CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

sast

Results 176 - 200 of 662Sort Results By: Published Date | Title | Company Name
Published By: VMware Dell     Published Date: Jun 05, 2008
WWF is the world’s largest independent conservation organization. As part of its IT department’s contribution to environmentally-friendly business practices, WWF-UK deployed VMware virtualization into its live production environment. They decreased server count, lessened cooling requirements, minimized the space needed to house their datacenter and significantly reduced their overall carbon footprint.
Tags : 
virtualization, vmware, virtual infrastructure, x86, server consolidation, server containment, business continuity, disaster recovery, energy savings, vmware infrastructure 3, vi3, vmware, infrastructure, green computing, power and cooling
    
VMware Dell
Published By: HP - Enterprise     Published Date: Jan 24, 2013
The trend toward consumerization in IT has strained the processes and governance put in place to ensure application security. It takes proven best practices to mitigate risk and embrace mobility without trepidation.
Tags : 
mobile, vulnerability, byod, dast, sast, testing, risk management, security management, anti spyware, anti virus, business continuity, compliance, email security, encryption, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, network security appliance
    
HP - Enterprise
Published By: LifeSize, a division of Logitech     Published Date: Nov 01, 2010
Analysts see other good reasons for companies to take a serious look at video conferencing technology: It can facilitate an increasingly mobile workforce, and it can help ensure business continuity in the face of natural catastrophes, man-made disasters or health scares.
Tags : 
lifesize, telework, remote communication, collaboration, mobile workforce, video conferencing, remote access
    
LifeSize, a division of Logitech
Published By: 8x8, Inc.     Published Date: Apr 23, 2013
Cloud communications technology not only offers more flexible ways to communicate and collaborate, but it’s your best bet for business continuity in the face of disaster.
Tags : 
8x8, cloud, cloud computing, cloud communications, cloud communications technology
    
8x8, Inc.
Published By: EMC Corporation     Published Date: May 27, 2014
If success for you means real-time data management, SAP HANA can keep your business on target. Watch this video to find out how SAP HANA allows your systems to instantly adapt to the ever-changing business environment you work in, and discover how EMC’s solutions give you efficient disaster-tolerance and backup while improving efficiency with our industry-leading partners.
Tags : 
emc, sap hana, vmware, virtualize sap, virtualize applications, it management, data center
    
EMC Corporation
Published By: Riverbed Technology, Inc.     Published Date: Apr 08, 2014
As organizations consolidate backup and disaster recovery operations, WAN optimization plays a key role in mitigating risk without sacrificing performance. Discover a new architectural approach that extends the virtual edge of the data center to the branch for complete server and data consolidation without a performance compromise.
Tags : 
wan, cloud based computing, idc, optimization, performance, data center, data consolidation, servers, disaster recovery, risk, security
    
Riverbed Technology, Inc.
Published By: Riverbed Technology, Inc.     Published Date: Apr 22, 2014
In today’s global economy, companies are increasingly distributed. That puts IT in a precarious position, especially when it comes to disaster recovery. It can take days to restore branch operations. Branch converged infrastructure delivers local performance, stores data safely in the datacenter, and enables instant recovery. Learn how to recover faster, reduce risk, and save money.
Tags : 
riverbed, branch office recovery, branch office, data loss, risk aversion, backup recovery, virtual servers, branch operations, technology challenges, it management, data management
    
Riverbed Technology, Inc.
Published By: HP - Intel®     Published Date: Oct 05, 2012
This whitepaper addresses customer pain points, and addresses Disaster Readiness, Operational Efficiency and solutions that can help improve Business Protection.
Tags : 
servers, server data, downtime, management software, networking and systems management, disaster recovery, disaster readiness, network performance management, business technology
    
HP - Intel®
Published By: Tripp Lite     Published Date: May 15, 2018
A Practical Guide to IDF/MDF Infrastructure Implementation Once relegated to early adopters and casual home users, VoIP (voice over Internet protocol) has matured. An essential element of any unified communications (UC) system, it is now the standard method of voice communication in business, education, government and healthcare. If your organization has not already migrated to VoIP, the question is not so much if it will, but when. Cost is the primary driver, since the data network performs double duty by carrying voice traffic as well. VoIP also offers capabilities that far exceed traditional phone systems, with unified communication platforms promising to integrate messaging, mobility, collaboration, relationship management, zoned security, intelligent call routing, disaster recovery, video, teleconferencing, status updates and other advanced features. The transition to VoIP presents a number of challenges, including assessing the ability of your network to handle not only additio
Tags : 
    
Tripp Lite
Published By: NetApp     Published Date: Oct 08, 2013
Learn how efficient NetApp IT empowers the Denver Broncos to invest in the future by providing asychronous disaster recovery and data protection.
Tags : 
data protection, security, netapp, disaster recover, technology, best practices, it management, data management, business technology
    
NetApp
Published By: Box     Published Date: Jun 11, 2014
Midsize learning technology company sought to move all files to the cloud for disaster-recovery reasons and to boost employee productivity. Added Box to their existing cloud stack for all employees. Streamlined IT operations; in the process of replacing servers with Box.Technology industry, midsize company, midmarket, global, server replacement, cloud stack, NA, APAC.
Tags : 
box, rosetta stone, midmarket, midsize companies, disaster recovery, server replacement, employee productivity, it management, knowledge management
    
Box
Published By: Acronis EMEA     Published Date: May 21, 2015
This Case Study reveals how companies are addressing today's Disaster Recovery challenges across physical, virtual and cloud environments.
Tags : 
data protection, cloud, cloud computing, disaster recovery, technologies, recovery, infrastructure, data security, cloud environments, security, application security, virtualization
    
Acronis EMEA
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
    
Ciena
    
Ciena
    
Ciena
Published By: MineralTree     Published Date: Jan 23, 2018
The team at Generation Tux is all about improving internal experiences to increase efficiency and improve operations. As a one-man finance team, they needed all the help he could get to automate and streamline financial processes. When he joined Generation Tux as the Controller, he found a disastrous Accounts Payable (AP) process in place. Found out how he turned it around.
Tags : 
business payments, accounts payable, payment automation, invoice automation, accounting applications
    
MineralTree
Published By: Veeam '18     Published Date: May 01, 2019
This 5-minute, easy-to-read document explains why organizations need to protect Office 365 data. This report will teach you: • The big misunderstanding between Microsoft's responsibility and the IT organizations • 6 reasons why backing up Office 365 is critical • Who is in control of Office 365 data
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: May 01, 2019
Il ransomware è al primo posto nei pensieri dei leader di molte organizzazioni poiché queste ultime devono affrontare le conseguenze potenzialmente disastrose degli attacchi riusciti. ESG ha intervistato i leader e le organizzazioni IT per scoprire la reale portata del problema ransomware, quali sono le conseguenze economiche delle interruzioni causate da questi attacchi e quali sono le best practice e le capacità che le organizzazioni devono applicare per essere protette. Secondo la ricerca ESG, quasi i due terzi delle organizzazioni intervistate in tutto il Nord America e l'Europa occidentale hanno subito un attacco ransomware a un certo punto dell'anno scorso, e il 22% ha riportato attacchi settimanali. Gli attacchi hanno contribuito a rendere la sicurezza informatica un obiettivo dell'investimento IT e la spesa in questo senso sta accelerando. Ciò che è necessario per respingere questa epidemia sono le best practice e gli strumenti per: • Prevenire o almeno mitigare gli attacchi •
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: May 03, 2019
Ransomware est une priorité pour de nombreux dirigeants d’entreprise, qui doivent faire face aux conséquences désastreuses d’une attaque réussie. Les conséquences commerciales des interruptions de service causées par des attaques de ransomware peuvent être dévastatrices et font apparaître le besoin de meilleures pratiques et de fonctionnalités dans tout le système informatique, notamment pour la protection des données. La solution Hyper Availability Platform de Veeam répond à ces préoccupations en combinant technologies et solutions permettant de limiter les risques liés aux ransomwares et d’améliorer la récupération en toute sécurité.
Tags : 
    
Veeam '18
Published By: DataCore     Published Date: Jun 06, 2019
More than 54% of companies have experienced a downtime event that lasted more than 8 hours – one full work day – in the past 5 years. And the risk of major disruptions to business continuity practices looms ever larger – primarily due to the troubling dependencies on the location, topology and suppliers of data storage. Download this infographic and see how you can preserve proven Business Continuity practices despite inevitable changes to your data storage infrastructure.
Tags : 
business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability, replication, storage infrastructure
    
DataCore
Published By: DataCore     Published Date: Jun 06, 2019
With so many moving pieces involved in business continuity and disaster recovery planning, anticipating the downstream impact of new SAN arrays, hyperconverged systems, and disaster recovery site relocation is increasingly more difficult. Learn how DataCore™ SDS services help you adapt your safeguards accordingly in the face of these common initiatives and business challenges: - Storage Array Replacement - Mergers and Acquisitions - Cloud Replication - Hyperconverged Infrastructure - Multi-Site Metro Cluster
Tags : 
business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability, replication, storage infrastructure, cloud, hyperconverged
    
DataCore
Published By: DataCore     Published Date: Jun 06, 2019
Nothing in Business Continuity circles ranks higher in importance than risk reduction. Yet the risk of major disruptions to business continuity practices looms ever larger today, mostly due to the troubling dependencies on the location, topology and suppliers of data storage. Get insights on how to avoid spending time and money reinventing BC/DR plans every time your storage infrastructure changes.
Tags : 
business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability, replication, storage infrastructure
    
DataCore
Published By: Riverbed     Published Date: Mar 23, 2015
In today’s global economy, companies are increasingly distributed. That puts IT in a precarious position, especially when it comes to disaster recovery. It can take days to restore branch operations. Branch converged infrastructure delivers local performance, stores data safely in the datacenter, and enables instant recovery.
Tags : 
    
Riverbed
Published By: F5 Networks Inc     Published Date: Jan 31, 2017
Organizations considering moving enterprise applications to the public cloud should ensure that they also move the application delivery services their applications rely on in the data center. In addition, cloud migration presents an opportunity to organize and rationalize security and access, gain visibility into cloud-based application traffic, and architect a strong disaster recovery plan. Download to read the 5 rules to follow when lifting and shifting apps to the the cloud.
Tags : 
apps, cloud, enterprise applications, public cloud, networking
    
F5 Networks Inc
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search