CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

configurations

Results 101 - 125 of 126Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Aug 26, 2014
Virtualizing with Microsoft Hyper-V allows you to control and cut costs while improving the scalability, flexibility, and reach of your IT systems. HP and Microsoft have joined together to create a portfolio of virtualization solutions designed for the needs of a growing businesses like yours. HP Flex-Bundles for Microsoft® Hyper-V are pre-defined, affordable configurations that combine the world’s most intelligent servers—HP ProLiant Gen8—with HP software, storage, networking, and Microsoft software to get you started and keep your business moving in your virtualization journey.
Tags : 
productivity, secure, safe, servers, processor, email, calendar, solution
    
HP
Published By: HP     Published Date: Aug 26, 2014
Get safe, secure always-on access to email, calendar, and contacts almost anywhere, from almost any device. HP Flex-Bundles for Microsoft® Exchange Server 2013 are Microsoft Exchange ready, affordable business email packages that combine the world’s most intelligent servers—HP ProLiant Gen8 servers—with high-performance Intel® processors, HP software, and Microsoft Windows® operating system software to get you started—and keep you moving—on your IT infrastructure journey. HP ServeIT Flex-Bundles, built upon the HP ProLiant ML350p Gen8 server and Microsoft® Exchange Server 2013, provide pre-defined configurations that can improve your productivity by enhancing accessibility to email, calendars, and contacts while simplifying IT management. Learn more.
Tags : 
productivity, secure, safe, servers, processor, email, calendar, solution
    
HP
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM illustrates the relative value of security investment options by mapping security effectiveness and value of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests.
Tags : 
citrix, firewall, security, svm, firewalls, intrusion prevention, web service security
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value of tested product configurations.
Tags : 
citrix, waf, firewall, tco, security, network security, application security, firewalls
    
Citrix Systems, Inc.
Published By: IBM     Published Date: Oct 24, 2013
Hear real world examples from service virtualization and mainframe experts about the way service virtualization can enable continuous integration to increase quality, reduce cost, and decrease project risk.
Tags : 
ibm webcast, continuous integration, test virtualization, test automation, execution environment, collaborative development, simplified testing, v2v migrations
    
IBM
Published By: IBM     Published Date: Oct 24, 2013
This IBM whitepaper presents facilities management solutions that utilize feature integrated processes and analytics to create smarter buildings. Facilities management solutions can help improve the effectiveness of a distributed workforce, increase facilities utilization and accelerate workplace configurations.
Tags : 
distributed workforce, facility management, integrated process, facilities management solution, real estate, capital projects, facilities management, integration
    
IBM
Published By: IBM     Published Date: Feb 18, 2015
UrbanCode Deploy provides extensive capabilities for configuring WebSphere Application Server (WAS) through plug-ins: Application Deployment for WebSphere - which enables the auto-discovery of WAS cells; and Middleware Configuration for WebSphere - which allows for management of WAS configurations. When combined, UrbanCode Deploy and these plug-ins enable a rapid, controlled method for continuous delivery to WebSphere Application Servers.
Tags : 
application delivery, websphere, ibm, urbancode, application server, it management, knowledge management, enterprise applications
    
IBM
Published By: VisiStat     Published Date: Mar 22, 2007
Old Log File analytics data was good – today's hosted on-demand Web analytics reporting is much better. What once was only understandable by IT personnel now has a place on the desktops of sales, marketing and business professionals. Read about the differences, and improvements, in analytics.
Tags : 
web analytics, hosted analytics, hosted solution, snippet, page snippets, snippet technology, code snippets, code tag
    
VisiStat
Published By: Alacritech     Published Date: Aug 21, 2009
IP storage using Internet SCSI (iSCSI) provides opportunity for many organizations looking to extend existing Fibre Channel SANs to stranded servers, or looking to deploy Ethernet-based SANs. It can reduce costs by allowing IT managers to take advantage of existing, familiar Ethernet networks. Often the biggest complaint white new technology like iSCSI is its ability to provide more than simple functionality and connectivity.
Tags : 
internet scsi, ip storage, ip networks, fiber channel, fibre channel, san, storage area networks, iscsi
    
Alacritech
Published By: Schneider Electric     Published Date: Nov 11, 2016
There is an increasing trend towards N+1 UPS architectures – rather than 2N – as IT fault tolerance through software continues to improve.
Tags : 
    
Schneider Electric
Published By: DataSynapse     Published Date: Feb 26, 2007
High availability (HA) configurations seek to bring downtime to zero - but can increase complexity across the IT organization, often in the form of excess technology, financial, and human capital investments.  Learn how application virtualization can reduce planned and unplanned downtime, and deliver greater flexibility.
Tags : 
high availability, it management, productivity, total cost of ownership, return on investment, configuration management, flexibility, data synapse
    
DataSynapse
Published By: DataSynapse     Published Date: Feb 26, 2007
This technical white paper reviews the principal tenets of application virtualization; freeing application configurations from OS and infrastructure; gaining centralized command and control over system resources; and dynamically allocating resources to applications based on demand. 
Tags : 
infrastructure, interoperability, load balancing, utility computing, business continuity, enterprise applications, application integration, data synapse
    
DataSynapse
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how Secure Configuration Manager can help with compliance requirements in the IT controls areas of entitlement reporting & segregation of duties. Discover how to make your compliance program more sustainable & repeatable, while gaining visibility into sources of vulnerability & risk exposure.
Tags : 
compliance, netiq, net iq, policy management, configuration management, unix, risk management, change management
    
NetIQ Corporation
Published By: TamoSoft     Published Date: Sep 28, 2007
This white paper examines the problems related to the deployment and usage of software-based network monitoring solutions, methods of achieving network traffic visibility in various network configurations that include hubs, switches, routers, etc.
Tags : 
monitoring, lan, wan, best practices, networking, wlan, wireless security, tamosoft
    
TamoSoft
Published By: Tideway Systems     Published Date: Dec 11, 2007
IT service providers need to offer services that deliver new business opportunities whilst increasing levels of availability, controlling risks and reducing costs. This paper provides you with practical guidance based on the practices in ITIL® V3 that will help you manage application and infrastructure changes and configurations.
Tags : 
service management, itil, change management, configuration management, knowledge management, service strategy, service design, tideway
    
Tideway Systems
Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows
    
Likewise Software
Published By: Puppet Labs     Published Date: Apr 05, 2011
Sun Microsystems uses Puppet to improve efficiency, accelerate system updates and ensure consistent configurations across their web server architecture.
Tags : 
puppetlabs, puppet labs, sun microsystems case study, system update, productivity, configuration, web server architecture
    
Puppet Labs
Published By: Symantec     Published Date: Oct 02, 2012
Securing Multiple Web Server and Domain Configurations
Tags : 
symantec, web server, domain configurations, commerce, business technology
    
Symantec
Published By: AlienVault     Published Date: Mar 30, 2016
Get Real-Time Threat Detection Starting on Day 1 with AlienVault USM Download a free, 30-day trial of AlienVault USM to experience the power of our all-in-one security platform. You’ll see how easy it can be to protect and defend against today’s threats with all of the essential security tools you need. Experience how USM makes it easy to: • Discover all IP-enabled assets on your network • Identify vulnerabilities like unpatched software or insecure configurations • Detect malware like botnets, trojans & rootkits • Speed incident response with remediation guidance for every alert • Generate accurate compliance reports for PCI DSS, HIPAA and more Download Your Free Trial Now!
Tags : 
    
AlienVault
Published By: AppDynamics     Published Date: Feb 08, 2018
The primary intended audience for this document is any expert in professional services who needs to assure the health of SharePoint and systems connected to it. If you’re a systems architect, you can gain understanding of SharePoint components and how other applications can take advantage of SharePoint. If you’re an independent consultant, you’ll learn about the elements of comprehensive coverage and total visibility into operations with prebuilt monitoring configurations.
Tags : 
    
AppDynamics
Published By: Dell EMC     Published Date: Nov 04, 2016
According to recent ESG research, 70% of IT respondents indicated they plan to invest in HCI over the next 24 months. IT planners are increasingly turning toward HyperConverged Infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. HCI consists of a nodal-based architecture whereby all the required virtualized compute, storage, and networking assets are self-contained inside individual nodes. These nodes are, in effect, discrete virtualized computing resources “in a box.” However, they are typically grouped together to provide resiliency, high performance, and flexible resource pooling. And since HCI appliances can scale out to large configurations over time, these systems can provide businesses with investment protection and a simpler, more agile, and cost-effective way to deploy virtualized computing infrastructure. Read this paper to learn more.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 04, 2016
According to recent ESG research, 70% of IT respondents indicated they plan to invest in HCI over the next 24 months. IT planners are increasingly turning toward HyperConverged Infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. HCI consists of a nodal-based architecture whereby all the required virtualized compute, storage, and networking assets are self-contained inside individual nodes. These nodes are, in effect, discrete virtualized computing resources “in a box.” However, they are typically grouped together to provide resiliency, high performance, and flexible resource pooling. And since HCI appliances can scale out to large configurations over time, these systems can provide businesses with investment protection and a simpler, more agile, and cost-effective way to deploy virtualized computing infrastructure. Read this paper to learn more.
Tags : 
    
Dell EMC
Published By: AWS     Published Date: Oct 07, 2019
Poor visibility into cloud deployments makes it difficult for organizations to enforce security and compliance across their cloud environment. Check Point CloudGuard Dome9 on Amazon Web Services (AWS) can help you gain deeper visibility of your traffic and configurations with automated assessments that strengthen your security posture and help you fulfill your part of the Shared Responsibility Model. Join the upcoming webinar with Check Point, Veracode, and AWS. Learn how Veracode improved their security posture using Check Point CloudGuard Dome9 on AWS.
Tags : 
    
AWS
Published By: Datastax     Published Date: Aug 07, 2018
it’s crucial to make the right choices when setting up your DSE cloud infrastructure. But how can you know which instance types will give you the best cost-to-benefit ratio, both now and as your business grows? That’s where benchmarking helps. For our paper, we conducted DSE stress tests on an array of hardware configurations, and we simulated various real-world workflows, all to see which EC2 instance types deliver the best performance at the lowest costs.
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 15, 2018
it’s crucial to make the right choices when setting up your DSE cloud infrastructure. But how can you know which instance types will give you the best cost-to-benefit ratio, both now and as your business grows? That’s where benchmarking helps. For our paper, we conducted DSE stress tests on an array of hardware configurations, and we simulated various real-world workflows, all to see which EC2 instance types deliver the best performance at the lowest costs.
Tags : 
    
Datastax
Start   Previous    1 2 3 4 5 6    Next    End
Search