CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

property

Results 101 - 125 of 154Sort Results By: Published Date | Title | Company Name
Published By: DocuSign     Published Date: May 29, 2014
Few business processes are as security sensitive as those involving electronic signatures. eSignature transactions routinely contain information that is critical to you, your business, and your customers. This information may include personally identifiable Information (PII), pricing details, proprietary business terms, intellectual property, and more. That is why DocuSign’s number one priority is customer security. DocuSign leads the industry in designing and delivering the most secure digital transaction solution available.
Tags : 
docusign, security, esignatures, personally identifiable information, pii, customer security, digital transactions, enterprise applications
    
DocuSign
Published By: Code42     Published Date: Jan 13, 2016
Whether in search of better managers, higher pay or more recognition, people are changing careers faster than ever. The average tenure of wage and salary employees is 4.6 years. With more and more employees working exclusively with corporate data, higher attrition translates to higher levels of data loss. Many employees feel entitled to the work they’ve created and ignore security policies, simply taking the data they want. While some of this pilfered data is innocuous or already in the public realm, some of it is classified, such as customer and employee information, payment data and intellectual property. Code42 provides enterprise organizations with a way to view, manage and protect data from walking out the door. Download the white paper to learn how.
Tags : 
code42, data protection, payment data, data protection, corporate data security, security, it management, knowledge management
    
Code42
Published By: SnowFlake     Published Date: Jul 08, 2016
CapSpecialty, through its subsidiaries, is a leading provider of specialty insurance for small to mid-sized businesses in the U.S., offering commercial property and casualty, professional liability, surety and fidelity products in all 50 states and the District of Columbia. By working with select partners through a limited distribution model, CapSpecialty’s creative, hardworking team provides personalized service and cultivates mutually successful partnerships to deliver positive results.
Tags : 
snowflake, capspecialty, insurance, best practices, productivity, project management
    
SnowFlake
Published By: SAP     Published Date: Apr 14, 2011
Discover how publishers, newspapers, studios, and broadcasting companies are using SAP solutions to automate the processes involved in acquisition and exploitation of content assets. They can accurately capture rights and effectively manage royalty processing for higher profits and better relationships.
Tags : 
intellectual property, contract management, rights availability, visibility, digital media content, rights management, content, royalties
    
SAP
Published By: 2ergo     Published Date: Apr 09, 2010
With close to 40 million smartphone owners and more than 3 billion applications downloaded, the potential of smartphone applications as brand builders and money makers is real! 2ergo's experienced team serves as the first choice for leading brands looking to launch smartphone applications, and we are ideally positioned to help you integrate mobile applications as part of your overall digital marketing strategy.
Tags : 
2ergo, iphone, mobile devices, apps, applications, mobile apps, smartphone, gps
    
2ergo
Published By: Asset Exchange Strategies, LLC     Published Date: Sep 03, 2010
Properly Structuring your Current IRA or 401k will allow you to invest into a Small Business or Franchise. Asset Exchange Strategies will help you setup and invest your IRA or 401k Into Your Small Business or Franchise, all without Taxes or Penalties.
Tags : 
asset exchange strategies, retirement investment, self directed ira, property, 401k
    
Asset Exchange Strategies, LLC
Published By: CarbonBlack     Published Date: Mar 16, 2016
It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.
Tags : 
application control, advanced threats, security, proactivity approaches, security, application security, email security, encryption
    
CarbonBlack
Published By: Bit9     Published Date: Mar 07, 2013
Download Bit9’s latest Threat Advisor and see how a trust-based security platform can help you protect your core IP.
Tags : 
security, risk management, cyber threats, security breaches, cyber espionage, nsa, intellectual property
    
Bit9
Published By: Eaton     Published Date: Jan 26, 2016
When working with data center and commercial facility electrical systems, shocks of 100mA to more than 2,000mA are possible—definitely in the realm of serious harm to humans and property. Energized electrical equipment also presents the risk of arc flash caused by electrical faults that produce powerful explosions. When dealing with commercial and industrial electrical systems, such as uninterruptible power systems (UPSs) and their batteries, data center and facilities managers need to be aware of these risks, especially since some repair and maintenance procedures require working with a unit that is still energized. There are ways to minimize the risks to employees, equipment and the field technician performing the service. This paper answers some common questions about UPS maintenance, how to reduce the risks associated with servicing UPSs and batteries, and how to qualify a UPS service provider.
Tags : 
eaton, ups safety, data center, arc flash, energized electrical equipment, facility managers, ups maintenance, it management
    
Eaton
Published By: Seagate Technology     Published Date: Apr 14, 2015
Upgrading security systems to meet both current and future needs is no small feat. So when a Texas-based surveillance system integrator began work with a large national nonprofit foundation on its 20,000 square foot park-like property, existing infrastructure and future system deployment were primary considerations. With the objective to update the nonprofit’s Virtual Management Software (VMS) while leveraging existing analog and IP cameras, the system integrator needed a cost-effective solution to meet their current needs with the ability to scale for rapid growth. Download this case study to learn more about how the system integrator engaged with NUUO, a leading NVR and VMS manufacturer known for seamless integration of 3rd party cameras to build a customized system that would suit the nonprofit’s needs.
Tags : 
surveillance, security system, virtual management software, cameras, network performance management, intrusion prevention, network security appliance, security management
    
Seagate Technology
Published By: 2ergo     Published Date: Apr 09, 2010
When Rightmove wanted to be the first to provide an innovative and engaging mobile app that would move millions of iPhone users to access extensive property search functionality, they turned to 2ergo. Learn about the challenges Rightmove faced, the solution 2ergo provided, and the unbelievable results that were achieved, including how the app ultimately ranked in the top 30 Apple "Best Apps of 2009" chart.
Tags : 
2ergo, iphone, mobile devices, apps, applications, mobile apps, smartphone, gps
    
2ergo
Published By: SAS     Published Date: Aug 28, 2018
Starting data governance initiatives can seem a bit daunting. You’re establishing strategies and policies for data assets. And, you’re committing the organization to treat data as a corporate asset, on par with its buildings, its supply chain, its employees or its intellectual property. However, as Jill Dyché and Evan Levy have noted, data governance is a combination of strategy and execution. It’s an approach that requires one to be both holistic and pragmatic: • Holistic. All aspects of data usage and maintenance are taken into account in establishing the vision. • Pragmatic. Political challenges and cross-departmental struggles are part of the equation. So, the tactical deployment must be delivered in phases to provide quick “wins” and avert organizational fatigue from a larger, more monolithic exercise. To accomplish this, data governance must touch all internal and external IT systems and establish decision-making mechanisms that transcend organizational silos. And, it must provi
Tags : 
    
SAS
Published By: Cisco     Published Date: Nov 17, 2014
The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.
Tags : 
cloud-computing, malware, cisco, malware infection, amp, networking, security, it management
    
Cisco
Published By: CarbonBlack     Published Date: Oct 26, 2016
Traditional antivirus (AV) just doesn’t cut it anymore. From ransomware that holds intellectual property hostage to sophisticated malware-less attacks that exploit PowerShell, scripting, and memory, endpoints are facing more security risk than ever before. As a result, companies have set their sights on the next generation of lightweight AV solutions.
Tags : 
security, it management, business technology
    
CarbonBlack
Published By: Cisco     Published Date: Dec 21, 2016
Located at a hub of innovation, Hyatt Regency Santa Clara caters to sophisticated, technology-savvy guests. This made it the perfect location for Hyatt Hotels to use as a model property in its quest to create the digital hotel of the future. Wi-Fi is one of the most visible services a hotel provides, and is crucial to guest experiences and loyalty. “We had limited Wi-Fi coverage that was not designed for the modern, mobile digital guest,” explains Dania Duke, general manager at Hyatt Regency Santa Clara. “We quickly learned that to stay competitive in Silicon Valley, we need to have the fastest, best Wi-Fi available.”
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 22, 2016
Today the network is critical in driving change in virtually all organizations as they take their digital transformation journey. This transformation journey will help organizations increase agility, improve productivity, better engage with customers, and protect key intellectual property and assets. The network edge has a pivotal role to play in this transformation and carries perhaps the broadest set of responsibilities when compared to the core and to data center networks. As shown in Figure 1, when comparing each layer of the network, the network edge has a broad breadth of responsibility in the campus. This is also true for the branch
Tags : 
    
Cisco
Published By: Cisco     Published Date: Feb 16, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
technology, infrastructure management, security, network management, network performance, productivity
    
Cisco
Published By: DocuSign     Published Date: Aug 09, 2016
With eSignature, agents, clients, and staff have all documents for any given transaction in one place. And they can sign those documents from any device, anywhere.
Tags : 
esignature, docusign, sign, send, property professional
    
DocuSign
Published By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : 
siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring
    
Q1 Labs
Published By: Arbor Networks     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches. Cyber threats continue to mutate and grow in volume. Read on to learn more.
Tags : 
defeating cyber threats, wider net, arbor networks, network security, improving ability to protect data, data security, security, data management
    
Arbor Networks
Published By: Symantec     Published Date: Jun 19, 2015
Learn how employees are putting your intellectual property at risk and see how there is a growing problem of intellectual property theft in the workplace by understanding the mindset of employees that take corporate assets.
Tags : 
intellectual property, cyber criminals, sensitive data, security initiatives, security, enterprise applications
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
By code signing software, developers can ensure the integrity of their application, protect their intellectual property and brand image and help combat malware.
Tags : 
    
Symantec
Published By: CBIZ     Published Date: Nov 22, 2013
What every business must know about the new tangible property regulations – the most dramatic changes in tax law since the overhaul of the Internal Revenue Code. Learn about the complex rules and the related tasks so that you can ensure compliance.
Tags : 
tangible property regulations, tax deduction opportunities, de minimis safe harbor, write-off opportunities, deductible repairs, capitalization write-off, depreciation, form 3115
    
CBIZ
Published By: IBM     Published Date: Mar 17, 2009
IBM and PTC, leaders in product development and innovation, are offering joint solutions that combine our expertise and technology to fully support cross-enterprise product development optimization. Together, we enable companies to meet time-to-market, cost-reduction and quality requirements, in an ever-increasing, complex global marketplace.
Tags : 
ibm, ptc, telelogic, product development, product innovation, joint solutions, product lifecycle management plm, return on investment
    
IBM
Published By: RuleStream     Published Date: Aug 21, 2009
The ability to harness intellectual property and product know-how is a key to competitive advantage. RuleStream appears to have broken through past technological barriers in rules-driven knowledge capture and reuse.
Tags : 
product development, market intelligence, business intelligence, competitive, business process automation, business process management, bpm, bpa
    
RuleStream
Start   Previous    1 2 3 4 5 6 7    Next    End
Search