CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

technology

Results 6326 - 6350 of 6618Sort Results By: Published Date | Title | Company Name
Published By: Box     Published Date: Jun 11, 2014
Watch this webcast to learn what's really happening in the mobile space and how you can use mobile tech to transform your business. You'll hear examples of innovative companies and what they're doing and learn to use new technology to optimize how your employees access and share info, allowing them to get more work done.
Tags : 
box, mobile, enterprise, mobile tech, technology, wireless, data management, business technology
    
Box
Published By: MuleSoft     Published Date: Sep 09, 2019
ABB leads one of the most complex industries on the planet; one that is under intense transformation. They are succeeding by using digital technology to fast track their supply chain and manufacturing process. Watch this webinar to learn how ABB is accelerating digital transformation through an API strategy with MuleSoft. Key takeaways How ABB leverages reusability and automation to streamline their complex manufacturing processes. Why MuleSoft's C4E (Center for Enablement) is a perfect fit for ABB. How ABB drives digital innovation through the adoption of API-led connectivity. Presented by: Szymon Myslinski, Global IT Department Manager for Innovation, ABB Gabriel Rauchenbichler, DACH Marketing Lead, MuleSoft
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Nov 08, 2019
An Airbus A380 is made up of 7 million different pieces with each piece coming from different parts of the world including Germany, Spain, UK, and France. Assembling the final plane requires support from various IT and operations teams. Leveraging legacy supply chain technology to support on-time arrival and coordination of parts was incredibly challenging, and only worsened with the need for new parts and pressure of massive growth. In order to scale, Airbus needed to think through how to transform and digitize its global supply chain. Hear from Airbus and how they are leveraging Anypoint Platform to enhance their production efficiency, and ultimately, drive innovation throughout the entire supply chain. In this webinar, you will learn how to: Leverage APIs to support a complex manufacturing process with multiple global partners. Foster collaboration amongst siloed IT teams through API reuse and API-led connectivity. Reduce time to market by providing end-to-end visibility acros
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: May 02, 2016
This is a webinar about MIT increasing its IT clock speed.
Tags : 
mit, clock, speed, digital transformations, education, technology, student egnagement, wireless, enterprise applications
    
MuleSoft
Published By: PC Mall     Published Date: Jun 22, 2011
This PC Mall webinar discusses the components of a borderless architecture and how technology is impacting network security as well as the benefits and how to of adopting a borderless network.
Tags : 
borderless networks, cisco, webinar, security, email, firewall, pc mall, eliminating borders, firewalls, internet security, intrusion prevention, security management, cloud computing, vulnerability management, infrastructure
    
PC Mall
Published By: KPMG     Published Date: Nov 06, 2019
Political uncertainty, potential trade wars and digital technologies continue to reshape our world, begging the question: Is your supply chain fit for the future? Listen to this webinar now to find out: • How to build an agile, responsive operational network that supports growth • The importance of knowing your customer and suppliers in an end-to-end supply chain • How to use data and insight to gain effective control and improve performance across operations • How to exploit simple, pragmatic digital steps to improve your supply chain performance, today • How to leverage emerging technology to future-proof your supply chain • How to develop new skillsets to help execute your digital roadmap.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 04, 2019
For many enterprises, cloud migration is attractive for two key reasons: greater agility and lower cost. However, the jury is still out when it comes to the financial benefits. In this webinar, KPMG’s Adrian Bradley, Head of Technology Architecture, and Emma Bisset, Senior Manager, CIO Advisory at KPMG UK, explore the reasons why. Listen to this webinar now to find out: • What leading IT decision makers told KPMG about their experience of cloud costs • Why organisations are failing to realise economic value from their cloud investments • What key levers your organisation can use to extract significant cost savings from existing deployments.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 09, 2019
BPO providers’ investment in automation is transforming the way they execute business processes. Could rethinking your BPO contract help drive a similar transformation in your own organisation? Listen to this webinar now to discover: • The current automation trends in BPO – myths and realities • Why you should factor emerging disruptive technology into any new contracts • How to engage the market in a transformational deal • How to contract and price for transformational BPO.
Tags : 
    
KPMG
Published By: Red Hat     Published Date: Jan 21, 2011
Chuck Dubuque - Product Marketing Manager, Red Hat Server and desktop virtualization technologies, which bring cost and agility advantages to enterprise IT, have become mainstream in most datacenters. However, after nearly 10 years, virtualized servers still only represent about 30 percent of x86 production workloads due to technology limitations and the expense of proprietary virtualization platforms. In this session, Chuck Dubuque will cover: * The benefits of datacenter virtualization * Technologies in the open source community that will enable pervasive virtualization * The move to the cloud * The particular advantages of Red Hat Enterprise Virtualization and the Red Hat subscription model
Tags : 
red hat virtual tradeshow, live event, business agility, enterprise virtualization, product marketing, server, desktop virtualization, datacenter, virtualized server, desktop management, data center design and management
    
Red Hat
Published By: Red Hat     Published Date: Jan 21, 2011
Red Hat Enterprise Virtualization for Desktops can help your business reduce desktop-associated costs, improve data security, and simplify overall desktop infrastructure management. In this session, Jeff Jameson will explain the technology features and benefits of delivering centrally hosted Linux and Windows desktops to the client of your choosing, while providing a true PC-like experience to your end users. With incredibly rich, integrated features like bi-directional audio and video, and kernel-level security enforcement, Red Hat Enterprise Virtualization for Desktops provides a complete solution for your virtual desktop deployments.
Tags : 
red hat virtual tradeshow, live event, enterprise virtualization, desktop infrastructure management, linux, windows desktop, security, infrastructure, desktop management
    
Red Hat
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Resolver     Published Date: Nov 01, 2019
As risk professionals, you’re tasked with the responsibility to minimize and mitigate risk, all while battling skeptical and reluctant executives for increased budget and more resources. The risk management paradox is a tough pill to swallow. When you’re doing your job well, nobody notices. And when something goes wrong, you’re the scapegoat. So, how do you prove the value of something not happening? In partnership with The Risk Management Society (RIMS), Resolver hosted a webinar to answer questions many risk managers struggle with: - How do you prove the value of an ERM program? - Who is ultimately responsible for risk management? - What metrics and KRIs should you track to measure the impact of your ERM program? - How do you encourage risk-based decision making across the enterprise? - How can technology be leveraged to maximize the value of an ERM program? Complete the form for access to the full webinar video that will help your team make the case for an ERM program.
Tags : 
    
Resolver
Published By: Red Hat     Published Date: Jan 21, 2011
Gunnar Hellekson - Chief Technology Strategist, US Public Sector, Red Hat The government was an early advocate of open source and Red Hat. Red Hat is now ubiquitous, in every state, every branch of the Department Of Defense, and in every cabinet-level agency. After ten years, we no longer hear about security or whether open source is ready for the enterprise. So what's next? How is Red Hat driving the next wave of innovation in government?
Tags : 
red hat virtual tradeshow, live event, us government, public sector, department of defense
    
Red Hat
Published By: KPMG     Published Date: Oct 09, 2019
Complying with financial and economic sanctions is likely to pose new challenges after Brexit. Explore the issues with KPMG experts Karen Briggs and Neal Dawson, with Maya Lester QC and Arjun Ahluwalia, Head of Sanctions Advisory at HSBC UK. Listen now to discover: • Details of current sanctions policy and post-Brexit implications • How financial and economic sanctions impact the private sector • How manage compliance better by using sanctions technology.
Tags : 
    
KPMG
Published By: Aria Systems     Published Date: Jun 15, 2016
Overcoming the obstacles to deliver the modern learning demands of a smart campusFrom secure BYOD to robust WiFi and comprehensive video surveillance, the IT challenges schools face to ensure smart, safe campuses are not minor. This on-demand webinar details how schools like yours seamlessly integrated new technology on a budget >
Tags : 
    
Aria Systems
Published By: Avaya     Published Date: Jun 15, 2016
Overcoming the obstacles to deliver the modern learning demands of a smart campusFrom secure BYOD to robust WiFi and comprehensive video surveillance, the IT challenges schools face to ensure smart, safe campuses are not minor. This on-demand webinar details how schools like yours seamlessly integrated new technology on a budget.
Tags : 
new technology, best practices, competitive advantage, smart campus, database development
    
Avaya
Published By: Staples     Published Date: Oct 24, 2018
Personal devices on corporate networks. Social media in the office. Millennials in the workforce. Technology is changing fast in the workplace and corporate IT managers are working to support a wider variety of user segments without putting the organization at risk. Watch this on-demand webinar to hear two IT experts diagnose the impact of the latest technology trends in the workplace and provide useful advice on how to support new user segments securely.
Tags : 
it security, mobility, it user segments, technology trends, enterprise technology
    
Staples
Published By: Progress     Published Date: Jan 22, 2019
With expectations high and requests coming from every direction, it is crucial you set strategic goals and objectives for your team that quickly drive results. But how do you set your priorities? How do you get the right mix of quick short-term wins and long-term strategic initiatives? And all the while keeping your customers, organization and stakeholders happy while ensuring the internal processes and technology are in place to support them. We will answer these questions and more in this on-demand webinar.
Tags : 
    
Progress
Published By: Resolver     Published Date: Nov 01, 2019
Together with ASIS International, Resolver polled corporate security professionals in the ASIS community about the state of security management in 2019. Based on the results, Resolver examined current practices and trends in the systems and technologies involved with managing incidents and assessing threats. Watch this webinar for access to the survey results where Resolver identified the top incidents organizations face, where security teams are planning technology improvements or upgrades, and how they use incident management to assess future threats. You’ll walk away with the information you need to benchmark your team, as well as practical tactics to collect relevant data to help allocate and maximize your security budget for 2020.
Tags : 
    
Resolver
Published By: PGi     Published Date: Oct 01, 2018
You wouldn’t hold a critical investor call, customer event or shareholder’s meeting in your office bullpen. So why would you host an important virtual event on a platform intended to support small-group collaboration and teamwork? Frost & Sullivan research shows that two-thirds of companies use web conferencing on a regular basis for project collaboration. We also know that more and more of them are turning to the same solutions to host webinars for critical internal and external events. While web conferencing solutions can be used to support large-group or strategically important meetings, webinar technology is designed specifically for that purpose and will almost always deliver a better experience and a higher return on investment. Webinar tools deliver a wealth of features to help companies gain better insights into attendee sentiment for better investor relations, employee and customer experience, and lead generation and qualification: • Integrated video draws higher levels of int
Tags : 
    
PGi
Published By: Webroot UK     Published Date: Sep 05, 2013
Webroot SecureAnywhere Business - Endpoint Protection offers a revolutionary approach to malware protection. It brings together Webroot's innovative file pattern and predictive behavior recognition technology, with the almost limitless power of cloud computing, to stop known threats and prevent unknown zero-day attacks more effectively than anything else. Read this white paper to learn about ultimate performance and minimal management security software from Webroot.
Tags : 
webroot, secureanywhere, business, software, security software, revolutionary software, predictive behavior, known threats, zero day attacks, ultimate protection, security
    
Webroot UK
Published By: Symantec Corporation     Published Date: Oct 03, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Increasingly however, we’re witnessing attacks on corporations designed to cause substantial economic losses via wholesale destruction. For example, the Shamoon malware that recently hit Saudi Arabia-based Aramco (the world’s largest oil company) and RasGas (a Qatar-based gas company) corrupted files on tens of thousands of workstations, overwriting the Master Boot Records. These malware attacks, which may well have targeted website vulnerabilities, resulted in destruction on an industrial scale. At Aramco, IT professionals were forced to replace 30,000 PCs and laptops. RasGas meanwhile, had to shut down all email communications, and the company’s website was forced offline.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Online where the reputation and success of your business is often measured by the trust that your customers have in the security of your website, it is important to understand how you can maintain and build on that trust. To that end, SSL/TLS has been the key to trust on the Internet for more than a decade and will continue to be so when it comes to providing the highest levels of protection against evolving cyber security threats. And while, yes, the technology is sophisticated and leading edge, the goal is simple: to make the Internet safer to transact business—for you, your customers and everyone else with whom you interact online. Please use this document as a reference to understand the threat landscape and understand how you can protect your company and your infrastructure.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: IBM     Published Date: Mar 28, 2008
Business integration, along with the IT integration resources required to support it, has become an essential focus for companies across industries. These organizations want to update existing technology assets—and realize new value from what were previously disconnected and isolated applications.
Tags : 
    
IBM
Start   Previous    247 248 249 250 251 252 253 254 255 256 257 258 259 260 261    Next    End
Search