CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

over the top

Results 76 - 100 of 337Sort Results By: Published Date | Title | Company Name
Published By: VMware, Inc     Published Date: Oct 28, 2014
VMware vCloud® Air™ Disaster Recovery introduces native cloud-based disaster recovery capabilities for VMware vSphere® virtual environments. Built on VMware’s hypervisor-based replication engine, vSphere Replication, and integration support with vCloud Air, it provides simple and secure asynchronous replication and failover. Consider these top five reasons why you should look to the cloud for your disaster recovery needs.
Tags : 
cloud, disaster recovery, asynchronous replication, hypervisor-based replication, integration, networking, data center
    
VMware, Inc
Published By: VMware AirWatch     Published Date: Feb 21, 2017
More organizations are choosing Horizon 7 over Citrix XenDesktop and XenApp because Horizon offers a more comprehensive and feature-rich solution. The three key architectural advantages that Horizon has over Citrix are a trusted platform, flexible delivery options, and workspace environment management. Download this whitepaper to learn how VMware Horizon® 7 helps IT manage, control, and protect all Windows resources at the speed required and with the efficiency that business demands, delivering desktops and applications through a single platform to end users anytime, anywhere, on any device.
Tags : 
    
VMware AirWatch
Published By: Okta     Published Date: Jul 19, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Akamai Technologies     Published Date: Aug 22, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: ? Customer trust is at an all-time low and it’s hurting growth ? Executives are aware that customer trust is becoming critical to success ? Companies struggle to balance security with digital experience ? Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : 
customer, trust, company, loyalty, security
    
Akamai Technologies
Published By: Oracle HCM Cloud     Published Date: Jun 07, 2016
In the Conference Board’s 2016 annual survey of over 6,000 CEO’s, talent concerns rated #1 and #2 among the top “hot button” issues. What are you doing to attract and retain top talent, develop next gen leaders and build high-performing business cultures that prime your organization for growth? Learn how doing business in today’s unpredictable world requires not only effective strategies and excellent execution, but a vision that inspires and engages the true engine of any organization—it’s people.
Tags : 
    
Oracle HCM Cloud
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
mobile device, flexibility, risk reduction, data security, agility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
risk reduction, flexibility, mobility, data security, agility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Functionality, cost effectiveness and efficiency drive your firm. Apply those standards to sharing large files if you want to beat competitors who use standard, less professional file-sharing tools with clients. Read this e-book to discover how you and your firm can: Avoid the unreliability and time-consuming limitations of FTP and email. Stop breaking up files and start tracking their status. Increase the speed of transferring proposals, specs and more without sacrificing security.
Tags : 
cost effectiveness, efficiency, data sharing, data security
    
Citrix ShareFile
Published By: Google Analytics 360 Suite     Published Date: Sep 05, 2017
Today’s meandering customer journeys take place over multiple channels and devices. Each interaction creates a stream of digital information, leaving marketers with a growing pile of data. But, with data seemingly everywhere, why are so many marketers still feeling like there’s not a drop to drink? Leaders Have a Data Strategy and Enable More Teams with Data In this research report from June 2017, Econsultancy surveyed more than 700 marketing and analytics executives at consumer brands to better understand how data factors into marketing strategy — and daily decision making. Two-thirds of leading marketers — those who outperformed their top business goal — say they currently have a documented data and analytics strategy. In this report, you’ll also learn how leaders have built data-driven cultures and why they are more likely to use: digital analytics to optimize user experience in real time audience-level data to personalize customer experience customer-level data to segment and r
Tags : 
    
Google Analytics 360 Suite
Published By: Fiserv     Published Date: Aug 23, 2018
Even with the rise of digital payments, cash is still a popular form of payment. According to the Federal Reserve, consumers use cash to pay for nearly one-third of all retail transactions. For many retailers, a completely "cashless society" is nowhere in sight. Cash management remains one of the most important aspects of managing a retail operation, particularly at quick service restaurants (QSRs) and convenience stores, where transactions are smaller and cash is a preferred method of payment. This white paper, Boost Profitability by Automating Cash, sponsored by Fiserv and Fast Casual, details the steps to manage cash properly and boost profit for your business. Uncover the top reasons and flexible options to automate your cash management. • Time savings • Theft deterrence • Higher accuracy • Better customer service • Real-time data
Tags : 
cash automation, smart safe, cash loss, cash handling, automated cash handling, cash management, cash reconciliation, manual cash reconciliation, automated cash reconciliation, automated vault, cash counting, cash automation system, cash deposits, cash recycler, cash dispensers, cash drawer, point of sale
    
Fiserv
Published By: Carbon Black     Published Date: Apr 11, 2018
Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Aug 14, 2018
Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able to carry out their attack objectives.
Tags : 
    
Carbon Black
Published By: Trimble     Published Date: Jul 24, 2018
Are you avoiding the speed bumps that threaten to derail your estimates? The construction business is competitive. Your ability to produce complete and accurate estimates can mean the difference between winning projects—or losing them. If you do win the project, your estimate becomes even more critical. Even a single error has the potential to kill your profit margin. While construction always carries some risk, your estimating process doesn’t need to. In this free eBook, you’ll learn specific strategies to: Minimize costly errors before they destroy your profit margin Retain the knowledge of your top estimators, even if they leave Produce accurate estimates quickly and efficiently Uncover the top three mistakes estimators make—and get the strategies you need to avoid them. Grab your FREE eBook now.
Tags : 
    
Trimble
Published By: Trimble     Published Date: Aug 20, 2018
Are you avoiding the speed bumps that threaten to derail your estimates? The construction business is competitive. Your ability to produce complete and accurate estimates can mean the difference between winning projects—or losing them. If you do win the project, your estimate becomes even more critical. Even a single error has the potential to kill your profit margin. While construction always carries some risk, your estimating process doesn’t need to. In this free eBook, you’ll learn specific strategies to: • Minimize costly errors before they destroy your profit margin • Retain the knowledge of your top estimators, even if they leave • Produce accurate estimates quickly and efficiently Uncover the top three mistakes estimators make—and get the strategies you need to avoid them. Grab your FREE eBook now.
Tags : 
    
Trimble
Published By: CheckMarx     Published Date: Nov 02, 2018
As DevOps continues to be widely adopted by fast-moving organizations, software security needs to keep pace to help accelerate software delivery and not slow it down. Is your software security program up to the challenge? By integrating security into the entire software development lifecycle, enterprises can manage their business risk and guarantee secure software delivery at the speed of DevOps. Check out these 10 Essential Best Practices for building and maintaining your modern-day software security program -- from your tools, to your processes, to your people. This eBook will cover the top 10 steps you can take today to help your organization move faster and more securely.
Tags : 
    
CheckMarx
Published By: Jeppesen     Published Date: Oct 01, 2019
What’s $6.12 to you? A fast food meal? A pair of dry-cleaned pants? In the airline industry, that’s the net profit per passenger. It’s a time of razor-thin margins and shrinking profits—in 2018 they were down 23% from the year before. Which means every savings opportunity is meaningful. And technology can help uncover a myriad of them. Taking real, anonymized data, we calculated how technology can make a serious dent in the costs of one of the top-five U.S. carriers.
Tags : 
    
Jeppesen
Published By: IBM APAC     Published Date: May 14, 2019
Machine Learning For Dummies, IBM Limited Edition, gives you insights into what machine learning is all about and how it can impact the way you can weaponize data to gain unimaginable insights. Your data is only as good as what you do with it and how you manage it. In this book, you discover types of machine learning techniques, models, and algorithms that can help achieve results for your company. This information helps both business and technical leaders learn how to apply machine learning to anticipate and predict the future. You will find topics like: - What is machine learning? - Explaining the business imperative - The key machine learning algorithms - Skills for your data science team - How businesses are using machine learning - The future of machine learning
Tags : 
    
IBM APAC
Published By: Amazon Web Services     Published Date: Oct 09, 2017
As easy as it is to get swept up by the hype surrounding big data, its just as easy for organisations to become discouraged by the challenges they encounter while implementing a big data initiative. Concerns regarding big data skill sets (and the lack thereof), security, the unpredictability of data, unsustainable costs, and the need to make a business case can bring a big data initiative to a screeching halt. However, given big data's power to transform business, it's critical that organisations overcome these challenges and realise the value of big data. The cloud can help organisations to do so. Drawing from IDG's 2015 Big Data and Analytics Survey, this white paper analyses the top five challenges companies face when undergoing a big data initiative and explains how they can effectively overcome them.
Tags : 
amazon, web services, intel, migration, data warehousing, organization optimization, security, software
    
Amazon Web Services
Published By: Here Technologies     Published Date: Apr 02, 2019
OEMs today face significant challenges that restrict effective fleet analysis. Data is often siloed and held in several incompatible formats, meaning responding to software faults can be a costly and lengthy process. To overcome this, Here have combined OTA technology with the HERE Open Location Platform. By closing this loop, Here provide a one-stop solution for data enrichment and analysis – and Here turn connected vehicle data into over-the-air updates. Watch this webinar and learn how HERE enables: • Early error detection and proactive remote maintenance of software and firmware • Reduction of data management value chain complexity with its one-stop solution • Effective fault response and real-time access to new products and services
Tags : 
over the air technologies, location data, auto, mapping
    
Here Technologies
Published By: Amazon Web Services     Published Date: Nov 28, 2017
So you’re thinking about moving to the cloud. Which means you’ve got some new (and some old) security issues to think about. Where do you start? What should you look for when you’re planning your cloud migration or expansion, and what features do you need to tick off your list when you compare partners for the project? At AWS, we’ve worked with millions of cloud users in 190 countries, from all kinds of industries – large enterprise, start-ups, non-profits, education and government. Every organisation's needs are different, but we’ve identified the top features of any successful cloud security initiative. Here are six must-haves for cloud security confidence.
Tags : 
integration, security, compliance, visibility, control, privacy, data, marketplace
    
Amazon Web Services
Published By: Intel     Published Date: Apr 16, 2019
When seeking a new cloud service provider (CSP), uptime and data sovereignty will be decisive considerations for many customers. At a time when cloud outages can bring down a huge number of web services and make the news, reliability is a hot topic. There is also a growing sensitivity towards where workloads are hosted, following introduction of regulations. Download Intel's latest eGuide, 'Meet Your Customers’ Biggest Cloud Concerns’ to discover: • How to boost uptime with hardware engineered for reliability • The ways telemetry can be used to call attention to potential problems before they occur • How to protect against the threat of cybercrime with a multi-layered approach to security • Why data geolocation is increasingly important, and how you can help with location tagging.
Tags : 
    
Intel
Published By: Intel     Published Date: Apr 16, 2019
When seeking a new cloud service provider (CSP), uptime and data sovereignty will be decisive considerations for many customers. At a time when cloud outages can bring down a huge number of web services and make the news, reliability is a hot topic. There is also a growing sensitivity towards where workloads are hosted, following introduction of regulations. Download Intel's latest eGuide, 'Meet Your Customers’ Biggest Cloud Concerns’ to discover: • How to boost uptime with hardware engineered for reliability • The ways telemetry can be used to call attention to potential problems before they occur • How to protect against the threat of cybercrime with a multi-layered approach to security • Why data geolocation is increasingly important, and how you can help with location tagging.
Tags : 
    
Intel
Published By: LogMeIn     Published Date: Mar 01, 2012
Uncover the top eight reasons why you should upgrade your remote support. Don't let customer service fall by the wayside, upgrade to a state-of-the-art solution now!
Tags : 
remote support, customer support, technical support, technology, it support, customer satisfaction
    
LogMeIn
Published By: Limelight     Published Date: Jul 31, 2012
In this report you will learn how today's WCM platforms are fusing the best marketing automation practices with content management, allowing marketers to leverage content in new and innovative ways. Discover 10 of the top capabilities you should be considering for your website.
Tags : 
limelight, networks, content marketing, content, marketing, best practices, marketing strategies, marketing solutions, business technology
    
Limelight
Published By: BillingPlatform     Published Date: Apr 18, 2019
Discover best path forward for monetizing your SaaS products. This whitepaper explores the pricing strategies and best practices for billing SaaS businesses. Some of the topics covered include: • Billing solution innovation facilitated by the SaaS economy. • Common SaaS pricing models and strategies. • Feature requirements for monetizing SaaS products. You’ll learn what to look for in a billing solution and understand what questions you need to ask before committing to an agile billing platform.
Tags : 
    
BillingPlatform
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search