CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

program management

Results 101 - 125 of 211Sort Results By: Published Date | Title | Company Name
Published By: Rosetta Stone     Published Date: Aug 04, 2016
Why do leading US companies invest in foreign language training programs for their employees? A global consulting company surveyed nearly 500 senior and upper-management business professionals in a variety of functional roles to find out how language skills impact their business.
Tags : 
    
Rosetta Stone
Published By: Balihoo     Published Date: May 28, 2010
One of the major challenges facing manufacturers' marketing teams in their efforts to make reseller co-op marketing more effective is at the very heart of what defines the century-old co-op marketing concept -- the coordination and execution of programs and financial transactions across two separate organizations. Today, when the manufacturer is working with hundreds if not thousands of different resellers, the scale and breadth of the effort can be overwhelming. However breakthroughs are not only possible today,but quite achievable by applying specialized and fully integrated technology solutions, bringing co-op marketing management into the modern age.
Tags : 
co-op marketing, co-op advertising, reseller marketing
    
Balihoo
Published By: 6th Sense Analytics     Published Date: Sep 18, 2007
Software development projects have a long and storied history of failure. In fact, 82% of projects today run late, while errors cost 80% of the average project budget to fix (The Standish Group). Certainly no other business process today is allowed to endure this sort of failure. But software development is often left to chance, despite the significant cost and importance of the process.
Tags : 
software development, development, programming, programmer, quality assurance, quality control, software testing, cost, costs, cost savings, spend management, spending, cost efficient, 6th sense
    
6th Sense Analytics
Published By: Shavlik Technologies     Published Date: Apr 14, 2011
This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.
Tags : 
shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security, anti virus, network security appliance
    
Shavlik Technologies
Published By: CDW     Published Date: Mar 31, 2015
Founded in 1929, the Rutgers Business School offers undergraduate and graduate degrees with programs in accounting, business administration, finance, information technology, pharmaceuticals and supply chain management. By leveraging cloud services, the burgeoning school can deliver rapid virtualization and easy single sign-on without cutting corners. Read this case study to learn more.
Tags : 
storage, cloud, infrastructure, data center, storage technologies, backup, security, it management, knowledge management, data management
    
CDW
Published By: NAVEX Global     Published Date: Nov 18, 2013
Download this report for a comprehensive review of cross-industry benchmarks and gain an excellent resource for companies wishing to assess their organization's reporting data.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
    
NAVEX Global
Published By: NAVEX Global     Published Date: Nov 18, 2013
In this paper, you'll learn more about each of the four Board responsibilities outlined in the U.S. Sentencing Guidelines with respect to ethics and compliance programs.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
    
NAVEX Global
Published By: NAVEX Global     Published Date: Nov 18, 2013
Download this whitepaper to learn the 4 fundamental steps to creating an effective third party compliance program like the elaborate, richly funded programs that are so prominent in the news.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance, third party compliance, risk assessment
    
NAVEX Global
Published By: NAVEX Global     Published Date: Nov 18, 2013
This checklist will enable you to target the features and functionality you really need before embarking on the path to securing your third party relationships.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
    
NAVEX Global
Published By: NAVEX Global     Published Date: Nov 19, 2013
Is your organization benefiting from the full ROI of automated policy and procedure management? Policies and procedures are the building blocks of every organization. This eBook offers articles geared toward managing the policy lifecycle from drafting and validating to approving and implementing, as well as increasing security and important steps toward protecting against data breaches.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
    
NAVEX Global
Published By: NAVEX Global     Published Date: Mar 04, 2014
Almost every company has some, many or all of the elements of an effective third party compliance program. The challenge is to identify what you have. This whitepaper can help you identify.
Tags : 
navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment, qualified third parties, qualifications, risk mitigation, monitoring and auditing, policy based management, security management, security policies, human resources
    
NAVEX Global
Published By: NAVEX Global     Published Date: Mar 04, 2014
Review the past year and identify key trends with an eye towards planning for the year ahead with the recommendations of this research whitepaper.
Tags : 
navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment, qualified third parties, qualifications, risk mitigation, monitoring and auditing, policy based management, security management, human resources
    
NAVEX Global
Published By: Zebra Technologies     Published Date: Jul 19, 2017
Whether youíre in retail, manufacturing, warehouse management, transportation or healthcare, a mobility solution is a great way to empower your employees to do more. But maximizing the value and success of your mobility solution hinges on one critical decision: choosing the right mobile devices. This white paper takes a look at how choosing the TC51/TC56 for a mobility solution can have a significant impact on the overall success of your initiative.
Tags : 
device selection, staff collaboration, loyal shopper, delivery driver, mobility solution, device function, operating systems, os security services, consumer devices, security support, android security support, one touch access, scanning, right devices, data capture, durability, touch computer, mobile computers, powerful computing performance, mobile device management
    
Zebra Technologies
Published By: Qualys     Published Date: Nov 05, 2013
Web applications have recently emerged as a top cybercriminal attack vector, and organizations that donít take a proactive approach to app security may be setting themselves up for disaster. More than one-third of organizations still donít have an application security program in place Ė what can you do to make sure youíre protected? Consult this informative survey today to discover your peersí proven practices for app security success, and learn what you can do to stay protected Ė read on to get started.
Tags : 
qualys, sans, sans survery, application, application security, web applications, web applications security, cybercriminals, app security, application security program, protection, customer facing web applications, vulnerability management, cloud computing
    
Qualys
Published By: Qualys     Published Date: Nov 05, 2013
Continuous Monitoring has become an overused and overhyped term in security circles, driven by US Government mandate (now called Continuous Diagnostics and Mitigation). But that doesnít change the fact that monitoring needs to be a cornerstone of your security program, within the context of a risk-based paradigm. This paper from Securosis discusses Continuous Security Monitoring, including how to do it, and the most applicable use cases they have seen in the real world. It also provides a step-by-step guide for things to do for each use case to move forward with a monitoring initiative.
Tags : 
qualys, securosis, secuirty monitoring, continuous monitoring, continuous security monitoring, cms< security, security programs, risk management, csm platform, use cases, attacks, change control, compliance, security, cloud computing
    
Qualys
Published By: Skillsoft     Published Date: Mar 03, 2015
The current approach to leadership development in most organizations today isnít working. In Brandon Hall Groupís Leadership: State of Development Programs 2013, nearly 75% of respondents said their leadership development programs were not very effective. Organizations must refocus their leadership efforts and shift their mindset from programs to process. This paper provides insights on how we can refocus leadership development by moving from programs to process and directing the white space.
Tags : 
skillsoft, leadership, development, programs, processes, business management
    
Skillsoft
Published By: Skillsoft     Published Date: Mar 03, 2015
This white paper will provide an actionable plan to follow to make certain they are ready to support video-based learning initiatives within their own organization.
Tags : 
skillsoft, development, programs, processes, business management, video learning, corporate education, courses, courseware
    
Skillsoft
Published By: Skillsoft     Published Date: Mar 03, 2015
This study looks at how organizations connect learning to business priorities, create development programs that impact every stage of the employee lifecycle, and utilize technology to support learning initiatives. It also examines the business impact of building learning capability and running effective learning programs.
Tags : 
business strategies, development programs, employee lifecycle, technology integration, performance management, employee performance, leadership bench strength, employee performance management
    
Skillsoft
Published By: Skillsoft     Published Date: Mar 03, 2015
With smartphones and tablets becoming more commonplace in enterprise environments, the interest in mobile learning is growing. Many organizations see the promise of mobile learning, but actual implementations are still relatively rare. Is now the time to take the plunge into mobile learning? Is your organization prepared? Itís important for organizations to focus on some basic issues before making this important decision.
Tags : 
skillsoft, development, programs, processes, business management, mobile learning, corporate education, courses, courseware, technology, resources, access, devices, support
    
Skillsoft
Published By: Skillsoft     Published Date: Mar 03, 2015
The face of corporate learning has changed. It is no longer possible to develop your human capital with a single approach. Todayís corporate environment calls for out-of-the-box thinking, incorporating the advantages of many types of learning to benefit your companyís single biggest investment: your people. This handy guide will help you navigate the growing number of learning solutions and equip you with eight must-ask questions as you develop your learning program.
Tags : 
skillsoft, development, programs, processes, business management, elearning, corporate education, courses, courseware, technology, resources, access, devices, support, mobile, video, content, on-demand, build, buy
    
Skillsoft
Published By: Skillsoft     Published Date: Mar 03, 2015
Are you thinking of introducing elearning into your growing organization's learning and development portfolio? This webinar delivers an informative discussion featuring the top eight must-ask questions to consider when getting started with elearning. We'll help you understand the key features of elearning and how it fits into the vast array of corporate learning solutions.
Tags : 
skillsoft, development, programs, processes, business management, elearning, corporate education, courses, courseware, technology, resources, expertise, engagement alignment, adoption, value, content
    
Skillsoft
Published By: Skillsoft     Published Date: Jun 26, 2015
In this webinar learn how power dynamics underlie all organizations. Understanding how to recognize and embody the different types of power is not only crucial for project managers to influence stakeholders but it is also essential for building highly performing teams.
Tags : 
skillsoft, development, programs, processes, business management, elearning, corporate education, courses, courseware, technology, resources, expertise, engagement alignment, adoption, value, content, pdu
    
Skillsoft
Published By: Skillsoft     Published Date: Mar 03, 2015
Learn how to manage and overcome ongoing difficulties in this informative webinar with Sandra Crowe, titled "I Didn't Sign Up for This! 7 Strategies for Dealing with Difficulty in Difficult Times."
Tags : 
skillsoft, leadership, development, programs, processes, business management, business issues and trends, human resources management
    
Skillsoft
Published By: Qualys     Published Date: Feb 04, 2010
The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, network security appliance, security management, security policies, vulnerability management
    
Qualys
Published By: CrossTec Corporation     Published Date: Feb 26, 2009
Without a comprehensive management program in place IT assets can cost far more than necessary through waste and redundancy (direct costs) and overly complex management and maintenance (indirect costs). Implementing an effective IT asset management program is a first step for companies to deal with these issues. Learn more today!
Tags : 
enterprise management system, ems, crosstec, it efficiency, it spending, it asset management, itam, software development, it management, enterprise applications
    
CrossTec Corporation
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search