CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

white

Results 376 - 400 of 6424Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: Oct 08, 2015
Download this white paper to learn how the company deployed a Dell and Hadoop cluster based on Dell and Intel® technologies to support a new big data insight solution that gives clients a unified view of customer data.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Oct 12, 2015
This business-oriented white paper explains four options for starting your Hadoop journey. This paper also outlines the benefits of Hadoop and highlights some of the many use cases for this new approach to managing, storing and processing big data.
Tags : 
    
Dell EMC
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
This white paper explains the benefits of using Kaspersky Security for Virtualization and its Light Agent technology.
Tags : 
security application, virtualisation, security, kaspersky, security solutions, application security, internet security, security management, virtualization
    
Kaspersky Lab Australia and New Zealand
Published By: Websense     Published Date: Jul 08, 2014
A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.
Tags : 
detecting unknown threats, websense, next-generation firewall, anti spam, anti spyware, anti virus, application security, encryption, hacker detection, high availability, internet security, intrusion detection, intrusion prevention, web service security
    
Websense
Published By: International Business Systems (IBS)     Published Date: Aug 30, 2011
If you're in wholesale distribution, you've got to keep your eyes on five main value drivers. This whitepaper focuses on the first - gross margin.
Tags : 
distribution logistics, distribution management, wholesale distribution, distribution resource management, supply chain management, erp, enterprise, resource, resource planning, ibs, enterprise applications, business technology, research
    
International Business Systems (IBS)
Published By: International Business Systems (IBS)     Published Date: Aug 30, 2011
This whitepaper explores six fatal mistakes" in ERP implementations, along with methods that can be employed to avoid or, at worst, rectify them.
Tags : 
erp, ibs, distribution logistics, distribution management, wholesale distribution, distribution resource management, supply chain management, erp, enterprise, resource, resource planning, ibs
    
International Business Systems (IBS)
Published By: Zebra     Published Date: Oct 12, 2011
In this whitepaper, find out how mobility maximizes return on inventory investment - and how understanding this truth is one catalyst that has the power to make average retailers great.
Tags : 
zebra industry solutions, barcode industry solutions, barcode business solutions, bar code industry solutions, bar code business solutions, rfid industry solutions, rfid business solutions, rfid industry solutions, rfid business solutions, business technology
    
Zebra
Published By: Zebra     Published Date: Oct 12, 2011
In this white paper, find out how mobile transaction systems provide a way for retailers to reduce checkout lines, and the time customers spend standing in them, without adding expensive checkout counters or staff.
Tags : 
zebra industry solutions, barcode industry solutions, barcode business solutions, bar code industry solutions, bar code business solutions, rfid industry solutions, rfid business solutions, rfid industry solutions, rfid business solutions, business technology
    
Zebra
Published By: Zebra     Published Date: Oct 12, 2011
Re-pricing products in the store has become a strategic tool that retailers apply to increase traffic and sales. This white paper explains how retailers are profiting from mobile markdown printing and how stores can leverage different printing applications to create more value.
Tags : 
zebra industry solutions, barcode industry solutions, barcode business solutions, bar code industry solutions, bar code business solutions, rfid industry solutions, rfid business solutions, rfid industry solutions, rfid business solutions, business technology
    
Zebra
Published By: Zebra     Published Date: Oct 12, 2011
This white paper outlines the requirements for kiosks - optimizing design, placement and component selection - in order to help you and your business meet specific use cases, various environments and goals.
Tags : 
zebra industry solutions, barcode industry solutions, barcode business solutions, bar code industry solutions, bar code business solutions, rfid industry solutions, rfid business solutions, rfid industry solutions, rfid business solutions, business technology
    
Zebra
Published By: Cisco     Published Date: Jun 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video.
Tags : 
    
Cisco
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8"
Tags : 
security, perimeter security, zero trust, cloud, enterprise security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : 
behavioral analytics, logging analytics, zero trust security model, security, cyber criminals, security breach
    
Akamai Technologies
Published By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Are you considering data virtualization for your organization today? If so this whitepaper synthesizes the 10 things you need to know as you commence your data virtualization journey.
Tags : 
    
TIBCO Software GmbH
Published By: TIBCO Software GmbH     Published Date: Jan 22, 2019
The Internet of Things (IoT) didn’t just connect everything everywhere; It laid the groundwork for the next industrial revolution. Connected devices sending data was only one achievement of the IoT—but one that helped solve the problem of data spread across countless silos that was not collected because it was too voluminous and/or too expensive to analyze. Now, with advances in cloud computing and analytics, cheaper and more scalable factory solutions are available. This, in combination with the cost and size of sensors continuously being reduced, supplies the other achievement: the possibility for every organization to digitally transform. Using a Smart Factory system, all relevant data is aggregated, analyzed, and acted upon. Sensors, devices, people, and processes are part of a connected ecosystem providing: • Reduced downtime • Minimized surplus and defects • Deep insights • End-to-end real-time visibility
Tags : 
    
TIBCO Software GmbH
Published By: CA Technologies     Published Date: Oct 22, 2014
A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.
Tags : 
improving consumer experience, optimal it service delivery, cloud service management, cloud computing, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 22, 2014
A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.
Tags : 
improving consumer experience, optimal it service delivery, cloud service management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 22, 2014
A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.
Tags : 
improving consumer experience, optimal it service delivery, cloud service management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 22, 2014
A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.
Tags : 
improving consumer experience, optimal it service delivery, cloud service management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This white paper offers a detailed look at the solution’s architecture, and some of the key features that make it stand apart from the competition.
Tags : 
ca uim, infrastructure management solutions, infrastructure management, virtualization, cloud computing, infrastructure
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers, including both the organizational and strategic impacts as well as the business case surrounding it. It goes further to examine CA Unified Infrastructure Management as an example of unified IT monitoring, and reviews three case studies where the solution has been deployed for active use in a unified manner.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim, enterprise applications, data management, business technology, virtualization, cloud computing, infrastructure
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 09, 2015
This whitepaper details the 5 essential pillars of API management and which components are required for effective, enterprise-level API Management.
Tags : 
api management, business security, components of api management, api solutions, enterprise level api management, access control, application security
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 09, 2015
This White Paper provides information on how enhance delivery secure and improve customer experience.
Tags : 
security demands, ways to enhance delivery of secure, protect the business, new security services, delivery security solutions, access control, anti spam, application security, identity management
    
CA Technologies
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search