CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

cto

Results 401 - 425 of 2535Sort Results By: Published Date | Title | Company Name
Published By: Pure Storage     Published Date: Sep 27, 2019
At no other time has data played such a crucial role in the success of our commercial sector, and no more so than in financial services. We can see this powerfully illustrated when we pause to consider the growth of data driven ‘technologies’ such as Artificial Intelligence and their prevalence in driving innovation in areas such as risk management, multi-channel customer experience and fraud detection. So keen is the sector to use data to deliver advantage, that PwC says startups with a strong AI-based offer attract some of the most lucrative funding – to the tune of $1 billion over the past two years.1 With this as our landscape, and the continued drive to deliver data-driven innovation the prospect of disruption and downtime is something that cannot be countenanced. This being the main reason why the senior management of most organisations continue to buy into tried-and-tested Disaster Recovery (DR) strategies. We all feel assured that if we ‘double up’ our investments in – as f
Tags : 
    
Pure Storage
Published By: Dell and VMWare     Published Date: Dec 15, 2017
Public cloud will continue to be a viable deployment model for some applications, primarily software as a service (SaaS) and less differentiated horizontal workloads like test/dev and infrastructure. Workloads that define the business—the high value vertical applications or those containing confidential / sensitive data—will remain on-premises. Not everything can move to a public cloud, and each day sharpens the understanding that more IT deployments will be on-premises. Hybrid IT will be the de facto deployment strategy. It is simply unrealistic, except for very small businesses, to have an IT footprint that does not include a healthy dose of on-premises infrastructure. Intel Inside®. New Possibilities Outside. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside ar
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Dec 15, 2017
Public cloud will continue to be a viable deployment model for some applications, primarily software as a service (SaaS) and less differentiated horizontal workloads like test/dev and infrastructure. Workloads that define the business—the high value vertical applications or those containing confidential / sensitive data—will remain on-premises. Not everything can move to a public cloud, and each day sharpens the understanding that more IT deployments will be on-premises. Hybrid IT will be the de facto deployment strategy. It is simply unrealistic, except for very small businesses, to have an IT footprint that does not include a healthy dose of on-premises infrastructure. Intel Inside®. Para un mundo de nuevas posibilidades. Procesador Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside,
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Dec 15, 2017
Public cloud will continue to be a viable deployment model for some applications, primarily software as a service (SaaS) and less differentiated horizontal workloads like test/dev and infrastructure. Workloads that define the business—the high value vertical applications or those containing confidential / sensitive data—will remain on-premises. Not everything can move to a public cloud, and each day sharpens the understanding that more IT deployments will be on-premises. Hybrid IT will be the de facto deployment strategy. It is simply unrealistic, except for very small businesses, to have an IT footprint that does not include a healthy dose of on-premises infrastructure. Intel Inside®. Nya möjligheter på utsidan. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
Dell and VMWare
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Lidiar con el coste y la complejidad que impone la gestión de los PCs deja poco tiempo para la innovación. Las actuales tecnologías y necesidades comerciales, que evolucionan rápidamente, hacen que haya menos oportunidades para sacar provecho de las nuevas tendencias que están cambiando la forma en que se suministra y consume la tecnología. Y, por supuesto, la tecnología del hardware no dura para siempre. Tiene un ciclo de vida, un comienzo y un final medibles con respecto a su productividad y valor. El departamento de TI se encarga de optimizar el ciclo del ciclo de vida de los PC e impulsar al mismo tiempo avances estratégicos para la organización. Obtenga más información sobre las soluciones Dell con tecnología Intel®.
Tags : 
optimizacion, ciclo, intel, dell
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Mar 13, 2018
Located in central Ontario approximately 100 km (60 miles) north of Toronto, Royal Victoria Regional Health Centre (RVH) provides highly responsive healthcare to more than 450,000 residents across a large geographical area. RVH’s team of more than 380 physicians, 2,500 staff members, and 850 volunteers delivers exceptional care and specialty services including cancer care, stroke services, orthopedics, intensive care, mental health services, and interventional radiology. In addition to the 319-bed acute care facility in Barrie, RVH also provides the MEDITECH electronic health records (EHR) platform for several other hospitals in Midland, Orangeville, and Collingwood.
Tags : 
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Mar 13, 2018
Situé à une centaine de kilomètres au nord de Toronto dans la province de l’Ontario au Canada, le centre médical Royal Victoria Regional Health Centre (RVH) délivre des soins de santé de très haute qualité à plus de 450 000 habitants d’une vaste zone géographique. L’équipe du RVH compte plus de 380 médecins, 2 500 employés et 850 bénévoles. Elle oeuvre pour offrir des services de soins exceptionnels et spécialisés : prise en charge du cancer, des accidents vasculaires cérébraux, des problèmes orthopédiques, des troubles mentaux, radiologie interventionnelle, etc. En plus de son établissement de soins de courte situé à Barrie, d’une capacité d’accueil de 319 lits, le centre médical RVH fournit la plate-forme MEDITECH de gestion des dossiers médicaux personnels pour plusieurs autres hôpitaux situés à Midland, Orangeville et Collingwood.
Tags : 
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: May 18, 2018
Enterprise PC Buying Patterns Are Changing As Buyers Look To Improve Both Security And The Employee Experience At Once As employee mobility increases globally and enterprise investments shift to tablets and laptops, organizations are assessing their ongoing investment in traditional PCs. One thing that remains clear is that enterprise PC buyers still value the security and performance offered by fixed computing solutions. They also say that new form factors like the micro PC help them deliver a better experience to employees, which they value at least as much as security.
Tags : 
    
Dell PC Lifecycle
Published By: Schneider Electric     Published Date: May 31, 2019
While enterprises continue to own and operate in-house datacenters, their use of colocation and other outsourcing services is growing fast. Demand for colocation and wholesale datacenters, with their readily available space and power, their professional operations teams and, increasingly, their rich connectivity and value-added offerings, has never been stronger. 451 Research forecasts that the operational square footage of the global colocation and wholesale sector will grow at a healthy 7% CAGR from 2017 to 2020.
Tags : 
customer insight, colocation business, schneider electric
    
Schneider Electric
Published By: Schneider Electric     Published Date: Oct 11, 2019
Data center designs have become much more safe, reliable, & efficient. However, we must continue to adopt new designs & emerging technologies to stay ahead of the pace of change. In this webinar, Steve Wallage, Managing Director of BroadGroup Consulting, shares his expertise to help global colocation providers: 1. Learn what changes colocation providers can make to adapt to the marketplace 2. Understand the future requirements of hyperscale cloud players 3. Hear of successful projects around the world and why they succeeded
Tags : 
data center, business growth, schneider electric
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 03, 2019
Since the sepia-toned days of the early 19th century, industry has sought effective ways to control manufacturing and production processes. New technology has greatly influenced factories and plants, resulting in new operational approaches to maximize benefits and achieve 100% ROI in a very short time. Download the white paper to learn more.
Tags : 
process control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecosttruxure plant, process automation
    
Schneider Electric
Published By: VMware     Published Date: Aug 23, 2011
The road map outlines a set of evolving objectives, challenges, required competencies, and success measures needed to transform IT from a cost center to a strategic value driver. It is designed to address key success factors at the executive sponsorship level and at the infrastructure level.
Tags : 
vmware, cloud computing strategy, virtualization, private cloud, it value transformation, roadmap, infrastructure, cloud computing, data center design and management, design and facilities
    
VMware
Published By: Datto Inc.     Published Date: May 08, 2013
The growth of the backup and disaster recovery market, and desire for increased revenues, has prompted MSPs to consider building their own BDR solutions. Learn the top 5 reasons factors MSPs need to evaluate when considering a “do-it-yourself” BDR.
Tags : 
datto, backup, disaster recovery, bdr, backup and recovery
    
Datto Inc.
Published By: Arbor     Published Date: Mar 13, 2014
All enterprises need to have mitigation solutions in place. Information security is vital in the workplace and DDoS has become more complex over time. Determine whether services are the best option for primary protection through this whitepaper.
Tags : 
arbor, idc, distributed denial-of-service, ddos attack ddos solutions, dns reflection, exfiltration of data, security products, the cloud, cloud migration, high-bandwidth attacks, volumetric attacks, deployment, multi-vector threat, ips solutions, deployment models, security, infrastructure
    
Arbor
Published By: Oracle     Published Date: Mar 22, 2018
Portugal Telecom is reaping the benefits of Oracle Exadata. The company’s CTO, Alexande Fonseca, highlights the importance of this database support platform in their digital transformation as they simplify processes and monetise multiplying customer data.
Tags : 
    
Oracle
Published By: CA Technologies     Published Date: Jan 20, 2015
In the application economy, speed, innovation and quality have become table stakes. If you can’t meet your customers’ expectations, they will surely find a competitor who can. Whether your organization is in one of the sectors facing the most intense digital competition—insurance, banking, telecommunications or retail—or in a more traditional industry, how rapidly and successfully you embrace a software-driven digital transformation strategy will likely have a profound effect on your organization’s long term viability. Within this transformation sphere, the development of “omnichannel” or “digitally-connected multi-channel” capabilities is a key priority. CA Technologies can help you deliver a consistent, integrated and quality customer experience, regardless of how your customers choose to interact with you.
Tags : 
enterprise mobility management, mobile devices, software, competitive advantage, strategic requirement, wireless, enterprise applications
    
CA Technologies
Published By: MobileIron     Published Date: Mar 16, 2016
Para ayudarle a tener éxito en su trayectoria móvil, esta guía detalla las mejores prácticas y recomendaciones esenciales de las cuatro etapas del ciclo de vida de las aplicaciones móviles: diseño, desarrollo, implementación y mantenimiento. Es ideal para las organizaciones que están preparadas para ir más allá de las aplicaciones básicas, como el correo y el calendario, en dispositivos móviles. Además, ofrece pautas operativas para implementar y mantener las aplicaciones móviles ya existentes.
Tags : 
mobile apps, best practices, mobileiron, phones
    
MobileIron
Published By: MobileIron     Published Date: Mar 22, 2016
Además de describir cómo funciona la EMM, esta guía también ilustra un típico trayecto de implementación, que explica cómo una organización afronta el proceso de implementar y administrar todas las piezas de una solución EMM. Al proporcionar procesos y recomendaciones detallados de implementación de mejores prácticas para encontrar al proveedor de EMM adecuado, esta guía ofrece conocimientos prácticos paso a paso que podrán ayudar a cualquier organización a impulsar su camino para convertirse en una empresa Mobile First.
Tags : 
mobile apps, best practices, mobileiron, phones
    
MobileIron
Published By: SAP SME     Published Date: Nov 02, 2017
Conoce cómo SAP Tax and Revenue Management for Public Sector puede ayudarle a reimaginar sus operaciones y ofrecer a los contribuyentes una experiencia en línea y en dispositivos móviles ininterrumpida y más personalizada, permitiendo los procesos tributarios simples, incrementando la transparencia y facilitando la Colaboración
Tags : 
    
SAP SME
Published By: SAP SME     Published Date: Nov 02, 2017
La mayoría de las áreas de TI del sector minorista se han adaptado a la Economía Digital, sin embargo es necesario la integración con todas las áreas del negocios
Tags : 
    
SAP SME
Published By: SAP SME     Published Date: Nov 02, 2017
La mayoría de las áreas de TI se han adaptado a la Economía Digital, sin embargo es necesario la integración con todas las áreas del negocios
Tags : 
    
SAP SME
Published By: ServiceNow     Published Date: Feb 24, 2017
Customer service is at an inflection point, in both the business-to-consumer and business-to-business sectors. Costs continue to skyrocket as the volume of inquiries increases, even as customer service budgets remain flat. Customer expectations seem to increase by the hour. Make a mistake or fail to resolve an issue quickly, and businesses may quickly see a decline in customer satisfaction and revenue.
Tags : 
    
ServiceNow
Published By: JBoss Developer     Published Date: Feb 05, 2016
As Oracle Java Composite Application Platform Suite (CAPS) nears the end of its life cycle, healthcare organizations are switching to Red Hat JBoss Fuse to prepare for future business needs. Red Hat JBoss Fuse represents existing use cases on a more flexible, standards-compliant platform. With over 100 different connectors, Red Hat JBoss Fuse offers extensive integration coverage to optimize data flow — both to internal users and to external healthcare partners — on-premise, on mobile devices, or in the cloud.
Tags : 
jboss, redhat, oracle, java, java composite application platform, fuse, integration, data optimization, data management
    
JBoss Developer
Published By: Akamai Technologies     Published Date: Sep 27, 2016
Akamai’s Threat Research team analyzed a week of cross-site scripting (xss) alert triggers to gain clarity on the nature of xss attacks. Read this case study to learn which vectors are vulnerable and specific techniques that were employed during remote resource injection exploitation attempts versus simple probing requests.
Tags : 
akamai, xss, xxs exploration, threat research, analytics, security, cybersecurity, networking, knowledge management, enterprise applications, business technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 06, 2019
Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks. The people behind these attacks realize the value of an account, whether it’s to a streaming site, a game, or someone’s social media account. And, they’re willing to do whatever it takes to steal them. This report provides an overview of the recent credential stuffing attacks against these sectors and the risks these attacks pose. We’ll also explore some of the ways adversaries conduct these attacks.
Tags : 
    
Akamai Technologies
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search