CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

reserve

Results 1 - 25 of 84Sort Results By: Published Date | Title | Company Name
Published By: Iovation     Published Date: Aug 02, 2019
The digitalization of business processes and the advent of mobile computing have given rise to the next generation of fraud. Cybercriminals have a variety of tools and techniques—as well as opportunities—to steal money and services. Furthermore, traditional fraud prevention tools often fail to stop this fraudulent activity. Companies need a new approach to fraud prevention—one that stops fraud early and preserves the user experience. Companies with an online presence must have the ability to: Detect and respond to fraudulent activity before incurring losses Leverage human insight and machine learning to identify advanced fraud Work with other fraud analysts to identify larger fraud trends and stop cybercriminals on a global scale Block more fraud while reducing fraud prevention costs This book explores how companies can leverage a next-generation fraud prevention solution to stop more fraud while reducing costs and providing a positive user experience for trusted customers.
Tags : 
    
Iovation
Published By: Salesforce     Published Date: Oct 17, 2019
Many investors were concerned over the inverted US yield curve and recessionary fears. The inversion was due to the Federal Reserve’s (Fed) excessive tightening steps in 2018 amid rising US-China trade tensions. Citi analysts believe the turn to easing by the Fed and numerous other central banks, as well as a likely more cautious approach to trade negotiations, could help to cushion risk assets. Citigold is Citi’s premium wealth management solution that is designed to meet the global banking and investment needs of affluent individuals with investable assets of USD 200,000 (or in equivalent currencies) and above. To find out more, download this whitepaper today.
Tags : 
    
Salesforce
Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation, security, finra, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services, compliance, colocation and web hosting
    
123Together
Published By: Extensis     Published Date: Mar 07, 2008
The Photography Department at The National Gallery of London wanted to give other Gallery departments better visibility into its archived library of images and reduce the administrative workload for its photographers. Read how Portfolio Server and Portfolio SQL-Connect painted the perfect solution to this challenge.
Tags : 
extensis, portfolio server, sql, asa, dam, digital asset management
    
Extensis
Published By: Data Center Frontier LLC     Published Date: Nov 11, 2019
Data center cable management is often considered a problem reserved for network engineering teams, but bad cable design can wreak havoc across your entire enterprise. “Spaghetti” cabinets and other symptoms of ill-considered cabling make it more difficult to complete equipment installations, troubleshooting, and maintenance. They can create an unsafe operating environment for your equipment by restricting airflow to racks, trapping dust, keeping cables warm, and making it impossible to understand at a glance how your devices are connected. Bad cable management practices can even hinder modern data center environments from adapting to new technologies like IoT and big data, provisioning IT resources on demand to support business innovation, and utilizing data center capacity to promote scalability, efficiency, and cost effectiveness.
Tags : 
    
Data Center Frontier LLC
Published By: Carbonite     Published Date: Jul 18, 2018
© 2018 Carbonite, Inc. All rights reserved. Case study Diamond Foods’ Diamond of California® nuts are household staples for shoppers across the U.S. But constantly filling grocery store shelves with snacks requires intricate supply chain management that relies on critical business data, including complex spreadsheets and enterprise resource planning files, to keep production and deliveries on schedule. “If our critical servers go down or we lose important data on employee laptops, it has a direct impact on our bottom line,” says Kentrell Davis, Senior Client Support Services Analyst at Diamond Foods.
Tags : 
    
Carbonite
Published By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
    
Dome9
Published By: Salesforce     Published Date: Oct 14, 2019
Many investors were concerned over the inverted US yield curve and recessionary fears. The inversion was due to the Federal Reserve’s (Fed) excessive tightening steps in 2018 amid rising US-China trade tensions. Citi analysts believe the turn to easing by the Fed and numerous other central banks, as well as a likely more cautious approach to trade negotiations, could help to cushion risk assets. Citigold is Citi’s premium wealth management solution that is designed to meet the global banking and investment needs of affluent individuals with investable assets of USD 200,000 (or in equivalent currencies) and above. To find out more, download this whitepaper today.
Tags : 
recession, finance, investing
    
Salesforce
Published By: Entrust Datacard     Published Date: May 10, 2017
The rapid rise of digital business is moving public key infrastructure (PKI) into the spotlight. Once commonly viewed as a deep-weeds technology reserved for niche applications, PKI is now emerging as a core technology for securing cloud, mobile and Internet of Things (IoT) initiatives.
Tags : 
digital, cloud, cloud computing, internet of things, intrastructure, virtualization, infrastructure
    
Entrust Datacard
Published By: Dell EMEA     Published Date: Aug 20, 2019
When it comes to longevity, nobody can hold a candle to Dell. Not only do our machines have the capability, manageability and security features that are trusted by IT, but they are designed for long lifecycles, thereby reducing waste and recycling costs. Small wonder they’ve been around for so long. That’s the past, but what about the futuristic features? Latitude 7400 2-in-1 uses Dell’s new ExpressSign-in to detect users’ presence, wake the system in about one second, and scan for facial recognition to log them in with Windows Hello. Users can just sit down at their desk and start working – without control-alt-delete or even reaching for the power button. In fact, it is the world’s first PC to use a proximity sensor enabled by Intel® Context Sensing Technology. When users step away for a break, Latitude will recognize they’ve left and lock itself to preserve battery life and maintain security.
Tags : 
    
Dell EMEA
Published By: Dell EMEA     Published Date: Aug 28, 2019
When it comes to longevity, nobody can hold a candle to Dell. Not only do our machines have the capability, manageability and security features that are trusted by IT, but they are designed for long lifecycles, thereby reducing waste and recycling costs. Small wonder they’ve been around for so long. That’s the past, but what about the futuristic features? Latitude 7400 2-in-1 uses Dell’s new ExpressSign-in to detect users’ presence, wake the system in about one second, and scan for facial recognition to log them in with Windows Hello. Users can just sit down at their desk and start working – without control-alt-delete or even reaching for the power button. In fact, it is the world’s first PC to use a proximity sensor enabled by Intel® Context Sensing Technology. When users step away for a break, Latitude will recognize they’ve left and lock itself to preserve battery life and maintain security. Download this whitepaper to learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMEA
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL – such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps – are commonplace. Even email applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps. It’s clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need the ability to preserve complete network and web histories from encrypted network and web traffic for compliance, regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
Tags : 
blue coat, ssl, ssl visibility, server hardware, servers, small business networks, service management
    
Blue Coat Systems
Published By: Venafi     Published Date: Mar 26, 2015
The SANS 20 Critical Security Controls for Effective Cyber Defense offers a blueprint of prioritized guidance to reduce risk. New updates to the SANS 20 signify the growing need to secure digital certificates and cryptographic keys to preserve trusted communications for all of your critical systems and your organization’s interactions with customers and partners. Too often cyberattacks on keys and certificates are successful because basic security controls are not present or not properly configured. Download the Solution Brief to learn how you can effectively build scalable controls and reduce risk: • Manage the rapid growth in certificates • Gain visibility into where keys and certificates are located • Secure your certificates against cyberattacks • Enforce automation of certificate issuance and renewal
Tags : 
sans 20, security controls, cyber defense, cyber attacks, secure digital certificates, cryptographic keys, automation
    
Venafi
Published By: Socialbakers     Published Date: Mar 27, 2015
Social has the power to help your clients achieve larger marketing and business goals. But only 5% of brands use social to it’s fullest potential - do your clients and prospects? In this study we discuss social trends agency reps just have to know to stay ahead and ways you can leverage social to pitch prospects and preserve accounts.
Tags : 
the key agency success, social trends, social, social media, agencies, importance and content, social media marketing trends, social data, social analytics, videos, advertising agencies
    
Socialbakers
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
Amazon EC2 Reserved Instances can appear complicated, but finding a solution that best suits your company doesn't mean becoming an expert yourself; you just need to know how to approach Reserved Instances and where they can make the biggest impact. This free guide delivers a collection of proven best practices to help you successfully manage Amazon EC2 Reserved Instances. The benefits include: A breakdown of reservation types and offerings, including Convertible Reserved Instances How to calculate the payback period How to modify and exchange existing reservations to match cloud usage over time How to maximise savings with automated RI management and optimisation
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
Microsoft Azure Reserved Virtual Machine (VM) Instances are an effective way to reduce your Azure spend. While the concept of reservations may be new to you, just remember that they enable you to make an all upfront payment towards your compute costs, thereby providing prioritised capacity. Read this eBook to learn: The benefits of Reserved VM Instances How to calculate the break-even point The options for modifying, exchanging, or cancelling your reservations
Tags : 
    
CloudHealth by VMware
Published By: Schneider Electric     Published Date: Oct 28, 2019
Einige potenzielle Nutzer von Colocation-Datacenter empfinden die bewährte Verfahren zur Stromversorgung und Kühlung als einschränkend. Allerdings können effektive Nutzungsbedingungen Ausfallzeiten aufgrund von thermischer Abschaltung und menschlichem Versagen verkürzen, Kapazitätseinschränkungen aufgrund von unnötigem Energieverbrauch verringern und die Lebensdauer der anfänglichen Mietfläche verlängern und somit Kosten für zu groß dimensionierte Reserveflächen vermeiden. Dieses Dokument erläutert einige Ursachen für unnötigen Energieverbrauch, Kühlung und Flächennutzung in Datacentern für Colocation-Services und erläutert, wie Stromverteilung, Luftabsaugung und andere Verfahren die Verfügbarkeit und Effizienz in kompakten Racks steigern können. Es werden Beispiele für Nutzungsbedingungen gegeben, die zur Lösung dieser Probleme beitragen.
Tags : 
colocation-datacenter, schneider electric, cloud und service-anbieter
    
Schneider Electric
Published By: BMC Software     Published Date: Jul 22, 2015
In this analyst commentary, find out how BMC TrueSight Capacity Optimization helps you: -Manage current and anticipated usage in a single holistic view -Time the delivery of services for optimal cost efficiency -Reserve capacity for planned initiatives to speed time-to-value
Tags : 
capacity management, hybrid environment, bmc truesight capacity optimization, usage
    
BMC Software
Published By: Dassault Systèmes     Published Date: Nov 11, 2019
What challenges do companies have to face today? How can they successfully digitize their production? Not only connectivity, artificial intelligence and flexible automation play an important role. When it comes to the strategy and implementation of digital manufacturing, the same missteps are often made. In order to capture and preserve the value of digital technologies, there are six essential factors to consider. Learn more and download the McKinsey report "6 factors for a successful digital manufacturing transformation”.
Tags : 
    
Dassault Systèmes
Published By: WorkBook from Deltek     Published Date: Jul 20, 2018
It is natural for an agency to want to focus on creativity and spend less time thinking about project management. Agencies that build a referable system to draw on when scoping, planning and estimating enjoy efficiencies that eliminate repeated work and unnecessary processes - ultimately preserving creative time and energy.
Tags : 
    
WorkBook from Deltek
Published By: Gigamon     Published Date: Jun 21, 2019
Organisations have invested heavily in cybersecurity tools and yet more than five million data records are lost or stolen every day. The problem is not that today’s cybersecurity tools are badly designed or missing features, the problem is that surging volumes of network traffic overwhelm security tools, causing administrators to use sampling or disable advanced features in order to preserve application performance. Also, security tools and IT staff don’t get all the data they need to detect and respond to outside attacks and insider incidents, because they are faced with “blind spots” in data collection. Read this business brief in local language to find out how
Tags : 
    
Gigamon
Published By: Fujitsu     Published Date: Feb 26, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in today’s digital world, everything they do may be recorded and posted online. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
public, safety, mobile, solutions, police, fujitsu
    
Fujitsu
Published By: Hitachi Vantara     Published Date: Mar 21, 2018
Digital transformation is top of mind for CIOs and business leaders for clear and practical reasons. It offers an opportunity to create new revenue streams and meet changing customer demands, as well as a way to address the rise of digital insurgents trying to hijack core markets. What’s needed is a common resource that both IT and business managers intrinsically value, one that can guide decisions about new business initiatives and related technology investments. That rallying point is enterprise data. Because incumbents possess richer reserves of business information, they wield a competitive advantage that even the most disruptive insurgents can’t claim. The key is for established companies to unlock the full potential of this important resource to fuel business transformation and help to maintain their leadership positions in volatile and quickly evolving markets.
Tags : 
    
Hitachi Vantara
Published By: IBM     Published Date: Jul 26, 2017
While there has been improvement in the amount of time an attacker spends in a network before detection — decreasing from years to days in many cases — the ongoing delay illustrates just how elusive attackers still are compared to an organization's ability to detect a problem. IDC believes that actionable threat intelligence is going to be a significant factor in improving this metric. Threat intelligence has historically been seen as a complex set of activities reserved for security operations centers (SOCs) and advanced security analysts. The tools to collect and apply threat intelligence have generally not existed commercially and the ability to integrate threat intelligence into the traditional security workflow has not been available. Over the last few years, threat intelligence has been growing in importance within the security workflow.
Tags : 
data security, threat intelligence, security operations, advanced security analysts
    
IBM
Published By: Drillinginfo     Published Date: Nov 26, 2015
In this PDF you’ll learn how Drillinginfo (DI) provides accurate, current rig data in the Permian Basin. From permitting and leasing information to rig locations and pricing trends, you’ll find products and solutions to help transform how OFS companies drive leads. Tracking prospects can be a lucrative opportunity, but rigs move on a daily basis, so you need the latest information. See how DI can drive a company’s success by gathering up-to-the-minute rig intelligence from a single, comprehensive software solution. The Permian Basin Play is seeing a surge of O&E activity, with reports indicating that almost 30% of future oil reserve growth in the U.S. will come from the formation. Does your oilfield service team have an innovative approach to your data source detailed enough to support competitive decision-making? See how to get the most accurate, timely drill-site and well event information to make better, faster decisions and drive the best leads — that can turn into opportunities.
Tags : 
ofs companies, leads, data, analytical tools, oilfield, leasing information, mobile app, rig intelligence
    
Drillinginfo
Start   Previous   1 2 3 4    Next    End
Search