CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

alm

Results 226 - 250 of 433Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Apr 16, 2018
Atualmente, todo mundo está falando sobre infraestrutura convergente. Mas como ir além do senso comum e entender o que é realmente a convergência, quem se beneficia dela e por que sua organização precisa olhar além das soluções convencionais de infraestrutura convergente?
Tags : 
entenda, infraestructura, convergente, que, beneficios, podem, trazer
    
Oracle
Published By: Oracle     Published Date: Apr 16, 2018
Actualmente, todo el mundo habla acerca de la infraestructura convergente, pero más allá del sentido común cómo entender qué es realmente la convergencia, quién se beneficia de ella y ¿por qué su organización necesita ver más allá de las soluciones convencionales de infraestructura convergente?
Tags : 
entiende, infraestructura, convergente, beneficios, pueden
    
Oracle
Published By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : 
security, technology, best practices, information technology, cyber threats, mobility, business technology
    
LogRhythm
Published By: G/O Digital     Published Date: Sep 13, 2016
• Getting and staying in front of shoppers is key. 55 percent of respondents would be somewhat to very likely to click on a retargeted ad from a previous website they had visited. • Reviews make a difference to the consumer. Only 8 percent of respondents said online reviews never factor into their decision to purchase at a local retailer. • Relevant Facebook ads work for local retailers. Almost 1 in 2 respondents would be likely to click on a Facebook ad that aligns with their personal needs and interests.
Tags : 
retail consumers, local stores, consideration phase, repeat customers, consumer survey, social media, facebook ads
    
G/O Digital
Published By: Symantec     Published Date: Jun 13, 2018
El Reglamento General de Protección de Datos (GDPR) entra en vigor el 25 de mayo de 2018. Si necesita procesar datos personales de la Unión Europea (UE), posiblemente el GDPR aplica para usted, a pesar de no estar en la Unión Europea. Esto se debe a que el reglamento realmente es global en su alcance y se aplica a cualquier organización que procesa datos personales de la UE, más allá de la ubicación de las compañías o del procesamiento de los datos. En su esencia, la legislación del GDPR está centrada en garantizar que se respete la privacidad como un derecho fundamental y que los datos personales sean guardados privada y seguramente. Elizabeth Denham, del Gabinete del Comisario de Información de la UE (ICO - Information Commissioner Office), dice: “Esta ley no es sobre multas. Se trata de poner en primer lugar al consumidor y al ciudadano” y “La emisión de multas siempre fue y seguirá siendo, el último recurso”. Sin embargo, es importante observar que los costos por incumplir el regla
Tags : 
    
Symantec
Published By: Infosys     Published Date: May 21, 2018
The world of retail banking has changed enormously in the last decade. Our client, one of the largest banks in the world, with over 50 million customers, has been at the heart of this movement. In the early days, we helped them to be one of the first banks to offer internet banking servers. Now, as digital natives enter the banking stream and demand seamless banking experiences, we are helping our client to rethink customer experiences at the convergence of physical and digital realms.
Tags : 
retail, banking, digital, customer, finance
    
Infosys
Published By: Infosys     Published Date: May 21, 2018
Good coffee is more than just a drink - it's an art. And coffee connoisseurs (distributors, retailers, and consumers) want to be sure of the authenticity of the art they buy. But given the complex supply chain and the number of stakeholders involved in getting coffee from the far to the cup, it is almost impossible to ascertain the lineage, health, and origin of your coffee.
Tags : 
blockchain, finance, distributors, retailers, consumers
    
Infosys
Published By: Infosys     Published Date: Feb 11, 2019
Good coffee is more than just a drink - it's an art. And coffee connoisseurs (distributors, retailers, and consumers) want to be sure of the authenticity of the art they buy. But given the complex supply chain and the number of stakeholders involved in getting coffee from the farm to the cup, it is almost impossible to ascertain the lineage, health, and origin of your coffee.
Tags : 
    
Infosys
Published By: Infosys     Published Date: Jun 14, 2019
The basic promise of blockchain is that it works as a global distributed ledger or database of things we value - everything from money, to creative work and votes - so these can then be managed and transacted in a trusted and secure manner. Yes, blockchain is a young technology, but well past its infancy. Today, the somewhat inflated expectations around the technology have been brought to a more realistic level and we are beginning to see practical applications across the enterprise. Although these are typically in the realm of reducing cost and/or time for transactions, improving product and system security, finding and preventing fraud and counterfeiting and increasing transparency, there are also instances of businesses relying on blockchain to create new revenue streams. Infosys recently commissioned an independent survey of senior executives worldwide. Download the report to read about their findings.
Tags : 
    
Infosys
Published By: Equinix APAC     Published Date: May 22, 2019
According to IDC, almost half of IT spending will be cloud-based in 2018, reaching 60% of all IT infrastructure and 60-70% of all software, services and technology spending by 2020. Today’s top-performing organizations are benefiting from hybrid and multi cloud scenarios. Industry thought leaders share their perspectives and insights on how enterprises across the region are reshaping their cloud strategies to stay ahead. • Industry Trends - William Lee, Research Director at IDC • Industry Best Practices - Alex Wehle, Cloud Infrastructure Lead, Microsoft • End User Perspective - T C Chao, Senior Manager, Ricoh • Industry Insights - Tejaswini Tilak, Sr. Director, APAC, Equinix Watch the webinar broadcast and a copy of the latest IDC cloud research report in addition.
Tags : 
    
Equinix APAC
Published By: MuleSoft     Published Date: Jan 16, 2018
The enterprise world is changing faster than ever. To compete, it is now necessary to do business at an almost unprecedented size and scale. In order to achieve this scale, winning companies are establishing digital platforms that extend their organizational boundaries. But what is the right way to build these platforms? Read this whitepaper to discover: Why establishing a digital platform is important for today's hyper-competitive business environment How to build a digital platform by creating and integrating APIs Case studies of how organizations built digital platforms and the successful outcomes they experienced
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Jul 13, 2018
"The enterprise world is changing faster than ever. To compete, it is now necessary to do business at an almost unprecedented size and scale. In order to achieve this scale, winning companies are establishing digital platforms that extend their organizational boundaries. But what is the right way to build these platforms? Read this whitepaper to discover: -Why establishing a digital platform is important for today's hyper-competitive business environment -How to build a digital platform by creating and integrating APIs -Case studies of how organizations built digital platforms and the successful outcomes they experienced"
Tags : 
    
MuleSoft
Published By: DataMotion     Published Date: Oct 20, 2008
Almost every task one performs at work includes the exchange of information in one form or another and much of that is exchanged via email and its attachments. Yet too many enterprises view e-mail as a mature technology that simply accomplishes a rather mundane but necessary task, taking e-mail for granted. They rarely seek to leverage it beyond its most fundamental function. However, the messaging services that form the basis of e-mail are far more valuable than the e-mail itself, and can be used innovative ways to save time and money in our every day tasks. Download to learn more.
Tags : 
certifiedmail, datamotion, microsoft exchange, security, e-mail security, maintenance, email security, security management
    
DataMotion
Published By: Dell     Published Date: Mar 02, 2012
By now the fundamentals of computer and network security are familiar to almost everyone who interacts with a PC on a regular basis: install antivirus software, choose good passwords and protect them and download and install software updates. Despite these measures, businesses of all sizes continue to suffer security breaches.
Tags : 
dell, mobile data, mobile devices, smartphones, it planning, technology, it management, small business, technology trenfs
    
Dell
Published By: IBM     Published Date: Aug 06, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today, it is a business imperative. In addition to providing solutions to insurance companies’ long-standing business challenges, big data inspires new ways to transform processes, organizations and many aspects of the insurance industry as we know it.
Tags : 
ibm, insurance, data, big data, technology, business
    
IBM
Published By: IBM     Published Date: Aug 08, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today, it is a business imperative. In addition to providing solutions to insurance companies’ long-standing business challenges, big data inspires new ways to transform processes, organizations and many aspects of the insurance industry as we know it.
Tags : 
big data, technology, insurance industry, emerging marketing
    
IBM
Published By: Red Hat     Published Date: Mar 16, 2015
Industry analyst firm IDC recently conducted primary research, commissioned by Red Hat, to determine the total cost of ownership (TCO) benefits Red Hat Enterprise Linux provides in the long term versus running mixed environments or primarily non-paid Linux distributions. The results of this analysis are clear: Organizations that standardize on Red Hat Enterprise Linux recover their up-front subscription costs faster through more efficient operations, less downtime and a more productive IT staff. Key findings include: Organizations that standardize on Red Hat Enterprise Linux have more efficient IT staffs Red Hat Enterprise Linux customers experience about one-fifth the amount of downtime as organizations using primarily non-paid Linux distributions Organizations that heavily use non-paid Linux have almost double the total operational costs Time to market for new application deployments can be greatly reduced with Red Hat Enterprise Linux
Tags : 
total cost of ownership, up-front subscription costs, productive it staff, application deployments, it management
    
Red Hat
Published By: Code42     Published Date: Apr 22, 2016
Today, in the age of information, people are paid for their ideas: to create original knowledge products or add value to existing products. Given their self-reliance, it is not surprising that workers take pride in their outputs—up to half of employees take a portfolio of files with them when they leave. When employees move on, many feel entitled to the work they’ve created.They presume it is acceptable to transfer work documents to personal computers, removable media, tablets, smartphones or online file sharing apps. Some pilfered data is innocuous and already in the public realm. But some of it is classified. Read this paper to find out how to collect and secure data to protect operations, reputation and continuity when employees leave.
Tags : 
data protection, code 42, data security, intellectual property
    
Code42
Published By: Frontier Communications     Published Date: May 01, 2017
It seems that with each passing year the speed at which new and emerging technologies are transforming business increases in almost direct proportion to impact. We now all live in an era of digital business transformation that is being enabled by rapid advances in telecommunications services. These changes do not just impact the way employees work; they profoundly change the way customers interact with businesses of all sizes.
Tags : 
    
Frontier Communications
Published By: Microsoft     Published Date: Jul 20, 2018
In the two years since we first began working on Enterprise Cloud Strategy, much has changed. Cloud technology has evolved from being an “if” to a “when,” and across almost all enterprises, the cloud has now become an integral part of IT strategy. Further, there is now a growing realization that cloud computing not only represents a set of technical opportunities for efficiencies and cost savings, but also provides the potential to significantly transform the scope of enterprise computing. In fact, many enterprises are finding that cloud computing offers entirely new business models, revenue streams, and vehicles for customer intimacy. Few technological changes have the potential to so dramatically change to the way we do business. The last time we experienced such a tectonic shift was the with arrival of the Internet itself. Yet, as we noted in the first edition of this book, when briefing CIOs and senior IT executives at Microsoft, we are often told that migrating IT workloads to the
Tags : 
    
Microsoft
Published By: Nutanix     Published Date: Apr 24, 2017
Nube Empresarial para Dummies Descargue gratis el libro y aprenda cómo puede hacerlo ¿Qué es la Nube Empresarial? Cada vez más organizaciones líderes van más allá de la hiperconvergencia y se enfocan en una estrategia de nube empresarial para llevar agilidad, simplicidad y un modelo de consumo bajo demanda de nubes públicas a su propio datacenter. Este libro lo ayudará a entender lo qué es la nube empresarial y cómo diseñar una infraestructura en la nube para impulsar su organización hacia el futuro. Descarga gratis el libro
Tags : 
nube empresarial, nube empresarial para dummies, hiperconvergencia, que es la nube empresarial, infraesctructura en la nube, almacenamiento en la nube, virtualizacion en la nube, nutanix, arquitectura clouda, infraestructura clouda, nube híbrida, nube privada, migración en la nube, virtualización, infraestructura on – premise, infraestructura bajo demanda
    
Nutanix
Published By: Nutanix     Published Date: Apr 24, 2017
Conviértase en un experto en Infraestructura Hiperconvergente Descargué el libro. La infraestructura tradicional (legacy), con sus componentes aislados como almacenamiento, redes y servidores, ya no es adecuada para cubrir las demandas cada vez mayores de las aplicaciones empresariales actuales ni el ritmo acelerado de las empresas modernas. Hoy, los expertos y líderes de TI están utilizando infraestructura Hiperconvergente para eliminar las barreras y complejidad de las plataformas tradicionales y brindar servicios de infraestructura en sus propias instalaciones (on-premise) pero con la velocidad, agilidad y eficiencia operativa de una nube pública. Descarga gratis el libro
Tags : 
infraestructura hiperconvergente, hiperconvergencia, cómo funciona nutanix, nutanix, hiperconvergencia de nutanix, ¿qué es un sistema convergente?, hci, almacenamiento empresarial, nube pública, nube empresarial, centro de datos, data center, definido por software
    
Nutanix
Published By: Webroot UK     Published Date: Sep 05, 2013
Webroot SecureAnywhere Business - Endpoint Protection offers a revolutionary approach to malware protection. It brings together Webroot's innovative file pattern and predictive behavior recognition technology, with the almost limitless power of cloud computing, to stop known threats and prevent unknown zero-day attacks more effectively than anything else. Read this white paper to learn about ultimate performance and minimal management security software from Webroot.
Tags : 
webroot, secureanywhere, business, software, security software, revolutionary software, predictive behavior, known threats, zero day attacks, ultimate protection, security
    
Webroot UK
Published By: IBM     Published Date: Mar 04, 2009
Software and systems are essential to nearly every business. Global organizations require software solutions that span geographic boundaries, cultures, and business units and that comply with corporate governance mandates. Such global businesses must collaborate effectively and leverage existing investments, or lose out to competitors.
Tags : 
ibm, global technology infrastructure, open source initiatives, alm, jazz project, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 13, 2009
Midsized companies now have a way to automate regular backups-and restore data almost immediately.
Tags : 
backup, ibm, tivoli storage manager fastback, restore data, it management, data security
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search