CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

oss

Results 1 - 25 of 4756Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Oct 01, 2019
Deze gids geeft u alle belangrijke informatie die u over hyperconvergence moet weten: • Een overzicht van de technologie • Hoe het werkt • Waarom u het nodig hebt • Waar u op moet letten wanneer u gaat aanschaffen Als de nieuwste generatie van zakelijke computing biedt hyperconvergence u een eenvoudige en kosteneffectieve oplossing als u wordt geconfronteerd met een groeiende vraag naar IT-services. Deze gids gebruikt voorbeelden uit de praktijk om u te tonen hoe andere kleine bedrijven het volgende hebben bereikt: • Lagere totale eigendomskosten • Grotere efficiëntie • Betere prestaties
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Oct 01, 2019
Een robuust netwerk opent de deur naar succes en Cisco is wereldwijd marktleider op het gebied van netwerktechnologie. Onze portfolio voor kleine bedrijven levert de betrouwbare, schaalbare en sterk beveiligde IT-infrastructuur die uw bedrijf nodig heeft. Uw IT-teams moeten uw infrastructuur operationeel houden, op urgente verzoeken reageren en nieuwe technologieën implementeren – zelfs als er sprake is van een beperkt aantal IT-medewerkers. Cisco Small Business-oplossingen zorgen ervoor dat u deze uitdagingen een stap voor kunt blijven. Het resultaat: IT-resources komen vrij, zodat u zich kunt richten op projecten met meerwaarde.
Tags : 
    
Cisco EMEA
Published By: VMware     Published Date: Sep 12, 2019
You’ve heard the stories: a large Internet company exposing all three billion of its customer accounts; a major hotel chain compromising five hundred million customer records; and one of the big-three credit reporting agencies exposing more than 143 million records, leading to a 25 percent loss in value and a $439 million hit. At the time, all of these companies had security mechanisms in place. They had trained professionals on the job. They had invested heavily in protection. But the reality is that no amount of investment in preventative technologies can fully eliminate the threat of savvy attackers, malicious insiders, or inadvertent victims of phishing. Breaches are rising, and so are their cost. In 2018, the average cost of a data breach rose 6.4 percent to $3.86 million, and the cost of a “mega breach,” those defined as losing 1 million to 50 million records, carried especially punishing price tags between $40 million and $350 million.2 Despite increasing investment in security
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever. For these reasons and more, enterprises need to start thinking differently about cybersecurity. Security doesn’t need new products. It needs a new model. One that applies the principles of intrinsic security across the fabric of the organization, from the sales floor to the C-suite, from the infrastructure to the endpoint device. In this Essential Guidance executive brief, learn how intrinsic security differs from traditional security methods, and the steps CIOs need to take to operationalize this model for greater business agility without greater risk.
Tags : 
    
VMware
Published By: NTT Ltd.     Published Date: Aug 15, 2019
As businesses are driven to digital transformation by changing market forces and customer expectations, many are looking to new technologies, including new infrastructure environments, as enablers. As a result, we are seeing a near-universal appetite for hybrid outcomes as business functions are executed across multiple on-premises and external infrastructure environments in pursuit of agility, cost, performance and other business benefits. Hybrid IT has become a key strategic imperative for a large portion of enterprises, impacting their IT objectives and expectations, and likely leading to new engagements with service provides for help designing, building and operating hybrid environments.
Tags : 
    
NTT Ltd.
Published By: SAP EMEA Global     Published Date: Aug 23, 2019
A network of digital twins visually communicates information about products, manufacturing, supply chain, service, and customers for program, scenario, and role-based analysis, and ultimately better collaboration across your business network.
Tags : 
    
SAP EMEA Global
Published By: KPMG     Published Date: Oct 15, 2019
We’re seeing a global trend towards responsible investing. Increasingly, institutional investors are recognising the potential for ESG factors to affect the valuation and financial performance of the companies they invest in. At the same time, consumer demand for responsible investments is surging, especially from the younger generation. “Responsible” or “sustainable” finance and a focus on environmental, social and governance (ESG) factors have moved firmly into the mainstream today. This booklet presents the proof to address the issues around responsible investment implementation: statistics from across investment markets that show how significant this shift is.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 15, 2019
Consumers have become more educated about the value of data and cyber risks associated with it. As consumer awareness increases so does their expectations of trust and digital security. Read now KPMG's report Trust in the time of disruption to understand the cybersecurity gap that exists between consumers and organisations, and what asset management and financial services firms as a whole can do to close the trust gap.
Tags : 
    
KPMG
Published By: SAP EMEA Global     Published Date: Sep 13, 2019
Managing employee experiences is not about pinpointing a single event or moment. People leaders need the ability to collect feedback at every moment that matters and take action to close experience gaps. With Employee Experience Management solutions from SAP, you can use a wide range of employee listening mechanisms across a variety of engagement channels to create a “digital open door.”
Tags : 
    
SAP EMEA Global
Published By: Barracuda     Published Date: Oct 14, 2019
In its guide for buyers considering email-security solutions—a detailed analysis of products and services—Forrester’s evaluation gave Barracuda the highest score possible in the cloud integration, deployment options and support and customer success criteria. Get full report and see all the details for yourself, including innovative solutions for email authentication and incident response and for preventing account takeover, business email compromise (BEC) and spear-phishing. Claim your complimentary copy right now!
Tags : 
    
Barracuda
Published By: SES     Published Date: Aug 01, 2019
Este artigo de blog, escrito por nosso VP de Desenvolvimento e Inovação Tecnológicos, apresenta insights de especialistas sobre a revolução da rede 5G. Descubra o impacto que a arquitetura da rede 5G terá na nossa sociedade "hiperconectada" do futuro. Conheça casos de uso como comunicações massivas por máquina, maior largura de banda móvel e comunicações com baixa latência.
Tags : 
    
SES
Published By: SES     Published Date: Aug 01, 2019
Descubra como uma empresa de comunicações está levando conectividade às áreas mais remotas do Peru. De uma frota de pesca offshore a uma vila acessível apenas por avião, a Axesat está levando soluções de satélite e cobertura de rede 4G a áreas que eram impossíveis de alcançar antes. O CEO da Axesat descreve como a empresa, em parceria com a SES Networks, consegue ampliar o comércio e a conectividade no Peru
Tags : 
    
SES
Published By: Workable     Published Date: Oct 09, 2019
Do you need an ATS? Broadly speaking, we’ve found three common scenarios driving the search for a better way to hire: Growing pains - companies with growing pains are typically looking for some predictability and structure across candidate sourcing and hiring. Drowning in email and spreadsheets - companies are looking for more efficient ways to manage candidates and collaborate as a team Outdated software - companies are looking for a modern, efficient approach to deliver on the original promise of an ATS A modern ATS, chosen with the right criteria, will relieve these common pain points. Take a step back and think about how your recruiting could be improved with the right tool.
Tags : 
    
Workable
Published By: HERE Technologies     Published Date: Jul 11, 2019
Supply chain managers are increasingly leveraging location intelligence and location data to raise visibility throughout their whole logistics process and to optimize their delivery routes. Leveraging this data requires an ever-more-robust technology stack. As supply chain technology stacks become more complex, diverse and defined by legacy system integrations, Application Program Interfaces (APIs) are becoming essential to making stacks scale, allowing supply chain managers to better meet the demands of the new generation of consumers. Innovative location APIs provide supply chain stacks and applications with: Greater agility Contextual intelligence Real-time data implementation Speed Scale Introducing new technology into an organization can sometimes be daunting. As one of the world’s leading location platforms, HERE shares insights and tips to streamline the supply chain technology integration across the whole organization.
Tags : 
here technologies, supply chain, mapping
    
HERE Technologies
Published By: HERE Technologies     Published Date: Sep 26, 2019
A utomobile manufacturers find meeting the requirements of a just - in - time supply chain one of their biggest challenges , but with advances in location technology manufacturers can meet even the strictest shipping deadlines . With better visibility across the supply chain auto manufacturers can drive down costs, improve efficiency and support proactive decision making. By reading this eBook, you’ll discover how to p repar e your supply chain for the future wit h the application of location intelligence to: ? Gain location - based insights to help optimize processes and inform decision making ? Set accurate ETAs with reliable real - time information ? Use real - time visibility to proactively solve problems ( like bottlenecks ) as they occur ? Gain comprehensive coverage of assets and trace them across factories, warehouses, showrooms and in transit
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Sep 26, 2019
Despite the greater frequency of extreme weather events occurring around the globe, freight still has to be delivered on time and on a year-round basis. Truck drivers often find themselves driving through rain, snow, sleet, hail, fog, ice, thunderstorms, tornadoes and high winds. While drivers aren't generally expected to stick to pre-planned routes in extreme weather, fleet managers don’t really have the capacity to outline every possible alternate route in anticipation of a future hazardous weather scenario. Data-driven route planning saves fuel, prevents accidents and improves ETAs, which is why many logistics companies are turning to advanced supply chain optimization solutions with real-time weather alerts and rerouting functionalities. Today, tech-savvy fleet managers are looking for exactly this type of tech innovations to provide them with a sharp competitive edge in an already crowded industry such as long-haul logistics. As one of the world's leading location platforms, HER
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Sep 26, 2019
Rising urbanization and upward of a billion vehicles in operation across the world have brought unprecedented levels of traffic and congestion to our major towns and cities. On the frontline are the emergency dispatchers and responders. Every day, they face complex challenges as they attempt to navigate through congested traffic, unexpected road closures and work zones in a timely manner.
Tags : 
    
HERE Technologies
Published By: SiteImprove     Published Date: Oct 02, 2019
This report is an attempt to understand what marketing leaders view as their top issues with regard to corporate websites and broader digital presences, and to identify their focus areas today and over the next 12 months. The results point to a desire for marketers to optimise the customer experience across every touchpoint. That aim is commendable but, as our research makes clear, there are serious obstacles along the way.
Tags : 
    
SiteImprove
Published By: KPMG     Published Date: Jun 06, 2019
As businesses start to experiment with true artificial intelligence, safe delivery of AI demands a new risk and control framework. This report, designed for anyone tasked with the safe delivery of AI, proposes an effective solution. Read the report to find out: • the risks associated with AI and the challenge of managing them • a 17-category Risk & Controls framework for AI • in-depth details for key categories, including security management, business continuity and knowledge management • an essential glossary of AI terms.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
Find out why cyber security must be embedded into commercial strategy. With focused insight on the economics of trust for financial services, automotive, mobile and retail organisations. Read the report to understand: • how consumer expectations are shifting on the topic of digital trust • how well the priorities of consumers and security executives align • what it takes for consumers to stay with a brand when things go wrong.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
As advanced technologies catapult manufacturing into the future, find out how to manage the most complex business challenge in generations. Read this briefing to discover: • why I4.0 transformation demands a cross-functional approach • how to get planning for I4.0 transformation the right way round • how to identify the best opportunities to create value • critical enablers for I4.0 transformation • five questions to ask for smarter I4.0.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
Getting complex decisions right across complicated operational networks is the key to optimum performance. Find out how one of the UK’s biggest bus operators is using data and analytics to make better decisions and optimise the use of resources across their network. Read this story to discover: • how data and analytics can transform operational performance • the benefits of using decision-support tools in the middle office • key lessons for getting your plans for digital transformation right.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 31, 2019
From intelligent automation to advanced analytics, disruptive technology will enable the finance function to provide all of its services more effectively and efficiently. Find out how technology will change the way finance delivers transactional services, expert services and business partnering, Read this report to discover: • how automation in finance can deliver expert services more reliably and with smaller workforces • how to design an agile workforce of humans and technologies • how the finance function will shift to be part of a cross-functional analytics model that provides key insights to the business
Tags : 
    
KPMG
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining has consistently been one of the top threats across all internet activity in 2018. Cryptominers tap into an organization’s computing power to create cryptocurrencies like Bitcoin and Monero — and generate profit for themselves. If you’re not protected, it can cost you in all kinds of ways. It can lead to degraded system performance and regulatory risks, and leaves an attacker with an open door to further exploit your network. In this eBook you’ll learn about who these criminals are targeting and how you can protect your network from a significant threat. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
AI is not a trend! Cisco has been doing it for years to help businesses across the globe quickly and easily identify banking trojans, botnets, phishing and ransomware. In this recorded webinar, we go beyond the hype.
Tags : 
    
Cisco Umbrella EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search