CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

day

Results 1 - 25 of 6130Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Jul 29, 2019
Learn how Small and mid-sized businesses (SMBs) that are leveraging Hybrid Cloud are seeing several critical benefits. Based on new Aberdeen research, these gains and benefits are even more vital for today’s organizations. With hybrid cloud, your SMB can reduce downtime, cost and risk while increasing flexibility and scalability.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 25, 2019
With digital IT transformation solutions and new business models driven by the democratization of data, advanced analytics, and a citizen-centric approach, HPE helps cities like yours get smarter—and continue to evolve into great places for your citizens to live. Visit hpe.com/info/public-sector to learn how you can take the next step on your journey.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 25, 2019
"Flash has permeated enterprise storage in small, medium-sized, and large enterprises as well as among webscale customers like cloud and service providers. It is available in a variety of different system architectures, including internal storage, hyperconverged and converged platforms, and shared storage arrays. Revenue driven by shared storage arrays, of both the hybrid flash array (HFA) and the all-flash array (AFA) type, is much larger than from other segments today and will continue to dominate enterprise storage spend through at least 2020."
Tags : 
    
Hewlett Packard Enterprise
Published By: Here Technologies     Published Date: Apr 02, 2019
In today’s interconnected world you need to future-proof the integrity and reputation of your business. Your company’s network remains the Achilles heel of the whole enterprise because once compromised, your company’s reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : 
    
Here Technologies
Published By: Conduent     Published Date: Jul 23, 2019
In this eBook, we’ve distilled the key information into a “decision guide” to help you head in the right direction with your technology planning. The guide walks you through the five main options for your technology and overviews the benefits and challenges related to each — so you can weigh the pros and cons and make the best technology choices for your organization. Complete the form at right to get your copy today.
Tags : 
    
Conduent
Published By: Intel     Published Date: Jul 17, 2019
The need for identity protection has never been stronger. Identity theft accounted for 74 percent of all data breaches in the first half of 2017, and costs associated with cybercrime are expected to reach $6 trillion annually by 2021. Any time an employee's username and password are compromised, your business is vulnerable. Eight-character passwords that changed every 90 days worked well a decade ago, but increasingly commonplace attack methods like password cracking, phishing, or screen scraping call for a new kind of protection.
Tags : 
    
Intel
Published By: Intel     Published Date: Jul 17, 2019
Today, business is conducted in a fast-paced, on-demand, globally dispersed environment. Maintaining a competitive edge requires cohesive real-time collaboration. Mobile workers, partners, vendors, suppliers, and even customers expect to be able to work together seamlessly, both inside and outside the firewall. But delivering tools for high-quality collaboration is often challenging, due to the need for businesses of all sizes to support a wide range of personal and business devices. Mixing disparate devices with complex conferencing solutions often lead to frustrated employees, while businesses face a labor-intensive, costly endeavor without a high ROI. In addition, collaboration is evolving with businesses creating small "huddle" spaces and open workspaces that increase the demand for ubiquitous, effective conferencing. The Intel Unite ' solution is a fast, simple, cost-efficient way to deliver a more secure, manageable, high-quality collaboration experience. Whether you select the
Tags : 
    
Intel
Published By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
    
Entrust Datacard
Published By: Blackberry     Published Date: Jul 12, 2019
Technology is changing the way that businesses across industries operate. Often referred to as “digital transformation” or “digitization,” this change is rapid, and it is relentless. It touches everything in the legal profession from the completion of everyday tasks to the way information is secured and shared
Tags : 
    
Blackberry
Published By: Schneider Electric     Published Date: Jul 01, 2019
: Are you among the two thirds of industrial companies who are currently, or planning to, implement industrial transformation? A new report by LNS Research finds that there is quite a wide gap in how the companies perceived as industrial transformation leaders develop their transformation project strategies compared with companies perceived as followers. Don’t get left behind. Discover the recommendations from LNS Research on how to ensure the success of your digital transformation initiatives.
Tags : 
digital, industry 4.0, automation, plant
    
Schneider Electric
Published By: Juniper Networks     Published Date: Jul 31, 2019
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download this report to find out what else Ovum has discovered about security practices in Asia Pacific.
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
The Security Operations Center (SOC) is the first line of defense against cyber attacks. They are charged with defending the business against the many new and more virulent attacks that occur all day, every day. And the pressure on the SOC is increasing. Their work is more important, as the cost of data breaches are now substantial. The Ponemon Institute’s “2017 Cost of Data Breach Study” says the average cost of an incursion is $3.62 million. The study also says larger breaches are occurring, with the average breach impacting more than 24,000 records. And with new regulations such as the EU’s General Data Protection Requirement (GDPR) putting stiff financial penalties on breaches of personal data, the cost of a breach can have material impact on the financial results of the firm. This trend toward increasingly onerous statutory demands will continue, as the U.S. is now considering the Data Privacy Act, which will bring more scrutiny and accompanying penalties for breaches involving
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Amazon Web Services EMEA     Published Date: Aug 02, 2019
Companies worldwide are undergoing digital transformations. By modernizing their applications, they can deliver better service to customers, and keep pace in a competitive landscape. In many cases, AWS has helped companies modernize by implementing containers—and initiating cultural shifts— to streamline development. In this eBook, we discuss best practices in containerization and how you can get started today with containers on AWS.
Tags : 
containers, developers, application, aws
    
Amazon Web Services EMEA
Published By: Uberall     Published Date: Apr 12, 2019
With this guide you will discover:
Tags : 
listings, engage, uberall, industry insights, google my business, location marketing, local seo, local search
    
Uberall
Published By: NetApp APAC     Published Date: Jul 04, 2019
This IDC study provides an evaluation of 10 vendors that sell all-flash arrays (AFAs) for dense mixed enterprise workload consolidation that includes at least some mission-critical applications. "All-flash arrays are dominating primary storage spend in the enterprise, driving over 80% of that revenue in 2017," said Eric Burgener, research director, Storage. "Today's leading AFAs offer all the performance, capacity scalability, enterprise-class functionality, and datacenter integration capabilities needed to support dense mixed enterprise workload consolidation. More and more IT shops are recognizing this and committing to 'all flash for primary storage' strategies."
Tags : 
    
NetApp APAC
Published By: HERE Technologies     Published Date: Aug 08, 2019
On-demand webinar published by eMarketer Marketers are using more location data than ever, but consumer privacy concerns and an evolving regulatory landscape have raised new challenges. There is a need for more consideration and transparency about collecting and using geolocation. Watch this webinar to learn about: • The various ways marketers are using location data today • How consumers feel about location sharing • How new government regulations may impact data collection Besides the two eMarketer Analyst, Hervé Utheza, Head of Media, Advertising & Telco at HERE Technologies joins the conversation and gives valuable insight on how to improve campaign performance through real world geometry. View the webinar now on demand.
Tags : 
    
HERE Technologies
Published By: IBM APAC     Published Date: Jul 19, 2019
Today’s IT organisations want simple, flexible storage infrastructures. IBM’s Storwize V5000 family of solutions are a fast, highly flexible, easy-to-use virtualised storage system that helps businesses to meet the challenges of rapid data growth in the context of limited IT budgets. This ESG report looks at the role the IBM Storwize V5000 family can have on addressing the storage needs of companies today.
Tags : 
    
IBM APAC
Published By: Workday APAC     Published Date: Jul 18, 2019
The misstep many organizations make when deploying new technologies is to copy existing processes in the new system, rather than commit to complete HR transformation.Read now to find out what is needed for a successful HR digital transformation.
Tags : 
    
Workday APAC
Published By: Workday APAC     Published Date: Jul 18, 2019
See the infographic to learn how InterContinental Hotels Group has benefited from Workday.
Tags : 
    
Workday APAC
Published By: Workday APAC     Published Date: Jul 24, 2019
Learn how Natixis deployed Workday to automate tasks, gain better insights via dashboards, track processes and encourage its employees' learning and development.
Tags : 
    
Workday APAC
Published By: Workday APAC     Published Date: Jul 24, 2019
Learn how Telstra uses Workday HCM platform to form a key part of a digital transformation project.
Tags : 
    
Workday APAC
Published By: IBC365     Published Date: Aug 08, 2019
FTP was developed in 1971, and a lot has changed in the decades since it was first created. Though the protocol has seen improvement over the years, there are some fundamental drawbacks to relying on this old technology for transferring today’s large media files.
Tags : 
    
IBC365
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development, software testing
    
Black Duck Software
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
Today's energy, environment, and utility companies face an unfamiliar landscape in which they must integrate alternative energies, expand situational awareness across the system, and deepen their relationships with customers-all while continuing to deliver reliable, safe, and affordable electricity, gas and water to everyone.By combining predictive analytics with IoT, cloud and mobile technologies, utilities companies can Lower costs, improve operational efficiency and increase equipment reliability.
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Jun 27, 2019
Organizations continue to rush down the digital transformation path. Whether by modernizing their IT infrastructures, leveraging the cloud, or becoming data-centric and data-driven, organizations must become more agile in their business practices and within their IT infrastructure stack to effectively compete in today’s dynamic business environment. Between the speed and distributed nature of modern businesses, as well as the expectation of instantaneous access to data from everyday users, it’s not surprising that nearly one in three organizations are looking into ways to improve data analytics for real-time business intelligence and customer insight.
Tags : 
    
Group M_IBM Q3'19
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search