CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

servers

Results 201 - 225 of 1085Sort Results By: Published Date | Title | Company Name
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 22, 2018
Citrix and Google are collaborating to bring the best, most secure way to deliver virtual apps and desktops from Google Cloud. The Citrix Workspace solutions traditionally installed on data center servers—including Citrix Virtual Apps and Desktops, Citrix Networking, and Citrix Content Collaboration (formerly known as Citrix ShareFile)—are now enabled on Google Cloud Platform services. Citrix enables customers to choose the workload deployment option that best aligns with their enterprise cloud strategy and offers a variety of ways to securely deploy Citrix solutions to meet unique application needs. Whether deployed on-premises, cloud-hosted, as a Citrix Workspace service, or with a service provider—customers choose how much and which components of app workloads to manage and when and where to securely deploy business apps, data, and desktops.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Citrix     Published Date: May 27, 2009
Whether you're considering your first virtual desktop solution or trying to salvage an existing implementation, Citrix XenDesktop is the clear choice on the market that offers the performance, scalability and manageability required to meet your business needs.
Tags : 
citrix, virtualization, hdx, xendesktop, sla, service level agreement, scalable, streamline
    
Citrix
Published By: Stratus Technologies     Published Date: Jul 25, 2008
Faced with a growing number of business-critical applications and services to support, SMBs and enterprises with remote environments are experiencing a real need for high availability.  This paper discusses an easy-to-use, affordable high-availability and virtualization solution using standard x86 servers.
Tags : 
high availability, virtualization, ha software, stratus avance software, fault-tolerant hardware, ftserver systems, stratus
    
Stratus Technologies
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security, networking, it management
    
CDW-Trend Micro
Published By: rPath     Published Date: Jan 10, 2012
Check out this pocket guide to learn the seven deadly sins of cloud applications...and best practices for avoiding them.
Tags : 
cloud application deployment, rpath, rpath inc, cloud, clouds, cloud servers, cloud application, cloud deployment
    
rPath
Published By: HP     Published Date: Sep 04, 2014
Data Intensity is an enterprise cloud services provider focusing on Oracle applications. Founded in 2001, it currently has 240 employees and operates two data centers with about 1,200 virtual servers. They needed a flexible storage platform to handle growth of individual customer applications, such as Oracle ERP, with minimal downtime with low operating costs. Testing included storage systems from five different vendors to find a solution that was easy to administer and provides thin provisioning, snapshots, and rapid provisioning.
Tags : 
3par, storage, data, cloud, oracle, data intensity, virtual, solution
    
HP
Published By: IBM     Published Date: Nov 08, 2011
This paper looks at cloud architecture in which the servers and networks in the data center can rapidly respond to changing demands.
Tags : 
ibm, system networking, network architecture, cloud, datacentre, datacenter, ibm system networking, network architecture
    
IBM
Published By: Cloud Passage     Published Date: Nov 15, 2012
The tremendous scalability, flexibility, and speed of Infrastructure-as-a-Service (Iaas) make it one of the fastest-growing sectors of the cloud computing markets. Read on to learn more of the new risk considerations and major challenges of cloud.
Tags : 
cloudpassage, cloud infrastructure, cloud server, cloud elasticity, risk considerations, security, it management, data management
    
Cloud Passage
Published By: Bluelock     Published Date: Nov 15, 2012
Enterprise IT departments are always open to business. But, the marketplace now demands better and faster service while reducing costs at the same time. Read on to learn how offloading IT burdens to hybrid and public clouds reduces costs and more.
Tags : 
bluelock, cloud computing, cloud servers, cloud, it infrastructure, it burdens, hybrid, it service model
    
Bluelock
Published By: Oracle     Published Date: Aug 31, 2016
What happened to Moore’s Law? Why is Oracle releasing a new SPARC processor with fewer cores and threads? The SPARC S7’s core processors are 50 percent to 100 percent more efficient than x86 processors. SPARC S7 delivers up to 10 times more-efficient data analytics and machine learning than x86-based systems. The new SPARC S7 is available in servers, an engineered system, and a cloud service at the same price as the Oracle Cloud x86 Compute service. The SPARC S7 processor makes it possible to build powerful, scalable, and cost-effective systems be it for application scale-out, on premise or public cloud.
Tags : 
    
Oracle
Published By: Verio     Published Date: Aug 06, 2014
Neovise, a cloud computing industry research and analyst firm, prepared this Perspective Report. • Cloud(n), an IaaS public cloud solution developed by NTT and hosted by Verio, delivers unique value, flexibility, reliability, backed by 24/7 customer support. • Using NTT’s vast global network, Verio can offer 99.99% reliability as well as free bandwidth and fixed pricing caps, so customers never pay more than expected. • Citrix CloudPlatform provides developers with a secure, reliable, hypervisor agnostic foundation supporting almost any workload, scaling in and out, as needed. • The intuitive management portal enables custom configured cloud servers to be spun up in minutes, using pre-set or uploaded templates. Load balancing, auto scaling, and monitoring are included. With an extensible API, the portal integrates with over 200 3rd party solutions, including AWS. • ISVs, SaaS and developers should seriously consider the many advantages of Cloud(n).
Tags : 
ntt, cloudn, cloud(n), public cloud, iaas, citrix, cloudplatform, aws
    
Verio
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Find out how it works and why it's actually possible now to move the battle for web security off your web servers.
Tags : 
cloud-based web security, cybercriminals, watchguard reputation enabled defense, web-based attacks, threat management, malware, url filtering, access control
    
WatchGuard Technologies
Published By: Symantec     Published Date: Dec 04, 2014
Certificates are for more than just Web servers - and code-signing certificates in particular can make your enterprise more secure, make your software more accepted, and even stop malware in its tracks.
Tags : 
web servers, code-signing, malware, software, code-signing certificates, best practice, security
    
Symantec
Published By: Symantec     Published Date: Dec 28, 2015
Certificates are for more than just Web servers - and code-signing certificates in particular can make your enterprise more secure, make your software more accepted, and even stop malware in its tracks. Learn about the many ways in which code-signing certificates are being used to create more secure, more trustworthy, and more accepted software in a variety of different scenarios.
Tags : 
code signing certificates, enterprise security, web servers, security
    
Symantec
Published By: Cohesity     Published Date: May 04, 2018
Cohesity provides the only hyper-converged platform that eliminates the complexity of traditional data protection solutions by unifying your end-to-end data protection infrastructure – including target storage, backup, replication, disaster recovery, and cloud tiering. Cohesity DataPlatform provides scale-out, globally deduped, highly available storage to consolidate all your secondary data, including backups, files, and test / dev copies. Cohesity also provides Cohesity DataProtect, a complete backup and recovery solution fully converged with Cohesity DataPlatform. It simplifies backup infrastructure and eliminates the need to run separate backup software, proxies, media servers, and replication. This paper specifically focuses on the business and technical benefits of Cohesity DataPlatform for the data protection use case. It is intended for IT professionals interested in learning more about Cohesity’s technology differentiation and advantages it offers for data protection - (i) Elim
Tags : 
    
Cohesity
Published By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: Carbonite     Published Date: Jul 18, 2018
© 2018 Carbonite, Inc. All rights reserved. Case study Diamond Foods’ Diamond of California® nuts are household staples for shoppers across the U.S. But constantly filling grocery store shelves with snacks requires intricate supply chain management that relies on critical business data, including complex spreadsheets and enterprise resource planning files, to keep production and deliveries on schedule. “If our critical servers go down or we lose important data on employee laptops, it has a direct impact on our bottom line,” says Kentrell Davis, Senior Client Support Services Analyst at Diamond Foods.
Tags : 
    
Carbonite
Published By: IBM APAC     Published Date: Apr 26, 2017
Find out how you can take advantage of hybrid cloud by extending or migrating workloads using secure and seamless networking capabilities offered by VMware. All of this is available on secure, single-tenant IBM Bluemix bare metal servers on IBM Cloud, giving you the utmost control.
Tags : 
virtualisation, cloud, vmware, ibm, ibm cloud, hybrid cloud, secure environment
    
IBM APAC
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Budgets are tight in today's business environment. You may be asked to do more with less. Take a look through your equipment room. You may have several devices that work just fine, but they are not visible via your network management system (NMS).
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: eFax     Published Date: May 15, 2007
Fax servers promise easier administration and cheaper faxing but most deployments fail to meet their goals because of unexpected, ongoing costs and unpredictable capacity needs. This paper offers information on why outsourced fax services eliminate the time, effort and cost issues associated with fax servers, but retain all of the same functionality.
Tags : 
fax, faxing, ip faxing, fax server, fax servers, ip networking, ip networks, converged communications
    
eFax
Published By: Dell     Published Date: May 13, 2016
Businesses using outdated servers for email, database, and file and print workloads stand to benefit greatly by replacing them. The Dell PowerEdge VRTX with two Dell PwerEdge M630 blase servers, both powered by the Intel Xeon processor E5-2650 v3, can provide the performance, scalability, and high availability your business needs to keep running and meet increased demand.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: May 12, 2016
Businesses using outdated servers for email, database, and file and print workloads stand to benefit greatly by replacing them. The Dell PowerEdge VRTX with two Dell PwerEdge M630 blase servers, both powered by the Intel® Xeon® processor E5-2650 v3, can provide the performance, scalability, and high availability your business needs to keep running and meet increased demand.
Tags : 
    
Dell EMC
Published By: Alacritech     Published Date: Aug 21, 2009
Today's systems and servers need an efficient way to move the ever-increasing amounts of data over networks. Many companies have introduced solutions such as TCP/IP Offload Engines (TOE) Network Interface Cards (TNICs), Network Interface Cards (NICs), and iSCSI Host Bus Adapters (HBAs) to solve efficiency and throughout challenges. However, the functionality of these solutions is quite varied, and in some cases, rapidly becoming obsolete.
Tags : 
data transfer, tcp/ip, tnic, nic, hba, iscsi, alacritech, networking
    
Alacritech
Published By: Sponsored by HP and Intel®     Published Date: Nov 02, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability.
Tags : 
virtualization, data management, it infrastructure, cloud computing, business technology, infrastructure, infrastructure management
    
Sponsored by HP and Intel®
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search