CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

web app

Results 351 - 375 of 977Sort Results By: Published Date | Title | Company Name
Published By: Fujitsu     Published Date: Dec 08, 2017
Join leading industry experts from Fujitsu, Salesforce and a special guest from Canon, as they share their expert insights on the future of Digital Enterprise and how manufacturing companies can accelerate their digital transformation journey. During this interactive discussion, they will: • Reveal how to identify and prioritize your critical issues; • Show how Canon Information & Imaging Solutions, is driving growth through an innovative outcome-based service model; • Demo a real-life digital transformation story; • Show how to see more, act fast, optimize, anticipate and power innovates your way to success. This webinar also features Fujitsu's unique digital transformation approach to help you understand where you are in your digital transformation journey and the actions you can take to accelerate it. Watch for this amazing webinar and a link will be sent to you via email.
Tags : 
fujitsu glovia, glovia enterprise planning software, digital transformation, fujitsu webinar
    
Fujitsu
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
As enterprises contine to adopt web-based apps, users spend more time their web browser than ever before. With Chrome Browser, IT can set a variety of policies to help users be more productive across the web. From enabling security policies that protect users, to making to making it easy to access needed boomarks and extensions, IT can offer users a better browsing experience to support users as they get their job done.
Tags : 
    
Google Chrome Enterprise
Published By: Zerto     Published Date: Oct 08, 2018
IT professionals are under tremendous pressure to ensure IT Resilience and that business technology services are protected and available 24/7. In this webinar, Forrester’s Senior Analyst, Naveen Chhabra, explores the practices and technologies that have evolved to become the tech infrastructure needed to help organizations achieve true IT resilience and giving IT the tools they need. You will hear about: The state of the IT Resilience market.New and evolving approaches and technologies that are leading organizations to solve for IT resilience.The tools IT needs in order to focus on modernization and building a solid cloud strategy.
Tags : 
it resilience, business technology, forrester, tech infrastructure
    
Zerto
Published By: Webroot UK     Published Date: Feb 04, 2013
This case study describes how a technology company with globally dispersed locations addressed concerns about Web security. These included an increasing number of mobile workers, numerous malware infections on its network, and the legal and financial risks of employees accessing inappropriate material on the Internet.
Tags : 
cascade, microtech, security, maleware protection, web proxy, reduced, workload, benefits
    
Webroot UK
Published By: Webroot UK     Published Date: Feb 04, 2013
This case study describes how a Law Firm with rapid growth and globally dispersed locations addressed concerns about Web security.
Tags : 
protects, appleby, law firm, web security, it analyst, bandwidth, cloud-based, business technology
    
Webroot UK
Published By: Webroot UK     Published Date: Feb 04, 2013
The Webroot solution provides customers with a layered approach to security including products for Web and email security, email archiving and endpoint security. Offerings can be implemented as an integrated suite or as individual point products.
Tags : 
solution, malware, email archiving, endpoint security, individual point products, web, business technology
    
Webroot UK
Published By: Dynatrace     Published Date: May 21, 2019
The Internet of Things (IoT) is exploding across every industry, everywhere, starting a new chapter in digital transformation. As new use-cases for IoT continue to emerge, the digital experiences they enable will become increasingly critical to business success, connecting all aspects of human society. Based on a global survey of 800 CIOs, this report examines the challenges organizations face as they begin to explore and deploy Internet of Things (IoT) use-cases and web-scale applications.
Tags : 
    
Dynatrace
Published By: IBM APAC     Published Date: Mar 19, 2018
IDC Analyst Report: A New Breed of Servers for Digital Transformation Most organizations today are on a digital transformation journey and a server infrastructure is a critical component of that journey. Read the IDC Analyst Report “A New Breed of Servers for Digital Transformation" to find out: • A roadmap for servers in three stages - from running simple stateless web applications to adopting open source DBMSs to cloud to predictive modeling • How you can take advantage of OpenPOWER-based infrastructure from a price/performance perspective • Ways to lower your IT spend and increase your workloads with minimal investment
Tags : 
    
IBM APAC
Published By: CA Service Assurance     Published Date: May 23, 2011
IDG Research Services recently conducted a study via the CIO Forum on LinkedIn. The results found that CIOs and IT leaders recognize the business impact of web application performance. It's all about the end user: ensuring customer satisfaction, increasing employee productivity, and lowering IT costs.
Tags : 
web application performance, cio, end user, idg research services, linkedin, it leaders, ca technologies, customer satisfaction
    
CA Service Assurance
Published By: CA Service Assurance     Published Date: May 08, 2011
While the rise of web-enabled applications and the zero latency customers expect from them has driven many enterprises to adopt performance management solutions, they are finding that basic understanding of how their overall user populations are being served is simply not enough.
Tags : 
application experience, application delivery, customer app experience, user satisfaction, quality assurance, service management
    
CA Service Assurance
Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise
Published By: F5 Networks Inc     Published Date: Apr 18, 2012
Cloud computing has become another key resource for IT deployments, but securing applications and data in the cloud remains a concern. Learn strategies for keeping your most precious assets safe, no matter where they reside.
Tags : 
cloud computing, cloud security, protection data in the cloud, cloud data protection, cloud deployment, application protection in the cloud, authentication, aaa
    
F5 Networks Inc
Published By: Okta     Published Date: Jul 05, 2012
For many organizations, portals are an increasingly important way of providing critical application access to partners and/or customers. Assembled from multiple web applications, portals introduce unique identity management challenges, because unlike internal employees, users from customers or partners aren't typically stored in the corporate directory. This forces administrators to maintain multiple user-stores and end-users to register, and manage logins for, each app individually.
Tags : 
okta, partner portals, enterprises, target applications, it management
    
Okta
Published By: Okta     Published Date: Jan 30, 2013
The Salesforce.com’s suite of platforms and applications offer enterprises the ability to roll out rich customer-facing applications quickly, with no hardware or operations infrastructure required. Learn how Okta solves problems with web apps.
Tags : 
security, enterprise applications, data management, business technology, data center
    
Okta
Published By: Okta     Published Date: Jan 31, 2013
Okta’s cloud-based identity and access management service solves the issue of user identities on multiple networks with a highly available solution for all cloud based and web based application AD integrations. Learn how Okta can help you.
Tags : 
okta, active directory, integration, architecture, okta, knowledge management, enterprise applications, data management
    
Okta
Published By: Okta     Published Date: Apr 03, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : 
multi-factor authentication, assurance of authentication, consumer and enterprise web, mobile applications, knowledge management, enterprise applications
    
Okta
Published By: M86 Security     Published Date: Dec 01, 2010
This white paper addresses the risks that concern IT security professionals, many of which they feel powerless to control.
Tags : 
m86 security, web security, malware protection, web 2.0 application, information exchange, collaboration, business enablement, anti spam
    
M86 Security
Published By: Blue Coat Systems     Published Date: Oct 24, 2011
Optimized Video Delivery automatically minimizes bandwidth impact and improves user experience! Find our more in this white paper.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, convergence, productivity, content management, business technology
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Oct 24, 2011
Learn how to proactively address the latest trends in WAN traffic. Tomorrow is here: video, Web 2.0, and SaaS applications are overtaking the WAN.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, network architecture, network management, network performance, network performance management
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Oct 24, 2011
ERP and Business Intelligence are essential to your success. Read this and learn how to improve productivity and decision-making using Blue Coat WAN Optimization.
Tags : 
blue coat, wan optimization, resource management, sap, erp, secure web gateway, application performance monitoring, netweaver
    
Blue Coat Systems
Published By: Oracle     Published Date: Apr 03, 2012
Download this white paper, Top Reasons to Implement an SOA Governance Strategy: A List for IT Executives, for a guide to governance that will set you on the right path.
Tags : 
soa, service oriented architecture, networking, middleware, weblogic, oracle, information technology, web services
    
Oracle
Published By: AppDynamics     Published Date: Nov 02, 2017
With an estimated 9 million developers worldwide, the Java community is a very robust one. One of the most important uses of Java today is building applications for mobile devices using the Android operating system. In addition, Java remains incredibly popular for enterprise applications and client-server web applications, and is also a very common language of instruction in software development courses.
Tags : 
    
AppDynamics
Published By: Citrix     Published Date: Nov 04, 2015
More and more, your customers are connecting to your products and services on their mobile devices. So if your goal is to provide great customer service, that’s where you need to be: in the app, interacting with customers. Join this webinar to hear industry experts discuss how in-app support will be the next era of customer service. Emerging mobile technologies are posing new challenges and opportunities — are you and your support team prepared? Attend this live webinar to learn: • Ways to evaluate your support center for the mobile world • How new technologies will impact the customer service industry • Why your customer service should offer in-app support options • And more…
Tags : 
    
Citrix
Published By: Avi Networks     Published Date: May 23, 2019
With growing adoption of container ecosystems, Kubernetes and OpenShift are becoming easy and popular choices for enterprises today. This webinar will look at the bigger picture by exploring all the components necessary to deploy a production-ready container-based application. Register to watch this webinar to: Review how containers and microservices have changed traditional application delivery Take a deeper look into application service deployment considerations in Kubernetes Understand the 'North-South' and 'East-West' nature of microservices Learn how the Avi fits into this ecosystem - working either alongside or replacing Kube-proxy To register to watch this webinar, simply fill out the form on this page.
Tags : 
    
Avi Networks
Published By: AWS     Published Date: Aug 06, 2018
Learn more Salesforce and Amazon Web Services at http://amzn.to/2zhcn1v. Building and releasing cutting-edge applications quickly can be difficult when you lack proper tooling and integrated customer data. Salesforce Heroku delivers a cloud-native, developer-friendly platform that streamlines application development by integrating formerly siloed customer data and removing the burden of infrastructure management, allowing developers to focus their attention solely on creating customer-centric applications. Join the upcoming webinar to hear how the Financial Times builds customer-driven applications with faster cycle times with Heroku and AWS.
Tags : 
    
AWS
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search