CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

white

Results 26 - 50 of 6378Sort Results By: Published Date | Title | Company Name
Published By: Infinidat EMEA     Published Date: May 14, 2019
Virtualization is the standard in enterprise IT environments for consolidating servers, enhancing businstrators that reduces their Total Cost of Ownership (TCO) and helps speed the application development process. However, as improvements have been made with server technology, storage technoless continuity, and improving business agility. VMware provides an architecture for server adminiogy has become the bottleneck. Legacy storage solutions can’t keep pace with thousands of virtual machines demanding maximum IOPS along with high bandwidth at the lowest latency. Infinidat’s InfiniBox removes the storage bottleneck for VMware environments. The InfiniBox enterprise storage array delivers faster-than-all-flash performance, high availability, and capacity density at petabyte scale. This Infinidat white paper is written for VMware and storage administrators to introduce them to the integration capabilities of the InfiniBox for VMware.
Tags : 
    
Infinidat EMEA
Published By: ServiceSource     Published Date: Jun 18, 2019
Market shifts and evolutions over time have brought us to a very unique point in B2B commerce. We’ve rapidly accelerated through several transitions: from a product economy, to the service economy, to the subscription economy, and today, the experience economy. Download the whitepaper to learn how ServiceSource can provide the most comprehensive and streamlined customer journey experience that spans the entire B2B customer lifecycle.
Tags : 
    
ServiceSource
Published By: ServiceSource     Published Date: Aug 14, 2019
Dive into our latest whitepaper “Architecting Your Customer’s Success,” where we outline a step-by-step guide to creating personalized customer success plans that result in more positive and profitable outcomes for your customers, along with increased retention rates and revenue for your own business.
Tags : 
    
ServiceSource
Published By: Dell EMC     Published Date: Aug 01, 2019
In the Principled Technologies datacenter, we tested the All-Flash Dell EMC SC5020 storage array and the HPE Nimble Storage AF5000 array to see how well they performed while handling two workloads at once. The Dell EMC array handled transactional database workloads and data mart imports better than the HPE solution without sacrificing performance. Download this whitepaper from Dell and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Aug 01, 2019
Pursuing agility to truly impact business transformation requires embracing date center modernization as a core competency. Crucial to this is having the most up-to-date IT instructure to support the scale and complexity of a changing technology landscape. Companies must embrace this imperative by adopting software-defined data center principles, embracing modernization, and automating their IT management processes. Those that do will propel business innovation and deliver superior customer experiences with fast, secure, and reliable business technology. Download this whitepaper from Dell and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: SAS     Published Date: Sep 05, 2019
Organizations are charging ahead with investments in cloud and analytics to deliver agility, scalability and cost savings. With computing power advancements and continuous growth of data, cloud provides the elastic workloads and flexibility required for modern business. However, the environment of flexibility and choice that cloud provides also creates complexity and challenges. In this white paper, learn how organizations are applying expertise and using the latest methods to move analytics to the cloud, including: • Why are organizations moving analytic work to the cloud? • What are the key challenges and misconceptions? • How do IT leaders provide choice while maintaining control?
Tags : 
    
SAS
Published By: Jamf     Published Date: Aug 12, 2019
Since its origin, Mac has been an instrumental tool in helping K-12 schools provide the right resources to students and staff. As the must-have technology for teachers and computer labs, Mac and its wealth of available apps help ensure success in elementary schools all the way through high school graduation. Now, with more Mac computers making their way into school environments than ever before, the need to properly deploy, manage and secure Apple is at an all-time high. This white paper examines how purpose-built management solutions are essential to a successful Apple strategy.
Tags : 
    
Jamf
Published By: Expert System     Published Date: Aug 07, 2019
When it comes to embracing new technologies like Artificial Intelligence (AI), it’s easy for companies who are curious to be influenced by extreme examples of success or failure. Indeed, a lot of the stories of failure and disappointment are often based on exaggerated expectations. However, such stories are not necessarily helpful or instructive for a company who is considering AI for its business. Instead, a more realistic analysis of the challenges and opportunities at play is in order. In this white paper, we will analyze both sides of the AI issue and help you discover the right way to approach your AI journey.
Tags : 
    
Expert System
Published By: Shape Security     Published Date: Sep 12, 2019
Online credentials have been stolen and compromised for almost as long as the Internet has existed. But in the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. Theft of user credentials has ramped up significantly for a number of reasons including: Users are reusing the same usernames and passwords across multiple sites Automated tools can take stolen credentials and test them on other sites at a massive scale Many customers have high value assets that are extremely lucrative targets for cyberattacks In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Tags : 
    
Shape Security
Published By: Bell Micro     Published Date: Jun 14, 2010
In this white paper, we describe the XIV snapshot architecture and explain its underlying advantages in terms of performance, ease of use, flexibility and reliability.
Tags : 
bell micro, hardware, storage management, vmware, ibm xiv, network architecture, server hardware
    
Bell Micro
Published By: Great Bay Software     Published Date: Jan 09, 2019
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : 
virtela, healthcare, remote user satisfaction, roi
    
Virtela Communications, Inc.
Published By: Juniper Networks     Published Date: Jul 31, 2019
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves. Download this whitepaper to know more about key recommendations including: • Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities • Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded • Ensuring that your organization has a unified view of your assets and the threat environment
Tags : 
network management, network security, network security appliance, security, security architecture
    
Juniper Networks
Published By: IBM     Published Date: Aug 26, 2019
Cyberspace is extremely difficult to secure. The basic approach to security is proving to be inadequate to the demands of the aggressive nature of the environment. A paradigm shift is necessary and soon. In this whitepaper, discover a possible change from a selective model to one that is pervasive. A significant modification in the basic structure of computing that is easy to implement and removes all barriers to full scale encryption.
Tags : 
cryptocurrency, bitcoin, blockchain
    
IBM
Published By: NEC     Published Date: Sep 14, 2009
This white paper is a business briefing for C-Level Executives on how integrating a range of technologies - including unified communications, service oriented architecture, virtualization and cloud computing - can transform the productivity and profitability of large enterprises.
Tags : 
nec, virtualization, soa, service oriented architecture, cloud computing, unified communications, sla, slas, service level agreement, vaas, mashup, enterprise communications
    
NEC
Published By: MuleSoft     Published Date: Apr 15, 2019
eCommerce offers consumers new ways to interact with traditional retailers, resulting in changed consumer preferences – 63% of customers today would switch brands for a better connected experience, and 75% want personalized offers based on purchase history. Traditional retailers need to consider how to build a new digital retail platform strategy within their business models to engage with consumers and help maintain their competitive edge. Read this whitepaper to learn: A 4-step strategy for retailers to build a retail digital platform strategy with APIs. The role APIs can play in optimizing consumer journey personalization and creating new revenue channels. How a leading fast food company created a unified consumer experience by adopting a platform-based business model.
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Jun 27, 2019
A connected, agile IT landscape serves as the foundation for a successful business. SAP integration requires the right technology, a strategic approach to connect SAP and third-party systems, and a means of enabling your organization to achieve success. Learn how MuleSoft’s Anypoint Platform and MuleSoft Catalyst enable you to unlock SAP across the domains of people, process, and technology to drive innovation and change the clock speed of your business. Download this whitepaper to learn about: The top 3 challenges to SAP integration. How Anypoint Platform connects SAP to any app, data, or device. Abstracting configuration complexity with an API-led approach. How MuleSoft Catalyst empowers your teams to scale innovation.
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Jun 27, 2019
As the leading CRM system, Salesforce can accelerate and increase sales, enhance customer loyalty, and grow marketing capabilities. But how can businesses extend Salesforce to streamline business processes and maximize services and solutions? Effective and efficient integration of Salesforce with adjacent enterprise systems — such as databases, ERP and CRM systems, and custom applications — is critical to enabling sales teams, increasing revenue, and better serving customers. Across the broad spectrum of Salesforce integration needs, patterns emerge for how to best address integration challenges. Integration patterns are the most logical sequence of steps to solving a specific type of integration problem. Learn how to synchronize CRM systems, migrate from legacy CRM systems, broadcast ERP data into your CRM system, and more. Download the whitepaper now.
Tags : 
    
MuleSoft
Published By: Velaro     Published Date: Jul 09, 2014
Application downtime impacts everyone. This paper provides best practices for communicating application downtime to end-users in a manner that maintains - or can even improve- your organization's credibility and brand image. Learn what to do and what not to do in this informative white paper.
Tags : 
    
Velaro
Published By: U.S. Cellular     Published Date: Aug 12, 2019
Are you ready to implement field service solutions, but don’t know where to begin? Getting started is actually very easy. All you need to do is choose the solutions that work best for your business. In this easy-to-read white paper, you’ll learn about three simple ways you can build the best possible field service solution for your business. Whether you’re planning to dive in headfirst, or dip your toes in the water, you can find optimal solutions for your current and future needs. Check out the white paper and discover how you can use field service management solutions to your advantage!
Tags : 
    
U.S. Cellular
Published By: The Economist Group     Published Date: Aug 28, 2019
In a digital world, customers expect banks to connect all the dots and deliver omnichannel experiences that are seamless, personalized, and yes, delightful. Whether your customers visit branch locations or engage on mobile apps, it’s essential that at the enterprise level, you're able to understand and anticipate their needs. Understanding your data is key to this kind of responsiveness. When you’re able to harness data and segment customers in new and exciting ways, target the right markets, and offer relevant products at the right time you can drive new opportunities, generate new revenue streams, and increase the value of every customer. To find out more download this whitepaper today.
Tags : 
    
The Economist Group
Published By: SAP Concur     Published Date: Aug 07, 2019
"Reworking an outdated invoice policy can be intimidating. Get a head start with this whitepaper, produced by Proformative and sponsored by SAP Concur. You'll get 9 tips for building an invoice policy and a template to help you create a vendor invoice and will take the pain out of accounts payable management. Once created and enforced, an effective accounts payable policy will: Reduce time spent on approving invoices Better store and retain important documents Make pulling documents for research, audit or litigation easier"
Tags : 
    
SAP Concur
Published By: SAP Concur     Published Date: Aug 07, 2019
"A successful CFO stays abreast of financial technology trends, and how they will impact their organization both now and in the future. Get informed with this SAP Concur sponsored CFO whitepaper. You’ll learn about the 5 latest trends in fintech that should be on any CFO’s radar. By applying these CFO trends strategically to your financial processes, you will: - Streamline back-office operations through the use of robotics - Integrate the next-generation of cloud computing - Learn the most strategic ways to improve budgeting procedures Download the Whitepaper today"
Tags : 
    
SAP Concur
Published By: SAP Concur     Published Date: Aug 07, 2019
"Spend Management is the planning, process, and system of managing business dollars to positively affect the production of products and services. Spend management usualy includes processes relating to procurement, supply chain management, and outsourcing. Optimal spend management relies on the ability to understand and control company spend through automation tools and analytics. Steps to Strategic Spend Management All CFOs are concerned with how their company is spending its money. However, this is of particular concern for CFOs of small to mid-size businesses who need to manage their cash flow effectively to survive. To survive and maintain a competitive advantage, companies need to be strategic in their spend management and identify ways to invest wisely to meet current demands and fuel growth for the future. Expense and invoice management can no longer be viewed as simply a cost center. Download this white paper to explore five initiatives that can help guide your company towa
Tags : 
    
SAP Concur
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search