CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

maturity model

Results 1 - 25 of 62Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Oct 25, 2017
Outdated, manual services aren’t just frustrating for citizens, they slow government processes down and increase costs. The Governing Institute recently analyzed how well state governments deliver digital experiences for citizens, employees, and businesses. Read Delivering on the Digital Experiences that Drive Efficiency to learn: • How digital experiences measure up in all 50 states • About our new customer experience maturity model for state governments • Best practices for improving digital processes in your own state
Tags : 
customer experience, digital government, digital maturity, customer-centric, customer engagement
    
Adobe
Published By: ADP     Published Date: Nov 16, 2017
Many businesses invest in analytics technology thinking it’s a silver bullet. But data doesn’t always tell the whole story. You get percentages but not insights. Trends but not necessarily relationships or patterns. Truly impactful workforce analytics has to do more. You have to turn data into insight, and then put it into action. This workbook is designed to help you progress through the workforce analytics maturity model. The first step in the process is to identify where you stand today.
Tags : 
    
ADP
Published By: Ahead     Published Date: Mar 20, 2019
AppDynamics features a robust Application Performance Monitoring (APM) solution, enabling transaction-level performance tracking, application mapping, dynamic baselining and code-level diagnostics.
Tags : 
    
Ahead
Published By: Aprimo, Inc.     Published Date: Dec 19, 2008
Marketing operations is in the midst of a major revolution. While the tools of marketing have changed dramatically over the past 25 years, the operational systems and processes have remained relatively stagnant. Most organizations use desktop productivity tools and e-mail to plan, deliver and ultimately execute their marketing activities.
Tags : 
aprimo, marketing operations, marketing tools, marketing model, web development, project management
    
Aprimo, Inc.
Published By: ARMA     Published Date: Nov 04, 2014
The relationship between an organization's information-handling practices and the impact those practices have on its ability to respond to electronic discovery is recognized in the Electronic Discovery Reference Model (EDRM). But the EDRM falls short of describing standards or best practices that can be applied to the complex issues surrounding the creation, management, and governance of electronic information. ARMA International's Generally Accepted Record-keeping Principles and its information Governance Maturity Model are designed specifically to provide a scalable, broadly applicable framework to address these issues.
Tags : 
information-handling practices, edrm, electronic discovery, maturity model, it management, knowledge management, data management
    
ARMA
Published By: Burton Group     Published Date: Jul 07, 2008
Data modeling has evolved from an arcane technique for database designers into an entire family of interrelated techniques that serves many constituencies, including techno-phobic business stakeholders and users. The new maturity of modeling tools and techniques arrives in the nick of time, because new technical and regulatory realities demand that enterprises maintain scrupulous awareness of their data and how it is used. Data modeling is no longer for databases only, no longer for technologists only, and no longer optional.
Tags : 
modeling, data modeling, data management, data mining, business intelligence, dba, database administration, burton group
    
Burton Group
Published By: CA Technologies     Published Date: Jun 26, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Ensuring visibility and accountability for compliance, security and governance while enabling flexibility for digital transformation requires a fresh and more tightly aligned approach to who—and now what in the form of applications, services, machines and things—are given the keys to the kingdom: privileged access. Read this white paper to understand how the digital transformation journey requires thinking through a clear roadmap that spans multiple years, anticipating near- and long-term requirements from a privileged access management solution and ensuring scope and scale needs at a reasonable cost of ownership through the entire lifecycle.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure. Opportunity Multiple elements factor into how effectively an enterprise can embrace automation and advance the maturity of their transformation. However, security tools are central to enabling a structured and measured approach to managing critical access risks at each stage of the maturity model journey. With the right privileged access platform and set of tools, enterprises can progressively automate and scale access management to align risk
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
La sfida Come ci si può aspettare, le aziende che intraprendono un percorso di digital transformation devono affrontare maggiori problemi correlati a rischi e sicurezza. Le iniziative di digital transformation aumentano inevitabilmente il numero dei punti di accesso all'infrastruttura aziendale che sfuggono ai controlli esistenti, sono accessibili a un numero superiore di set di identità diversi e proliferano all'interno di un'infrastruttura distribuita e dinamica. L'opportunità Conoscere i propri utenti con privilegi significa conoscere i rischi. Di per sé, gli strumenti di privileged access management devono essere in grado di supportare l'automazione nel processo di autorizzazione e garantire la scalabilità attraverso il supporto di operations dinamiche e infrastrutture effimere, come gli account amministrativi Amazon Web Services (AWS) per le identità umane.
Tags : 
    
CA Technologies EMEA
Published By: Cisco     Published Date: Jul 01, 2011
This EMA White Paper examines in more detail the building blocks for private cloud computing - automation, virtualization, and cloud service management - and provides EMA's recommendations for a phased approach to cloud computing, based on EMA's maturity model, research data, and enterprise activities, with prescriptive approach and some sample use cases to help get started.
Tags : 
cisco, automization, service catalog, self-service, virtualization, private cloud, building blocks, infrastructure, ema, newscale, cloud computing
    
Cisco
Published By: Cisco     Published Date: Jul 27, 2011
This EMA White Paper examines in more detail the building blocks for private cloud computing - automation, virtualization, and cloud service management - and provides EMA's recommendations for a phased approach to cloud computing, based on EMA's maturity model, research data, and enterprise activities, with prescriptive approach and some sample use cases to help get started.
Tags : 
cisco, automization, service catalog, self-service, virtualization, private cloud, building blocks, infrastructure, ema, newscale, cloud computing, design and facilities
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2015
This whitepaper provides background on cloud contact centers, their advantages and the essential considerations for selecting a vendor. It describes: - Trends surrounding the adoption of cloud contact center technology; - The advantages of selecting a cloud contact center solution; - Key factors to review when selecting a vendor and contact center platform; - Recommendations and a maturity model that businesses can use to develop a cloud contact center roadmap.
Tags : 
ovum, cisco, white paper, cloud contact center, contact center solution, cloud technology, business technology, data center
    
Cisco
Published By: Cisco     Published Date: Feb 12, 2016
This whitepaper provides background on cloud contact centers, their advantages and the essential considerations for selecting a vendor. It describes: - Trends surrounding the adoption of cloud contact center technology; - The advantages of selecting a cloud contact center solution; - Key factors to review when selecting a vendor and contact center platform; - Recommendations and a maturity model that businesses can use to develop a cloud contact center roadmap.
Tags : 
    
Cisco
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
The explosion of Big Data represents an opportunity to leverage trending attitudes in the marketplace to better segment and target customers, and enhance products and promotions. Success requires establishing a common business rationale for harnessing social media and determining a maturity model for sentiment analysis to assess existing social media capabilities.
Tags : 
collaborative consulting, big data, social media, customer sentiment, influence sentiment, govern sentiment, maturity model, generate revenue, media promotions, measurable influence, maturity level, data management, data center design and management, data center
    
Collaborative Consulting
Published By: CrowdStrike     Published Date: Oct 23, 2017
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs How the CrowdStrike® EDR solution empowers organ
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: • What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical • How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs • How the CrowdStrike® EDR solution empowers
Tags : 
    
CrowdStrike
Published By: Ektron     Published Date: Jun 03, 2014
Don’t let the mobile revolution pass you by. Download the whitepaper to find out where you rank, and where you should be headed.
Tags : 
ektron, digital experiences, digital marketing, marketing strategies, search, social, mobile, customer engagement, mobile first, mobile friendly, search marketing, email marketing, emerging marketing
    
Ektron
Published By: F5 Networks Inc     Published Date: Nov 20, 2008
One of the pillars of the Virtual Data Center is virtual platform infrastructure, or the virtual machine; however virtual platforms are dependent on many other, oft forgotten components of both the physical and virtual data center.
Tags : 
virtualization maturity, vdc maturity model, virtual data center stock, data center, iscsi, enterprise applications, storage
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Nov 20, 2008
Defining the baseline and process of virtualization maturity for the data center.
Tags : 
virtualization maturity, vdc maturity model, virtual data center stock, network virtualization, networking, enterprise applications, storage
    
F5 Networks Inc
Published By: IAG Consulting     Published Date: Aug 24, 2010
Requirements excellence cannot be achieved without first understanding the critical capabilities of requirements maturity, and recognizing your organizations strengths and weaknesses. In order to develop a focused plan of attack, it is necessary to assess your requirements practice in each of six areas: process, technology, staff competency, organization, techniques, and deliverables. You will then be armed with the information you need to identify key improvement opportunities, recognize organizational strengths, and form concrete goals for action.
Tags : 
iag, project management, project management, maturity, consulting, model
    
IAG Consulting
Published By: IAG Consulting     Published Date: Jul 27, 2010
Requirements quality is tangible. This hard-hitting 10 minute video microcast presents the concrete rules that will allow you to quickly assess a requirements document and determine if it will likely lead to an effective implementation.
Tags : 
iag, project management, project management, maturity, consulting, model
    
IAG Consulting
Published By: IBM     Published Date: May 30, 2008
Organizations with data-sharing environments, complex information and systems hinder business responsiveness and decision makers’ ability to make informed decisions. This white paper will describe how engaging in a master data management (MDM) project enables effective governance of data - specifically master data - and achieves maturity in key categories of the IBM Data Governance Maturity Model.
Tags : 
ibm, mdm, master data management, data management, data governance
    
IBM
Published By: IBM     Published Date: Jul 23, 2009
Companies that successfully introduce a new requirements-engineering process not only change their process and technology but also change their thinking. While improving your requirements management and analysis practices, this step-by-step guide can help you accelerate change and process acceptance across your organization. Learn more today!
Tags : 
ibm, telelogic, doors, enterprise applications
    
IBM
Start   Previous   1 2 3    Next    End
Search