CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

ipt

Results 276 - 300 of 479Sort Results By: Published Date | Title | Company Name
Published By: NAVEX Global     Published Date: Mar 04, 2014
Almost every company has some, many or all of the elements of an effective third party compliance program. The challenge is to identify what you have. This whitepaper can help you identify.
Tags : 
navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment, qualified third parties, qualifications, risk mitigation, monitoring and auditing, policy based management, security management, security policies, human resources
    
NAVEX Global
Published By: Vindicia     Published Date: Sep 23, 2014
Vindicia sheds light on the factors that affect the selection of business models, including pricing, packaging, and promotions and shares insights about how the way you bill customers can affect revenue today.
Tags : 
digital services, subscription, freemium, microtransactions, digital business model, digital subscription, subscription submodels, subscription best practices, subscription metrics, virtual goods, virtual currencies, monthly billing, internet marketing
    
Vindicia
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Your customers are asking for it. Your developers are ready for it. Your operations team is demanding it. What’s behind this momentum? Software-as-a-Service (SaaS) is a fundamental shift away from traditional software licensing to a market-driven subscription model. Keystone engaged 20 ISVs who successfully transitioned to a SaaS model, and found: New customer segments open thanks to lower adoption and operating costs. With less complex infrastructure under SaaS, customer TCO drops. ISV products improve with value-added cloud services and SaaS data capabilities. Financial predictability improves with recurring revenue model. New pricing models aligns ISV value to customers’ business needs, driving increased revenue. Additional, significant operational benefits from switching to a SaaS model. Fill out the form at right to get the free report, The Shift to SaaS: A high-value opportunity for ISVs. The collection of product usage data increases the speed of product development by 33%. –
Tags : 
    
Microsoft Azure
Published By: McAfee     Published Date: Mar 31, 2017
The concept of SIEM orchestration provides immediate, automated responses. It is the only way for a modern enterprise to protect against advanced attacks.
Tags : 
secops, siem, soc, orchestration, threat intelligence, epo, automation, process integration, workflow scripting
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Overwhelmed by the volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate efforts. Machine learning moves security analytics from diagnostic and descriptive to prescriptive and proactive, leading to faster and more accurate detection.
Tags : 
machine learning, advanced analytics, advanced threats, sandbox, zero-day, malware, mcafee labs, dynamic endpoint
    
McAfee
Published By: Sigstr     Published Date: Oct 18, 2017
Businesses of all shapes, sizes and descriptions understand traditional, interruption marketing is now less efficient than ever. This awakening has powered the shift to inbound and content marketing, and the accompanying belief that "content is king." But here's the problem: If nobody can find the king, and most people distrust the king, are you still the king?
Tags : 
    
Sigstr
Published By: NodeSource     Published Date: Nov 20, 2017
Node.js is now the most dominant and in-demand language for application development, particularly on the enterprise scale. This report will trace the evolution and adoption of Node.js in the enterprise, as well as the directions in which the ecosystem will grow.
Tags : 
nodesource, application development, javascript, web applications, open source, soa, application security, web service security, java, soap, web development
    
NodeSource
Published By: Stratavia     Published Date: Oct 03, 2007
IT organizations are looking to leverage automation to improve the delivery of business services across the enterprise, while reducing costs. Automation can be implemented in many ways; however, today’s enterprise demands a higher level of sophistication than simple scripts. This whitepaper from Stratavia discusses the key aspects of automated server provisioning that every CIO should know.
Tags : 
server provisioning, automation, itil, workflow, data center automation, run book automation, configuration management, configuration, data center, vmware, virtualization, stratavia, infrastructure, network management, servers
    
Stratavia
Published By: VMware AirWatch     Published Date: May 19, 2016
We work at home. We take conference calls in the backseat of a taxi. We even tap out emails from 30,000 feet. Mobility is radically redefining the way we work, because it’s redefining where and when we can work. It’s why Keith Perske, executive managing director of workplace innovation for Collier’s, thinks it’s time to adopt a new description of the workplace: “Today’s workplace is an integrated set of locations, technology, programs and work practices that connect people and enable employees to contribute and be productive. That’s the new workplace definition.” And with the emergence of this modern workplace, users are expecting a mobile experience that’s simple, convenient, and a boon to their productivity. In order to deliver on these expectations, IT organizations are making business mobility a priority in their investment decisions. Which is why we’ve identified five potent mobility trends that warrant attention and also present opportunities to transform the enterprise
Tags : 
technology, innovation, work practices, best practices, mobility, trends, productivity
    
VMware AirWatch
Published By: RolePoint     Published Date: Apr 12, 2016
Over the last three years, social networks have experienced exponential growth. Employee networks have grown accordingly, offering access to structured career data through sites like LinkedIn in particular, and unstructured data through networks like Facebook. Employees are continually adding new contacts and growing personal networks. Job posting tools that share jobs into social networks are often described as social referral tools, though this is an inaccurate and misleading description. The more sophisticated of these tools create unique links for sharing that enable employers to identify which of their employees originated the share. This is useful for recognition and reward, whilst the practice of sharing jobs in the wider network is to be encouraged in order to reach job seekers who are browsing or using search engines to identify opportunities. Job seekers are increasingly connecting with their peers in organizations they want to work for. Encouraging employees to share jobs in
Tags : 
rolepoint, social referral, facebook, linkedin, career data, personal network, data management
    
RolePoint
Published By: Dell Software     Published Date: Jul 18, 2012
Paper: Replacing Logon Scripts
Tags : 
technology, script replacement, logon, networking, client-server, processor, white paper, business technology, research
    
Dell Software
Published By: SugarCRM     Published Date: Jan 07, 2015
The way companies use and pay for customer relationship management (CRM) software has changed significantly over the past decade. Moving from a predominantly perpetual license-based system, where companies paid a large up-front sum and then smaller annual maintenance fees, CRM software providers are now moving towards monthly or annual subscription fees to access CRM software on the Internet.
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing, lead quality, lead scoring, sales automation, sales channels, sales force automation, sales management, networking
    
SugarCRM
Published By: Asure Software     Published Date: Sep 10, 2012
In this case study, you'll learn how DPT's research into time and attendance systems lead them to Asure Software. After reviewing various vendors, DPT selected Asure Software as their vendor and partner because they knew AsureForceT Time & Labor Management Solutions would provide accuracy and room for company growth.
Tags : 
time and attendance systems, workforce management, payroll solutions, human resources, web-based applications
    
Asure Software
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts,risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, rackspace, pci, pci dss, payment security, compliance, cloud pci, security, it management
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, cloud pci, security, it management
    
Alert Logic and Sungard Availability Services
Published By: Polycom     Published Date: Oct 31, 2014
Description: Learn how the Polycom® CX8000 and Polycom® CX5100, the 360-degree panoramic room view camera with HD active speaker tracking for Lync 2013, are designed to extend the familiar desktop Lync collaboration experience into the conference room making meetings more effective and engaging. Topics covered were: How to tell if your company is ready for a Microsoft Lync Room System, what Polycom’s new Microsoft Lync Room System solution adds to a Lync deployment and how Polycom’s CX8000 and CX5100 are different than other Microsoft Lync Room Systems.
Tags : 
best practices, network, services, topics, architects, video-enabling, lync, environment, considerations, presence, webinar, customer, success, enterprise, deployment, organization, software development, enterprise applications
    
Polycom
Published By: Polycom     Published Date: Oct 31, 2014
Description: Lync expert and blogger Jeff Schertz presented about deploying video for Microsoft Lync and preparing for a Lync Room System. You have questions and Jeff Schertz has the answers when it comes to anything Lync, including video implementation. Jeff led a technical discussion on how to deploy video for Lync and what you need for the Microsoft Lync Room System.
Tags : 
best practices, network, services, topics, architects, video-enabling, lync, environment, considerations, presence, webinar, customer, success, enterprise, deployment, organization, software development, enterprise applications
    
Polycom
Published By: Polycom     Published Date: Oct 31, 2014
Description: Microsoft Solution Architects discuss the top considerations when adding Microsoft Lync video to your network. You have Microsoft Lync for IM and Presence. Maybe you also use Lync for Enterprise Voice. Video is a logical next step. This webinar will cover how to prepare your network and your organization for Lync video. Topics covered were: What to consider when deploying video, learn about real customer successes and missteps with Lync video deployment and services available to assist with the readiness of your network.
Tags : 
best practices, network, services, topics, architects, video-enabling, lync, environment, considerations, presence, webinar, customer, success, enterprise, deployment, organization, software development, enterprise applications
    
Polycom
Published By: Soonr     Published Date: Jul 30, 2014
Soonr takes a holistic approach towards security, incorporating a variety of structures and mechanisms at various layers within the Soonr service architecture. The following descriptions convey the breadth and depth of security considerations that have become a cornerstone of the Soonr Workplace service.
Tags : 
soonr, security architecture guide, security, workplace service, it management
    
Soonr
Published By: Jobvite     Published Date: Mar 31, 2015
Once upon a time, finding candidates meant posting a job description…and then waiting. But today, everything’s different. • Jobs have changed • Jobseekers have changed • Technology has changed But here’s the kicker: When candidates change, and the recruiting environment changes, your job as a recruiter will change, too. Are you ready to adapt? If you aren't sure, don’t fret. A number of recruiters today are faced with the challenge of adjusting to the new climate. Now is the perfect time to analyze your behavior and rethink your perspective. Here’s a look at seven of the top “sins” recruiters commit today, along with valuable direction for correcting your bad habits.
Tags : 
jobseekers, job search, stem, employment, recruiting, technology, hiring, sourcing, talent pools, human resources
    
Jobvite
Published By: IBM     Published Date: May 07, 2015
Hear a panel of HR leaders engage in a conversation about how they are using predictive and prescriptive analytics applied to talent to drive better business results. Join us to explore how you can be more effective in designing pilots, demonstrating the ROI for talent analytics, and translating talent data into talent insight.
Tags : 
talent acquisition, recruiting, optimization, technology, talent analytics, ibm, human resources
    
IBM
Published By: Microsoft Office 365     Published Date: Jan 05, 2018
Discover how Microsoft Teams is transforming collaboration through unified and intelligent communications experiences to a diverse workforce. Plus, see a hands-on demo of the new meetings experiences within Microsoft Teams, including recording meetings, transcription, immersive HD, and more.
Tags : 
    
Microsoft Office 365
Published By: IBM     Published Date: Jun 13, 2016
Attracting today’s savvy candidate requires much more than a creative job description and a flattering email message. The transparency provided by web sites such as Glassdoor combined with a millennial desire for meaningful work and corporate responsibility have the upped the ante when it comes to employer brand and candidate experience. While many firms have good intentions when it comes to employer brand, these intentions aren’t always translated to action, leaving many candidates feeling frustrated as they move through the process. New hires need confirmation that everything they were told in the interview processes is not only accurate, but even better than expected. When the onboarding process falls short of those expectations, candidates immediately question their decision to accept the offer and retention efforts in jeopardy. Join this webcast to learn how to avoid costly new-hire attrition in your organization.
Tags : 
ibm, recruiting, onboarding, talent acquisition, new-hire attrition, recruiting software/services, human resources
    
IBM
Published By: IBM     Published Date: Jun 13, 2016
Read this eBook to explore how using predictive and prescriptive analytics applied to talent can drive better business results.
Tags : 
ibm, workforce analytics, ibm smarter workforce institute, human resources, hr analytics
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search