CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

wan

Results 326 - 350 of 1676Sort Results By: Published Date | Title | Company Name
Published By: NetApp EMEA     Published Date: Feb 15, 2018
Der Eintritt von NetApp in den Hyperkonvergenzmarkt ist seit Langem überfällig, und die Lösung wird bei den wichtigsten Kunden des Unternehmens große Wellen schlagen. IDC ist der Meinung, dass die Entscheidung von NetApp für die Technologie von SolidFire als Grundlage der HCI beweist, dass es verstärkt auf die neue Generation von Speichertechnologien setzt, die den digitalen Wandel ermöglichen. Die Integration mit Data Fabric zeigt, dass NetApp fähig ist, seine Vision für die hybride Cloud und den Datenverkehr in all seine Lösungen einzubringen, damit Kunden ihre Pläne für eine hybride IT nahtlos vorantreiben können. Schließlich deuten die flexiblen Skalierungsmöglichkeiten darauf hin, dass NetApp nicht einfach in aller Eile ein „Me-too“ Produkt auf den Markt bringen, sondern vielmehr ernsthaft auf die kostenbezogenen Herausforderungen eingehen wollte, denen sich HCI-Kunden gegenübersehen.
Tags : 
netapp, hcl, erste, hyperkonvergente, infrastrukturlosung
    
NetApp EMEA
Published By: iPass     Published Date: Dec 20, 2012
Today’s distributed enterprises find themselves with two primary WAN options for consideration: MPLS or an Internet IP VPN solution.
Tags : 
network, wan, vpn, mpls, enterprise, connectivity, networking, business technology
    
iPass
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security, cloud security, applications, on premise, network provisioning, network security, access control, application security, authentication, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security, cloud security, applications, on premise, network provisioning, network security, access control, application security, cloud computing
    
CA Technologies
Published By: Cisco     Published Date: Oct 08, 2018
Cisco DNA takes a software-delivered approach to automating and assuring services across your campus, WAN, and branch networks. Based on an open and extensible platform, DNA allows you to build value on the network, so you can streamline operations and facilitate IT and business innovation.
Tags : 
networking, intent-based networking, gartner, wan, network, innovation, digital, digital network, digital transformation
    
Cisco
Published By: Schneider Electric     Published Date: Apr 23, 2019
After buzzing Industry 4.0 all over the media by all OT and IT experts, today, a few key concepts seem to unveil the potential that the industry believes is behind Industry 4.0. These include: Smart Machines, Smart Factory, cyber physical systems, Everything-as-a-Service and a few technologies like OPC UA, cloud and data analytics. Clearly, they are the innovation drivers and must-haves for every vendor of automation products that want to be recognized as leaders or challengers. Sooner or later they will become standards and used by followers and niche players, but the key question for the market of automation suppliers is not who is first in developing and providing all the nice concepts and technologies, but who is creating and combining them in the right way so that they can be turned into new revenue streams. We keep in mind that competitive advantages can be achieved through increasing operational efficiency, but the better way is through strategic uniqueness. Companies which ar
Tags : 
industry 4.0, iiot, smart machines, smart manufacturing, business models
    
Schneider Electric
Published By: HP - Enterprise     Published Date: Jun 05, 2013
When asked how important technology is to driving innovation in their organizations, 100 percent of CEOs indicated it was important, with 80 percent pointing out that it’s very important, according to HP sponsored research. Even CIOs agree with their CEOs. According to the same research, when asked whether or not technology will be the innovation engine or administrative engine for a business or government, approximately two out of three CEOs said it would be the “innovation engine.” This represents a significant shift in the role that technology is playing in enterprises. Today, organizations demand new applications and more functionality delivered more quickly, and at a lower cost than ever before. Many organizations either want a mobile application or are already using one. In fact, according to analysts, by 2016 350 million employees will use smartphones at work and businesses will increase spending on mobile projects over 100 percent in the same time.
Tags : 
mobile, cloud, applications, apps, mobile apps
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jun 05, 2013
Whether you want to map directions, find a restaurant, look up your flight details, see where your next meeting is, or just check your email, chances are you do it on your smartphone. Just about everything is going mobile. Industries such as retail and financial services are going mobile to increase efficiency and generate more revenue. Mobile business apps and mobile enterprise apps have the potential to transform organizations. This white paper discusses key mobile trends and analyzes how financial services organizations must change their IT application development, testing, monitoring, and management methodologies while extending their services to multi-client mobile environments, leveraging both Native and Mobile-oriented Web apps.
Tags : 
mobility, financial services, revenue stream, application development
    
HP - Enterprise
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring, access control, anti virus, application security, authentication, disaster recovery, email security, encryption, firewalls, hacker detection, high availability, identity management
    
Blue Coat Systems UK
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
ERP and Business Intelligence are essential to your success. Read this and learn how to improve productivity and decision-making using Blue Coat WAN
Tags : 
blue coat, wan optimization, resource management, sap, erp, secure web gateway, application performance monitoring, netweaver, business objects, soa, optimization, convergence, infrastructure, interoperability, wide area networks, data center design and management, colocation and web hosting, content management
    
Blue Coat Systems UK
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
Learn how to proactively address the latest trends in WAN traffic. Tomorrow is here: video, Web 2.0, and SaaS applications are overtaking the WAN.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, convergence, infrastructure, interoperability, network architecture, network management, network performance, network performance management, network provisioning, wide area networks, data center design and management, content management
    
Blue Coat Systems UK
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
Optimized Video Delivery automatically minimizes bandwidth impact and improves user experience! Find our more in this white paper.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, convergence, infrastructure, interoperability, productivity, project management, service management, content management
    
Blue Coat Systems UK
Published By: Genesys     Published Date: Oct 16, 2013
The existing upgrade paths from legacy PBX and ACD suppliers make it difficult for contact center executives to contemplate the future of customer service on their own terms. If your ACD-based contact center has become a road block for adding capacity or adding channels such as social media and mobile, you might want to think about making the switch to a SIP-based contact center solution. SIP delivers two important advantages over legacy switching: 1. SIP is based on open standards, so you can choose hardware and software that is best suited for your environment. 2. SIP’s capability extends beyond voice to new media types such as mobile, social media and video. SIP-based contact centers provide a roadmap to sophisticated features without the complexity and expense of traditional proprietary ACDs. Learn more about how to build the next-generation customer service platform.
Tags : 
contact center, customer service, social media, mobile, sip, technology solution, technology, enterprise applications, business technology
    
Genesys
Published By: ClickExpress     Published Date: May 01, 2013
Businesses with between 15-250 mobile workforce employees are looking for optimization software. At the same time, they don’t want a complex enterprise solution with long integration times and complex IT requirements. Many vendors are offering cloud-based solutions. But what does that mean? Is it secure? In this Q&A, we answer the most common questions about cloud-based software solutions for field service management.
Tags : 
cloud-based, solution, mobile, workforce, optimization, employees, software, enterprise, solutions
    
ClickExpress
Published By: Juniper Networks     Published Date: Jan 11, 2016
Da Anwendungs-Workloads neu definiert werden, müssen sich auch Rechenzentren ändern. In diesem IDC-Whitepaper wird beleuchtet, wie Netzwerk-Automatisierung und -Orchestrierung bei diesem Wandel helfen können und somit einfachere, agilere Netzwerke entstehen.
Tags : 
    
Juniper Networks
Published By: SumTotal Systems     Published Date: Oct 10, 2013
If you’re like everyone else in HR today, you’re probably thinking about how your organisation can handle data better. Maybe your executives want the power to make data-driven decisions from comprehensive workforce analytics. Perhaps you’d like to streamline the efficiency of your HR operation or put more actionable information in the hands of your line managers and employees. With the elixHR Platform, you can integrate your HR data and processes so your people can access information quickly and easily, and make better decisions. You can also lower your operational costs because you can increase efficiency and eliminate the need to replace HR systems that you already have in place.
Tags : 
sumtotal, sumtotal elixhr, sumtotal elixhr platform, elixhr, human resources, hr data, hr processes, hr systems, hr technology, integration, master data management, mdm, mdm technology, talent expansion, platforms, human resource technology, business technology
    
SumTotal Systems
Published By: Oracle     Published Date: Aug 17, 2017
50% of guests do not want to be served by a robot but 80% of operators say robots will be cleaning restaurants by 2027 50% of guests want to be recognized without giving a name or loyalty card 54% of restaurant operators would like to see artificial intelligence helping with menu planning
Tags : 
anticipating, consumer trends, seeking innovations, enhance guest experiences
    
Oracle
Published By: Red Hat     Published Date: Nov 30, 2015
FICO, a financial services provider, wanted to address small-to-medium business (SMB) and midmarket customer requests for solutions without on-premise installation. To transition from an on-premise model to a cloud- and services-based infrastructure, FICO chose to build an OpenStack® cloud using Red Hat® solutions, including OpenShift by Red Hat and Red Hat Enterprise Linux® OpenStack Platform. As a result, FICO generated US$10 million in sales to new customers, reduced solution time to market by 50%, and lowered storage and overall infrastructure costs.
Tags : 
fico, smb, customer requests, enterprise applications
    
Red Hat
Published By: Dun & Bradstreet     Published Date: Jun 08, 2016
THE B2B MARKETERS GUIDE TO THE WORLD OF PROGRAMMATIC ADVERTISING While some in the B2B world are quickly jumping on the programmatic advertising bandwagon, many more don’t know the first thing about it or what the benefits are. That’s probably why you’re checking out this nifty little guide right now. Whether you’re a beginner with a basic curiosity about programmatic, or you have already executed a programmatic ad buy but want to learn more, you’ve come to the right place. After skimming through the pages of this book, you’ll learn exactly what programmatic is, why you need it, how it works, and why there’s no looking back when planning you’re next great ad campaign. You’ll discover exactly why Programmatic Matters.
Tags : 
    
Dun & Bradstreet
Published By: CA Technologies     Published Date: Jun 04, 2015
DevOps helps drive continuous collaboration with the end-customer, gaining further visibility into online and mobile application usage and its effect on the brick-and-mortar experience. The data your company can derive from this collaboration should be used to continuously validate assumptions made earlier in the development process. Today’s empowered consumers have high expectations for the companies they do business with. They expect real-time communication, instant information, and the ability to connect in multiple ways. And they want it to be simple. A DevOps approach can help to accomplish this.
Tags : 
    
CA Technologies
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search