CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

hr technology

Results 651 - 675 of 675Sort Results By: Published Date | Title | Company Name
Published By: HP - Enterprise     Published Date: Nov 19, 2008
While investments to secure the enterprise continue to rise, breaches into company systems and data are skyrocketing. These cyber crimes are consistently debilitating organizations operations, reputations and ultimately, viability. Today’s CEOs are demanding aggressive strategies to protect their business. CIOs and CSOs are working together to employ proven Business Software Assurance approaches across the enterprise to stay ahead of constant threats.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise
Published By: BlackBerry     Published Date: Nov 08, 2008
This paper is the first in a four-part series examines the ways that wireless technology and mobile communications can enhance the efficiency and quality of institutional healthcare, improving the processes through which doctors, nurses, specialists and support staff members deliver medical treatment. Part One offers an overview of the current healthcare situation and suggests ways in which wireless technology solutions address healthcare challenges.
Tags : 
blackberry, healthcare, voip, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers
    
BlackBerry
Published By: Quocirca     Published Date: Nov 05, 2008
Unsurprisingly, research shows that the majority of organizations see their future predicated on how well they can innovate. However, just throwing IT technology at issues in the hope that innovation will happen is not viable. Ideas are ephemeral and are easily crushed within the wrong environment. Creating a suitable culture, allied with a well implemented ideas management approach combined with strong leadership, is required.
Tags : 
quocirca, networking, infrastructure, network management, tcp/ip protocol, wide area networks
    
Quocirca
Published By: Dell     Published Date: Oct 20, 2008
Dell has improved PC deployment activities through patent-pending automation technology and offers an array of services from planning a Windows Vista migration to post-deployment management.
Tags : 
dell, deploying vista, dell deployment framework, dell deployment model, deployment automation toolset, optimized deployment, security, software development
    
Dell
Published By: Lumension     Published Date: Oct 17, 2008
Vulnerability management can be a powerful means toward reducing the threat surface within an enterprise IT environment. But because vulnerability management technology has been around in some form or another for so long there has been plenty of time for the din of marketing-speak from various vendors to confuse users about the true nature of vulnerability management tools and practices.
Tags : 
lumension, it environment
    
Lumension
Published By: HP - Enterprise     Published Date: Oct 16, 2008
Is open source secure? How much business risk is introduced with it?  Fortify surveyed the open source community for an answer and revealed that open source projects lack the three essential elements of security:  people, process and technology.  Read this research to discover what actions can reduce these risks within your organization.
Tags : 
fortify, open source, business risk, security, application security, audit, risk, vulnerabilities
    
HP - Enterprise
Published By: Godfrey     Published Date: Oct 02, 2008
It’s not unusual for business-to-business companies to cut communications budgets when faced with uncertain times like economic downturns, mergers/acquisitions, reorganization, significant competitive threats, technology changes and the like.And yet, it is precisely these situations in which communications that support the brand are most helpful. If there’s ever a time when you need the strength, continuity, and support of a healthy brand, it’s when there’s uncertainty.
Tags : 
b-to-b branding, business-to-business branding, b-to-b branding in web 2.0, b-to-b interactive media, brand guardians, brand ambassadors, media proliferation, brand fragmentation
    
Godfrey
Published By: Quocirca     Published Date: Sep 18, 2008
Whether we like it or not we are all IT users now. Through the ubiquity of networks of devices that we rely on for information, security and day-to-day transactions even those who eschew technology now rely on it, even if they do not acknowledge it. The failure of these networks can lead to widespread disruption, unhappy customers, unproductive employees and lost business. Ensuring their availability, security and efficiency is a job for experts who need powerful tools to carry out the task.
Tags : 
quocirca, service management, high availability, security
    
Quocirca
Published By: Integration New Media, Inc.     Published Date: Sep 18, 2008
This new white paper by Integration New Media looks at the benefits achieved through adding richness to eCommerce sites, with an emphasis on the impact that this change can have on a retailer’s bottom line. In addition, it presents samples of successful integrations and options for moving forward that leverage current technology, providing retailers with the biggest bang for the smallest investment.
Tags : 
inm, integration new media
    
Integration New Media, Inc.
Published By: Integration New Media, Inc.     Published Date: Sep 18, 2008
This new white paper by Integration New Media provides marketing agencies and multimedia developers with a strong foundation of information about Rich Internet Applications (RIAs). From basic definitions through to technology explanations, this white paper is a must-read for those looking to embrace new technologies to satisfy their clients’ growing needs.
Tags : 
multimedia, ria, rich internet applications, web development, inm, integration new media
    
Integration New Media, Inc.
Published By: HP Service Management     Published Date: Sep 03, 2008
In this first chapter of "The Shortcut Guide to IT Service Management and Automation," you will be led through a step by step analysis of your company's IT and business relationships, providing you with a basis for a strategic plan to turn service lifecycle management into a valuable business asset. Author and compliance expert Rebecca Herold demonstrates how technology acts as a strategic differentiator by enabling business growth, driving operational efficiencies to lower maintenance costs, optimizing outcomes, and reducing IT risks.
Tags : 
itil, itil v3, bsm, bsa, dca, itsm, it service management, operations
    
HP Service Management
Published By: Orchid Technologies Engineering & Consulting     Published Date: Sep 03, 2008
Shrinking product development cycles coupled with demanding product requirements and increasingly complex design implementations can overwhelm a design team. The technical risk of employing new, complex, high-speed processor technology can often deter a design group from incorporating new technology in their product designs.
Tags : 
scm, supply chain, oem, manufacturing, manufacture, manufacturer, product development, chip
    
Orchid Technologies Engineering & Consulting
Published By: Intermec     Published Date: Aug 01, 2008
Find out how each aspect of perfect order performance (On-Time Delivery, Complete Orders, Damage-free Delivery, Accurate Invoicing and Documentation) can be improved through enhancements to data collection processes and technologies including RFID, speech, imaging technology, and GPS.
Tags : 
rfid, on-time delivery, complete orders, perfect order, bar code, manufacturing, metrics, speech
    
Intermec
Published By: Quocirca     Published Date: Jul 03, 2008
Technology is no longer a nice to have, or a tool for the few. With many organizations now being completely dependent on their IT systems, the need for the IT department to be seen to be responding to the organization's requirements is of critical importance.  Business Service Management, or BSM, can help in providing underpinnings to the IT function. This paper looks at how the changing processes and market conditions within an organization can be augmented through the use of a Business Service Management (BSM) approach, creating a flexible and responsive technology infrastructure aimed at supporting a rapidly changing commercial landscape and enabling greater competitiveness in the markets.
Tags : 
quocirca, business service management, bsm, service management, business management
    
Quocirca
Published By: IBM     Published Date: Jun 11, 2008
Good governance of a service-oriented architecture is becoming a core competency. This Magic Quadrant report by Gartner examines the market for SOA governance through a set of integrated technologies. It evaluates leaders, challengers and innovators in the SOA governance technology market, providing feature information and strengths and cautions for each.
Tags : 
soa, ibm, ebf, governance, infrastructure
    
IBM
Published By: VMware Dell     Published Date: Jun 05, 2008
The First American Corporation is America’s largest provider of business information. Their numerous acquisitions and diverse lines of business meant that First American had multiple datacenters dispersed throughout the country. They turned to VMware virtualization technology to consolidate facilities. They standardized on VMware technology and avoided purchasing 700 physical machines.
Tags : 
server consolidation, server containment, desktop manageability, vmware infrastructure, vmware, green it, green, servers
    
VMware Dell
Published By: Integration New Media     Published Date: Apr 01, 2008
This new white paper by Integration New Media looks at the benefits achieved through adding richness to eCommerce sites, with an emphasis on the impact that this change can have on a retailer’s bottom line. In addition, it presents samples of successful integrations and options for moving forward that leverage current technology, providing retailers with the biggest bang for the smallest investment.
Tags : 
inm, integration new media
    
Integration New Media
Published By: Integration New Media     Published Date: Apr 01, 2008
Librarians looking to build electronic libraries face numerous challenges. This new white paper by Integration New Media provides a summary of best practices for building an eLibrary. From defining your audience and content requirements, through to choosing a technology solution that makes sense for your use cases, this paper will provide a strong checklist of items to consider. The paper also looks at the three types of users and the key elements of designing the user experience for your eLibrary.
Tags : 
inm, integration new media, online library, elibrary, web development, web services
    
Integration New Media
Published By: Integration New Media     Published Date: Apr 01, 2008
This new white paper by Integration New Media provides marketing agencies and multimedia developers with a strong foundation of information about Rich Internet Applications (RIAs). From basic definitions through to technology explanations, this white paper is a must-read for those looking to embrace new technologies to satisfy their clients’ growing needs.
Tags : 
multimedia, ria, rich internet applications, web development, inm, integration new media, software development, web services
    
Integration New Media
Published By: IBM     Published Date: Mar 28, 2008
In this era of unprecedented change, organizations need agility to adapt rapidly. Part of what separates winners from losers is the ability to respond quickly and intelligently to market opportunities, competitive threats and regulatory constraints — in short, to innovate and create value. The best companies understand how to use technology for strategic advantage to help accomplish these goals.
Tags : 
    
IBM
Published By: Clarus Systems     Published Date: Mar 18, 2008
In this document, you'll learn to enable the successful execution and completion of IPT Deployment projects through a standardized set of processes and methodologies based upon Information Technology Infrastructure Library (ITIL) standards.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices
    
Clarus Systems
Published By: Stratus Technologies     Published Date: Jan 07, 2008
CIOs today are being called upon to interpret business strategy and priorities, then add value through information technology initiatives. At a time when "critical to the business" translates to "mission-critical IT", how do you ensure end-to-end availability and reliability of the IT resources that enable your company’s essential business processes.
Tags : 
business success, productivity, compliance, cost control, decrease spending, spend management, data integrity, meeting sla
    
Stratus Technologies
Published By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : 
monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management
    
netForensics
Published By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : 
storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging
    
Decru
Published By: Symantec     Published Date: Nov 02, 2006
The IT threat landscape has changed from individual hackers disrupting network operations to organized crime stealing confidential information. Antivirus technology must be joined by a coordinated, multilayered defense that includes proactive vulnerability-based intrusion prevention, file-based intrusion prevention, and inbound and outbound traffic control.
Tags : 
security, hacker detection, internet security, crimeware, spyware, intrusion prevention, anti virus, hacker prevention
    
Symantec
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27     Next   End
Search