delivering on their brand promise 'that was easy.' As part of a recent strategic imperative, Staples recently embarked on a major modernization of its systems architecture and supporting processes. The goal was to ensure IT’s systems could scale with the company’s continued global expansion without sacrificing the quality of the brand experience. One critical target for modernization was Staples’ enterprise job scheduling processes and systems. After researching the top software providers in this space, Staples selected Tidal Software to support its efforts to centralize and streamline automated batch processing.
Tags : 
job scheduling roi, tidal scheduler, enterprise scheduling roi, systems management tools, batch processing, systems architecture, tidal, tidal software
    
Tidal Software
Published By: DataMotion     Published Date: Oct 01, 2008
With HIPAA audits now randomized, you must be prepared for them every day. And with state regulations requiring compliance-breach reporting, you must become your own auditor. HIPAA is the Health Insurance Portability and Accountability Act, the 1996 federal regulation that mandated health-data privacy.This regulation requires compliance by all insurers and health care providers, including physician’s offices, hospitals, health plans, employers, public health authorities, life insurers, clearinghouses, billing agencies, information systems vendors, service organizations, and universities.But that’s not all.
Tags : 
certifiedmail technology, act's privacy rule, health insurance portability, accountability act, security, it management, data management, firewalls
    
DataMotion
Published By: SRC,LLC     Published Date: Jun 01, 2009
To mine raw data and extract crucial insights, business decision‚Äźmakers need fast and comprehensive access to all the information stored across their enterprise, regardless of its format or location. Furthermore, that data must be organized, analyzed and visualized in ways that permit easy interpretation of market opportunities growth, shifts and trends and the business‚Äźprocess changes required to address them. Gaining a true perspective on an organization’s customer base, market area or potential expansion can be a challenging task, because companies use so many relational databases, data warehouse technologies, mapping systems and ad hoc data repositories to gather and house information for a wide variety of specialized purposes.
Tags : 
src, enterprise, enterprise applications, convergence, compared, counted, combined, reorganized
    
SRC,LLC
Published By: EMC Corporation     Published Date: Mar 20, 2014
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Tags : 
emc, siem, security transformation, malware detection, malware threats, big data security platform, incident detection, advanced security analysis
    
EMC Corporation
Published By: Kaseya     Published Date: Mar 12, 2015
Turn management data into actionable business information that helps create operational efficiencies and demonstrate value.
Tags : 
data management, business information, audits, inventory information, it policies, automation management systems, it assets, it solutions
    
Kaseya
Published By: Comcast Business     Published Date: Mar 24, 2015
The digitization of data has empowered both healthcare providers and patients to improve how, when and where healthcare is administered, giving patients greater control over their personal health and well-being. The key to success lies in the ability to get the right information to the right people at the right time. And a crucial enabler of improved communications is the ability to transfer data across like and disparate systems through mobile technology. This was the topic at a recent focus group Comcast Business held at HIMSS14 that included healthcare IT professionals from six leading healthcare providers. The participants shared the following insights on how advancements in data mobility can engage the entire healthcare ecosystem and help improve patient outcomes. Download this white paper to learn more.
Tags : 
healthcare, patient care, communication, electronic health records, remote diagnostics, mobile technology, networking, security
    
Comcast Business
Published By: Intralinks     Published Date: Oct 03, 2013
As the business case for Software-as-a-Service (Saas) and other cloud computing models solidifies, more companies are incorporating cloud computing into their IT programs. However, the legal, regulatory, and ethical requirements of data security must be adhered to regardless of where the information is housed. The best SaaS providers offer strong authentication systems, user activity auditing tools, and real time usage reporting to maintain the highest level of control over sensitive and confidential data. In this 11-page white paper, Intralinks provides tips and questions to ask prospective providers about their security standards and practices, software reliability and uptime, and the availability of reporting and audit trails.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, knowledge management, enterprise applications
    
Intralinks
Published By: MuleSoft     Published Date: Oct 13, 2015
Learn the recommendations to meet the following challenges: Financial services firms are deploying private clouds and PaaS to improve IT manageability and to empower developers, but still need to manage and monitor legacy environments and third party applications Many firms are adopting PaaS to manage microservices and break down legacy applications into discrete components, resulting in many more endpoints to make discoverable, secure, connect, manage and monitor Applications and container technologies deployed on the PaaS may lack the ability to generate ďmachine dataĒ--detailed information on memory utilization, system resources, endpoint analysis and other critical monitoring statistics
Tags : 
financial services paas, private clouds, disparate environments, memory utilization, it manageability, enterprise applications
    
MuleSoft
Published By: Frontier Communications     Published Date: Dec 29, 2017
As a business owner, youíre used to wearing several hats. However, you donít always have the time or expertise needed for those various roles. So what do you do when you need help but donít have the resources to bring on a full-time team member? The answer could lie in temporary consulting. If the role youíre struggling with most is in the information technology (IT) department, bring in an IT consultant to solve important technological problems and/or implement new systems. Hiring a temporary IT consultant to work on specific tasks can be more time and cost efficient than hiring a full-time IT employee. Hereís how to find the right IT consultant.
Tags : 
    
Frontier Communications
Published By: Trillium Software     Published Date: May 19, 2011
Insurers must combine information from disparate systems, applications, and business units to create an enterprise view of risk. By developing a process to incorporate geocodes into location intelligence, insurers can build a more accurate assessment of risk.
Tags : 
trillium software, underwriting risk, insurers, location intelligence, geocodes, risk management, granularity, risk models
    
Trillium Software
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search