CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

device liability

Results 1 - 14 of 14Sort Results By: Published Date | Title | Company Name
Published By: Pure Storage     Published Date: Oct 09, 2018
As flash storage has permeated mainstream computing, enterprises are coming to better understand not only its performance benefits but also the secondary economic benefits of flash deployment at scale. This combination of benefits — lower latencies, higher throughput and bandwidth, higher storage densities, much lower energy and floor space consumption, higher CPU utilization, the need for fewer servers and their associated lower software licensing costs, lower administration costs, and higher device-level reliability — has made the use of AFAs an economically compelling choice relative to legacy storage architectures initially developed for use with hard disk drives (HDDs). As growth rates for hybrid flash arrays (HFAs) and HDD-only arrays fall off precipitously, AFAs are experiencing one of the highest growth rates in external storage today — a compound annual growth rate (CAGR) of 26.2% through 2020.
Tags : 
    
Pure Storage
Published By: TE Connectivity     Published Date: Feb 23, 2018
In our increasingly connected world, quality, reliability and consistency matter a great deal, particularly in the context of the smart home ecosystem. The antennas, connectors, relays, sensors, switches, terminals and tubing inside these devices play critical roles in the product’s ultimate functionality. If you don’t focus on the right components or choose the wrong or incompatible ones, then device reliability becomes an issue.
Tags : 
    
TE Connectivity
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. The diversity and bureaucratic nature of government agencies have complicated communication for decades. But today digital technologies offer a path to connectivity and information sharing that could help break the gridlock. Innovative mobile and field force automation (FFA) technologies are helping state and federal government agencies break down the walls that hindered cooperation and decision making between offices and field personnel. This document is designed to help ensure that your mobile device platform selection and processes provide the power, reliability, and flexibility you need to achieve your mission — in the office, in the field, or ten flights up in the air.
Tags : 
    
Fujitsu America, Inc.
Published By: Indegy     Published Date: Jun 17, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegy’s agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
cybersecurity, industrial networks, security capabilities, indegy
    
Indegy
Published By: Citrix Systems     Published Date: Nov 10, 2014
Today, defending your organization’s web properties means more than just protecting a handful of enterprise web applications from advanced malware. Learn more on the complexity and challenges of defending against today’s modern threats and discover how Citrix NetScaler application delivery controller (ADC) is an ideal defense solution.
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security, reliability, netscaler, wireless
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security, reliability, netscaler, wireless
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
We’ve all come to expect the same security, performance and reliability from our mobile applications as we do with native applications. But these apps don’t just run on our mobile devices. They are powered by a variety of backend infrastructure – a hidden but important layer of application components and network devices. NetScaler helps this invisible layer of infrastructure to perform and communicate, improving security as well as quality of service. And by integrating with XenMobile, you can offer greater support and a better experience for mobile users. Learn more about delivering improved security, reliability and performance through mobile environments by reading our full report, Defend Hidden Mobile Web Properties (link).
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security, reliability, netscaler, wireless
    
Citrix Systems
Published By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability, device liability, technology vendors, mdm, sarbanes oxley, sensitive data, mobile data, mobile information, vpn, virtual private networks, wireless, access control, mobile application security
    
CDW
Published By: Aruba Networks     Published Date: Jul 03, 2013
802.11ac is well on its way to becoming the standard for next-generation Wi-Fi. The gigabit speed, improved capacity and reliability that 802.11ac brings to wireless LANs (WLANs) are amplified as mobile users, devices and application usage continue to grow rapidly. Whether you are an early adopter who has already started planning, or like several organizations, unsure of your next step, download this five step guide to help you prepare and plan for a successful migration to an 802.11ac WLAN.
Tags : 
migrate, 802.11ac, mobile users, device, upgrade, reliability
    
Aruba Networks
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world.  Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohitib visibility and control in distributed architectures. The brief also explains: - The Citrix Networking approach to delivering reliability and a high-quality experience - How to ensure reliable access to apps at branch and remote locations while keeping costs low - How to provide full visibility and analytics for your network, applications, users, and data"
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jun 04, 2019
Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world. Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohibit visibility and control in distributed architectures. The brief also explains: The Citrix Networking approach to delivering reliability and a high-quality experience How to ensure reliable access to apps at branch and remote locations while keeping costs low How to provide full visibility and analytics for your network, applications, users, and data
Tags : 
    
Citrix Systems
Published By: Dell Storage     Published Date: Jan 16, 2009
Most storage devices support multiple SAN connections for performance and reliability, but in many configurations servers use only a single storage connection. This creates a single point of failure and potential performance bottleneck for I/O. Multipath Input/Output (MPIO) is server software that extends redundancy to the entire I/O pathway in a SAN, delivering fault tolerance, high availability, and better performance.
Tags : 
dell, san connections, storage area networks, configuration servers, mpio, multipath input/output, storage
    
Dell Storage
Published By: SAP     Published Date: Jul 17, 2012
As the "bring your own device" (BYOD) trend sweeps across the business world, it raises a huge management challenge for many companies. It changes who within an organization gets access to mobility. It also affects the way a business operates, with implications that go far beyond simply IT. BYOD presents new, fundamental questions about security, liability, and cost. Answers depend on two aspects of mobility management: device management policy and the technology used to fulfill and enforce a policy.
Tags : 
sap, mobile, managing, business, mobility, technology, business technology
    
SAP
Published By: Fujitsu America, Inc.     Published Date: Jan 18, 2019
The diversity and bureaucratic nature of government agencies have complicated communication for decades. But today digital technologies offer a path to connectivity and information sharing that could help break the gridlock. Innovative mobile and field force automation (FFA) technologies are helping state and federal government agencies break down the walls that hindered cooperation and decision making between offices and field personnel. This document is designed to help ensure that your mobile device platform selection and processes provide the power, reliability, and flexibility you need to achieve your mission — in the office, in the field, or ten flights up in the air. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.
Search