CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

level

Results 101 - 125 of 1791Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Mar 26, 2018
Welcome to the 2017 Digital Marketing Study. Between March and April 2017, we reached out to 1,165 digital marketers in enterprise companies in the United States, Canada, the United Kingdom, France, and Germany, with an average company size of more than 7,000 employees. We’ve also gathered information and insights from leaders in several industries regarding their specific challenges, priorities, and tactics. In this report, we use this data to help companies at all levels of maturity successfully transform into an experience business. We hope you find it valuable.
Tags : 
    
Adobe
Published By: Oracle CX     Published Date: Oct 19, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make better
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 19, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make better
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 19, 2017
Oracle’s software in silicon technology is truly revolutionary for providing security and workload performance increases beyond the scale of traditional new processor technology improvements. It was the vision of Oracle over 4 years ago to integrate application acceleration and security capabilities at the processor level, which enables the highest levels of security and the highest application performance levels. Software in Silicon technology is an example why Oracle software runs best on Oracle systems and will be incorporated across Oracle systems and software products including engineered systems and operating systems.
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 19, 2017
This paper provides guidance to organizations interested in researching Oracle’s SPARC M7 and Oracle Solaris 11 security features and capabilities. It will also provide a high level overview of some of the noteworthy features that these two product offerings bring to the market. We will review industry best practices in information security as it relates to these Oracle products in the context of a secure implementation. This paper is not meant to be an in depth technical paper, position paper, or security implementation guide. It will instead endeavor to deliver a foundational level of knowledge of the SPARC M7 processor and server technology and the function set within Oracle Solaris 11 that are primarily relevant to information security as it is currently understood. The information used to compose this paper was collected from a variety of open sources, interviews with Oracle subject matter experts, and reviews of OEM (Original Equipment Manufacturer) documentation and specificatio
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 19, 2017
Oracle’s software in silicon technology is truly revolutionary for providing security and workload performance increases beyond the scale of traditional new processor technology improvements. It was the vision of Oracle over 4 years ago to integrate application acceleration and security capabilities at the processor level, which enables the highest levels of security and the highest application performance levels. Software in Silicon technology is an example why Oracle software runs best on Oracle systems and will be incorporated across Oracle systems and software products including engineered systems and operating systems.
Tags : 
    
Oracle CX
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows.
Tags : 
    
Dell and Nutanix
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows.
Tags : 
    
Dell and Nutanix
Published By: TE Connectivity     Published Date: Feb 07, 2018
Our free solutions guide profiles solutions made to take safety & security in both new and older buildings to a higher level. You’ll get 1. Building Safety & Security Solutions Guide 2. Building Safety & Security Fact Sheet 3. USB Interconnects Quick Reference Guide 4. PIDG Terminals & Splices Quick Reference Guide 5. AMPMODU Interconnect System Catalog
Tags : 
    
TE Connectivity
Published By: Akamai Technologies Australia     Published Date: Feb 07, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
    
Akamai Technologies Australia
Published By: Dell PC Lifecycle     Published Date: Aug 09, 2018
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. It sounds like another current term, “digital transformation.” But in fact, effective digital transformation doesn’t happen without IT Transformation. A company that undergoes IT infrastructure transformation no longer has to rely on rigid, manual, siloed, legacy technologies. It sees a boost in IT operational speed, efficiency, scale, and cost effectiveness—tasks are automated, processes streamlined, and resources are freed up. Those IT-level improvements fuel a larger-scale digital transformation, allowing the company to thrive in today’s digital economy. It is able to out-innovate, out-think, and out-pace its competitors—ultimately becoming the disruptor, not the disrupted.
Tags : 
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Aug 09, 2018
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. Although not synonymous with digital transformation, the two concepts are fundamentally linked together, as effective digital transformation cannot happen without IT Transformation. A company that transforms its IT infrastructure no longer has to rely on rigid, manual, siloed, legacy technologies. It sees a boost in IT operational speed, efficiency, scale, and cost effectiveness—tasks are automated, processes streamlined, and resources are freed up. Those IT-level improvements fuel a larger-scale digital transformation, allowing the company to thrive in today’s digital economy. It is able to out-innovate, out-think, and out-pace its competitors—ultimately becoming the disruptor, not the disrupted.
Tags : 
    
Dell PC Lifecycle
Published By: Limelight Networks     Published Date: Mar 02, 2018
Your online audience expects fast, flawless, secure experiences on any device in any location, every time. But whether you are delivering videos, your website, music, software or games, ensuring engaging online experiences from an increasing variety of devices around the world is a huge challenge. Content delivery networks (CDNs) can significantly improve the user experience of your online audiences. But not all CDNs deliver the same level of service. Dos and Don’ts of Evaluating and Deploying a CDN provides tips on how to determine what is most important to your organization and how to choose a CDN that meets your needs. Download this guide to learn: The four major performance factors that can affect user experience Why speed alone isn't an accurate measure of performance How a content audit can identify performance bottlenecks The role content storage can play in reducing costs and latency How to decide what features are most important to your business
Tags : 
content delivery network, cdn, web performance, web acceleration, digital content delivery, ddos protection, ddos, web application security, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott content delivery
    
Limelight Networks
Published By: Limelight Networks     Published Date: Mar 02, 2018
Can your business afford to lose $9,000 per minute? According to the Ponemon Institute $9,000 is the average cost of an unplanned outage. In some cases the costs are much higher. The catalogue of cloud outages over recent years is well publicized and reads like a “who’s who” of the technology industry. It seems no one is immune. But when it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questi
Tags : 
content delivery network, cdn, multi-cdn, multiple cdns, web performance, web acceleration, digital content delivery, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott content delivery
    
Limelight Networks
Published By: Dell EMC & Intel     Published Date: Aug 03, 2018
Digital transformation has become a business imperative as most aspects of economic engagement have become digital. Around the globe, businesses and government agencies are re-engineering their technology infrastructures to keep pace with customer demands, spur innovation and stay competitive in an ever-evolving digital economy. A recent PwC survey noted that 45 percent of business and IT executives across 51 countries identified growing revenue via digital transformation as a top priority1. Success in this fast-paced digital landscape requires businesses to transform their IT infrastructures to achieve new levels of flexibility and responsiveness. At the same time, business leaders must find a balance between funding core aspects of the business while investing in new business and technology innovations needed to compete in today’s dynamic environment. Hyper-Converged Infrastructure (HCI) systems bundle multiple technology components together into single systems, enabling IT departmen
Tags : 
    
Dell EMC & Intel
Published By: Dome9     Published Date: Apr 25, 2018
Cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. But there is one aspect of cloud that consistently worries IT and security professionals – how to achieve high levels of security in the cloud. As cloud adoption increases, the fears of unauthorized access, stolen identities, data and privacy loss, and confidentiality and compliance issues are rising right along with it. This report has been produced by the 350,000 member Information Security Community on LinkedIn in partnership with Crowd Research Partners to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. 2
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
    
Dome9
Published By: Eaton     Published Date: Jul 09, 2018
Code updates happen for one main reason: safety improvement. NEC (National Electrical Code) Article 408.3 helps take electrical safety for service entrance panels to a new level. The code, updated in 2017, includes provisions to provide shock protection via panelboard barriers. The barriers protect from energized conductors on the line terminals of the main overcurrent protection device (OCPD) in a panelboard. When the main circuit breaker in a panel is turned off, line side terminals and conductors remain energized from upstream via the utility or another panelboard. With these barriers in place and the main OCPD turned off, installers are better protected when pulling wires into the panelboard. Today, all panelboards are shipped with shock-protective barriers. However, barriers are new to installation procedures, so contractors may not recognize them and accidentally throw them out—easily and often.
Tags : 
    
Eaton
Published By: KPMG     Published Date: Nov 21, 2018
Many BPO providers have already invested heavily in robotic process automation (RPA), providing an opportunity to renegotiate your BPO contract to reflect the cost savings they are making as a result. But there’s more. Contract renegotiation also creates an opportunity to leverage providers’ investment to accelerate automation in your own business. Read this to discover: • the benefits of automating business processes and the impressive level of cost savings this can deliver • the impact of automation on the BPO market and the implications this has for BPO contracts • a five-step processing for assessing and renegotiating your outsourcing contract • three options for starting your automation journey.
Tags : 
    
KPMG
Published By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
    
Oracle
Published By: T Systems     Published Date: Nov 19, 2018
If only there was a whitepaper that could explain how digitalization is changing the retail landscape while advising retailers on how they can embrace this driving force to excel in the industry. Here at T-Systems, we have produced a whitepaper that provides a detailed look into what is required for your retail business to succeed in the digital age. Our ‘Shaping Retail’s Future, Understanding & Delighting Customers in The Digital Era’ provides you with the means to safely navigate and prosper from the effect that digitization is having upon the industry. In a retail world that demands engaging with an ever more sophisticated level of consumer, those whom exhibit less brand loyalty year-on-year – the window for error has become decisively small. Our whitepaper enables your business to identify your digital needs for more effective retail operations by asking critical questions to reveal and plug your capability gaps. We examine the importance of developing the right omnichannel strateg
Tags : 
retail, sales, whitepaper, t-systems, omnichannel, data analytics, touchpoints, digitization, iot
    
T Systems
Published By: Dell EMC Storage     Published Date: Nov 28, 2018
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. Although not synonymous with digital transformation, the two concepts are fundamentally linked together, as effective digital transformation cannot happen without IT Transformation. A company that transforms its IT infrastructure no longer has to rely on rigid, manual, siloed, legacy technologies. It sees a boost in IT operational speed, efficiency, scale, and cost effectiveness—tasks are automated, processes streamlined, and resources are freed up. Those IT-level improvements fuel a larger-scale digital transformation, allowing the company to thrive in today’s digital economy. It is able to out-innovate, out-think, and out-pace its competitors—ultimately becoming the disruptor, not the disrupted. Download this whitepaper to learn more about how Flash Storage powered by Intel® Xeon® processor fuels IT transformations below
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Nov 28, 2018
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. It sounds like another current term, “digital transformation.” But in fact, effective digital transformation doesn’t happen without IT Transformation. A company that undergoes IT infrastructure transformation no longer has to rely on rigid, manual, siloed, legacy technologies. It sees a boost in IT operational speed, efficiency, scale, and cost effectiveness—tasks are automated, processes streamlined, and resources are freed up. Those IT-level improvements fuel a larger-scale digital transformation, allowing the company to thrive in today’s digital economy. It is able to out-innovate, out-think, and out-pace its competitors—ultimately becoming the disruptor, not the disrupted.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Mar 27, 2019
The automotive industry is in the midst of a highly competitive transitional period, with the ultimate goal of fully autonomous or “driverless” vehicles likely to be realized within a decade. The scale and intensity at which OEMs and Tier 1 suppliers must bring innovations to market – while containing costs, mitigating risks, managing product complexity and maintaining compliance – is challenging. The emergence of Advanced Driver Assistance Systems (ADAS), designed to enhance passenger, vehicle and road safety, introduces disruptive requirements for engineering IT infrastructure – particularly storage, where even entrylevel capacities are measured in petabytes. This paper will explore the infrastructure challenges facing OEMs and Tier 1 suppliers in developing and validating ADAS technologies, and propose a storage solution that is optimized for such workloads, delivering high performance, high concurrency and massive scalability.
Tags : 
    
Dell EMC Storage
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search