CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

information industries

Results 1 - 25 of 31Sort Results By: Published Date | Title | Company Name
Published By: Panasonic     Published Date: Mar 18, 2019
In a world of content overload, executives at Entertainment & Media companies know they need to find new ways to engage, enlighten and inspire audiences through cutting-edge spaces that overlay digital information onto the physical world. That’s what Panasonic, a leading innovator in 10 top disruptive technologies, found in its recent study. They asked senior technology decision makers across 13 industries how they are investing in new technologies, which they have already adopted and which they intend to implement. The report is available now to our readers. Get the report today for an inside look at how competitive companies are adopting disruptive technologies, innovating and planning for the future.
Tags : 
    
Panasonic
Published By: ALE     Published Date: Jan 10, 2019
Campus Cybersecurity is a perennial ‘top of mind’ topic for Higher Education. For the second time in three years, information security topped Educause’s annual Higher Ed CIO Top 10 IT Issues survey. This should come as no surprise according to the latest Verizon Data Breach Investigations Report (DBIR). The report, which shows cybercriminal activity trending upwards, identifies the three most targeted industries as Financial and Insurance, Healthcare, and Education. To find out more, download this whitepaper today.
Tags : 
    
ALE
Published By: MuleSoft     Published Date: Nov 27, 2018
Every company today is a software company and, as a result, business and technology strategies ought to be very intertwined. But often, those strategies aren’t in alignment, leading to challenges in information technology. And in today’s hyper-competitive business environment, that can be disastrous. Companies have to ask themselves: How can we tackle challenges of information technology? Are we doing IT wrong? Today’s CIOs are the key players who enable organizations to respond to the disruptive forces and information technology challenges impacting all industries — mobile, IoT and SaaS among others. In order to increase speed and agility there must be a strong partnership between IT and the rest of the business. Read this eBook to learn: Why we have been doing IT wrong and how putting culture first and technology second, valuing reuse and leveraging KPIs can push CIOs to the right direction. How IT teams can address their delivery gap and increase project delivery speed by adoptin
Tags : 
    
MuleSoft
Published By: Uberall     Published Date: Oct 08, 2018
One of the great advantages of the digital age is the vast amount of information and opinions that consumers are exposed to when making a buying decision. This gives enormous exposure to businesses, whether in a positive or negative way. With this significant increase in information, unbiased and authentic customer reviews become increasingly important to both consumers and businesses. There is a wide choice of rating portals and review platforms, that specialize in all types of industries and services.
Tags : 
consumer, digital, information, portals, services, local marketing, consumer sentiment, reputation management
    
Uberall
Published By: SAS     Published Date: May 24, 2018
This paper provides an introduction to deep learning, its applications and how SAS supports the creation of deep learning models. It is geared toward a data scientist and includes a step-by-step overview of how to build a deep learning model using deep learning methods developed by SAS. You’ll then be ready to experiment with these methods in SAS Visual Data Mining and Machine Learning. See page 12 for more information on how to access a free software trial. Deep learning is a type of machine learning that trains a computer to perform humanlike tasks, such as recognizing speech, identifying images or making predictions. Instead of organizing data to run through predefined equations, deep learning sets up basic parameters about the data and trains the computer to learn on its own by recognizing patterns using many layers of processing. Deep learning is used strategically in many industries.
Tags : 
    
SAS
Published By: Dell EMC     Published Date: May 09, 2018
Millennials are reshaping the world of work through their knowledge of new technologies, work habits, and attitudes of the 21st-century workplace. At the same time, IT departments are working to add flexibility to the way they are supporting the Millennial worker. Yet it’s not just about IT providing the right tools and devices to its employees so they can get their jobs done effectively; IT needs to offer an overall workplace ecosystem that is secure and innovative. In September 2016, Dell commissioned Forrester Consulting to conduct a study with 560 information workers across all industries in Australia, India, the UK, and the US. Learn more about the working habits that emerged and how IT departments can apply these insights to future deployments. Download Report! Intel Inside®. Powerful Productivity Outside. Intel® Xeon® processor Intel, the Intel logo, Xeon and Xeon Inside are the trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Published By: Adobe     Published Date: Mar 26, 2018
Welcome to the 2017 Digital Marketing Study. Between March and April 2017, we reached out to 1,165 digital marketers in enterprise companies in the United States, Canada, the United Kingdom, France, and Germany, with an average company size of more than 7,000 employees. We’ve also gathered information and insights from leaders in several industries regarding their specific challenges, priorities, and tactics. In this report, we use this data to help companies at all levels of maturity successfully transform into an experience business. We hope you find it valuable.
Tags : 
    
Adobe
Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother
Published By: MuleSoft     Published Date: Jan 16, 2018
Every company today is a software company and, as a result, business and technology strategies ought to be very intertwined. But often, those strategies aren’t in alignment, leading to challenges in information technology. And in today’s hyper-competitive business environment, that can be disastrous. Companies have to ask themselves: How can we tackle challenges of information technology? Are we doing IT wrong? Today’s CIOs are the key players who enable organizations to respond to the disruptive forces and information technology challenges impacting all industries — mobile, IoT, and SaaS among others. In order to increase speed and agility there must be a strong partnership between IT and the rest of the business. Read this e-book to learn: Why we have been doing IT wrong, and how putting culture first and technology second, valuing reuse, and leveraging KPIs can push CIOs to the right direction. How IT teams can address their delivery gap and increase project delivery speed by ado
Tags : 
    
MuleSoft
Published By: SAP EMEA Global     Published Date: Dec 13, 2017
For manufacturers, this IDC white paper examines the current and future Internet of Things (IoT) imperative for the following discrete manufacturing industries: automotive, aerospace and defense, high tech, and industrial machinery. We highlight IoT-enabled scenarios — those possible both now and in an Industry 4.0 future with smart manufacturing. (IDC defines IoT as a network of uniquely identifiable endpoints or “things” that communicate without human interaction using IP connectivity.) These scenarios more tightly integrate “things” with other information, processes, and even value chains. Further, we demonstrate how companies in these industries leverage technology to create business value today and disruptive opportunities tomorrow.
Tags : 
    
SAP EMEA Global
Published By: Netsuite     Published Date: Sep 06, 2017
Moving your company to the cloud allows for more efficient and effective business operations—essential for growing an organization. Companies plagued by inaccurate, out of date information can instead get real-time access to critical business data anywhere. NetSuite has worked with businesses across all industries to guide them through the many phases of growth, from start-up to ramp up to IPO. Learn how to overcome the five obstacles to successful growth and why NetSuite will be the last business system you will ever need.
Tags : 
    
Netsuite
Published By: IBM     Published Date: Apr 14, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain competitive advantage in their industries. However, as discussed in “The truth about information governance and the cloud,” most organizations will be challenged to reconcile their legacy on-premises data with new third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
data integration, lifecycle management, hybrid environment, cloud-based data, information governance, decision making
    
IBM
Published By: IBM     Published Date: Mar 30, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain competitive advantage in their industries. However, as discussed in “The truth about information governance and the cloud,” most organizations will be challenged to reconcile their legacy on-premises data with new third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
cloud security, electronic security, health care, security risk management, user authentication, cloud technology
    
IBM
Published By: MobileIron     Published Date: Feb 15, 2017
The third edition of the Mobile Security and Risk Review is a must read and provides IT security leaders with timely information about the mobile threat landscape and the emerging risks facing their organizations. The report also includes a list of the most popular business apps, Apple VPP and DEP adoption metrics, top blacklisted mobile apps and information about healthcare and financial services industries.
Tags : 
    
MobileIron
Published By: IBM     Published Date: Jan 27, 2017
Cloud- based data presents a wealth of potential information for organizations seeking to build and maintain competitive advantage in their industries. However, as discussed in “The truth about information governance and the cloud,” most organizations will be challenged to reconcile their legacy on- premises data with new third- party cloud- based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, networking, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
best practices, security, technology, next gen
    
IBM
Published By: Cisco     Published Date: Jun 22, 2016
With 50 to 100 billion things expected to be connected to the Internet by 2020, we are now experiencing a major paradigm shift that is revolutionizing business. More and more of the objects we use every day—including those in our factories, utilities, and railroads—are used to capture and distribute information that is helping us know more and do more. The TechWiseTV team and guest experts take an in-depth look at how industries like these are utilizing the data they are gathering from the factory floor all the way out to the field. This exploration into how the Internet of Things actually works in the real world and what your organization must do to take full advantage of it is a great opportunity to understand the practical challenges and specific technology involved in bringing all this potential to life.
Tags : 
    
Cisco
Published By: Red Hat     Published Date: May 11, 2016
Platform-as-a-Service (PaaS) provides an abstraction that makes developers more productive by helping them focus on creating applications rather than dealing with infrastructures. This is important as information and its associated processing has become central to more businesses, even those in industries that haven’t been historically thought of as dependent on information technology. And that makes writing custom applications in support of an organization’s business objectives more important than ever.
Tags : 
red hat, paas, platform, developer, enterprise applications, platforms
    
Red Hat
Published By: IBM     Published Date: Mar 31, 2016
"The API economy is the source of much of the innovation that is happening today, both in how companies manage their information technology and how they do business. To succeed in the API economy and reach new markets, companies need a clear strategy to define the best way to achieve monetization. But what, really, is this thing we call API economy? And how do you take advantage of it? In this exciting broadcast, experts will explore how companies are leveraging APIs to disrupt entire industries and how organizations can get started today. Who Should Attend this Webcast: business audience"
Tags : 
ibm, api, api economy, integration, application program interface, cloud, middleware, networking, business technology
    
IBM
Published By: SAP     Published Date: Dec 04, 2015
Supporting the needs of information workers requires the delivery of the latest, relevant information at the point of decision. Download this IDC Report to learn how to enable finance in a digital enterprise to plan, monitor, and predict.
Tags : 
digital enterprise, planning, monitoring, predicting, information industries, information workiers, finance
    
SAP
Published By: Cisco     Published Date: Nov 17, 2015
With 50 to 100 billion things expected to be connected to the Internet by 2020, we are now experiencing a major paradigm shift that is revolutionizing business. More and more of the objects we use every day—including those in our factories, utilities, and railroads—are used to capture and distribute information that is helping us know more and do more. The TechWiseTV team and guest experts take an in-depth look at how industries like these are utilizing the data they are gathering from the factory floor all the way out to the field. This exploration into how the Internet of Things actually works in the real world and what your organization must do to take full advantage of it is a great opportunity to understand the practical challenges and specific technology involved in bringing all this potential to life.
Tags : 
cisco, connected factory, internet of things, iot solutions, data management, convergence, business process management, data integration, data analytics, networking, it management
    
Cisco
Published By: Adobe     Published Date: Apr 13, 2015
In this research study hear from more than 1,500 line-of-business leaders, IT leaders, and information workers about the effectiveness of their organization’s document-based business processes. Learn how organizations of all sizes in all industries around the world are suffering from what we call the “document disconnect.” Learn how this is causing significant delays and errors across critical business functions such as sales contracting and quoting, procurement, talent acquisition, and onboarding. Download this white paper to learn more.
Tags : 
adobe, talent acquisition, sales contracting, sales quoting, document disconnect, productivity, project management, human resources services, workforce management software
    
Adobe
Published By: Intel Corporation     Published Date: Sep 10, 2014
Sponsored by: NEC and Intel® Xeon® processor The goal of ESG Lab reports is to educate IT professionals about emerging technologies and products in the storage, data management and information security industries. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by NEC Corporation of America. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
lab, reports, improvement, storage, data, technologies, purchasing, valuable, customers, third-party, evaluation, security, information, data management
    
Intel Corporation
Previous   1 2    Next    
Search