CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

wan

Results 301 - 325 of 1675Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Challenge Enterprises today face the major challenge of how to fully orchestrate the apps that define their business and automate the IT processes underpinning them when much of the infrastructure used to run them is outsourced to cloud providers. Opportunity Some cloud service providers offer their own orchestration tools, and each on-premises tool has automation capabilities. But while we own our apps, providers are interchangeable depending on what they can offer and for what price. We should be able to switch between cloud providers and between cloud, on-premises and hybrid infrastructure as and when the business requires, with minimal effort and without losing any control. Sometimes we might want to use more than one provider at the same time, leveraging the advantages of each provider simultaneously. Benefits What is needed is an orchestration layer that remains constant while cloud services come and go; one that enterprises own along with their core apps.
Tags : 
    
CA Technologies_Business_Automation
Published By: BeyondTrust     Published Date: Apr 11, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage.
Tags : 
    
BeyondTrust
Published By: ipoque     Published Date: Oct 04, 2018
The SD-WAN market is growing fast, but so is competition. In such a competitive environment, SD-WAN vendors need to offer products with unique features and capabilities in order to stand out. Real-time application visibility powered by deep packet inspection (DPI) software can be the decisive element in achieving them. This whitepaper highlights the key value of DPI software, which is enabling advanced SD-WAN analytics and security features.
Tags : 
dpi, deep packet inspection, sd-wan, analytics, network analytics, traffic analytics
    
ipoque
Published By: Riverbed     Published Date: May 24, 2012
Data transfer bottlenecks and unpredictability on the Wide Area Network (WAN) can hurt application performance. In addition, the time required to migrate large volumes of data to and from data centers can be a serious concern to business continuity.
Tags : 
wan, wan optimization, riverbed, virtual steelhead, business technology, data center
    
Riverbed
Published By: Riverbed     Published Date: May 24, 2012
Forrester Consulting recently analyzed the requirements for consolidating branch office infrastructures while simultaneously supporting the demands of emerging business goals.
Tags : 
infrastructure, server and storage virtualization, wan optimization, dns, dhcp, branch-office, business technology, data center
    
Riverbed
Published By: Riverbed     Published Date: May 24, 2012
The combination of Riverbed WAN optimization and web content optimization solutions ultimately have the same end goal of improving user performance, the techniques employed serve different use cases.
Tags : 
steelhead appliances, stingray aptimizer, microsoft sharepoint, wan, wbo, web content optimization, business technology, data center
    
Riverbed
Published By: Riverbed     Published Date: May 24, 2012
Hybrid cloud architectures are growing in popularity as a way to cope with today's business needs. This paper outlines a framework and specific solutions for adopting a hybrid cloud architecture to support increased profits and productivity.
Tags : 
cio, cloud computing, hybrid cloud adoption, wan optimization, application delivery controllers, network performance management, cloud storage gateways, business technology, data center
    
Riverbed
Published By: Riverbed     Published Date: May 24, 2012
End users want to be productive just as much as the business wants them to be. Most people thrive in environments where they are set up to succeed, and IT has a strategic role in that process. Simply put, users expect applications to be faster.
Tags : 
enterprise it, platform, server virtualization, private cloud, public cloud, cloud services, data centers, steelhead, granite, stingray, cascade, business technology, data center
    
Riverbed
Published By: CA Technologies     Published Date: Jun 09, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Published By: IBM UK&Ireland     Published Date: Nov 14, 2017
Today’s empowered consumers want to shop anywhere, anytime and they expect nothing less than a seamless experience with all their needs accommodated as they shift among mobile, digital and physical channels. They want the freedom and choice of online shopping, balanced with the comfort and immediacy of a physical store. They want to research and select items from their armchair, check out offers when they’re on the move and then try out products in the store.
Tags : 
omni channel, retail success, customer empowerment, digital, mobile, ibm
    
IBM UK&Ireland
Published By: LogMeIn     Published Date: May 31, 2016
LivePerson’s forced migration to the LiveEngage platform has businesses like yours re-examining their live chat options. Given the painful relationship they’ve endured for years with LivePerson, many customers are wary, and they want to make sure that they make the right move. BoldChat is working with a number of former LivePerson customers who came to us looking for a true partner – one that not only wants to earn their business, but to continue earning it every day. What they’re getting in return is much more.
Tags : 
boldchat, logmein, liveperson, chat, customer service, customer experience, enterprise applications, business technology
    
LogMeIn
Published By: IBM     Published Date: Oct 26, 2016
Predictive analytics has come of age. Organizations that want to build and sustain competitive advantage now consider this technology to be a core practice. In this white paper, author Eric Siegel, PhD, founder of Predictive Analytics World, reveals seven strategic objectives that can only be fully achieved with predictive analytics.
Tags : 
ibm, predictive analytics, analytics tools, advanced analytics, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 18, 2017
Predictive analytics has come of age. Organizations that want to build and sustain competitive advantage now consider this technology to be a core practice. In this white paper, author Eric Siegel, PhD, founder of Predictive Analytics World, reveals seven strategic objectives that can only be fully achieved with predictive analytics. Read this paper to learn how your organization can more effectively: Compete – Secure the most powerful and unique competitive stronghold Grow – Increase sales and retain customers competitively Enforce – Maintain business integrity by managing fraud Improve – Advance your core business capacity competitively Satisfy – Meet today's escalating consumer expectations Learn – Employ today's most advanced analytics ....and finally, render your business intelligence and analytics actionable.
Tags : 
predictive analytics, increase sales, customer retention, fraud management, consumer expectations
    
IBM
Published By: Prevero     Published Date: Feb 23, 2018
Am Ende wird sich der Controller der Zukunft im Unternehmen nur dann erfolgreich positionieren können, wenn einerseits seine Instrumente und Systeme an die geänderten Anforderungen an Flexibilität, Schnelligkeit, Zuverlässigkeit etc. angepasst sind und er andererseits auch selbst bereit ist, einen Rollenwandel hin zum Business Partner zu vollziehen. Kooperation statt Konkurrenzdenken wird auf der sozialkompetenten Ebene der Schlüssel zum Erfolg sein.
Tags : 
entwicklung, produktion, logistik, sales, aftersales, controller, business, partner
    
Prevero
Published By: Prevero     Published Date: Feb 23, 2018
Ohne eine angemessene IT-Unterstützung lässt sich eine werttreiberbasierte Planung nicht umsetzen. Die Auswahl der passenden Software ist mindestens genauso wichtig wie die Identifikation der geschäftsspezifischen Werttreiber und die Konzipierung eines werttreiberbasierten Planungsmodells. Insbesondere Softwarelösungen, die bereits branchenspezifische Werttreiberbäume hinterlegt haben, bieten für Unternehmen große Vorteile. Gleichzeitig ist auf die Usability und eine hohe Flexibilität mit einfacher Anpassungsfähigkeit zu achten, die ohne umfangreichen Customizing-Aufwand realisiert werden kann.
Tags : 
werttreiberbasierte, planung, prevero
    
Prevero
Published By: Sitecore EMEA     Published Date: Jan 23, 2018
The global beauty company provides an exhilarating example of the power of context-driven commerce. When customers can rely on brands to achieve the outcomes that are important to them, brand owners can shift their focus from nonstop customer acquisition to long-term customer engagement. The Sitecore Experience Platform and the underlying Sitecore Experience Database are foundation technologies for IT organizations wanting to implement context-driven commerce environments that function elegantly today and into the future. Sitecore puts an end to digital retailers’ obsession with cart abandonment, replacing it with opportunities to delight customers with personal, meaningful commerce offers.
Tags : 
advertising, revenue, customers, social channels, sitecore
    
Sitecore EMEA
Published By: Equinix     Published Date: Jul 06, 2016
This white paper explores a new interconnection-driven paradigm to help M&E companies improve media content creation, management and distribution workflow efficiencies, develop higher quality products faster, scale their global reach and give the viewing public what they want, when they want it — all at reduced costs.
Tags : 
media cloud system, media content, content management, content media
    
Equinix
Published By: Equinix     Published Date: Jul 07, 2016
Selevision wanted a data centre provider to host its services - Video on Demand, Live TV and Catch-up TV. It needed direct access to the world’s top CDNs, NSPs, ISPs and mobile data providers to securely stream video across the Middle East region. Selevision chose to host its services in the Equinix Internet Business Exchange (IBX) located in Dubai.
Tags : 
content management, content on demand, equinix, content
    
Equinix
Published By: Equinix     Published Date: Jul 11, 2016
Selevision wanted a data centre provider to host its services - Video on Demand, Live TV and Catch-up TV. It needed direct access to the world’s top CDNs, NSPs, ISPs and mobile data providers to securely stream video across the Middle East region. Selevision chose to host its services in the Equinix Internet Business Exchange (IBX) located in Dubai.
Tags : 
content management, content on demand, equinix, content
    
Equinix
Published By: NetApp EMEA     Published Date: Feb 15, 2018
Der Eintritt von NetApp in den Hyperkonvergenzmarkt ist seit Langem überfällig, und die Lösung wird bei den wichtigsten Kunden des Unternehmens große Wellen schlagen. IDC ist der Meinung, dass die Entscheidung von NetApp für die Technologie von SolidFire als Grundlage der HCI beweist, dass es verstärkt auf die neue Generation von Speichertechnologien setzt, die den digitalen Wandel ermöglichen. Die Integration mit Data Fabric zeigt, dass NetApp fähig ist, seine Vision für die hybride Cloud und den Datenverkehr in all seine Lösungen einzubringen, damit Kunden ihre Pläne für eine hybride IT nahtlos vorantreiben können. Schließlich deuten die flexiblen Skalierungsmöglichkeiten darauf hin, dass NetApp nicht einfach in aller Eile ein „Me-too“ Produkt auf den Markt bringen, sondern vielmehr ernsthaft auf die kostenbezogenen Herausforderungen eingehen wollte, denen sich HCI-Kunden gegenübersehen.
Tags : 
netapp, hcl, erste, hyperkonvergente, infrastrukturlosung
    
NetApp EMEA
Published By: iPass     Published Date: Dec 20, 2012
Today’s distributed enterprises find themselves with two primary WAN options for consideration: MPLS or an Internet IP VPN solution.
Tags : 
network, wan, vpn, mpls, enterprise, connectivity, networking, business technology
    
iPass
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security, cloud security, applications, on premise, network provisioning, network security, access control, application security, authentication, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, mobile device management
    
CA Technologies
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search