CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

data configuration

Results 1 - 25 of 97Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: Oct 07, 2019
Securing cloud environments is different from securing traditional data centers and endpoints. The dynamic nature of the cloud requires continuous assessment and automation to avoid misconfigurations, compromises, and breaches. It can also be difficult to gain complete visibility across dynamic and rapidly changing cloud environments — limiting your ability to enforce security at scale. On top of these challenges, cloud governance is critical to maintain compliance with regulatory requirements and security policies as they evolve. Because cloud deployments are not just implemented once and left untouched, organizations need to consider how to integrate security into their CI/CD pipeline and software development lifecycle. Implementing a security solution that addresses cloud challenges requires deep security and cloud expertise that organizations often do not have. Once in the cloud, organizations manage and create environments via automation, adapt their workloads to changes by automa
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Application owners and DevOps teams want to build in AWS without compromising security, but often lack the tools to keep sensitive data secure. During Pacific Dental’s move to Amazon Web Services (AWS), the company sought to enhance and operationalize its security measures to match the speed and scale of the cloud, using a cloud access security broker (CASB) to proactively address misconfiguration and risk to their data.
Tags : 
    
AWS
Published By: Cherwell Software     Published Date: Apr 07, 2016
Cherwell Service Management™ software empowers IT organizations to easily manage their infrastructure at a fraction of the cost and complexity associated with traditional, legacy IT service management software. Designed with a metadata-driven approach, the Cherwell Service Management platform can easily be configured to meet process and integration requirements without writing or touching a single line of code. Furthermore, configurations will never break during version upgrades.
Tags : 
best practices, customer support, business intelligence, business optimization
    
Cherwell Software
Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
Your company is collecting more data than ever before; your customers’ pain points, habits, and desires all flow in and out of your business each second. To mine the most value from that data, and to get the answers you need at a competitive speed, you need to employ server solutions powerful enough to handle complex analytics software. In the Principled Technologies datacenter, we compared a legacy Dell EMC™ PowerEdge™ R720xd to the new PowerEdge R740xd (powered by Intel® Xeon® Scalable processors) in three storage configurations: with basic hard drives, with SATA SSDs, and with NVMe SSDs. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Automation Anywhere     Published Date: Feb 21, 2019
Automation Anywhere’s flagship product is Automation Anywhere Enterprise – a RPA platform offering a variety of tools to help organisations develop, operate and manage RPA bots that automate data entry, data gathering and other repetitive, routine tasks usually carried out as part of high-volume, repetitive work (for example, service fulfilment work in call centres, shared-service centres, and back-office processing environments). Automation Anywhere Enterprise bots can add value both in unattended (server-based, lights-out operation) and attended (desktop-based, interactive) deployment configurations. In this report, MWD Advisors digs deeper into the features and capabilities of Automation Anywhere’s product portfolio, analysing its fast-growth trajectory and highlighting large-scale implementations.
Tags : 
    
Automation Anywhere
Published By: ServiceNow     Published Date: Oct 18, 2013
Certifying the accuracy of a CMDB with inconsistent, manual methods is unreliable. ServiceNow's built-in data certification gives you the ability to automate the process. Learn how data certification works with the ServiceNow CMDB to deliver a trustworthy single system of record you can rely on.
Tags : 
configuration management, data certification, product management, servicenow, enterprise it cloud, it cloud company, infrastructure applications, management applications, operational applications, identifying configuration items, defining configuration items, integration, webinar, data quality, it management, cloud computing, infrastructure management
    
ServiceNow
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
Your company is collecting more data than ever before; your customers’ pain points, habits, and desires all flow in and out of your business each second. To mine the most value from that data, and to get the answers you need at a competitive speed, you need to employ server solutions powerful enough to handle complex analytics software. In the Principled Technologies datacenter, we compared a legacy Dell EMC™ PowerEdge™ R720xd powered by Intel® Xeon® Platinum processor’ to the new PowerEdge R740xd (powered by Intel® Xeon® Scalable processors) in three storage configurations: with basic hard drives, with SATA SSDs, and with NVMe SSDs. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
Your company is collecting more data than ever before; your customers’ pain points, habits, and desires all flow in and out of your business each second. To mine the most value from that data, and to get the answers you need at a competitive speed, you need to employ server solutions powerful enough to handle complex analytics software. In the Principled Technologies datacenter, we compared a legacy Dell EMC™ PowerEdge™ R720xd powered by Intel® Xeon® Platinum processor’ to the new PowerEdge R740xd (powered by Intel® Xeon® Scalable processors) in three storage configurations: with basic hard drives, with SATA SSDs, and with NVMe SSDs. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Microsoft     Published Date: Jul 07, 2016
Every organization and every industry is being transformed by the trend towards cloud and mobility. There is no shortage of narrow point solutions that can provide bits and pieces of the overarching solution you need – but modern IT departments face enough day-to-day challenges without having to constantly fine tune and integrate a bunch of different products. We’ve assembled a step-by-step guide to help you address the challenges you face as you work to go mobile, stay mobile, and protect your data with an end-to-end solution. Download this free e-book to learn: • How application policy relates to providing secure e-mail • How to set up policy for MAM without enrollment apps via application managed policy • How to create device configuration policies for both corporate-owned and personally owned devices • How to authenticate and authorize access to your company resources • How to get end-to-end protection for mobile e-mail up and running in your own environment.
Tags : 
technology, best practices, data, enterprise
    
Microsoft
Published By: IBM     Published Date: Oct 13, 2016
Compare IBM DB2 pureScale with any other offering being considered for implementing a clustered, scalable database configuration see how they deliver continuous availability and why they are important. Download now!
Tags : 
data. queries, database operations, transactional databases, clustering, it management, storage, business technology
    
IBM
Published By: Oracle ODA     Published Date: Aug 15, 2016
DBAs need help with tackling significant issues, including doing more with fewer resources, quickly responding to upgrade and patch needs, while reducing the time spent on cloning databases. Finally, they need help eliminating the time they spend integrating, testing, and deploying full-stack cloud solutions. How can DBAs reconcile these competing demands? Learn more about expanded offerings in a database appliance that are delivering numerous advantages. These new configurations have the potential to help IT derive new benefits in its efforts to serve the business.
Tags : 
    
Oracle ODA
Published By: Carbonite     Published Date: Aug 02, 2017
Every day, a new product launch promises speed, efficiency or savings for businesses eager to stay a step ahead. But if you’re an IT pro, and it’s your job to onboard the new system, the allure gives way to practical considerations: How are you going to move all that critical data—including dependencies, settings and custom configurations—from one system to another so it all talks to each other the way it’s supposed to? Whether you’re tackling a oneoff project or looking to improve your in-house skills, these eight tips for mastering migration will help you form a strategy, determine costs and find technical solutions to ensure successful migration no matter what platform you’re on or which one you’re moving to.
Tags : 
migration, technical solutions
    
Carbonite
Published By: Workday     Published Date: Jul 19, 2017
The shift to SaaS is gaining momentum and there are clear business benefits that can be derived. To optimise success, transformation strategies need to encompass all elements of people, processes, technology and organisational design. Adopting SaaS technologies drives significant change to the way organisations operate – from business processes to support model design and company culture. The implications of cloud adoption and technical challenges such as integrations, data migration and configuration must be fully understood and addressed from the outset.
Tags : 
finance technology, communication processes, protocols, interaction management, relations, technology, cloud
    
Workday
Published By: Attunity     Published Date: Feb 12, 2019
Read this technical whitepaper to learn how data architects and DBAs can avoid the struggle of complex scripting for Kafka in modern data environments. You’ll also gain tips on how to avoid the time-consuming hassle of manually configuring data producers and data type conversions. Specifically, this paper will guide you on how to overcome these challenges by leveraging innovative technology such as Attunity Replicate. The solution can easily integrate source metadata and schema changes for automated configuration real-time data feeds and best practices.
Tags : 
data streaming, kafka, metadata integration, metadata, data streaming, apache kafka, data integration, data analytics, database transactions, streaming environments, real-time data replication, data configuration
    
Attunity
Published By: Juniper Networks     Published Date: Feb 01, 2016
Read this report from IDG to see how Juniper Networks can help in several ways: • Simplify at the data center, campus, and branch levels • Protect the edge via the cloud • Centralize functions like configuration, provision, management, and more
Tags : 
    
Juniper Networks
Published By: NetApp     Published Date: Sep 24, 2013
"Today, IT’s customers are more mobile and global than ever before and as such expect their applications and data to be available 24x7. Interruptions, whether planned or unplanned, can have a major impact to the bottom line of the business. ESG Lab tested the ability of clustered Data ONTAP to provide continuous application availability and evaluated performance for both SAN and NAS configurations while running an Oracle OLTP workload. Check out this report to see the results."
Tags : 
mobile, global, applications, cloud, configuration, technology, knowledge management, storage, data center
    
NetApp
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, security, risk reduction, containerization, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, risk reduction, data security, collaboration, containerization
    
Citrix ShareFile
Published By: NetApp     Published Date: Feb 19, 2015
The NetApp EF550 all-flash array provides a robust platform for delivering exceptional performance to mission-critical applications. The EF550 flash array leverages the latest in solid-state disk technologies along with a strong heritage of handling diverse workloads and providing superior business value through the acceleration of latency-sensitive and high-I/O applications. This technical report provides an overview of workload characterizations performed on NetApp EF-series all-flash arrays across a wide variety of I/O types - with best practices and observations based on extensive test data. Characterizations include IOPS, throughput, and latency under varying block loads and RAID levels, SSD rebuild times, EF540 and EF550 performance comparison, and usable capacity sizing guidelines for various protection levels. If you are considering deploying an EF-series flash storage array in your environment, this is an essential technical resource to insure proper configuration and maxim
Tags : 
    
NetApp
Published By: Pure Storage     Published Date: Mar 15, 2018
Pure Storage® Purity ActiveCluster is a fully symmetric active/active bidirectional replication solution that provides synchronous replication for RPO zero and automatic transparent failover for RTO zero. ActiveCluster spans multiple sites enabling clustered arrays and clustered hosts to be used to deploy flexible active/active datacenter configurations.
Tags : 
    
Pure Storage
Published By: Oracle     Published Date: Jan 28, 2019
Oracle Private Cloud Appliance is a converged infrastructure system designed for rapid and simple deployment of private cloud at an industry-leading price point. Whether customers are running Linux, Microsoft Windows or Oracle Solaris applications, Oracle Private Cloud Appliance supports consolidation for a wide range of mixed workloads in medium-to-large sized data centers. High-performance, low-latency Oracle Fabric Interconnect and Oracle SDN allow automated configuration of the server and storage networks. The embedded controller software automates the installation, configuration, and management of all infrastructure components at the push of a button. Customers need to enter only basic configuration parameters and create virtual machines (VMs) manually or by using Oracle VM Templates to get a full application up and running in a few hours. With Oracle Enterprise Manager, the Oracle Private Cloud Appliance is transformed into a powerful private cloud infrastructure that integrates
Tags : 
    
Oracle
Published By: CA WA 2     Published Date: Oct 01, 2008
Data Center Automation enables you to manage change processes, ensure configuration compliance and dynamically provision servers and applications based on business need. By controlling complexity and automating processes in the data center, your data center becomes more adaptive and agile. Effective Data Center Automation lets you leverage virtualization, manage capacity, and reduce costs and also helps reduce energy usage and waste.
Tags : 
it automation, ca wa 2, ca wa, data center automation, datacenter automation, configuration, server hardware, servers
    
CA WA 2
Published By: Citrix Systems     Published Date: Jul 25, 2016
The modern enterprise workforce poses new challenges for IT. Today’s employees work in more places, on more devices— personal or company-owned—and over more networks than ever, using a diverse array of datacenter applications, mobile apps, SaaS and cloud services. As they move among apps, networks and devices, IT needs to be able to control access and ensure data and application security without impeding productivity. That means enabling users to get to work quickly and easily in any scenario without having to deal with different ways of accessing each app. Traditional VPNs and point solutions add complexity for both users and IT, increase costs and fail to enable a holistic approach to business mobility. Over the years, many IT organizations have addressed these evolving requirements through point solutions and by case-by-case configuration of access methods. The resulting fragmented experience poses a key roadblock to productivity and increases user frustration. For IT, the lack of a
Tags : 
    
Citrix Systems
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Start   Previous   1 2 3 4    Next    End
Search