CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

test

Results 526 - 550 of 2347Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Pour pouvoir réellement mettre en œuvre une approche de livraison continue, les organisations doivent entièrement repenser la façon de mener leur processus d’assurance qualité (QA). Cela passe notamment par redéfinir le rôle que les professionnels d’assurance qualité jouent au sein de l’organisation, automatiser le plus possible à chaque niveau et revoir entièrement les structures de test, pour prendre en charge des versions logicielles plus légères et plus rapides.
Tags : 
continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, test, ca test data manager
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Faites passer rapidement vos idées du stade de la conception au stade du développement, sans sacrifier la qualité, grâce à un écosystème de livraison continue de bout en bout capable de mettre en œuvre des tests rigoureux selon la fonctionnalité utilisateur souhaitée.
Tags : 
continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, test, ca test data manager
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Depuis plus de vingt ans, les entreprises doivent se conformer à différentes directives et réglementations en matière de protection des données. Le Règlement général sur la protection des données (RGPD ou GDPR en anglais), qui reprend l’ensemble des législations existantes de la Commission européenne en matière de protection des données, a toutefois pour but de renforcer et d’harmoniser ces différentes réglementations pour les citoyens européens. Les principaux objectifs du RGPD sont de redonner aux citoyens un contrôle sur leurs données personnelles et de simplifier le cadre réglementaire pour les entreprises internationales. Pour les organisations déjà conformes à la Directive 95/46/CE, quels sont les critères technologiques à remplir pour garantir la conformité au RGPD ?
Tags : 
rgpd, gdpr, conformité, compliance, data testing, test data management, ca test data manager
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Dans une série d’articles, Paul Gerrard, consultant et spécialiste des tests, aborde diverses questions sur ces derniers. Les modèles de test sont essentiels pour les tests et, dans cet article, Paul Gerrard évoque l’art de créer et d’utiliser ces modèles. Si les testeurs interviennent de plus en plus tôt, de pair avec les développeurs ou du moins plus étroitement, les testeurs (et les développeurs) doivent être capables de créer des modèles, de savoir comment les articuler et les partager, ainsi que d’encourager une meilleure collaboration.
Tags : 
modèles de test, continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, test, ca test data manager
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Ce document présente les résultats d’une enquête commandée par CA Technologies en vue de comprendre la situation des entreprises face aux exigences imposées par le RGPD. Ce dernier ayant de vastes implications concernant le type de données pouvant être utilisées dans les environnements autres que de production, CA Technologies souhaitait avant tout comprendre comment les entreprises envisageaient de se mettre en conformité avec le RGPD et quels sont les processus et technologies nécessaires pour y parvenir.
Tags : 
rgpd, gdpr, conformité, compliance, data testing, test data management, ca test data manager
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 24, 2017
Générez des données virtuelles riches qui couvrent tous les scénarios possibles et fournissent un accès illimité aux environnements nécessaires pour livrer des applications testées avec soin, dans les délais et le budget impartis. Modélisez les données des systèmes réels complexes et appliquez des algorithmes d’apprentissage automatisé de règles pour éliminer la dette technique et permettre une compréhension approfondie des applications composites. Mettez en outre à la disposition des équipes distribuées des données virtuelles à la demande et évitez les goulots d’étranglement au niveau des tests.
Tags : 
modèles de test, continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, ca test data manager
    
CA Technologies EMEA
Published By: Sage People     Published Date: Nov 27, 2017
In our latest survey report, we explore the growth challenges facing businesses and HR leaders in a rapidly changing landscape.
Tags : 
business, hr leaders, changing landscape, growth, company, employees
    
Sage People
Published By: Aerohive     Published Date: Oct 26, 2015
Join this webinar to learn: - What the latest solution offerings look like and how to avoid investing in dead technology - Why more vendors are using the cloud to drive technical and commercial flexibility for organisations - How to easily grow your network with demand
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive
Published By: VMware     Published Date: Jun 28, 2019
With the benefits quickly stacking up, it’s easy to understand why Gartner stated HCI (Hyper-Converged Infrastructure) as one of the hottest trends in data centre infrastructure. HCI is intended to reduce infrastructure complexity and cost, whilst enhancing scalability, agility and operational efficiency. This consolidated infrastructure enables organizations to leverage the software layer by using low cost commodity hardware, while reducing concerns around vendor lock-in, to form a seamless software- defined IT infrastructure environment well suited to today’s IT challenges. Simple to use and manage, without specialists and more cost-effective than most traditional solutions, it’s easy to understand why more organisations are making the move from traditional architecture to Hyper-Converged Infrastructure. Submit the form to view the infograph to discover the benefits and whether this solution is right for you.
Tags : 
    
VMware
Published By: IBM     Published Date: May 25, 2016
IBM PureApplication is the fastest and simplest way to cloud-enable, deploy, manage, and move applications and middleware across your hybrid cloud
Tags : 
ibm, middleware, ibm pureapplication, hybrid cloud, application delivery, cloud, enterprise applications, cloud computing, business technology
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
The headlines are ablaze with the latest stories of cyberattacks and data breaches. New malware and viruses are revealed nearly every day. The modern cyberthreat evolves on a daily basis, always seeming to stay one step ahead of our most capable defenses. Every time there is a cyberattack, government agencies gather massive amounts of data. To keep pace with the continuously evolving landscape of cyberthreats, agencies are increasingly turning toward applying advanced data analytics to look at attack data and try to gain a deeper understanding of the nature of the attacks. Applying modern data analytics can help derive some defensive value from the data gathered in the aftermath of an attack, and ideally avert or mitigate the damage from any future attacks.
Tags : 
cyber attacks, data breach, advanced data analytics, malware
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
The right identity and access management solution can integrate with a healthcare provider’s EMR system to help keep sensitive medical data safe—and keep the organization compliant. It can provide valuable insights and visibility into accounts, access privileges and entitlements, across the wide range of users. By closing the gaps in identity protection, organizations can fight the threats of inadvertent misuse and intentional theft that may lead to security breaches.
Tags : 
healthcare, electronic medical records, access management solutions, identity protection, medical data
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Are you up-to-speed with the latest trends in mobile and Internet of Things (IoT) application security testing? Our recent Ponemon Institute study reveals key findings about organizations' ability to protect their mobile and IoT apps. Read our report to learn how well you stack up against your peers in securing your most critical mobile and IoT applications.
Tags : 
iot, ponemon institute, mobile application security, application security
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
IBM retained its position as a "Leader" in the 2017 Gartner Magic Quadrant for Application Security Testing. Read our complimentary version of the Gartner report to learn: Critical trends in the Application Security Testing market. Why IBM maintained a Leadership position in a report that spanned 18 Application Security vendors. Detailed criteria that determine how all of the vendors are positioned in the Magic Quadrant.
Tags : 
ibm, application security, gartner, application security testing
    
Group M_IBM Q1'18
Published By: Lenovo - APAC     Published Date: Oct 11, 2018
Lenovo’s VMware vSAN-based hyperconverged solution reduces TCO by 40% within the datacenter. VMware-based hyperconverged solutions from Lenovo come with a set of certified components that can be deployed to create platforms that support a broad array of workloads, performance, and budgetary requirements. With VMware vSAN pre-installed, pre-configured, and pre-tested, Lenovo’s VMware-based hyperconverged solutions help improve productivity, and cut complexity quickly and easily. VMware-based hyperconverged solutions from Lenovo represent proven solutions that are enterprise-class and are already being leveraged within mission-critical environments around the world. Download IDC’s Infobrief on “The Real-World Value of Hyperconverged Infrastructure” and learn how you can: • Cut the cost of scaling infrastructure • Reduce time spent on infrastructure provisioning • Improve application performance • Eliminate complexity and cost related to refreshing traditional infrastructure
Tags : 
    
Lenovo - APAC
Published By: Absolute Software     Published Date: Feb 14, 2012
Dysart Unified School District (DUSD) is Arizona's fastest-growing school district. Despite the district's extremely rapid expansion, it remains focused on its mission of "Increasing in Excellence" - or, preparing students for life in the new century.
Tags : 
laptop learning, dysart, dusd, arizona, students, virtualization, cloud computing, infrastructure, design and facilities
    
Absolute Software
Published By: Schneider Electric     Published Date: Jan 26, 2018
Part 3 in our Partnering with Certainty Webinar Series, "Customer Demands at the Edge." As distributed edge environments become more critical, physical security becomes more important. Nobody would leave their data center wide open for anyone to enter, but that’s exactly how many organizations treat their edge computing sites. Often, they consist of a rack or two of gear in a non-dedicated location, perhaps a janitor’s closet, with little to no physical security. Fill out your information and click "Register" to watch the third event in our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Protect me from Downtime!” This webinar originally aired on November 9th, 2017. In this webinar, we discuss physical security best practices, including environmental issues such as temperature and humidity monitoring. We also update partners on the physical security features of the latest APC racks and the NetBotz line of security and environmental appliances, cameras and sensors.
Tags : 
    
Schneider Electric
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
You want to maximize the potential offered by new technologies and establish an advantage over your competitors. But you know the latest IT developments can also bring new security challenges.
Tags : 
it security, security technologies, it developments, security, it management, knowledge management
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
The importance of IT security to a business has never been greater. But often, investments are shelved or cutbacks are made. This can result in businesses unknowingly making compromises regarding their IT security. In this latest whitepaper from Kaspersky Lab, you’ll find useful facts, examples and business case arguments to help you get buy-in and commitment from your business.
Tags : 
it security, it security investments, cyber threats, malware detection, security, it management, knowledge management
    
Kaspersky Lab
Published By: HP - Enterprise     Published Date: Aug 25, 2011
This white paper details how hybrid app security enables organizations to resolve critical security issues faster and cheaper than any other technology
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Aug 31, 2011
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 22, 2011
HP Fortify on Demand: The quickest, most affordable way to accurately test and score the security of your applications.
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, access control, anti spam, anti spyware, anti virus, compliance, ddos, disaster recovery
    
HP - Enterprise
Published By: iPass     Published Date: Apr 08, 2009
Learn what Forrester has uncovered in their latest report on Enteprise Mobility trends. During the past two years, Forrester has seen the number of enterprise mobility inquiries increase nearly 55%, jumping to 550-plus inquiries in 2008. In the past year, we have seen a spike in the number of inquiries focused on mobile network architecture, new types of mobile devices, and deploying vertically focused mobile applications that address the needs of workers in certain industries (e.g., retail, transportation, and healthcare).
Tags : 
forrester, wireless, infrastructure, fmc, fixed mobile convergence, network architecture, healthcare, retail, transportation, wimax, roi, return on investment, wlan, wimax, network management, wide area networks
    
iPass
Published By: iPass     Published Date: Sep 22, 2009
A few short years after 3G service brought us anytime, anywhere broadband-and before Apple rolled out its 3G iPhone-4G networks began raising the bar in select markets. This latest evolution in wireless networking offers faster wireless data transmission speeds, vastly superior coverage and support for a new generation of mobile applications and services.
Tags : 
ipass, wifi, smartphones, roaming, web portal, vpn, ethernet, connection detail records, mobility, mobile workers, cdrs
    
iPass
Published By: Ariba     Published Date: Mar 30, 2011
Practical Approaches for Spend Management Success.
Tags : 
ariba, spend management
    
Ariba
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search