CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

adoption

Results 276 - 300 of 944Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 09, 2014
Companies worldwide are embracing private clouds, not only because they support new, highly efficient and secure data solutions, but also to drive new competitive organizational strategies. This white paper provides an assessment of the business value of implementing IBM SmartCloud Entry for Power Systems versus comparable private cloud solutions from VMware on Intel. It discusses the benefits of private cloud solutions, including reduced labor and hardware/software costs, ease of implementation and adoption, scalability, organizational flexibility, security, improved efficiency, as well as allocation of and access to IT resources.
Tags : 
smartcloud, private cloud, vmware, workloads, smartcloud entry, ibm smartcloud, edison group, systems director
    
IBM
Published By: IBM     Published Date: Jul 25, 2012
As it has been the trend over the last decade, organizations must continue to deal with growing data storage requirements with the same or less resources. The growing adoption of storage-as-a-service, business intelligence, and big data results in ever more Service Level Agreements that are difficult to fulfill without IT administrators spending ever longer hours in the data center. Many organizations now expect their capital expense growth for storage to be unstoppable, and see operating expense levers - such as purchasing storage systems that are easy to manage - as the only way to control data storage-related costs.
Tags : 
infrastructure, technology, cloud, storage, virtualization, data management, business technology, cloud computing
    
IBM
Published By: Apptio     Published Date: Jul 16, 2019
With increased adoption, cloud footprints are getting larger and more unwieldy to manage. Organizations know they must analyze and consolidate their cloud bills to stop cloud waste eating into OpEx budgets. Extensive cloud adoption driven by a “cloud-first” mandate isn’t inherently sprawl, but do you know the business initiatives that spend is supporting? What alternatives did you consider? How is spend tracking? Download this guide to stop cloud sprawl from undercutting your IT strategy.
Tags : 
    
Apptio
Published By: Arcserve     Published Date: Jul 23, 2010
This report is designed to help IT organizations more effectively plan for the adoption of solutions that can help bring together a unified view of IT service performance as it impacts business outcomes. Download now!
Tags : 
ca technologies, ema radar, business service management, bsm, vendor, application performance management, infrastructure manager, service desk
    
Arcserve
Published By: GuideSpark     Published Date: Aug 01, 2018
Employee Communication 3.0 (EC3) is designed to be campaign-driven and deliver “just-in-time” information experiences to employees. It’s time for HR to think like a marketer.
Tags : 
employee communication, employee engagement, employee experience, employee culture, effective employee communication, strategic employee communication, multi-channel communication, drive employee engagement
    
GuideSpark
Published By: FICO     Published Date: Jun 07, 2016
With the increasing mainstream adoption of big data infrastructure — highly distributed file storage and query tools — more businesses are taking a new look at what business intelligence and analytics can do to grow revenue, increase profits and ultimately develop strategic relationships with customers.
Tags : 
    
FICO
Published By: Infoblox     Published Date: Jun 11, 2012
Learn why any organization relying on the IT ecosystem enabled by the Internet Protocol - especially those organizations with public-facing content - are at great risk. Get your free complimentary white paper NOW!
Tags : 
infoblox, private cloud, public cloud, cloud, routers, switches, servers, firewalls
    
Infoblox
Published By: Symantec     Published Date: Jul 11, 2017
CloudSOC can help you more easily determine which apps should be blocked and which should be allowed within your organization by assisting in identifying unsanctioned Shadow IT, providing customized Business Readiness Ratings™ for each cloud app tailored to your organization’s risk profile, and applying User Behavior Analytics (UBA) to identify hackers and malicious usage. Here you’ll learn how to guide your organization through the process of safely adopting cloud apps and services using Symantec CloudSOC.
Tags : 
cloud application, cloud app adoption, cloud security, cloud protection, shadow it
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Stories and statistics behind successful analytics projects The adoption of analytics across the enterprise is accelerating, and with good reason. Analytics can offer a competitive advantage by helping to identify growth opportunities, circumnavigate risk and improve customer relationships. These insights are becoming crucial parts of the business strategy for executives representing a wide array of industries. Check out our latest eBook to see how some of the world’s leading companies are using analytics to meet their needs. You’ll receive diverse examples of how organizations applied the latest statistical methodologies, such as: scorecard build, regression, decision trees, machine learning and material change to uncover meaning in data. The examples represent global brands across critical industries – Financial Services, Insurance, High-Tech, Aerospace, Manufacturing and others – where analytics helped answer their most challenging questions.
Tags : 
    
Dun & Bradstreet
Published By: Juniper Networks     Published Date: Sep 26, 2019
Businesses in the Asia-Pacific (APAC) region manage many disparate security tools, frequently without a centralized information management platform. They also suffer a deluge of threat alerts, although only a small percentage of these require further investigation.
Tags : 
    
Juniper Networks
Published By: Motorola     Published Date: Feb 06, 2008
This White Paper outlines how mobile solutions help organizations work efficiently in a global business environment. It also discusses how organizations can best create processes around device usage, data/service access and security.
Tags : 
mobile strategy, wireless, mobility, adoption, htc, mobile workers, security, network
    
Motorola
Published By: NEC     Published Date: Nov 20, 2013
Mobile usage isn't slowing down; take a look at how its impacting the work place.
Tags : 
nec, enterprise mobile device, mobile, smartphones, tablets, it management
    
NEC
Published By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apple’s app-review and they face the risk that attackers will cont
Tags : 
enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
    
Lookout
Published By: Motorola, Inc.     Published Date: Mar 10, 2009
Enterprise mobility has emerged as a top strategic initiative among leading global organizations. To benchmark the current state of Enterprise Mobility adoption, Motorola’s Enterprise Mobility business conducted independent research among a representative sample of enterprise mobility decision-makers, the chief purchasers of enterprise mobility solutions and various mobile workers within enterprise and commercial businesses.
Tags : 
enterprise mobility, motorola, manufacturing industry, mobile workers, digital two-way radio, voice-over-wlan, vowlan, tdma modulation
    
Motorola, Inc.
Published By: ThousandEyes     Published Date: Aug 04, 2017
Technology trends like telecommuting, BYOD, VoIP and SaaS adoption bring new challenges to the underlying network infrastructure that connects branch offices and datacenters. This guide explains how to tackle the challenges faced by the internet-centric enterprise by intelligently monitoring your WAN, LAN, Wi-Fi and SaaS applications through a combination of Enterprise and Endpoint Agents.
Tags : 
telecommuting, datacenter, network infrastructure, lan monitoring
    
ThousandEyes
Published By: HP Helion     Published Date: Sep 29, 2015
Read more to learn how enterprises are rapidly moving to a multi-cloud approach and enabling an IT-as-a-service (ITAAS) model.
Tags : 
cloud, it service, multi cloud approach, cloud adoption, itaas, cloud computing, productivity, network management
    
HP Helion
Published By: HP Helion     Published Date: Sep 29, 2015
Read more to learn how enterprises are rapidly moving to a multi-cloud approach and enabling an IT-as-a-service (ITAAS) model.
Tags : 
    
HP Helion
Published By: Infosys     Published Date: Jun 12, 2018
Digital technologies are rewriting the rulebooks across industries. They are not only having a profound impact on how organizations work, but are also redefining the parameters of productivity and success. Organizations that can evolve and embrace this fast paced, digital world that we live in are more likely to be successful. However, given the rapid pace at which digital trends are evolving, what might be an industry standard at one moment can be displaced the next. This means that for enterprises, simply striving to keep up might no longer be enough, as businesses need to lead the way with new technology in their industries. Infosys commissioned an independent market research company, Vanson Bourne, to investigate the use of digital technologies and key trends in nine industries. This exclusive report covers: The surging tide of digital technology adoption in organizations – what is used and where? The promised land of digital technology use, and the hurdles organizations face to
Tags : 
digital, technology, organization, enterprises
    
Infosys
Published By: Dell Storage     Published Date: Nov 28, 2012
A custom Technology Adoption Profile Commissioned by Dell and Intel.
Tags : 
dell, intel, enterprises, virtualization, cloud, private cloud, business technology
    
Dell Storage
Published By: ForeScout     Published Date: Aug 15, 2017
When it comes to network security, most organizations face a daunting situation. IT infrastructure continues to grow more complex, driven by an onslaught of mobile devices and BYOD, Internet of Things (IoT) adoption, and increasing use of cloud computing. At the same time, the threat landscape becomes increasingly dangerous as organizations face a rise in sophisticated targeted attacks.
Tags : 
    
ForeScout
Published By: NetApp     Published Date: Sep 24, 2014
ESG research indicates that the corporate usage of public cloud computing in the form of cloud-based infrastructure services, business applications , and/or application development continues to grow. What are the profiles of the organizations at the forefront of the cloud adoption movement, how are these services being leveraged today, and what is their likely level of impact over a five-year horizon?
Tags : 
public cloud, corporate use, cloud-based infrastructure, business applications, application development, cloud impact, enterprise applications, cloud computing
    
NetApp
Published By: NetApp     Published Date: Jun 16, 2014
As the amount of data created by organizations grows, efficient management of these resources is becoming increasingly important. Simply retaining data is not enough; effective organizations must be able to leverage their IT and intellectual resources to deliver business value. This Evaluator Group report looks at the popular trend of the adoption of IT as a Service (ITaaS), also known as cloud services. As well as the several technologies needed to deliver ITaaS or Cloud.
Tags : 
netapp, evaluator group, enterprise storage, it as a service, itaas, cloud services, it management, data center
    
NetApp
Published By: NetApp     Published Date: Jun 19, 2014
As the amount of data created by organizations grows, efficient management of these resources is becoming increasingly important. Simply retaining data is not enough; effective organizations must be able to leverage their IT and intellectual resources to deliver business value. This Evaluator Group report looks at the popular trend of the adoption of IT as a Service (ITaaS), also known as cloud services. As well as the several technologies needed to deliver ITaaS or Cloud.
Tags : 
netapp, evaluator group, enterprise storage, it as a service, itaas, cloud services, it management, data center
    
NetApp
Published By: EVault Inc.     Published Date: Aug 22, 2012
How will you prepare your company for cloud adoption? Cloud services are especially attractive to midmarket companies hit with the high cost of meeting compliance requirements. Author and information security expert Felix Santos discusses: . Information security and data protection in the cloud . Recent cloud standards and audit initiatives . Evaluation criteria for selecting a cloud provider that offers trusted data assurance
Tags : 
evault, ebook, trusted, data, assurance, cloud, services, compliance
    
EVault Inc.
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search