CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

ios

Results 1 - 25 of 931Sort Results By: Published Date | Title | Company Name
Published By: Vmware     Published Date: Oct 17, 2019
Over the next five years, chief information officers (CIOs) in Europe will lead their companies toward fundamentally new ways of doing business.
Tags : 
    
Vmware
Published By: Vmware     Published Date: Nov 01, 2019
In den nächsten fünf Jahren werden Chief Information Officers (CIOs) in Europa ganz neue Geschäftsmethoden für ihre Unternehmen einsetzen.
Tags : 
    
Vmware
Published By: Vmware     Published Date: Nov 01, 2019
En los próximos cinco años, los directores de informática (CIO) europeos dirigirán a sus empresas hacia maneras radicalmente nuevas de hacer negocios
Tags : 
    
Vmware
Published By: KPMG     Published Date: Oct 15, 2019
When we first launched the Women In Alternative Investments Report (WAI Report) in 2001, we were among the few voices talking about women’s advancement in alternative investments. It was a delicate conversation and one that few people were comfortable having. But now, eight years later, the conversation has shifted. The issues have moved mainstream, the dialogue has broadened, and the voices are many, but change is afoot. Investors are pressuring Alternative Investment Firms to increase gender diversity at the funds and portfolios they invest in. Read the KPMG report to understand why achieving gender diversity is a business imperative.
Tags : 
    
KPMG
Published By: Intel     Published Date: Nov 14, 2019
-memory databases have moved from being an expensive option for exceptional analytics workloads, to delivering on a far broader set of goals. Using real-world examples and scenarios, in this guide we look at the component parts of in-memory analytics, and consider how to ensure such capabilities can be deployed to maximize business value from both the technology and the insights generated.
Tags : 
    
Intel
Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: Google     Published Date: Nov 04, 2019
"McKinsey conducted a study of CIOs and CTOs of large enterprises from 17 industries. 80% said they hadn’t reached the agility their business needs due to costly trade-offs like sacrificing speed for security or preferred tools for uniformity. Get the report, “Unlocking business acceleration in a hybrid cloud world,” to discover the top perceived trade-offs and how some CIOs have avoided them and steps to unlock the next stage of your IT modernization journey
Tags : 
cloud as a service, cloud computing, enterprise security, cloud infrastructure, cloud providers
    
Google
Published By: Oracle     Published Date: Sep 26, 2019
If people always knew what they wanted and asked for it, your job would be easy—and boring, which really isn’t your style. But people—and customers—are complicated, and that’s a good thing. It means that every quirk, habit, bias, behavior, curiosity, experience, and demographic detail is a chance to optimize and catapult your customer experience to new heights. But first, you have to go beyond all the details you know about your customers to discover what they mean for your business. These “customer insights” make all the difference. And this guide is a crash-course in how to catch them, decode them, and put them to work.
Tags : 
    
Oracle
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Compiling a cloud services comparison is a daunting task in the rapidlyevolving cloud environment. There are thousands of cloud services, dozens of cloud service providers, and numerous Infrastructure-as-aService (IaaS) providers offering pay-as-you-go pricing models—each one frequently changing and upgrading their portfolios. We have chosen to limit our cloud services comparison to the top three IaaS providers providing service in the Western Hemisphere—Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP)—because, not only are these the IaaS providers most organizations are familiar with, they are also the IaaS providers whose services most organizations are likely to compare. This eBook provides an introduction to the range of services offered by the leading cloud service providers, information on regions and availability zones, a breakdown of cloud storage services, and more, to help inform you on your multicloud journey.
Tags : 
    
CloudHealth by VMware
Published By: Infinidat EMEA     Published Date: May 14, 2019
Digital transformation is a business enabler, one that also translates to an increase in the demand for greater storage capacity and performance. This increasing demand requires IT organizations to re-examine their data storage strategy as the growth in capacity doesn’t align with a shrinking IT budget. To support the growth of the business and remain competitive in a global digital market, CIOs are asked more than ever to “do more with less,” while improving performance and availability at the same time.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 war kein einfaches Jahr für einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafür, dass es einfacher wird. Bei so vielen Datenverstößen, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschärften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu überdenken. Abgesehen von der Einhaltung gesetzlicher Vorschriften sind Unternehmen gegenüber ihren Kunden und Aktionären verp?ichtet, Daten zu schützen und ihre Gefährdung nicht nur gegenüber externen Angreifern, sondern auch gegenüber Mitarbeitern zu minimieren. Die im Jahr 2017 am häu?gsten genutzte Methode für Datendiebstahl war das Phishing, welches sich an interne Mitarbeiter von Unternehmen richtete (siehe Report zur Untersuchung von Datenverstößen im Jahr 2017). Damit wurden diese Mitarbeiter unwissentlich mitschuldig an der Datenverletzung: Über 80% der erfolgreichen Cyber-An
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Oct 14, 2019
2017 war kein einfaches Jahr für einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafür, dass es einfacher wird. Bei so vielen Datenverstößen, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschärften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu überdenken.
Tags : 
    
Infinidat EMEA
Published By: MicroStrategy     Published Date: Nov 08, 2019
Mobile devices are part of nearly everything we do in life. Two-thirds of the world's population is connected via one of these devices; in 2020 there will be 6.95 billion mobile users worldwide, according to Statista forecast. Apple iOS and Google Android mobile devices provide on-the-go access to the vast array of applications and information that people have come to rely on. In the next decade the use of mobile devices gain intelligence likely will significantly change how an organization does its work.
Tags : 
    
MicroStrategy
Published By: TIBCO Software     Published Date: Sep 16, 2019
A tendência atual na indústria de manufatura se inclina para os produtos feitos sob medida em lotes pequenos e com tempo de entrega reduzido. Com frequência, esta mudança pode alterar a produção, o que acarreta em um maior tempo de inatividade das máquinas, custos de produção mais altos, desperdício de produtos e a necessidade de voltar a produzir os produtos defeituosos. Assista esse webinar para conhecer como as soluções Smart Manufacturing da TIBCO pode ajudá-lo a superar esses desafios. Você também verá uma demonstração da tecnologia da TIBCO em ação, e como ela melhora os processos de produção e otimização, assim como reduz os custos.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 16, 2019
Por años, los fabricantes han estado tratando de optimizar sus procesos y cadenas de suministro asociadas creando mercados, intercambios estandarizados, y sistemas monolíticos. En muchos casos, estas soluciones no logran su objetivo, lo que da origen a procesos fragmentados y frágiles, y en los que compartir datos es complicado. Blockchain, la tecnología que está detrás de Bitcoin y otras criptomonedas, puede resolver estos problemas. Compartir información mediante una red distribuida confiable con una lógica de negocio integrada ofrece muchos beneficios al sector manufacturero, especialmente cuando se combina con las comunidades de IoT y de IA. Vea este webinar titulado Blockchain y Manufactura: Una Manera Inteligente de Elevar la Eficiencia en las Cadenas de Suministro de Semiconductores y Electrónica, conducido por Nelson Petracek, director de Tecnología de TIBCO Software. Entre los temas que se abordan se incluye: • Blockchains empresariales • Casos de uso en el sector manufactur
Tags : 
    
TIBCO Software
Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. • Stay ahead of your competitors • Reduce operating costs and drive revenue • Get your team on board with digital transformation • Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh
Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. • Stay ahead of your competitors • Reduce operating costs and drive revenue • Get your team on board with digital transformation • Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh
Published By: KPMG     Published Date: Jun 06, 2019
In future, people with IT skills will no longer work only within the IT function. Instead, they’ll be part of an ecosystem of technology talent across the enterprise. How should CIOs respond to this change? Read this briefing to find out: • what the changing status of technology means for the IT workforce • how CIOs can encourage employees to be IT enablers rather than IT ‘doers’ • why we need to rethink IT as a technology talent ecosystem • why IT should no longer be the gatekeeper to technology – and what it needs to become instead.
Tags : 
    
KPMG
Published By: ToneTag     Published Date: Nov 14, 2019
Increasingly, retailers in APAC face the combined challenges of more demanding customers, shrinking profitability, increased competition, and complex online-offline experiences. That’s why more retailers are adopting data-over-sound technology. This technology allows customers to make mobile payments using sound to communicate with payment devices like credit card readers, or kiosk machines. It also enables novel customer experiences, which allow retailers to drive in-the-moment sales, improve loyalty program stickiness, and eliminate queues, among other benefits. And because it doesn’t require the Internet, and works even on feature phones, it can be leveraged in a number of scenarios such in pop-up markets, food courts, concerts, and door-to-door deliveries, among others. Inside This Guide: • The top 5 ways retailers are using data-over-sound • 14 benefits for retailers • Why sound-based experiences will take over APAC
Tags : 
    
ToneTag
Published By: ToneTag     Published Date: Nov 14, 2019
It’s critical for BFSI and fintech firms in APAC to enable frictionless payments to win the customer experience war. Making it easier and more intuitive for customers to make payments opens new revenue channels for BFSI and fintech, increases customer loyalty, and attracts more merchants. That’s why more APAC’s BFSI and fintech innovators are adopting data-over-sound technology. This technology allows customers to make mobile payments using sound to communicate with payment devices like credit card readers, or other phones. It is also flexible: It can transform any device with a speaker or a microphone into a payment device. This includes ATMs, food kiosks, etc. The benefit? BFSI and fintech firms can re-use existing assets, driving down innovation cost. Plus, it doesn’t require the Internet, and works even on feature phones. This makes it ideal to acquire customers in rural and semi-rural markets. Inside This Guide: • The top 5 ways BFSI and fintech firms are using data-over-
Tags : 
    
ToneTag
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search