CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

volume

Results 1 - 25 of 587Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Sep 12, 2019
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever. For these reasons and more, enterprises need to start thinking differently about cybersecurity. Security doesn’t need new products. It needs a new model. One that applies the principles of intrinsic security across the fabric of the organization, from the sales floor to the C-suite, from the infrastructure to the endpoint device. In this Essential Guidance executive brief, learn how intrinsic security differs from traditional security methods, and the steps CIOs need to take to operationalize this model for greater business agility without greater risk.
Tags : 
    
VMware
Published By: Experian     Published Date: Sep 26, 2019
"We are in an age of unprecedented opportunity, where ubiquitous data and new technologies are shaping the world and dramatically changing the way consumers interact with businesses like yours. The rise of fintech companies is driving competition, e-commerce has raised the bar for digital experiences, fraud is at an all-time high, and there is pressure to grow your business. You need to meet these challenges head on and do it in a way that can scale with the increasing volume — and value — of customers. All while meeting and exceeding customer expectations. We believe rapid, sustainable growth can be fuelled by acquiring the right customers and delivering customer experiences that align with their expectations. To succeed you need a comprehensive, unified view into your customers and their needs. As a business leader, how do you achieve these objectives? What can you do to attract and acquire new customers? What tools do you need to quickly act on insights and to make consistent, relev
Tags : 
    
Experian
Published By: Intel     Published Date: Aug 26, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: Gigamon     Published Date: Sep 03, 2019
Network performance and security are vital elements of any business. Organisations are increasingly adopting virtualisation and cloud technologies to boost productivity, cost savings and market reach. With the added complexity of distributed network architectures, full visibility is necessary to ensure continued high performance and security. Greater volumes of data, rapidlyevolving threats and stricter regulations have forced organisations to deploy new categories of security tools, e.g. Web Access Firewalls (WAFs) or Intrusion Prevention Systems (IPS). Yet, simply adding more security tools may not always be the most efficient solution.
Tags : 
    
Gigamon
Published By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: KPMG     Published Date: Jun 06, 2019
High-volume administrative tasks are a feature of every business. We helped a global bank develop a machine learning algorithm to help with the task of reviewing over 100,000 ‘sanctions alerts’ every day. Read this story to find out: • what other benefits AI can deliver beyond cost savings • how AI tools achieve greater accuracy than human reviewers • what it takes to apply AI and Machine Learning successfully in a regulated sector.
Tags : 
    
KPMG
Published By: Blend     Published Date: Oct 07, 2019
Every lender, bank, and credit union has different product mixes and marketing priorities, but one thing they all share is the goal of winning, retaining, and growing our customer relationships. Typically, there are two ways to maximize customer engagement: seek margin with products like credit cards, or seek volume and deeper relationships with products like home equity. This report analyzes both of these options through three key lenses: current market conditions, access to today’s high-quality borrowers, and the rich opportunity for integrated, targeted marketing. Our goal is to enable you to determine the best way to fine-tune your strategic customer engagement for 2019 by helping you: Review current market conditions. Connect with higher-quality borrowers. Develop a 360-degree, integrated marketing mix.
Tags : 
    
Blend
Published By: Infinidat EMEA     Published Date: Oct 10, 2019
Big Data- und Analytik-Workloads bringen für Unternehmen neue Herausforderungen mit sich. Die erfassten Daten stammen aus Quellen, die vor zehn Jahren noch gar nicht existierten. Es werden Daten von Mobiltelefonen, maschinengenerierte Daten und Daten aus Webseiten-Interaktionen erfasst und analysiert. In Zeiten knapper IT-Budgets wird die Lage zusätzlich dadurch verschärft, dass die Big Data-Volumen immer größer werden und zu enormen Speicherproblemen führen. Das vorliegende White Paper informiert über die Probleme, die Big Data-Anwendungen für Storage-Systeme mit sich bringen, sowie darüber, wie die Auswahl der richtigen Storage-Infrastruktur Big Data- und Analytik-Anwendungen optimieren kann, ohne das Budget zu sprengen.
Tags : 
    
Infinidat EMEA
Published By: Datastax     Published Date: Sep 27, 2019
Smartphones, smart cities, smart homes, smart cars—IoT has triggered a data explosion, and not every enterprise is prepared to handle it. Beyond collecting and analyzing the increasing volume of data, organizations must figure out how to manage the velocity of that data, as well as how to integrate it with multiple data sources. And that’s just scratching the surface of the IoT challenge. To extract business value out of this inpouring of data, and to take full advantage of IoT boosted by new 5G technology, IT organizations must consider five key technologies. In this ebook, you’ll learn about these five technologies and their benefits. To continue to develop and scale your IoT-driven applications, your infrastructure needs to be able to handle sensor data at velocity, keep data close to the edge, maintain 100% uptime, and make it easy to extract business value. The insights you’ll discover in this ebook will not only help you prepare your organization for this reality; they’ll also
Tags : 
    
Datastax
Published By: Jamf     Published Date: Aug 06, 2019
Hobson & Company (H&C), a leading research firm focused on total cost of ownership (TCO) and return on investment (ROI) studies, conducted independent research and found that a proven Apple device management solution delivers a quick and compelling ROI to both large and small enterprises. • Simplifying IT management o 90% reduction in time spent managing apps o 80% reduction in time spent provisioning • Improving end-user experience o 60% reduction in end-user productivity loss o 15% reduction in volume of help desk tickets • Mitigating risk o 90% reduction in time spent creating inventory reports o 65% reduction in time spent managing policy and setting changes
Tags : 
    
Jamf
Published By: TIBCO Software     Published Date: Sep 16, 2019
TIBCO Data Virtualization é uma solução comprovada que é usada por quatro das cinco principais companhias de energia integradas para fornecer mais rapidamente um maior volume de dados analíticos nas operações de exploração e produção. Os casos de uso específicos descritos incluem: • Análise de dados em plataformas offshore • Manutenção e reparação de poços • Serviços de dados web em refinarias • SAP Master Data Quality Se uma empresa de energia está enfrentando desafios relacionados com dados e suas análises, deve considerar o TIBCO Data Virtualization.
Tags : 
    
TIBCO Software
Published By: CheckMarx     Published Date: Sep 12, 2019
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
    
CheckMarx
Published By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: Genesys     Published Date: Dec 20, 2018
Companies across the world are innovating with artificial intelligence (AI) to improve customer experience and forge deeper relationships with customers. Through surveys and interviews with 599 executives, from large and mid-sized companies across the globe, this MIT report reveals that most customer-centric firms have already deployed AI extensively in their customer-facing operations and customer experience management processes. Get the global report and regional spotlights on North America, Latin America, Europe and Asia to access complete results. Key insights include: • Nearly 90% of respondents report measurable improvements in the speed of complaint resolution; 80% note enhanced call volume processing using AI • 80% of respondents report measurable improvements in customer satisfaction, service delivery and contact center performance • In North America, 60% of the respondents believe they will deliver a 10% or more increase in customer lifetime value in the next year • Europe
Tags : 
    
Genesys
Published By: Adobe     Published Date: Sep 23, 2019
Data is a company’s most valuable asset. Just look at Forbes’ World’s Most Value Brands list. No longer is a company’s worth evaluated by its tangible assets — data has changed all of that. Every business today relies on data. The ability to filter through volumes of data to capture true insights is critical to gaining a competitive advantage. Companies aspiring to deliver the best possible customer experiences must be able to unify different types of information, including behavioral, transactional , and operational data
Tags : 
    
Adobe
Published By: Nuance     Published Date: Feb 09, 2012
Using your desired number of seats, we have compared Adobe Acrobat Stardard CPL/TLP published pricing to Nuance volume pricing. Download this calculator to see how much you can save with Nuance PDF Converter Enterprise.
Tags : 
    
Nuance
Published By: Marketo     Published Date: Sep 03, 2019
Across all industries, marketing increasingly plays a critical role in company growth. It is the marketer’s responsibility to help their organization retain, nurture, and increase their customer base—not an easy task. Having the right technology and skill set is essential to provide measurable ROI and deliver on the bottom line. Everything starts with the customer, and the tech needed to assist them on their buyer journey. By harnessing a well-considered MarTech stack, marketers can bring order to the overwhelming volumes of data they collect from online and offline interactions with prospective and existing customers. Better yet, this technology enables you to make those insights actionable, meaning you can make informed decisions. Download this ebook for eight practical steps your organization can take to put together a high-performance MarTech stack.
Tags : 
    
Marketo
Published By: AWS     Published Date: Oct 07, 2019
Imperva, an APN Security Competency Partner, can help protect your application workloads on AWS with the Imperva SaaS Web Application Security platform. The Imperva high-capacity network of globally distributed security services protects websites against all types of DDoS threats, including networklevel Layer 3 and Layer 4 volumetric attacks—such as synchronized (SYN) floods and User Datagram Protocol (UDP) floods—and Layer 7 application-level attacks (including the OWASP Top 10 threats) that attempt to compromise application resources. Harnessing real data about current threats from a global customer base, both the Web Application Firewall (WAF) and DDoS protection, incorporate an advanced client classification system that blocks malicious traffic without interfering with legitimate users. Enterprises can easily create custom security rules in the GUI to enforce their specific security policy. In addition, this versatile solution supports hybrid environments, allowing you to manage th
Tags : 
    
AWS
Published By: Dependable Solutions     Published Date: Feb 16, 2010
A critical challenge for many companies in 2009 was to stay on top of licensees' obligations, payments, receipts and royalties, along with growing volume of approvals.
Tags : 
dependable solutions, licensing, edi, electronic data interchange, sku
    
Dependable Solutions
Published By: SAP     Published Date: Feb 03, 2017
In the digital economy, data is becoming more interconnected every day. The volume of highly-connected data is growing rapidly, while also becoming a highly-valued corporate asset. By exploring relationships among people, processes and things, new business opportunities emerge, helping grow your business's competitive advantage.
Tags : 
    
SAP
Published By: Dell APAC     Published Date: May 30, 2019
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
    
Dell APAC
Published By: Cisco     Published Date: Mar 22, 2019
Artificial intelligence (AI) and machine learning (ML) are emerging technologies that will transform organizations faster than ever before. In the digital transformation era, success will be based on using analytics to discover the insights locked in the massive volume of data being generated today. Historically, these insights were discovered through manually intensive data analytics—but the amount of data continues to grow, as does the complexity of data. AI and ML are the latest tools for data scientists, enabling them to refine the data into value faster.
Tags : 
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search