CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

servers

Results 201 - 225 of 1086Sort Results By: Published Date | Title | Company Name
Published By: Lenovo - APAC     Published Date: Jan 23, 2019
For Japan’s largest medical equipment wholesaler, Mutoh, ensuring its 300,000 products reach hospitals, clinics and health-centres on time is an imperative. Someone’s life depends on it. Without IT that wouldn’t be possible. But Mutoh’s IT infrastructure was unable to keep pace with the demands of the business. Every time an order came in, Mutoh had to pull data from different systems across multiple servers which was time-consuming. It needed an IT infrastructure that was fast, high-performing, reliable, stable, and flexible. Mutoh turned to Lenovo’s hyperconverged infrastructure that helped the company achieve: • The ability to seamlessly extract data from different systems across multiple physical servers helped Mutoh respond to customer orders as quickly as possible, thereby saving lives • A modular hyperconverged solution allowed Mutoh to invest on a need basis, improving ROI and addressing spikes in customer demand
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
According to the 2018 Global DNS Performance Benchmark Report, the state of DNS resiliency among enterprises and top SaaS providers is poor, with 60% relying on a single source for their authoritative nameservers. In this article, we’ll explore the necessity of having a secondary DNS service.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Dell SB     Published Date: Jan 24, 2019
Dell EMC PowerEdge rack servers help you build a modern infrastructure that minimizes IT challenges and drives business success. Choose from a complete portfolio of 1-2-and-4 socket rack servers to deliver high core density for your traditional applications, virtualization and cloud-native workloads. Enhanced mem ory speeds, faster NVMe storage options 1 and BIOS tuning allows you to match performance to your workload for ultimate efficienc y.
Tags : 
    
Dell SB
Published By: Dell SB     Published Date: Jan 24, 2019
Build bold with solution ready servers built for today's most demanding OEM workloads. And tomorrow's.
Tags : 
    
Dell SB
Published By: Dell SB     Published Date: Jan 24, 2019
Analyst firm IDC reports that organizations can increase agility, improve efficiency and reduce operational costs by refreshing their servers every three years. Shorter refresh cycles can help your busin
Tags : 
    
Dell SB
Published By: Dell SB     Published Date: Jan 24, 2019
Whether we choose to or not , our businesses are undergoing a rapid digital transformation. To ride this technology wave successfully, we need a modern IT infrastructure. At the heart of this modern IT infrastructure is the server. Choosing the right server that fits both the current and future needs is critical. PowerEdge is introducing its new line of award winning servers that is custom - built for the modern IT infrastructure. Since b usiness face fierce competition and dynamic customer needs, the Scalable Business Architecture from PowerEdge enables an enterprise to scale efficiently and adapt quickly to address this dynamic business & workload needs. With Intelligent Automation in new PowerEdge , you can automate more routine tasks and free up skilled resources for business - critical tasks. Finally, w e all know how important security is for all operations. PowerEdge protects businesses and their customers with its sophisticated Integrated Security fea
Tags : 
    
Dell SB
Published By: Oracle     Published Date: Jul 05, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System (DNS) is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct website when entering a URL. DNS mappings are maintained in special-purpose servers called DNS nameservers. When a user enters your company’s URL, a DNS query is routed to a DNS nameserver containing the address mappings for your company’s internet domain.
Tags : 
advanced traffic steering, global internet visibility, open programming interfaces, risk management tools, secondary dns
    
Oracle
Published By: Oracle     Published Date: Nov 30, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System (DNS) is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct website when entering a URL. DNS mappings are maintained in special-purpose servers called DNS nameservers. When a user enters your company’s URL, a DNS query is routed to a DNS nameserver containing the address mappings for your company’s internet domain.
Tags : 
traffic, dns, internet, visibility, programming, interfaces, optimization, routing
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System (DNS) is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct website when entering a URL. DNS mappings are maintained in special-purpose servers called DNS nameservers. When a user enters your company’s URL, a DNS query is routed to a DNS nameserver containing the address mappings for your company’s internet domain.
Tags : 
traffic, dns, internet, visibility, programming, interfaces, optimization, routing
    
Oracle Dyn
Published By: Mimecast     Published Date: Nov 26, 2018
If you are among the IT professionals feeling a little uneasy about relying solely on the email security provided by Microsoft in Office 365™, you are not alone. Here’s the good news, you can regain the same sense of security that you had when you were managing email servers on-premises with the right third-party solution. TechTarget summarizes how you can easily and effectively realize the benefits of Office 365 with a complementary third-party solution that can not only mirror the kind of layered security built for on-premises solutions, but also ensure uninterrupted access to Office 365 email, even if it crashes.
Tags : 
    
Mimecast
Published By: HP Inc.     Published Date: Mar 04, 2016
IT complexity leads to wasted effort, time, or expense. Drive up productivity with HP ProLiant Gen9 servers for small and midsize businesses to simplify your infrastructure, resulting in better performance and scalability with easier management.
Tags : 
    
HP Inc.
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed. The cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply how business is done. The availability of mobile devices and cloud services has redefined how and where people work. Applications and servers are moving to the cloud faster than ever to take advantage of cost savings, scalability, and accessibility. The age of perimeter-only security is over. Find out more today about how Cisco can help.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Not long ago, even the most astute executives couldn’t fully anticipate how quickly emerging technologies would transform their business operations — and even their business models. Laptops, smartphones, and other mobile devices; high-bandwidth wireless networks; and cloud-based computing services have proven to be among the most impactful of these advances, collectively untethering workers from office environments and fundamentally altering work behaviors. employees today work anytime, anywhere while accessing applications and data that reside on company servers and in the cloud. Cisco Umbrella can help your business overcome these problems, download this whitepaper today to find out more.
Tags : 
    
Cisco Umbrella EMEA
Published By: Carbonite     Published Date: Jan 04, 2018
For a backup solution to be considered flexible, it needs to satisfy several key business requirements. It should integrate seamlessly with any servers you’re running and provide full support for all the applications your business uses. It should enable you to protect assets in different parts of the country or overseas. And it should let you manage and monitor backups from anywhere. A flexible backup solution gives you everything you need to protect the technology investments you make now and in the future. So instead of having to buy multiple solutions to support your changing needs, you can have a single solution that adapts to fit your environment. We call that flexible deployment.
Tags : 
    
Carbonite
Published By: IBM     Published Date: May 25, 2016
IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by migrating from open source Java EE application servers to WebSphere Application Server (WAS) Liberty. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of a WAS Liberty migration on their organizations.
Tags : 
ibm, application infrastructure, application servers, ibm was liberty, enterprise applications, middleware, cloud computing, business technology
    
IBM
Published By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: Vocia     Published Date: Aug 24, 2011
Day-to-day operations of public venues are increasingly complex. Examine common requirements and functions of a successful critical paging solution-whether for a hospital, shopping center or sports arena.
Tags : 
vocia, critical paging systems, paging solutions, public venues, communication system technologies, outputs, inputs, amplifiers
    
Vocia
Published By: CDW     Published Date: Nov 12, 2012
Server virtualization is no longer a luxury but an essential part of the modern data center. By combining the workloads of several underused servers, you can get more out of your hardware when IT budgets stay flat, even as demand goes up.
Tags : 
server virtualization, power and cooling, data center, tco, total cost of ownership, cloud computing, business technology
    
CDW
Published By: CDW     Published Date: Nov 12, 2012
A flexible and optimized infrastructure requires unshackling computing from physical servers.
Tags : 
agility, it infrastructure, server virtualization, data centers, business technology, data center
    
CDW
Published By: Okta     Published Date: Nov 09, 2016
You're moving towards Office 365 and you want true single sign-on for users. You also want to ensure authentication is directly tied back to the policies and user status in Active Directory. With Okta's lightweight agent, you can minimize your on-prem footprint as you move to the cloud. Zero servers and on-prem software to deploy, update and manage means lower TCO. Download this white paper to learn more!
Tags : 
    
Okta
Published By: Hewlett Packard Enterprise     Published Date: Sep 25, 2017
Solid state storage is increasingly deployed in all sizes of datacenters, from the small and medium business to the large enterprise. It comes in many forms including hybrid arrays, direct attached drives, PCIe flash and accelerators that fit somewhere in between servers and storage. With the price of flash continuing to drop, hybrid storage is becoming more compelling to the small and medium business for critical computing applications such as databases and day-to-day operational computing.
Tags : 
    
Hewlett Packard Enterprise
Published By: Carbonite     Published Date: Oct 10, 2018
IT admins tasked with restoring servers or lost data during a disruption are consumed with a single-minded purpose: successful recovery. But it shouldn’t take an adverse event to underscore the importance of recovery as part of an overall backup strategy. This is especially true with large datasets. Before you consider how you’re going to back up large datasets, first consider how you may need to recover the data.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
For a backup solution to be considered flexible, it needs to satisfy several key business requirements. It should integrate seamlessly with any servers you’re running and provide full support for all the applications your business uses. It should enable you to protect assets in different parts of the country or overseas. And it should let you manage and monitor backups from anywhere. A flexible backup solution gives you everything you need to protect the technology investments you make now and in the future. So instead of having to buy multiple solutions to support your changing needs, you can have a single solution that adapts to fit your environment. We call that flexible deployment.
Tags : 
    
Carbonite
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
For organizations with additional security requirements for high value servers hosting business-critical assets, CA Privileged Access Manager Server Control provides localized, fine-grained access control and protection over operating system-level access and application-level access. Agent-based, kernel-level protection is available for individual files, folders and specific commands based on policy and/or finedgrained controls on specific hosts.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search