CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

user productivity

Results 51 - 75 of 202Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: Feb 07, 2018
All companies, small and large, grapple with infrastructure growth and IT modernization. For many companies, datacenter infrastructure has become an essential part of a hybrid cloud environment that allows users to consume internal and external resources seamlessly. This, in turn, is helping modernize today's datacenters and drive new levels of agility, productivity, and scale. A common attribute of modern datacenter infrastructure is solutions that provide all compute and data services as a single system that can be managed holistically at a rack scale. IDC refers to such solutions as converged infrastructure. Intel®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Published By: Dell     Published Date: Feb 02, 2018
All companies, small and large, grapple with infrastructure growth and IT modernization. For many companies, datacenter infrastructure has become an essential part of a hybrid cloud environment that allows users to consume internal and external resources seamlessly. This, in turn, is helping modernize today's datacenters and drive new levels of agility, productivity, and scale. A common attribute of modern datacenter infrastructure is solutions that provide all compute and data services as a single system that can be managed holistically at a rack scale. IDC refers to such solutions as converged infrastructure.
Tags : 
    
Dell
Published By: Riverbed     Published Date: Jan 25, 2018
To stay ahead in today's hybrid network, you need a lens into the end user's experience as well as an understanding of the dependencies between your applications and network. With this approach, you are alerted to issues before the business is impacted and problems are resolved faster. This eBook details what you need to know to select a best of breed network performance management solution and outlines the critical capabilities required for deep application visibility across virtualized, hybrid and cloud networks no matter where a user is located. Read this book and: Discover best practices - for proactive network monitoring and fast troubleshooting Learn how to stay ahead of application performance issues with increased visibility Increase productivity and a higher ROI - with automatic discovery, end-to-end monitoring, reporting, analytics and faster MTTR Ensure your approach is a proactive mode Study the
Tags : 
    
Riverbed
Published By: Dell     Published Date: Dec 12, 2017
Fast-moving employees demand access to people, programs and data from anywhere. Power up their productivity with greater portability and connectivity. Begin by downloading “On the go Professional,” a brief by Dell that uncovers the key needs around convenience, connectivity and access required by mobile professionals. The brief also covers technology recommendations for you to consider, such as the robust line of Dell Latitude and Venue devices powered by Intel®, to meet the preferences of your users. Take advantage of the solutions that maximize enterprise productivity and employee satisfaction today. Download the brief now!
Tags : 
    
Dell
Published By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
    
MobileIron
Published By: Oracle     Published Date: Oct 20, 2017
ESG Lab evaluated the Zero Data Loss Recovery Appliance from Oracle with a focus on its ability to deliver reliable data protection by recovering Oracle databases to any point in time with sub-second RPO in a highly scalable scale-out solution that is easy to use and manage. Year after year, ESG respondents consistently cite improving data backup and recovery among the top IT priorities in our annual spending intentions survey (including 2016’s iteration). Why? Because when unforeseen infrastructure failures or data corruptions occur, the ability to restore not only business-critical information but also application and end-user access to that information become paramount. Lost or prolonged inaccessibility to business-critical data and applications most often means lost revenue and productivity to the business, and possibly the inability to meet regulatory requirements.
Tags : 
    
Oracle
Published By: Druva     Published Date: Sep 27, 2017
A massive migration is taking place fueled by strategic digital transformation initiatives focusing on increasing workload mobility while delivering scalable applications that reduce downtime and increase user productivity. Learn why organizations are now looking to the cloud as it represents an appealing option for managing VMware enterprise environments.
Tags : 
vmware, digital transformation, workload mobility
    
Druva
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
Previously, wireless added a useful layer of mobility to your wired infrastructure. Now, you have users who may never connect with cables. Before, laptops and desktops were the primary tools of productivity in the office. These days, smartphones, tablets and apps are essential, whether users are on the move or at their desks.
Tags : 
device, iot, vlans, unified access, applications, analytics, healthcare
    
Alcatel Lucent Enterprise
Published By: IBM     Published Date: Jul 31, 2017
Read this Magic Quadrant for EFSS report by Gartner to see how the EFSS vendors, including Box shown as a leader in the Magic Quadrant, are increasingly addressing digital workplace enablement to improve modern user productivity and cloud-based content collaboration for the creation of a digital workplace
Tags : 
gartner magic quadrant, digital workplace, could-based content, collaboration
    
IBM
Published By: Urban Airship     Published Date: Jul 24, 2017
Have you ever wondered how push notifications impact app user retention rates? This first of its kind study analyzed the 90-days after first app open for 63 million new app users, comparing retention rates of those who received push notifications with those who did not. We uncovered surprising, and critical, insights as well as devised recommendations on how to keep users engaged and decrease user churn. This 61 page benchmark report is full of data points, insights and recommendations. Download it to learn about: • The impact of messaging at different intervals in the app user lifecycle • Recommendations on when & what to message to increase new user retention rates • Insights on the data specific to four key verticals - retail, media, sports & recreation and utility & productivity.
Tags : 
retention rates, push notifications, app traffic, user engagement, user churn
    
Urban Airship
Published By: VMware     Published Date: Jul 24, 2017
The mobile-cloud era is here. It is not merely about delivering apps; it is about simplifying processes so you can accomplish more. The mobile-cloud era is redefining productivity by enabling workflows through the key foundations of identity and contextual experiences, mobile collaboration, united endpoint management and security, and windows apps and desktops. Today people work primarily from mobile sources and expect a strikingly continuous experience across all their devices, regardless of which device they select to best accomplish any given task. Once access is established, organizations are looking to transform processes to mobile so they can increase efficiency and workflows for end users, thereby driving productivity to the next level.
Tags : 
    
VMware
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Windows 10 has the potential to be a quantum leap in IT and end-user productivity. But first, IT needs to educate its teams and end users on how to use, manage and employ Windows 10 to unlock those powerful benefits. Read this new flipbook to unlock insights into the seven game-changing features that make Windows 10 “ready for today’s mobile-cloud era” —and how IT can deliver a cloud-first unified approach to modern OS management and security.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Consumerization of IT (with BYOD) and mobile-cloud initiatives are quickly becoming the norm in order for businesses to stay competitive. This is forcing organizations to think beyond basic end user productivity and collaboration, and embrace modern business mobility initiatives that require reengineering core business processes to a mobile-cloud model.
Tags : 
    
VMware AirWatch
Published By: Akamai Technologies     Published Date: May 05, 2017
Web application and DDoS attacks hit enterprises without warning or reason. Most Distributed Denial of Service (DDoS) attacks require little skill to launch with attackers can simply rent resources from DDoS-for-hire sites at a low cost.. In comparison, DDoS attacks typically result in: • Operational disruption • Loss of confidential data • Lost user productivity • Reputational harm • Damage to partner and customer relations • Lost revenue Depending on your industry, that could add up to tens of thousands of dollars in damage – and in some cases it could be millions. Only 2% of organizations said their web applications had not been compromised in the past 12 months – 98% said they had.
Tags : 
ddos, technical support, data security, application security
    
Akamai Technologies
Published By: Microsoft Windows     Published Date: Mar 31, 2017
Windows 10 is the best Windows yet, and at Microsoft, we are excited to deliver innovative Windows 10 experiences across a wide variety of world-class devices. Get the most out of Windows 10 with innovative hardware form factors that boost user productivity while reducing security risks—delivering more value at every price point. Download this buyer's guide to discover which Windows 10 Pro devices are right for your business.
Tags : 
    
Microsoft Windows
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: Okta     Published Date: Mar 01, 2017
Customers that are migrating to Microsoft Office 365 or on-boarding other cloud apps have complex requirements, particularly when it comes to the security of the service. Over the last 20 years, cyber security has evolved and now dominates the headlines. More than ever, users are accessing their messaging and productivity tools from untrusted networks, devices and workstations and providing multi-factor and analytics has never been more critical.
Tags : 
    
Okta
Published By: VMware     Published Date: Feb 24, 2017
Windows 10 has the potential to be a quantum leap in IT and end-user productivity. But first, IT needs to educate its teams and end users on how to use, manage and employ Windows 10 to unlock those powerful benefits. Read this new flipbook to unlock insights into the seven game-changing features that make Windows 10 “ready for today’s mobile-cloud era” —and how IT can deliver a cloud-first unified approach to modern OS management and security.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
As the volume and variety of mobile devices surge, so do expectations among end users and business leaders to put these devices to work—as tools for productivity and a competitive advantage for the enterprise. With the goal of striking a balance between opportunity and control, increasing numbers of IT decision makers are adopting enterprise mobility management (EMM) solutions. So, how do you know if your organization is ready to make the move? Read this white paper to determine if now is the right time to adopt EMM, especially if your organization experiences: - Increased need for security and compliance - Device expansion - Rapid growth - And more
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
    
VMware
Published By: Dell     Published Date: Feb 23, 2017
Managing the PC lifecycle can be a complicated and expensive process. Organizations with outdated systems require increased support, have higher maintenance costs, and experience a loss of end user productivity. However, Dell commissioned Forrester® Consulting to study the trends and challenges for global IT decision makers in order to identify opportunities for optimizing the PC Lifecycle.
Tags : 
    
Dell
Published By: VMware AirWatch     Published Date: Dec 09, 2016
The average organization owns about 2,500 apps - making a secure, seamless, scalable virtual workspace strategy easier said than architected. Businesses find themselves scrambling to deploy virtual workspace solutions that meet both mobile end-users' and IT's demands. In this white paper, you'll find five key criteria you must implement in order to effectively execute your mobile workspace plans. Get details on how to offer: A single point of access for productivity and tools Easy app navigation and management Personalization and customization And more
Tags : 
    
VMware AirWatch
Published By: Adobe     Published Date: Oct 05, 2016
Ask any marketer or line of business owner what is driving their investment in mobile apps and you’ll hear a mix of priorities, including the need to improve the user experience, better marketing, increased sales, improved brand loyalty and streamlined productivity.
Tags : 
mobility, mobile devices, mobile strategy, apps, mobile apps
    
Adobe
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search