CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

sharing

Results 326 - 350 of 456Sort Results By: Published Date | Title | Company Name
Published By: WebEx Communications     Published Date: Dec 14, 2007
Through remote desktop sharing WebEx Support Center enables companies to manage and resolve remote support issues — whether they be external customer-driven or internal user-driven. Support personnel can initiate a session with a remote user by sending them an e-mail or providing a URL.Download this Paper to Learn More About a Support Center.
Tags : 
customer support, helpdesk, help desk, technical support, remote access, roi, spend management, cut costs, cost control, webex, productivity, customer service, customer satisfaction
    
WebEx Communications
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
Disaster can strike when you least expect it.  So how do you back up and maintain control of your data and still provide access to data in a distributed organization?  The challenges are clear...large and growing amounts of data need to be distributed across many sites yet complications such as bandwidth usage, file coherence, version consistency, and file latency all result in lost productivity.
Tags : 
globalscape, wide area networks, disaster recovery
    
GlobalSCAPE
Published By: Iovation     Published Date: Sep 25, 2009
Online businesses today face a daunting battle in combatting online fraud and abuse. Existing identity-based and credit risk scoring systems are being challenged by fraudsters and fraud rings. They capitalize on cheap identities they use to repeatedly target a business or industry. Using device identification to establish device reputations and expose repeat offenders and fraud rings changes everything.
Tags : 
software-as-a-service (saas) solution, device identification technology, discovery of hidden associations, fact-based fraud management, ip geolocation data, reputation sharing, audit logs, reputation trust rules, shared device reputation, application security, auditing, internet security, security management, web service security
    
Iovation
Published By: Iovation     Published Date: Sep 25, 2009
After $20,000 in direct losses and who knows how many lost opportunities, we just couldn't stay in reaction mode. We went looking for a proactive solution and found iovation. We were drawn to the idea of sharing fraud profiles with other subscribers. Plus, the fraud checking is done in real time and it scales to volume which eased my concerns about customer impact. Implementation was straightforward. Preventing half the fraud attempts each month pays for the system; we've seen a 95% reduction in our chargeback rate in 8 months.
Tags : 
iovation, sharing fraud profiles, fraud protection service, on-line mmo gaming, rmt, real money trading, application security, auditing, identity management, internet security, network security appliance, security management, web service security
    
Iovation
Published By: SAS     Published Date: Mar 19, 2013
Gaining Insights from Your Data Faster than Ever and Sharing the Insights with Others
Tags : 
big data, visualization, interactive, data, data visualization
    
SAS
Published By: Focus     Published Date: Nov 15, 2011
With so many choices, how do you know which web conferencing vendor offers the right services and value for your company? Compare the pros and cons.
Tags : 
web conference, vendors, pros, cons, application, desktop sharing, video-conferencing, pricing
    
Focus
Published By: Box     Published Date: Oct 18, 2012
In a mobile-centric world, IT has a new challenge on its hands: ensuring that users can access and collaborate on content anytime, anywhere an on any device. Here are the top five challenges, and how to overcome them.
Tags : 
box, mobile collaboration, access, bring your own device, content, sharing, it management, enterprise applications, business technology
    
Box
Published By: Box     Published Date: Oct 18, 2012
A modern mobile IT strategy is no longer an option, it is an absolute business necessity
Tags : 
box, mobile it strategy, bring your own device, mobile file sharing, collaboration, enterprise applications, telecom
    
Box
Published By: SocialChorus     Published Date: Jan 07, 2014
Thanking advocates for their efforts is an important component to Advocate Marketing success. Whether your goal is to motivate advocates to create and share brand content or increase awareness, a comprehensive Thank You strategy is vital in keeping your employee, consumer and blogger advocates engaged and sharing.
Tags : 
advocates, advocate marketing, brand ambassadors, employee advocates, consumer advocates, bloggers, emerging marketing
    
SocialChorus
Published By: ClearSlide     Published Date: Oct 24, 2013
Many sales leaders are learning that a successful approach to enablement includes providing reps with tools that can help them monitor and track the steps the buyer has already taken on his or her journey. This guide will show you how.
Tags : 
sales engagement platform, customer engagement, shorten sales cycles, sales enablement software, sales analytics, clearslide, customer management software, sales prospect tracking, customer engagement tools, optimize sales process, sales predictability tools, sales productivity tool, sales web tools, mobile apps for sales, online collaboration tool, how to deliver a good sales pitch, email pitch, presentation sharing software, improve sales forecasting, improve sales management
    
ClearSlide
Published By: ClearSlide     Published Date: Oct 24, 2013
To explore how effectively sales organizations are dealing with change, CSO Insights conducted a Sales Engagement Optimization (SEO) study, gathering input from 354 firms. Download now to see the results.
Tags : 
sales engagement platform, customer engagement, shorten sales cycles, sales enablement software, sales analytics, clearslide, customer management software, sales prospect tracking, customer engagement tools, optimize sales process, sales predictability tools, sales productivity tool, sales web tools, mobile apps for sales, online collaboration tool, how to deliver a good sales pitch, email pitch, presentation sharing software, improve sales forecasting, improve sales management
    
ClearSlide
Published By: ClearSlide     Published Date: Oct 24, 2013
Some salespeople are just naturally better than the rest. But with the right insights from technology, you can create more top sellers within your organization.These 5 tips can help you transform your entire team into top sellers.
Tags : 
sales engagement platform, customer engagement, shorten sales cycles, sales enablement software, sales analytics, clearslide, customer management software, sales prospect tracking, customer engagement tools, optimize sales process, sales predictability tools, sales productivity tool, sales web tools, mobile apps for sales, online collaboration tool, how to deliver a good sales pitch, email pitch, presentation sharing software, improve sales forecasting, improve sales management
    
ClearSlide
Published By: GlobalSCAPE     Published Date: Jul 16, 2012
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks.
Tags : 
globalscape, mobile devices, mobile security, file sharing, mobile workers, file transfering, cloud sharing, byod, servers, access control, cloud computing, mobile device management
    
GlobalSCAPE
Published By: GlobalSCAPE     Published Date: Oct 10, 2013
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services.
Tags : 
globalscape, ftp, mft, secure file transfer, cloud sharing, file sharing, byod, mobile devices, mobile workers, mobile security, network security, remote access, access control, email security, hacker detection, web service security, cloud computing, mobile device management
    
GlobalSCAPE
Published By: Polycom     Published Date: Sep 07, 2016
"Seeing is believing. How we connect and collaborate is changing. It’s no longer about reviewing a PowerPoint deck or a document sent out in advance in the meeting invite over a voice bridge. It’s now about collaborating and working in real time with voice, video and content sharing—as a team. Together, Microsoft and Polycom make it simple. Watch now an interactive session covering the following hot topics: How the new Office 365 Services and Skype for Business Online change the collaboration experience and reduce conferencing/communications costs. How you can turn your conference rooms and huddles spaces into productive, collaborative workspaces. Polycom RealPresence Trio and how it accommodates our 3 collaboration needs: Voice, Content and Video. How easy it is to set up and how easy it is for users to connect. How flexible your workspace transition plan can be. Don’t miss this session featuring Polycom and Skype for Business solutions experts, Peter Huboi and Jovito Salonga, for a d
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, collaboration, productivity
    
Polycom
Published By: K2     Published Date: Jan 07, 2016
User adoption has always been something of an issue. Despite having ready access to SharePoint, many users cling to their file-shares, or more recently, adopt other ways of collaborating and sharing documents via web-based services. A third of the organizations surveyed feel that their SharePoint project has struggled to meet their original expectations, and a further 26% feel progress has stalled. Is this because of poor training and governance, restricted functionality of SharePoint, or simply the inevitable result of being the first ECM system to move beyond the safer boundaries of compliance-based aoperations? As we will see in this report, it is likely to be a combination of all of these.
Tags : 
aiim, microsoft sharepoint, user adoption, enterprise content management, networking, security, it management, wireless, knowledge management
    
K2
Published By: IBM     Published Date: Oct 18, 2016
Meet Liz, a Director of Marketing, and journey with her as she looks for innovative ways to brainstorm and share content with both her internal teams and external agency partners. Liz discovers Box, a simple cloud-based content and file sharing solution that improves collaborative control.
Tags : 
ibm, analytics, ecm, box, marketing, effective marketing, content, ibm box, knowledge management, enterprise applications, business technology
    
IBM
Published By: IBM MaaS360     Published Date: Apr 16, 2015
For a deeper dive into the EMM shift, Aragon sheds light on the need for secure and managed sharing of content to mobile devices.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, application security, mobile device management
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
iOS: The last iterations of Apple business dominating OS of choice gave IT new options in security and new concerns in how to manage information sharing.
Tags : 
ios 8, apple, macintosh, security, information sharing, business process readiness, networking, software development, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Get the latest mobile devices and apps in the hands-off learners and educators quickly and securely with mobile device and app management.
Tags : 
ibm, mobile, device management, education, app management, file sharing, networking, wireless, business technology
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
The last iterations of Apple business dominating OS of choice gave IT new options in security and new concerns in how to manage information sharing.
Tags : 
ibm, fiberlink, maas360, apple, ios, data security, information sharing, networking, security, software development, enterprise applications, business technology
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
For a deeper dive into the EMM shift, Aragon sheds light on the need for secure and managed sharing of content to mobile devices.
Tags : 
ibm, mobile, content management, mcm, aragon research, networking, software development, wireless, knowledge management, business technology
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 09, 2015
Mobilephobia: A family of fears typically impacting CISOs and other security professionals associated with embracing and deploying a mobile security strategy that enables access across the enterprise, sharing of corporate data or interaction with associates, customers and other third parties via mobile devices and applications.
Tags : 
fiberlink, ciso, security, mobile, mobilephobia, corporate data, networking, business technology
    
IBM MaaS360
Published By: IBM     Published Date: Oct 09, 2015
Mobilephobia: A family of fears typically impacting CISOs and other security professionals associated with embracing and deploying a mobile security strategy that enables access across the enterprise, sharing of corporate data or interaction with associates, customers and other third parties via mobile devices and applications.
Tags : 
    
IBM
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search