CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

test

Results 426 - 450 of 2339Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: May 25, 2018
The latest version of CA Project & Portfolio Management facilitates core financial activities with the ease and familiarity of a spreadsheet. Two years ago, CA began to reevaluate how organizations were leveraging their project and portfolio management solutions. Our goal was to identify ways CA Project & Portfolio Management (CA PPM) could better serve every user.CA PPM 15.3 simplifies the job of the financial manager with Microsoft Excel® -like functionality, embedded communication and collaboration features, and direct links to the industry’s most popular reporting and business intelligence tools. Today, CA PPM provides financial managers with the ability to visualize, manage and take advantage of data like never before—all from inside the solution.
Tags : 
budgets, project, cash, flows, finance, project, management
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
CA Live API Creator creates application back-ends exposing enterprise-class REST/JSON APIs, including access to existing data and applications. It enables developers to create new REST endpoints that join data across diverse data sources using a point–and–click approach. API owners can extend the API with declarative business rules, JavaScript event processing, role-based security and interactive testing. The CA Live API Creator Reactive Logic model yields systems that are highly scalable and reliable. Its optimized services run more efficiently and with less fragility than services manually coded by skilled developers and architects.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
La crescita aziendale è una priorità costante. In parallelo all’espansione dell’economia delle applicazioni, è probabile che stiate considerando iniziative di business digitale. Tra gli obiettivi più promettenti di una simile strategia:• Fornire esperienze digitali di qualità superiore ai consumatori attraverso il mobile • Ampliare mercati e flussi di ricavi attraverso canali multipli• Collegare dipendenti e partner ai dati aziendali, sempre e ovunque • Avviare nuovi servizi innovativi nel contesto dell'Internet of Things (IoT)La corretta esecuzione di una strategia digitale richiede la capacità di lanciare nuove applicazioni e coordinare la vostra presenza digitale con i partner. Le API (Application Programming Interface) generano la connettività necessaria per condividere i dati aziendali e i contenuti digitali con quelle applicazioni e con quei partner, tramite Internet. Le API sono una componente essenziale del business digitale: mettono gli sviluppatori in condizione di crear
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies EMEA
Published By: OpenText     Published Date: May 22, 2018
Learn what enterprises like yours are doing to conquer compliance. And get all the latest compliance management trends and best practices.
Tags : 
opentext, gdpr, gdpr compliance, regulations, compliance, eu compliance, governance, internet security, security policies, pci compliance, employee training software, business technology
    
OpenText
Published By: Infosys     Published Date: May 22, 2018
When one of our client's most strategic web applications was hacked, it was something of a wake-up call. Application security is surprisingly often an afterthought, and serious investment is only sometimes made when security breaches are discovered. Effectively, companies try to close the stable door after the horse has bolted. However, preventive security maintenance of apps is far more cost-effective and less damaging than reactive security. Our client therefore asked us to put in place an app security testing program early in the development life cycle to reduce the chances of similar breaches in the future.
Tags : 
security, technology, data, app, device, web
    
Infosys
Published By: IBM     Published Date: May 22, 2018
An overview of testing in talent acquisition and four specific guidelines for assessment practitioners evaluating new selection methods.
Tags : 
human resources, talent management
    
IBM
Published By: Infosys     Published Date: May 21, 2018
Our client is a very well-known, long-established bank with over 13 million customers across the globe. Over the years, they had built up a large and complex technological legacy. The landscape included over 1,000 different applications residing on a complex architecture and a hybrid mix of technology, which made testing the non-production environment an increasingly difficult task for quality assurance (QA) teams. Testing environments were fragmented, and this was compounded by a lack of ownership, governance processes, and communication regarding the status of environment readiness; causing delays, extending time to market, and increasing cost.
Tags : 
banking, technology, environment, governance, communication
    
Infosys
Published By: Dell PC Lifecycle     Published Date: May 21, 2018
Performing PC’s are critical to businesses’ productivity and competitiveness, but hardware refresh is often extended well beyond its due date as IT departments’ resources are stretched or diverted to more urgent business critical projects. PC as a service (PCaaS) has recently emerged as a new model for IT procurement and management, and according to IDC’s latest PCaaS survey, satisfaction among early adopters in Europe is strong.
Tags : 
    
Dell PC Lifecycle
Published By: EMS     Published Date: May 21, 2018
Explore the latest research on how you can optimize your employee experience and drive greater collaboration in your workplace.
Tags : 
top trends, workspace, workplace, optimization, modern, employee, experience, flexible, productive environment, tech-infused, 2018, remote-work
    
EMS
Published By: Dell EMC     Published Date: May 16, 2018
IT organizations are increasingly turning toward hyper-converged infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. Many use cases such as VDI, Test/Dev, IT Operations, Disaster Recovery, ROBO, Private Cloud etc…are already running on VxRail appliances and business critical applications are no exception. VxRail, powered by VMware vSAN, provides the high availability, resiliency, predictable performance, and enterprise ready storage data services that business critical applications require. Intel Inside®. Powerful Productivity Outside. Intel® Xeon® processor Intel, the Intel logo, Xeon and Xeon Inside are the trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Published By: HireVue     Published Date: May 16, 2018
OVERVIEW Unilever is a global player in the fast-moving consumer goods (FMCG) sector, with nearly a third of the world’s population using its products every day. The company has more than 169,000 employees working around the world, and its leaders estimate that within three years, as many as 60 percent of those employees will be Millennials. Critical to Unilever’s ongoing success will be its ability to attract these recent college graduates. For its signature Future Leaders Programme, the company wanted its recruitment efforts to get ahead of the curve. The existing process was rooted in paper-based applications, phone interviews with recruiters, and manual assessment tests. It took four to six months to sift through 250,000 applications and ultimately hire 800 individuals. The company sought to radically transform this process using online gamification, digitally recorded interviews, and science-based assessment tests and data analysis. In this case study, we: • Explain the chal
Tags : 
    
HireVue
Published By: Cisco EMEA     Published Date: May 15, 2018
Miercom was engaged by Cisco Systems to independently configure, operate and validate the performance and feature of the new Catalyst 9000 switches. The switches tested- the Catalyst 9300, 94000 and 9500- represent the next generation of Cisco's Catalyst switch line. Although this report does not focus on Software- Defined Access (SD- Access), it is worth nothing that the Catalyst 9000 switches are the best platform for Cisco's SD- Access solution.
Tags : 
    
Cisco EMEA
Published By: Dell PC Lifecycle     Published Date: May 15, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization.
Tags : 
    
Dell PC Lifecycle
Published By: Workday     Published Date: May 09, 2018
These four resources will help you take advantage of the latest CIO tech trends and understand the importance of a true cloud solution.
Tags : 
    
Workday
Published By: Workday     Published Date: May 09, 2018
Compare your professional services firm with more than 450 PSOs with this expansive benchmark study from Service Performance Insight. Get access to hundreds of pages of charts, graphs, and analyses that offer insight into the performance of your peers and where you can improve to make the greatest impact.
Tags : 
    
Workday
Published By: Dell EMC     Published Date: May 09, 2018
The workplace is changing and the one-size-fits-all approach to technology is changing along with it. As a result, your organization may need to rethink how to keep productivity high, promote collaboration, delight employees with the latest devices all while keeping IT within budget. This interactive eGuide will be your one-stop resource to understand all the new innovation available in Dell’s latest notebooks, desktops, 2-in-1s and ecosystem that can keep your organization future-ready. Access the eGuide from Dell and Intel® and you will learn: • How the workplace and workforce is changing • What tools and solutions help IT go from maintenance to innovation • How innovation is changing notebooks, 2-in-1s, desktops and workstations • The latest Windows 10 features employees will be talking about • What you need to keep endpoints and data secure Intel Inside®. Powerful Productivity Outside. Intel® Xeon® processor Intel, the Intel logo, Xeon and Xeon Inside are the trademarks of
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2018
Dell’s approach to PC Lifecycle management is designed to help customers make the change from IT maintenance to innovation all while controlling their PC infrastructure costs. With this eGuide IT professionals will learn how to deploy, secure, and support PCs with unparalleled efficiency leveraging Dell’s industry-leading hardware, services, and security solutions. Access the eGuide from Dell and Intel® and you will learn: • Why IT needs to take a different approach PC lifecycle management • The four critical stages of the PC lifecycle (Plan, Deploy, Manage, and Retire) • How to partner with Dell to strategically migrate to Windows 10 • What solutions can help in each phase to reduce costs and increase IT productivity • The latest security solutions to protect data and employees
Tags : 
    
Dell EMC
Published By: Monotype     Published Date: May 09, 2018
Over the past several years, we’ve seen a huge change in how brands communicate, market, and relate to their customers. Maintaining good brand health and a strong visual identity is essential to developing trust with your customers, meeting them where they are, and keeping up with their expectations. // In our latest eBook, we've highlighted areas you can’t ignore if you want to deliver the experience consumers expect. You’ll find out what’s most important to today’s customers, ways you can prepare for the future, and how type ties it all together. // You'll learn: Why it’s essential to establish a cohesive brand identity across all touchpoints, in whatever region or language your customers demand How customer expectations have evolved and how you can to adapt Why type is an essential tool in responding to these changes and preparing for the future
Tags : 
branding, marketing best practices, branding best practices, customer experience, global brand, monotype, marketing, design, digital advertising, web fonts, global marketing, emerging marketing, user experience, display advertising
    
Monotype
Published By: IBM     Published Date: May 08, 2018
Security testing is growing faster than any other security market, as AST solutions adapt to new development methodologies and increased application complexity. Security and risk management leaders must integrate AST into their application security programs.
Tags : 
application security, ast solutions, security management, risk management
    
IBM
Published By: VMWare     Published Date: May 08, 2018
Intel Xeon Scalable processors together with Optane and 3D NAND enable increased VM density, better performance and efficiency. Working with Intel and VMware, Evaluator Group tested several next generation Hyperconverged configurations based on VMware vSAN and Intel technologies, including a new class of storage media known as OptaneTM for extreme performance levels.
Tags : 
    
VMWare
Published By: MobileIron     Published Date: May 07, 2018
MobileIron knows that cybercriminals are continuously generating more advanced ways to steal your data by any means necessary. That’s why we are committed to continually innovating and delivering new solutions that help our customers win the race against time to get ahead of the latest mobile security threats. As part of that commitment, MobileIron Threat Defense supports the five critical steps to deploying advanced, on-device mobile security. Our solution provides a single, integrated app that delivers several key advantages.
Tags : 
mobile, threat, defense, security, mobileiron, cyber, criminal
    
MobileIron
Published By: Trustpilot     Published Date: May 04, 2018
Finding a new way to convert visitors into buyers is always a top priority for any company. According to research, the average conversion rate on desktop across the globe hovered around 4% in Q4 2016. And in Q1 2017, statistics from SaleCycle claim the average rate of shopping cart abandonment sat at 75.6%! So how can we keep customers hooked and ensure your business generates more revenue?
Tags : 
marketing, ecommerce, conversion strategies, seo, customer reviews, user generated content
    
Trustpilot
Published By: Cohesity     Published Date: May 04, 2018
Cohesity provides the only hyper-converged platform that eliminates the complexity of traditional data protection solutions by unifying your end-to-end data protection infrastructure – including target storage, backup, replication, disaster recovery, and cloud tiering. Cohesity DataPlatform provides scale-out, globally deduped, highly available storage to consolidate all your secondary data, including backups, files, and test / dev copies. Cohesity also provides Cohesity DataProtect, a complete backup and recovery solution fully converged with Cohesity DataPlatform. It simplifies backup infrastructure and eliminates the need to run separate backup software, proxies, media servers, and replication. This paper specifically focuses on the business and technical benefits of Cohesity DataPlatform for the data protection use case. It is intended for IT professionals interested in learning more about Cohesity’s technology differentiation and advantages it offers for data protection - (i) Elim
Tags : 
    
Cohesity
Published By: Trend Micro     Published Date: May 03, 2018
NSS Labs performed an independent test of the Trend Micro Deep Discovery Inspector Model 4000 (Hardware model 4100) v3.8 SP5 and OfficeScan (OSCE) v12.0.1807. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v4.0 available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Trend Micro’s participation. While the companion Comparative Reports on security, performance, and total cost of ownership (TCO) will provide information about all tested products, this Test Report provides detailed information not available elsewhere.
Tags : 
    
Trend Micro
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search