CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

mba

Results 326 - 350 of 373Sort Results By: Published Date | Title | Company Name
Published By: VeriSign     Published Date: Jul 14, 2010
As consumers are constantly bombarded with messages that their online security is threatened, they can be hesitant to trust any kind of online transaction. If online transactions are your goal, the solution is to add trust signals to your Web site, such as those outlined in this white paper.
Tags : 
verisign, online retail, seo, customer confidence, security, ecommerce, shoppers, online purchasing
    
VeriSign
Published By: sweetiQ     Published Date: Jan 23, 2014
Successful brands, whether big or small, need ambassadors to trumpet their products and services. Finding the right people to represent you is a task - they are more than influencers. Download this whitepaper and you'll discover that while the best brand ambassadors are loyal customers, developing them may require significant work.
Tags : 
local listing management, google+ local, google places, location-based marketing, local search, local search optimization, business listings, solomo
    
sweetiQ
Published By: sweetiQ     Published Date: Jan 23, 2014
Download this whitepaper to learn how complaining customers can easily be turned into faithful customer and even brand ambassadors to expand the reach of your business.
Tags : 
local listing management, google+ local, google places, location-based marketing, local search, local search optimization, business listings, solomo
    
sweetiQ
Published By: Norse     Published Date: Oct 24, 2013
Learn how to protect your financial institution and your customers from cyber-attacks and fraud by learning about 4 technologies that can strengthen security.
Tags : 
threat, cyber security, impact report, threat intelligence, it security, cyber threat, data breach, security attacks
    
Norse
Published By: Aladdin     Published Date: Aug 21, 2009
Identity theft is a major obstacle financial organizations must overcome to maximize the potential of online banking. USB strong authentication tokens with built-in smartcard technology combat identity theft and fraud, while helping banks meet regulatory compliance.
Tags : 
compliance, glba, identity theft, pci, authentication, tokens, smartcard, smartcards
    
Aladdin
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Viruses have been on the attack for more than 20 years, and the cost of dealing with them is escalating. Too many malcode (malicious code) attacks by viruses, worms, Trojans and the like are breaking through today's most prevalent system defenses: Antivirus (AV) programs. This whitepaper will discuss the full impact of virus disasters and what historically has been done to combat the problem.
Tags : 
virus, antivirus, anti-virus, anti virus, trojan, trojans, malware, worms
    
Internet Security Systems
Published By: Secure Computing     Published Date: Aug 21, 2009
Spyware presents a daily threat to organizations. It can even lead to networks being exposed to malicious attacks. Find out about the specific types of spyware threats that are out there and how you can combat these threats today.
Tags : 
security, internet security, anti spyware, intrusion prevention, intrusion detection, malware, anti virus, secure computing
    
Secure Computing
Published By: Lumension     Published Date: Oct 17, 2008
The realities of security and compliance have changed considerably since patch management faced its first big paradigm shift some years ago. At that time many organizations wrestled with the transition from manual patching and remediation to an automated process. Of course, nothing in security is ever static, so it is no surprise that patch management has continued to evolve since then. Though still automated, today’s best patch management tools and techniques are significantly different from their predecessors. In this whitepaper, Lumension Security’s Matt Mosher, Senior Vice President of the Americas, gives an historical perspective on how this evolution unfolded and why it is important for organizations to evolve their patch management technology in order to remain on top of increasing security attacks.
Tags : 
lumension, unix, linux, web 2.0, windows, cve
    
Lumension
Published By: Lombardi Software     Published Date: Dec 07, 2006
In this paper, we will discuss the benefits of BPM and SOA in more detail and show how leading companies have recognized that implementing BPM and SOA together gives them unique capabilities.
Tags : 
bpm, soa, business process management, service oriented architecture, service-oriented architecture, lombardi, lombardi software, it management
    
Lombardi Software
Published By: Lombardi Software     Published Date: Dec 07, 2006
This paper is intended for groups who want to make the business case for investing in BPM to drive process improvement. It provides an overview of the areas of benefit that companies can expect from BPM as well as concrete examples of value.
Tags : 
bpm, business process management, process improvement, productivity, roi, return on investment, it management, lombardi
    
Lombardi Software
Published By: Lombardi Software     Published Date: Dec 07, 2006
Ask 10 different vendors to define BPM or BPM suites, and you will likely get 10 variations of the definition, even though all vendors use the same basic terminology to explain it.  Learn more about BPM now.
Tags : 
workflow, bpm, define bpm, business process management, bpm suite, process improvement, lombardi, lombardi software
    
Lombardi Software
Published By: Lombardi Software     Published Date: Dec 07, 2006
For those individuals or organizations that are being asked to investigate process improvement, Business Process Management (BPM) is a term that frequently associated with the process improvement. This paper defines BPM and explains how it can be applied to help companies achieve process improvement goals.
Tags : 
bpm, business process management, process improvement, productivity, business management, work smarter, lombardi, lombardi software
    
Lombardi Software
Published By: Blue Lane     Published Date: Apr 03, 2007
One of the biggest challenges mirrors a problem in the physical server world: security patching. This paper describes in greater detail the benefits and challenges of server virtualization, and offers insight into how Blue Lane customers are utilizing the PatchPoint(r) System to combat the threat of software vulnerabilities.
Tags : 
virtualization, patching, security, vmware, network security, blue lane, patchpoint, server virtualization
    
Blue Lane
Published By: GFI     Published Date: Jun 12, 2007
Virus-writers are using increasingly complex and sophisticated techniques in their bid to circumvent anti-virus software and disseminate their viruses. Anti-virus software, though essential, cannot combat such threats alone; an email exploit detection tool is also necessary.
Tags : 
email security, trojan, trojans, anti-virus, anti virus, virus, network security, gfi
    
GFI
Published By: Perimeter     Published Date: Jul 17, 2007
With the decrease in the total number of viruses, some have theorized that the need for virus protection is becoming less and less necessary. The purpose of this paper is to help individuals understand the scope of the problem, and specific strategies available to combat this continually changing threat.
Tags : 
patch, ips, intrusion prevention, ids, intrusion defense, security policies, spam, spyware
    
Perimeter
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
In November 2002, Skanska embarked on the construction industry’s largest consolidation effort. Having acquired numerous companies in the previous 12 years — ranging in size from $100 million to $1 billion and comprising the $3.9 billion Skanska of today — CIO Chris Stockley was charged with migrating all the companies onto the J.D. Edwards application platform already in use by a few of the organizations.
Tags : 
skanska, building, construction, case study, oneneck, erp hosting, erp outsourcing, it outsourcing
    
OneNeck IT Services
Published By: OneNeck IT Services     Published Date: May 30, 2018
Learn the real risks, and then find out how to reduce your exposure and combat attackers with Cisco’s 2018 Annual Cybersecurity Report.
Tags : 
    
OneNeck IT Services
Published By: OneNeck IT Services     Published Date: May 30, 2018
Learn the real risks, and then find out how to reduce your exposure and combat attackers with Cisco’s 2018 Annual Cybersecurity Report.
Tags : 
    
OneNeck IT Services
Published By: Tideway Systems     Published Date: Dec 11, 2007
Many firms are embarking on ambitious data center optimization projects to significantly reduce cost in hardware, maintenance, licensing, rack space, cooling and power – only to realize they are lacking fundamental data about their environment. Learn how you can accelerate and de-risk your data center optimization initiatives.
Tags : 
infrastructure, network management, configuration management, cms, cmml, cmdb, datacenter, data center
    
Tideway Systems
Published By: Bronto     Published Date: Jan 03, 2013
While most marketers would agree that the more data we have, the better; it's important we focus on collecting the "right" data and using it sensibly to execute effective email, mobile, and social marketing campaigns.
Tags : 
esp, email marketing, retail, automation, automated, marketing, digital marketing, software
    
Bronto
Published By: NuSphere     Published Date: Jul 31, 2008
The problem of providing remote access to the files is nothing new, but the implementation of the solution quite often also determines reliability, safety and productivity. In this article we will look at accessing a remote computer (Unix, Linux or Windows) over non-trusted network.
Tags : 
remote files sharing, samba, ssh tunnel, nusphere, remote access
    
NuSphere
Published By: Godfrey     Published Date: Oct 02, 2008
Branding has always been about much more than logos and graphics. It comprises the total experience customers and prospects have with your company. By adding newer, richer choices, today’s new communications technologies – everything from blogs and podcasts to wikis and mobile – are changing the fundamental basis of business-to-business marketing. Almost daily. While some are saying that branding is no longer relevant in that increasingly fragmented media world, we believe branding actually is more important than ever. In fact, it’s critical to your success.
Tags : 
godfrey, b-to-b branding, business-to-business branding, b-to-b branding in web 2.0, b-to-b interactive media, brand guardians, brand ambassadors, media proliferation
    
Godfrey
Published By: Godfrey     Published Date: Oct 02, 2008
It’s not unusual for business-to-business companies to cut communications budgets when faced with uncertain times like economic downturns, mergers/acquisitions, reorganization, significant competitive threats, technology changes and the like.And yet, it is precisely these situations in which communications that support the brand are most helpful. If there’s ever a time when you need the strength, continuity, and support of a healthy brand, it’s when there’s uncertainty.
Tags : 
b-to-b branding, business-to-business branding, b-to-b branding in web 2.0, b-to-b interactive media, brand guardians, brand ambassadors, media proliferation, brand fragmentation
    
Godfrey
Published By: SAS     Published Date: Aug 03, 2016
On an average day, 78 Americans die from opioid overdose. Last year’s total was almost 30,000 deaths, roughly two-thirds involving prescription opioids (including Percocet, Vicodin, Hydrocodone, Oxycodone, Oxycontin), the rest involving heroin. The United States, with about 5 percent of the global population, consumes 80 percent of the prescription opioids. The problem affects people of all backgrounds and across the socioeconomic spectrum; the Center for Disease Control (CDC) has officially declared it an epidemic.
Tags : 
best practices, data, technology, analytics, business technology, data center
    
SAS
Published By: Greenpacket     Published Date: Sep 27, 2010
There is an assortment of solutions to combat congestion, ranging from high investment to cost-effective and short-term to long-term.
Tags : 
data offloading, saving, operator, connection manager, connection management, seamless mobility, session persistence, visual basic
    
Greenpacket
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search