CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

ema

Results 1 - 25 of 3890Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Cisco is committed to leading the collaboration revolution— both today and tomorrow. The role of technology in themarket place is to support and inspire big ideas and innovation. Digital transformation is going to continue to drive new ways of working, and Cisco will remain a driving force, with a vision that extends beyond in-house innovations—because the best ideas can come from anywhere.
Tags : 
file sharing, team engagement, cisco spark board, hybrid media, services, work optimization, developers
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Dec 13, 2017
Modern networks are vast and complex, spanning the globe to make information available to everyone within an organization and have begun to encompass new areas of technology. The Internet has unlocked tremendous new capabilities and technologies, but these innovations require persistent and reliable network connectivity. Salesforce’s© Customer Relationship Management (CRM) cloud product for example is now widely used by businesses for its significantly lower cost and overhead when compared to on-premise predecessors. The cloud is driving an insatiable demand for faster, more reliable network access, and for IT organizations the pressure is on.
Tags : 
connectivity, network, management, configuration, security, reliability, meraki
    
Cisco EMEA Tier 3 ABM
Published By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
The Cloud, once a radical idea in IT, is now mainstream. Whether it’s email, backup or file sharing, most consumers probably use a cloud service or two. Similarly, most IT professionals are familiar with cloud service providers such as Amazon, Google and Microsoft Azure, and many companies have moved at least some of their information technology processes into the cloud. In fact, the cloud has become so popular it’s easy to assume that running IT applications on-premises is not cost competitive with a cloud based service. In this report Evaluator Group will test the validity of that assumption with a TCO (Total Cost of Ownership) model analyzing a hyperconverged appliance solution from HPE and a comparable cloud service from Amazon Web Services (AWS).
Tags : 
infrastructure, cost competitive, cloud, hyper converged, amazon web services, total cost of ownership, tco
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
In recent years, it seems like technology is changing faster than it used to in decades past. As employees devour newer technologies such as smartphones, tablets, wearables, and other devices, and as they become more comfortable with solutions such as Dropbox and Skype, their demands on enterprise IT intensify. Plus, management and other decision makers are also increasing their demands on enterprise IT to provide more infrastructure with less cost and time. Unfortunately, enterprise IT organizations often don’t see much, if any, associated increases in funding to accomodate these demands.
Tags : 
hyperconverged, infrastructure, implementation, data metrics, protection, recovery, public cloud
    
Hewlett Packard Enterprise
Published By: Dell     Published Date: Dec 12, 2017
Fast-moving employees demand access to people, programs and data from anywhere. Power up their productivity with greater portability and connectivity. Begin by downloading “On the go Professional,” a brief by Dell that uncovers the key needs around convenience, connectivity and access required by mobile professionals. The brief also covers technology recommendations for you to consider, such as the robust line of Dell Latitude and Venue devices powered by Intel®, to meet the preferences of your users. Take advantage of the solutions that maximize enterprise productivity and employee satisfaction today. Download the brief now!
Tags : 
    
Dell
Published By: Oracle     Published Date: Nov 08, 2017
All’inizio, probabilmente avrai scelto di adottare l’infrastruttura cloud con una certa prudenza, limitandoti a un approvvigionamento rapido o alla riduzione dei costi operativi o delle macchine. Ma come resistere ai vantaggi di questo nuovo modo di fruire della tecnologia? Il cloud continua a evolvere e a conquistare credibilità in tutti i settori. Oggi, ci aspettiamo che ogni sistema aziendale possa beneficiare dei vantaggi del cloud.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Oracle     Published Date: Nov 08, 2017
Digital developments are forever shaping the way we work, bringing new innovations through our office doors almost every day. These high-demand technologies have increased expectations, with organizations now having to drive business agility at unprecedented levels. Although we’re presented with enormous opportunity, we also face new obstacles that can block the path to success; obstacles such as the need to innovate quickly, keep costs down, and actively respond to competitive pressures.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Cardinal Health     Published Date: Dec 28, 2017
Rising costs, declining reimbursements and the mandate to improve quality: these are key challenges that surgery centers face every day. For years, costs have continued to climb, while reimbursements have declined or, at best, remained stable. To address these issues and succeed in the future, surgery centers need to develop comprehensive plans that leverage both supply chain and clinical expertise. For many facilities, the next step is to conduct a clinical assessment that identifies new ways to improve inventory management and clinical practices. The heart of this approach from Cardinal Health is a clinical team that leverages OR and supply chain expertise to understand, prioritize and pursue opportunities for improving the health of patient and your practice alike. To learn more, read this case study and find out how two surgery centers have used a clinical assessment from Cardinal Health to improve performance.
Tags : 
    
Cardinal Health
Published By: Carbonite     Published Date: Oct 12, 2017
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses.
Tags : 
ransomware, malware, cybercrime, lockscreen, encryption
    
Carbonite
Published By: HP Inc.     Published Date: Dec 06, 2017
Shapeways builds consumer demand with HP 3D printing. While many consumer manufacturers debate when 3D printing will be ready for final-part production, Shapeways is busy proving that it is.
Tags : 
case study, manufacturer, consumer, printing, production
    
HP Inc.
Published By: Cisco     Published Date: Dec 27, 2017
The market for communications is shifting to one in which multi-modal interactions will become the norm. Voice, video, and messaging Communications and Collaboration will drive the future of this market. As messaging becomes a larger part of the Communications landscape, Mobile Collaboration is poised to take on a larger enterprise role, by way of shifting email to more of a confirmation tool. Moreover, the convergence of content types under UCC will be greatly enhanced by a categorized and dynamic ontology-driven knowledge framework that goes beyond search. Once the framework supports are in place, UCC will accelerate its momentum at an even greater rate than it already is today. This Research Note identifies the new elements of UCC and how enterprises can plan for the shift to multi-modal communications.
Tags : 
    
Cisco
Published By: Mimecast     Published Date: Jan 05, 2018
Relying on outdated solutions like Symantec Email Security (formerly MessageLabs) to defend your organization from email-borne attacks may be risky. Others in this position have suffered from spear-phishing, ransomware and even impersonation attacks. To effectively defend against these advanced threats you need the latest protection techniques – something Mimecast delivers to tens of thousands of organizations already. Join us for this 30 min webinar to learn: • The damaging effects of ransomware, spear-phishing and impersonation attacks • What defensive strategies and technologies you should employ • Why your current Symantec Email Security solution may not be up to the task • How to enhance your email security and overall cyber resilience
Tags : 
email security, ransomware, spear-phishing, cyber resilience, symantec
    
Mimecast
Published By: Carbonite     Published Date: Jan 04, 2018
Backup and high availability are both essential forms of protection that fulfill different roles within a data protection strategy. So which type of protection is right for different systems? According to recent analyst reports, experts recommend a blended approach that aligns data protection with type of data.By aligning data protection with data urgency, businesses can ensure higher levels of resiliency and reduce demands on internal resources.
Tags : 
    
Carbonite
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Banques, gestionnaires de patrimoines, établissements de crédit et autres institutions financières. Tous constatent d’importants changements, conséquence d’une évolution de la demande et du nouvel arsenal réglementaire. Ces entreprises sont tenues de revoir leurs priorités, leurs processus et leurs produits, avant de jeter les bases de leur future réussite. La solution ? Les logiciels.
Tags : 
api, application programming interface, psd2, open banking, json, github, api gateway, apim
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Sie müssen stets für das kontinuierliche Wachstum Ihres Unternehmens sorgen. Im Zuge der anhaltenden Dynamik der Application Economy setzen Sie zur Förderung dieses Wachstum vermutlich auf digitale Unternehmensinitiativen. Wie organisieren und verwalten Sie nun am besten ein APIProgramm, ohne Ihr geistiges Eigentum außerhalb des Unternehmens auf problematische Weise zu exponieren? Nachfolgend stellen wir eine Reihe von Early Adopters vor, die ihr Wachstum erfolgreich mit APIs befördert haben.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 24, 2017
Générez des données virtuelles riches qui couvrent tous les scénarios possibles et fournissent un accès illimité aux environnements nécessaires pour livrer des applications testées avec soin, dans les délais et le budget impartis. Modélisez les données des systèmes réels complexes et appliquez des algorithmes d’apprentissage automatisé de règles pour éliminer la dette technique et permettre une compréhension approfondie des applications composites. Mettez en outre à la disposition des équipes distribuées des données virtuelles à la demande et évitez les goulots d’étranglement au niveau des tests.
Tags : 
modèles de test, continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code
    
CA Technologies EMEA
Published By: Workday     Published Date: Jun 05, 2017
Aging HCM technology in many organizations contrasts sharply with the demands of digital business and the future world of work. HR IT leaders should use this strategic roadmap to plan their future HCM technology landscape to leverage the cloud, deeper automation and embedded advanced analytics.
Tags : 
workday, integrated learning, workplace success, gartner, hcm technology
    
Workday
Published By: Workday     Published Date: Nov 27, 2017
The new revenue recognition standard is going to shake things up in your business beyond just accounting. This new eBook from CFO, an Argyle company and sponsored by Workday—an early adopter—offers insight into preparing and planning for the new standard, along with strategies for meeting the new demands.
Tags : 
    
Workday
Published By: Mimecast     Published Date: Nov 28, 2017
With the healthcare industry as the #1 target for ransomware attacks, it’s critical to ensure steps are taken to prevent, detect and respond to these attacks without downtime – and without loss of patient data. A multi-layered approach to protective controls – including a Secure Email Gateway (SEG) with advanced threat protection capabilities – will start your healthcare organization on the right path to ransomware resilience. Download and use this top 10 list of how to protect your organization now. Use it as a reference tool for frequent health checks of your own ransomware resilience program.
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Lookout     Published Date: Aug 28, 2017
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective.
Tags : 
mobile risk, enterprise risk management, endpoint security, mobile-specific security, mobile threats
    
Lookout
Published By: Lookout     Published Date: Dec 07, 2017
How to think about the risk to data from the mobile ecosystem Mobile devices, even those that are corporate owned, are personal. Your CEO uses the same smartphone to send confidential emails, snap family photos, inspect customer records, get directions to meetings, and scrutinize financial reports. Every employee in your organization does the same thing. Your organization's critical data is constantly being accessed by mobile devices, and once it leaves the network you have no visibility into where it goes, and little or no ability to enforce your security policy to protect it. Your organization’s sensitive data has made the mobile ecosystem the new frontier for a wide spectrum of risk that every CISO must now understand. Take a deep dive into all twelve elements of the Mobile Risk Matrix in the interactive table below.
Tags : 
    
Lookout
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Today’s DevOps and agile–loving enterprises are striving for fast changes and quick deployments. To these companies, the microservices architecture is a boon, but not a silver bullet. Organizations can enable smaller development teams with more autonomy and agility, and as a result, the business will notice IT being more in tune with their changing demands.
Tags : 
api, application programming interface, psd2, open banking, json, github
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Le odierne aziende orientate alle metodologie DevOps e Agile puntano a cambiamenti rapidi e deployment veloci. Per queste aziende l'architettura dei microservizi è un vantaggio, ma non una soluzione ottimale. Le aziende possono offrire ai team di sviluppo di piccole dimensioni più autonomia e agilità e, di conseguenza, si noterà una maggiore adeguatezza dell'IT alle aspettative mutevoli del business.
Tags : 
modularità, velocità di delivery, zero deployment, deployment automatizzato, coesione, separazione delle problematiche, ca technologies
    
CA Technologies EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search