CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

organization management

Results 251 - 275 of 976Sort Results By: Published Date | Title | Company Name
Published By: Cohesity     Published Date: May 04, 2018
In today’s application driven, cloud agnostic world, many organizations still rely on legacy, multiple point backup and recovery products that consist of backup software, target storage, media and master servers, and cloud gateways, all from different vendors. With slow backups and long recovery times of their existing backup products, organizations are unable to meet their tight business SLAs. Constant forklift upgrades and complex management UIs make it expensive to manage the current backup and recovery environments. There has to be a simpler, more cost-effective way to keep your data safe. This is the problem that Cohesity is designed to solve, with an entirely new approach to data protection. Download this solution brief to learn more about Cohesity and its advantages!
Tags : 
    
Cohesity
Published By: Workday APAC     Published Date: Jul 18, 2019
"Workday has been named the top-ranked ERP system for hospitals and healthcare organizations in the “2019 Best in KLAS: Software and Services” report by KLAS Research. In addition, we’ve been selected as a Category Leader in Talent Management. We’re honored to be recognized for the second year in a row as the leader enabling healthcare providers to improve efficiencies, reduce costs, and deliver quality care. And we wouldn’t be here without our customers. Learn more about how how their feedback contributed to our top rankings."
Tags : 
    
Workday APAC
Published By: IBM APAC     Published Date: May 14, 2019
IBM PowerAI Enterprise helps to make deep learning easier and faster for organizations by bringing together some of the most popular open source frameworks for deep learning, with development and management tools in a single installable package. Designed to simplify end-toend deep learning, PowerAI Enterprise allows enterprises to spend less time on data preparation, implementation and integration, and more time training neural networks for results. IBM PowerAI Enterprise version 1.1.2 includes the most popular deep learning frameworks in one installation: - BVLC Caffe - IBMCaffe - TensorFlow - PyTorch - Keras (tensorflow-keras)
Tags : 
    
IBM APAC
Published By: Amazon Web Services     Published Date: Oct 09, 2017
Today’s organizations are tasked with managing multiple data types, coming from a wide variety of sources. Faced with massive volumes and heterogeneous types of data, organizations are finding that in order to deliver insights in a timely manner, they need a data storage and analytics solution that offers more agility and flexibility than traditional data management systems. Data Lakes are a new and increasingly popular way to store and analyse data that addresses many of these challenges. Data Lakes allow an organization to store all of their data, structured and unstructured, in one, centralized repository.
Tags : 
cost effective, data storage, data collection, security, compliance, platform, big data, it resources
    
Amazon Web Services
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 42.3% of respondents in ASEAN countries saying they deal with more than 50 alerts each day. Shockingly, for 7% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in ASEAN.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
    
Juniper Networks
Published By: Taleo     Published Date: Feb 09, 2011
Seven Steps for Effective Leadership Development: Only 36 percent of organizations have formal programs to immediately fill leadership positions. Developing effective leadership using talent management at all levels across the organization can return significant business value. Leadership development begins with alignment to company strategy and follows seven steps to success.
Tags : 
taleo, intelligence, workforce, engagement, knowledge infusion, leadership, effective leadership
    
Taleo
Published By: Taleo     Published Date: Dec 30, 2009
Integrated Talent Management: Improving Business Results through Visibility and Alignment: Research shows the vast majority of organizations have only achieved integration across two or more elements of talent management, those that have are reporting superior performance gains.
Tags : 
talent management, human capital management, hcm, integrated, integration, visibility, integrate, alignment
    
Taleo
Published By: Infor     Published Date: Mar 07, 2017
Financial reporting teams, often led by Controllers, face mounting pressure to provide accurate, useful, and timely data, while also decreasing turnaround time and costs. Regulatory agencies don’t care if an organization is short of staff or if its financial management system amounts to a collection of spreadsheets.
Tags : 
    
Infor
Published By: Google Apigee     Published Date: Jun 08, 2018
A must-read for IT professionals that provides a comprehensive analysis of the API management marketplace and evaluates 22 vendors across 15 essential criteria. APIs are the de-facto standard for building and connecting modern applications. But securely delivering, managing and analyzing APIs, data and services, both inside and outside an organization, is complex. And it’s getting even more challenging as enterprise IT environments grow dependent on combinations of public, private and hybrid cloud infrastructures. Choosing the right APIs can be critical to a platform’s success. Likewise, full lifecycle API management can be a key ingredient in running a successful API-based program. Tools like Gartner’s Magic Quadrant for Full Life Cycle API Management help enterprises evaluate these platforms so they can find the right one to fit their strategy and planning. Apigee is pleased to offer you a complimentary copy of the Gartner report. Access in-depth evaluations of API managemen
Tags : 
    
Google Apigee
Published By: IBM     Published Date: Jul 06, 2016
To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM) with the IBM big data portfolio creates a valuable connection: big data technology can supply insights to MDM, and MDM can supply master data definitions to big data.
Tags : 
ibm, mdm, big data, ibm infosphere, data management, data center
    
IBM
Published By: IBM     Published Date: Jul 08, 2016
Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : 
ibm, idc, big data, data, analytics, information governance, knowledge management, data management
    
IBM
Published By: IBM     Published Date: Oct 13, 2016
To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM) with the IBM big data portfolio creates a valuable connection: big data technology can supply insights to MDM, and MDM can supply master data definitions to big data.
Tags : 
ibm, mdm, big data, ibm infosphere, mdm advantagw, knowledge management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business.
Tags : 
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-c entric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : 
    
IBM
Published By: Entrust Datacard     Published Date: Jul 21, 2015
This paper reveals how Entrust Authority Security Manager, the world's leading public key infrastructure (PKI), helps organizations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.
Tags : 
entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
    
Entrust Datacard
Published By: Oracle     Published Date: Jan 28, 2019
Oracle Engineered Systems are architected to work as a unified whole, so organizations can hit the ground running after deployment. Organizations choose how they want to consume the infrastructure: on-premises, in a public cloud, or in a public cloud located inside the customer’s data center and behind their firewall using Oracle’s “Cloud at Customer” offering. Oracle Exadata and Zero Data Loss Recovery Appliance (Recovery Appliance) offer an attractive alternative to do-it-yourself deployments. Together, they provide an architecture designed for scalability, simplified management, improved cost of ownership, reduced downtime, zero-data loss, and an increased ability to keep software updated with security and patching. Download this whitepaper to discover ten capabilities to consider for protecting your Oracle Database Environments.
Tags : 
    
Oracle
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: newScale     Published Date: Jan 30, 2008
Many organizations implementing ITIL as part of their IT Service Management framework begin with the Configuration Management Database (CMDB). While a CMDB is a key piece of any successful ITIL implementation, there are several traps that are easily fallen into when implementing one.
Tags : 
change management, cmdb, service catalogue, service catalog, service management, itil, newscale, itil
    
newScale
Published By: Avaya     Published Date: Jan 15, 2014
Be guided on what the best practices are, offering strategies, actionable tactics, and examples of enterprises on the cutting edge so your organization won't have an overabundance of options when working with partners and customers.
Tags : 
avaya, collaboration, effective enterprise, effective collaboration, new culture, broadcasting center, organizational roles, customer experience
    
Avaya
Published By: CA WA 2     Published Date: Oct 01, 2008
Management of a virtual environment presents unique challenges; many organizations do not thoroughly anticipate the differences in managing a virtual environment from a purely physical environment. Many of your existing management tools may, in fact, only be able to manage physical machines or may collapse under the sudden load of many more systems.
Tags : 
virtual, virtualization, ca wa, ca wa 2
    
CA WA 2
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : 
fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication
    
DigitalPersona UK
Published By: Oracle     Published Date: Sep 21, 2016
Overhauling your processes, rewiring your product focus, creating a new culture: large-scale, transformative organizational development and change is messy, difficult—and usually fails. This digibook contains a step-by-step guide to leading process management and overcoming the cultural and procedural challenges, with case studies and examples of how smart CFOs are leading the transformation of their enterprises.
Tags : 
    
Oracle
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search