CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

configurations

Results 26 - 50 of 126Sort Results By: Published Date | Title | Company Name
Published By: Oracle Dyn     Published Date: Dec 06, 2017
In this eBook, we’ll make the case for why you need to rethink DNS from several different and important perspectives. The first is to rethink your DNS choices. Choices around solutions, vendors and configurations that were made several years ago may no longer be optimal in today’s environment. The second is to rethink the importance of DNS for building digital resilience, including the need for a secondary DNS configuration. The third is to rethink the value of DNS as it has evolved to be so much more than simple domain name resolution. Modern DNS with intelligent response capabilities continues to open up new opportunities for traffic steering across hybrid resources.
Tags : 
scalability, dynamic network, dns, world wide, point of presence, pop, hardware, systems
    
Oracle Dyn
Published By: Oracle     Published Date: Nov 30, 2017
In this eBook, we’ll make the case for why you need to rethink DNS from several different and important perspectives. The first is to rethink your DNS choices. Choices around solutions, vendors and configurations that were made several years ago may no longer be optimal in today’s environment. The second is to rethink the importance of DNS for building digital resilience, including the need for a secondary DNS configuration. The third is to rethink the value of DNS as it has evolved to be so much more than simple domain name resolution. Modern DNS with intelligent response capabilities continues to open up new opportunities for traffic steering across hybrid resources.
Tags : 
scalability, dynamic network, dns, world wide, point of presence, pop, hardware, systems
    
Oracle
Published By: SecureAuth     Published Date: Nov 13, 2017
A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies. This eBook provides a simple guide to explain both penetration testing's purpose and a basic guide to getting you there. Download now and start testing your network today.
Tags : 
    
SecureAuth
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: Dell EMC     Published Date: Aug 17, 2017
This paper presents the results of a three-year total cost of ownership (TCO) study comparing Dell EMC™ VxRail™ appliances and an equivalent do-it-yourself (DIY) solution of standalone server hardware and software from the VMware vSAN ReadyNode™ (hardware compatibility list) configurations. For both options, we modeled total hardware capital expense, total software capital expense and operational expense for small, medium and large clusters over a three-year period.
Tags : 
server hardware, hci, vsan readynode, hardware compatibility, hardware
    
Dell EMC
Published By: Carbonite     Published Date: Aug 02, 2017
Every day, a new product launch promises speed, efficiency or savings for businesses eager to stay a step ahead. But if you’re an IT pro, and it’s your job to onboard the new system, the allure gives way to practical considerations: How are you going to move all that critical data—including dependencies, settings and custom configurations—from one system to another so it all talks to each other the way it’s supposed to? Whether you’re tackling a oneoff project or looking to improve your in-house skills, these eight tips for mastering migration will help you form a strategy, determine costs and find technical solutions to ensure successful migration no matter what platform you’re on or which one you’re moving to.
Tags : 
migration, technical solutions
    
Carbonite
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"DBAs need help with tackling significant issues, including doing more with fewer resources, quickly responding to upgrade and patch needs, while reducing the time spent on cloning databases. Finally, they need help eliminating the time they spend integrating, testing, and deploying full-stack cloud solutions. How can DBAs reconcile these competing demands? Learn more about expanded offerings in a database appliance that are delivering numerous advantages. These new configurations have the potential to help IT derive new benefits in its efforts to serve the business. "
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
DNS Speed and reliability are fundamental to the performance of your website and essential to the growth of your business. In order to overcome outages and ensure digital success it’s important to evaluate your DNS infrastructure and determine which configuration is best for your IT environment at this layer. Discover how you can use Secondary or Multi-DNS architecture to promote business continuity, and optimal DNS resolution performance. Download this Technical Brief on Secondary/Multi-DNS patterns and learn: How multi-DNS patterns can significantly improve security, reliability, and performance of your infrastructure The advantages and limitations of Primary-Secondary, Hidden Master and Primary-Primary configurations The best use cases for implementing a supplemental or secondary DNS service
Tags : 
    
Oracle + Dyn
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"DNS Speed and reliability are fundamental to the performance of your website and essential to the growth of your business. In order to overcome outages and ensure digital success it’s important to evaluate your DNS infrastructure and determine which configuration is best for your IT environment at this layer. Discover how you can use Secondary or Multi-DNS architecture to promote business continuity, and optimal DNS resolution performance. Download this Technical Brief on Secondary/Multi-DNS patterns and learn: • How multi-DNS patterns can significantly improve security, reliability, and performance of your infrastructure • The advantages and limitations of Primary-Secondary, Hidden Master and Primary-Primary configurations • The best use cases for implementing a supplemental or secondary DNS service Learn more! "
Tags : 
    
Oracle + Dyn
Published By: ThousandEyes     Published Date: Mar 14, 2017
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings.
Tags : 
    
ThousandEyes
Published By: ThousandEyes     Published Date: Nov 17, 2016
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings. Watch this video short now!
Tags : 
    
ThousandEyes
Published By: Schneider Electric     Published Date: Nov 11, 2016
There is an increasing trend towards N+1 UPS architectures – rather than 2N – as IT fault tolerance through software continues to improve.
Tags : 
    
Schneider Electric
Published By: Dell EMC     Published Date: Nov 04, 2016
According to recent ESG research, 70% of IT respondents indicated they plan to invest in HCI over the next 24 months. IT planners are increasingly turning toward HyperConverged Infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. HCI consists of a nodal-based architecture whereby all the required virtualized compute, storage, and networking assets are self-contained inside individual nodes. These nodes are, in effect, discrete virtualized computing resources “in a box.” However, they are typically grouped together to provide resiliency, high performance, and flexible resource pooling. And since HCI appliances can scale out to large configurations over time, these systems can provide businesses with investment protection and a simpler, more agile, and cost-effective way to deploy virtualized computing infrastructure. Read this paper to learn more.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 04, 2016
According to recent ESG research, 70% of IT respondents indicated they plan to invest in HCI over the next 24 months. IT planners are increasingly turning toward HyperConverged Infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. HCI consists of a nodal-based architecture whereby all the required virtualized compute, storage, and networking assets are self-contained inside individual nodes. These nodes are, in effect, discrete virtualized computing resources “in a box.” However, they are typically grouped together to provide resiliency, high performance, and flexible resource pooling. And since HCI appliances can scale out to large configurations over time, these systems can provide businesses with investment protection and a simpler, more agile, and cost-effective way to deploy virtualized computing infrastructure. Read this paper to learn more.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 04, 2016
According to recent ESG research, 70% of IT respondents indicated they plan to invest in HCI over the next 24 months. IT planners are increasingly turning toward HyperConverged Infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. HCI consists of a nodal-based architecture whereby all the required virtualized compute, storage, and networking assets are self-contained inside individual nodes. These nodes are, in effect, discrete virtualized computing resources “in a box.” However, they are typically grouped together to provide resiliency, high performance, and flexible resource pooling. And since HCI appliances can scale out to large configurations over time, these systems can provide businesses with investment protection and a simpler, more agile, and cost-effective way to deploy virtualized computing infrastructure. Read this paper to learn more.
Tags : 
data, software-defined, hyper-convergence, hdd, sddc
    
Dell EMC
Published By: MobileIron     Published Date: Oct 21, 2016
The release of Android for Work, combined with the enterprise upgrades in Lollipop, delivers an outstanding opportunity for companies that have long waited to support Android devices as part of their BYOD mix. It also cements the need for a multi-OS EMM platform that is capable of delivering configurations across Android, iOS, and Windows devices. For organizations that want to take advantage of Android for Work, the first step will be to find an EMM provider with with a comprehensive platform and broad experience with multi-OS deployments to ensure their success. Download now to learn more!
Tags : 
    
MobileIron
Published By: Oracle ODA     Published Date: Aug 15, 2016
DBAs need help with tackling significant issues, including doing more with fewer resources, quickly responding to upgrade and patch needs, while reducing the time spent on cloning databases. Finally, they need help eliminating the time they spend integrating, testing, and deploying full-stack cloud solutions. How can DBAs reconcile these competing demands? Learn more about expanded offerings in a database appliance that are delivering numerous advantages. These new configurations have the potential to help IT derive new benefits in its efforts to serve the business.
Tags : 
    
Oracle ODA
Published By: IBM     Published Date: Jul 07, 2016
In this webinar, you will learn about the availability of SAP HANA across the entire IBM Power Systems line with pre-sized IBM POWER8 configurations that are optimised for SAP HANA, highly available/disaster recovery options for SAP HANA on Power Systems deployments, and systems management solutions to maintain the SAP HANA systems. You will also hear client use cases on why they chose to implement their SAP HANA solution on IBM Power Systems..
Tags : 
ibm, sap, sap hana, suse, ibm power systems, enterprise applications, open source
    
IBM
Published By: Cherwell Software     Published Date: Apr 07, 2016
Cherwell Service Management™ software empowers IT organizations to easily manage their infrastructure at a fraction of the cost and complexity associated with traditional, legacy IT service management software. Designed with a metadata-driven approach, the Cherwell Service Management platform can easily be configured to meet process and integration requirements without writing or touching a single line of code. Furthermore, configurations will never break during version upgrades.
Tags : 
best practices, customer support, business intelligence, business optimization
    
Cherwell Software
Published By: AlienVault     Published Date: Mar 30, 2016
Get Real-Time Threat Detection Starting on Day 1 with AlienVault USM Download a free, 30-day trial of AlienVault USM to experience the power of our all-in-one security platform. You’ll see how easy it can be to protect and defend against today’s threats with all of the essential security tools you need. Experience how USM makes it easy to: • Discover all IP-enabled assets on your network • Identify vulnerabilities like unpatched software or insecure configurations • Detect malware like botnets, trojans & rootkits • Speed incident response with remediation guidance for every alert • Generate accurate compliance reports for PCI DSS, HIPAA and more Download Your Free Trial Now!
Tags : 
    
AlienVault
Published By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value Map™ (SVM). The SVM illustrates the relative value of security investment options by mapping security effectiveness and value (TCO per protected - connections per second (CPS)) of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests. Individual PARs are available for every product tested. CARs provide detailed comparisons across all tested products in the areas of: ? Security ? Performance ? Total cost of ownership (TCO)
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected-CPS) of tested product configurations.
Tags : 
    
Citrix Systems
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM illustrates the relative value of security investment options by mapping security effectiveness and value of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests.
Tags : 
citrix, firewall, security, svm, firewalls, intrusion prevention, web service security
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value of tested product configurations.
Tags : 
citrix, waf, firewall, tco, security, network security, application security, firewalls
    
Citrix Systems, Inc.
Published By: Cisco     Published Date: Jan 08, 2016
The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : 
cisco, ngfw, security, svm, firewall, protection, leader, enterprise applications
    
Cisco
Start   Previous    1 2 3 4 5 6    Next    End
Search