CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

service providers

Results 401 - 425 of 438Sort Results By: Published Date | Title | Company Name
Published By: Tail-f Systems     Published Date: Sep 16, 2008
The NETCONF protocol is a modern building block for device management automation, offering a unified approach to network configuration, rather than a device-specific methodology. To equipment vendors, NETCONF is a way to standardize the management interface of network elements. To service providers, NETCONF is a way to optimize the administrative workflow, by moving management intelligence out of the device under management, and consolidating this management into higher-level applications.
Tags : 
netconf, netconf standard, device management automation, network standard, ietf standard, tail-f, tailf, networking, network management
    
Tail-f Systems
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial services providers—from the solo accounting professional to the midsize accounting firm to world’s largest corporation, from CPAs to CFPs to credit counselors—have never been as challenging as they are in today’s turbulent times. And although the large data breaches at the most recognizable companies receive the most publicity, small companies and solo offices can also be victims, according to the Better Business Bureau.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: CEEOA     Published Date: Dec 03, 2010
CEEOA released its annual report on the state of IT outsourcing service providers market in the CEE region 'Central and Eastern Europe IT Outsourcing Review 2010'.
Tags : 
it outsourcing, software development, research, cee region, software outsourcing
    
CEEOA
Published By: Sixth Sense Media     Published Date: Apr 14, 2011
This paper will review growth drivers, and outline steps service providers can take to enter a new age of lifecycle marketing and promotions to increase ARPU and address churn.
Tags : 
mobile subscriber marketing, telecommunications marketing, mobile services marketing, reduce subscriber churn, telecom services, subscriber marketing
    
Sixth Sense Media
Published By: GMS Inc     Published Date: May 18, 2011
Insights into the service and support offerings of GMS and business software providers alike
Tags : 
accounting, causes, charity, community, consultants, donation, donations, donorexpress, donorperfect, donorworks, education, environment, finance, fundraising, funds, grants, inspiration, loans, non-profit, nonprofits
    
GMS Inc
Published By: Blue Jeans Network     Published Date: Oct 17, 2013
In this white paper, you will learn how third-party service providers can help Lync to become the ubiquitous solution empowering information workers, speeding decision making, and enabling the next generation of B2B and B2C communications.
Tags : 
visual collaboration, video conferencing, collaboration, unified communications, it management, enterprise applications
    
Blue Jeans Network
Published By: Blue Jeans Network     Published Date: Oct 17, 2013
In this white paper, you will learn how third-party service providers can help Lync to become the ubiquitous solution empowering information workers, speeding decision making, and enabling the next generation of B2B and B2C communications.
Tags : 
visual collaboration, video conferencing, collaboration, unified communications
    
Blue Jeans Network
Published By: CDW     Published Date: Sep 10, 2014
Leading organizations don’t think of data protection in traditional back-office terms—and that’s no accident. They think and act like service providers, and in doing so transform data protection operations from mere cost centers to business enablers. Traditional data protection architectures can’t meet today’s challenges of massive growth, application performance, and data availability. And they aren't designed for services-oriented business models.
Tags : 
protection, storage, architecture, massive growth, integrated, data
    
CDW
Published By: SilverSky     Published Date: May 22, 2014
Are you looking for a Microsoft Hosted Exchange Provider? Want to see how the providers in this space stack up? The Radicati Group provides vendor analysis and reveals the Trail Blazers, Specialists, Mature Players and Top Players in this report.
Tags : 
silversky, ibm, microsoft hosted exchange, microsoft hosted exchange providers, email service providers, cloud, cloud business email providers, cloud business email, cloud computing, business technology
    
SilverSky
Published By: HireRight     Published Date: May 01, 2013
A person’s home is their castle, and no one would willingly welcome in a dangerous criminal. If you offer in-home services, your customers trust you to send someone that is not a threat to their family or personal property. If you fail to do so, there can be serious business , financial and even legal consequences. This industry brief outlines the risks that arise from bad hires and how careful background screening can help mitigate those risks.
Tags : 
field employees, screening, hireright, human resources, in home services screening, human resource technology
    
HireRight
Published By: IBM     Published Date: Nov 05, 2013
In today’s mobile, connected era, customers expect perfection from their service providers. With competitors only a click (or tap) away, companies have a strong incentive to deliver flawless operations. Online retailers have “set a high bar” in the way that they engage customers throughout the entire sales process—not just during the commercial transaction, but before, during and after the transaction. Can your insurance company meet the challenge?
Tags : 
smarter process approach, agility, business process management, bpm, insurance, case management, operational decision management, analytics, process automation
    
IBM
Published By: IBM     Published Date: Nov 05, 2013
We live in an era in which customers expect perfection from their service providers. With competitors only a click (or tap) away, companies have a strong incentive to deliver flawless operations. Online retailers have “set a high bar” in the way they engage customers throughout the entire sales process—not just during the commercial transaction, but before, during and after the transaction. Your operations must be seamless, because individuals enjoy an interconnected and ubiquitous experience. And your operations must be insightful, because every personal and professional interaction is targeted and relevant. A Smarter Process approach helps you to reinvent business operations in the era of the customer.
Tags : 
business operations, business process management, bpm, process automation, healthcare, smarter process, life sciences, health plan, payer claims management, compliance management
    
IBM
Published By: GENBAND     Published Date: Apr 01, 2014
See how GENBAND offers CIOs of large multi-site enterprises effective ways to reduce telecom spend by leveraging their IP data networks for inter-site, intra-enterprise multimedia communication and consolidation of connectivity to service providers.
Tags : 
genband, enterprise, telecom, ip data networks, service provider networks, remote access, remote network management
    
GENBAND
Published By: Marketo     Published Date: Jun 08, 2017
Read this complimentary copy of the SiriusView: Marketing Automation Platforms 2017 and learn more about Marketo’s key differentiators including its native multi-channel experience, live event management, and content recommendation functionalities. Marketo's powerful marketing automation capabilities and seamless CRM integrations are complemented by our LaunchPoint ecosystem featuring over 500 technology and service providers that offer best-of-breed solutions for today’s marketers.
Tags : 
    
Marketo
Published By: Cisco     Published Date: Apr 07, 2014
Cisco present and build upon their extensive research into Wi-Fi usage and help answer common service provider questions on how money can be made from the explosion of Wi-Fi usage.
Tags : 
wi-fi, service providers, cisco
    
Cisco
Published By: Cisco     Published Date: Apr 07, 2014
Cisco present and build upon their extensive research into Wi-Fi usage and help answer common service provider questions on how money can be made from the explosion of Wi-Fi usage.
Tags : 
wi-fi, service providers, cisco
    
Cisco
Published By: Cisco     Published Date: Apr 07, 2014
Cisco present and build upon their extensive research into Wi-Fi usage and help answer common service provider questions on how money can be made from the explosion of Wi-Fi usage.
Tags : 
wi-fi, service providers, cisco
    
Cisco
Published By: Cisco     Published Date: Apr 07, 2014
Cisco presents its research findings on mobile data traffic, wireless trends and how the service providers can capture the Wi-Fi opportunity.
Tags : 
wi-fi, wireless, cisco, service providers
    
Cisco
Published By: Cisco     Published Date: Apr 07, 2014
Cisco presents its research findings on mobile data traffic, wireless trends and how the service providers can capture the Wi-Fi opportunity.
Tags : 
wi-fi, wireless, cisco, service providers
    
Cisco
Published By: Epicor     Published Date: Apr 04, 2017
Software-as-a-service (SaaS) enterprise resource planning (ERP) is accelerating as a mainstream delivery model to help companies gain flexibility and leverage modern cloud technologies. The market landscape is evolving as pure-play SaaS ERP providers battle traditional ERP vendors that are repositioning their offerings for the cloud. Businesses should assess the viability of their current ERP deployments and consider the rapidly changing ERP landscape as they plan a transition path to the cloud. Review the Forrester report to hear how the ERP market is changing, and how businesses are reconsidering deployment models to better fit their goals and needs.
Tags : 
erp software, enterprise resource planning software, cloud erp, saas erp
    
Epicor
Published By: McAfee     Published Date: Jan 20, 2015
Constantly available networks typically rely on several Internet service providers to ensure always-on connectivity and increase bandwidth. Augmented VPN aggregates all Internet Service Provider links to obtain a single high capacity tunnel.
Tags : 
asset, networking, encryption, firewalls, internet security, network security appliance
    
McAfee
Published By: ArborNetworks     Published Date: Feb 12, 2016
DDoS prevention appliances are the first line of defense for most service providers and large enterprises around the globe looking to protect themselves from brute-force attacks on network or resource availability, and with the unprecedented number, size, and coverage of DDoS attacks since the floodgates opens in 2008, vendors who build DDoS prevention solutions have seen and continue to see a significant increase in demand. This report covers actuals for 4Q14 and 1Q15.
Tags : 
arbor network, ddos, service provider, biannual report, security
    
ArborNetworks
Published By: Dell EMC     Published Date: Dec 01, 2017
Hyperconverged infrastructure (HCI) is becoming a popular architecture choice, particularly for businesses consolidating infrastructure as part of a hybrid IT strategy to extend compute and storage resources outside the enterprise. At its current level of progress, HCI could soon become a foundation layer for the next generation of infrastructure at enterprises, midsized companies and remote deployments. Hybrid cloud is the next frontier for HCI, with most players looking to develop cloud orchestration and workload-migration capabilities to become hybrid cloud enablers for enterprises and service providers. Today, many organizations still have questions and uncertainty about HCI: What are the most effective uses of HCI today and in the future? Who benefits from HCI, and who doesn’t? What enterprise infrastructure challenges could be solved with HCI? This report will provide data and analysis to provide perspective on how the HCI market could be evolving, and to better understand
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Dec 01, 2017
perconverged infrastructure (HCI) is becoming a popular architecture choice, particularly for businesses consolidating infrastructure as part of a hybrid IT strategy to extend compute and storage resources outside the enterprise. At its current level of progress, HCI could soon become a foundation layer for the next generation of infrastructure at enterprises, midsized companies and remote deployments. Hybrid cloud is the next frontier for HCI, with most players looking to develop cloud orchestration and workload-migration capabilities to become hybrid cloud enablers for enterprises and service providers. Today, many organizations still have questions and uncertainty about HCI: What are the most effective uses of HCI today and in the future? Who benefits from HCI, and who doesn’t? What enterprise infrastructure challenges could be solved with HCI? This report will provide data and analysis to provide perspective on how the HCI market could be evolving, and to better understand th
Tags : 
    
Dell EMC
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search