CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

traffic

Results 151 - 175 of 529Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Jan 17, 2018
For many of us, the term “smart city” conjures up images of sensors collecting data about everything from traffic patterns to energy use. It’s common for government leaders to think, “That’s not for us. We’re not there yet.” But if your organization is collecting data of any kind, you are in a position to use that data to create a smarter city for your citizens. Download this whitepaper for 10 examples of analytics being used to solve problems or simplify tasks for government organizations.
Tags : 
    
SAS
Published By: MoreVisibility     Published Date: Dec 19, 2017
The Internet has vastly changed the B2B sales process. Whereas potential buyers used to reach out to businesses early on in the process, many now come to a buying decision on their own – aided by the plethora of free content available online. Businesses that succeed in this new world will have a hand in creating the content that helps buyers make decisions. This requires strategy, resources and an ongoing commitment toward creating the content that anticipates and answers your buyers’ questions. Do that, and you have a greater chance of influencing their decisions, and inspiring their loyalty. In this report, we outline the steps for creating a holistic B2B web content strategy, from performing research to creating content that drives traffic and cultivates leads.
Tags : 
    
MoreVisibility
Published By: MoreVisibility     Published Date: Dec 19, 2017
As the approach to strategic business decision making becomes more and more data driven, a method for consolidating our various data sets, which are often spread across multiple systems becomes exceedingly important. Two of the biggest players in data driven decision making are website analytics platforms and customer relationship management systems. The former includes accumulating data on top of the funnel behavior such as site traffic origins, lead generation, content consumption tracking, device usage, and overall site behavior. While the latter has a focus more on bottom of the funnel activity such as lead nurturing, customer status, lifetime value, etc. Lastly, without communication between these two essential platforms, a complete understanding of your customers, from lead to longtime client, may never be possible. A web analytics (Google Analytics) and CRM integration provides you with a 360 degree view of your customer base, so that you can understand not just what PPC efforts
Tags : 
    
MoreVisibility
Published By: Oracle Dyn     Published Date: Dec 06, 2017
DNS speed and reliability are fundamental to the performance of your website and essential to your business. Contact Dyn today to learn how a supplemental DNS service can help you optimize DNS performance and improve user experiences. We can help you determine which multi- DNS option is best for your business and assist with planning and service integration efforts.
Tags : 
dns, service, management, traffic, vendors, delegation, protocol, traffic
    
Oracle Dyn
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Creating a highly scalable, reliable, and efficient DNS infrastructure takes time, money, and expertise. You can accelerate your success and contain costs with a cloud-based service. Cloud-based DNS also exposes myriad opportunities to leverage the DNS infrastructure for global load balancing and traffic steering across hybrid environments.
Tags : 
dns, performance, reliability, network, global, anycast, customer, satisfaction, revenues, designing
    
Oracle Dyn
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System (DNS) is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct website when entering a URL. DNS mappings are maintained in special-purpose servers called DNS nameservers. When a user enters your company’s URL, a DNS query is routed to a DNS nameserver containing the address mappings for your company’s internet domain.
Tags : 
traffic, dns, internet, visibility, programming, interfaces, optimization, routing
    
Oracle Dyn
Published By: Oracle Dyn     Published Date: Dec 06, 2017
In this eBook, we’ll make the case for why you need to rethink DNS from several different and important perspectives. The first is to rethink your DNS choices. Choices around solutions, vendors and configurations that were made several years ago may no longer be optimal in today’s environment. The second is to rethink the importance of DNS for building digital resilience, including the need for a secondary DNS configuration. The third is to rethink the value of DNS as it has evolved to be so much more than simple domain name resolution. Modern DNS with intelligent response capabilities continues to open up new opportunities for traffic steering across hybrid resources.
Tags : 
scalability, dynamic network, dns, world wide, point of presence, pop, hardware, systems
    
Oracle Dyn
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Today’s network edge is increasingly taking on a critical role in connecting users to the digital content and web services that they need to reach. This is driving a new approach to load balancing that starts at the edge. Powered by DNS, edge-based global load balancing (GLB) steers user traffic to destination endpoints based on IT-defined policies. GLB works independently or in concert with site-based, or on premises, load balancing technologies in a “federated” system. This approach applies load balancing and traffic steering policies at each layer from the user edge to the host—whether virtual or physical—where the request is actually served.
Tags : 
geo-zoning, path, optimization, resource, asset, balancing, virtual, resource
    
Oracle Dyn
Published By: Oracle     Published Date: Nov 30, 2017
In this eBook, we’ll make the case for why you need to rethink DNS from several different and important perspectives. The first is to rethink your DNS choices. Choices around solutions, vendors and configurations that were made several years ago may no longer be optimal in today’s environment. The second is to rethink the importance of DNS for building digital resilience, including the need for a secondary DNS configuration. The third is to rethink the value of DNS as it has evolved to be so much more than simple domain name resolution. Modern DNS with intelligent response capabilities continues to open up new opportunities for traffic steering across hybrid resources.
Tags : 
scalability, dynamic network, dns, world wide, point of presence, pop, hardware, systems
    
Oracle
Published By: Oracle     Published Date: Nov 30, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System (DNS) is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct website when entering a URL. DNS mappings are maintained in special-purpose servers called DNS nameservers. When a user enters your company’s URL, a DNS query is routed to a DNS nameserver containing the address mappings for your company’s internet domain.
Tags : 
traffic, dns, internet, visibility, programming, interfaces, optimization, routing
    
Oracle
Published By: Oracle     Published Date: Nov 30, 2017
Today’s network edge is increasingly taking on a critical role in connecting users to the digital content and web services that they need to reach. This is driving a new approach to load balancing that starts at the edge. Powered by DNS, edge-based global load balancing (GLB) steers user traffic to destination endpoints based on IT-defined policies. GLB works independently or in concert with site-based, or on premises, load balancing technologies in a “federated” system. This approach applies load balancing and traffic steering policies at each layer from the user edge to the host—whether virtual or physical—where the request is actually served.
Tags : 
geo-zoning, path, optimization, resource, asset, balancing, virtual, resource
    
Oracle
Published By: Oracle     Published Date: Nov 30, 2017
Creating a highly scalable, reliable, and efficient DNS infrastructure takes time, money, and expertise. You can accelerate your success and contain costs with a cloud-based service. Cloud-based DNS also exposes myriad opportunities to leverage the DNS infrastructure for global load balancing and traffic steering across hybrid environments.
Tags : 
dns, performance, reliability, network, global, anycast, customer, satisfaction, revenues, designing
    
Oracle
Published By: Oracle     Published Date: Nov 30, 2017
DNS speed and reliability are fundamental to the performance of your website and essential to your business. Contact Dyn today to learn how a supplemental DNS service can help you optimize DNS performance and improve user experiences. We can help you determine which multi- DNS option is best for your business and assist with planning and service integration efforts.
Tags : 
dns, service, management, traffic, vendors, delegation, protocol, traffic
    
Oracle
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe, qos, security
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: SAP     Published Date: Nov 22, 2017
To keep up with sweeping global economic and societal changes, public services organizations are undergoing significant technology-driven transformation. Aging populations, rapid urbanization, political instability, concerns about sustainability and resiliency, and changing worker and resident expectations are driving public services organizations to radically improve operations and service delivery. At the core of this transformation is the ability to collect and process vast amounts of data to help to improve outcomes and services. One way to generate this data is through the Internet of Things (IoT) — which IDC defines as a network of networks of uniquely identifiable endpoints or “things” that communicate without human interaction using IP connectivity. The IoT is a transformational technology that can reshape the public sector, enabling improved outcomes and new services such as remote patient monitoring, advanced traffic solutions and predictive policing.
Tags : 
global, economic, societal, technology, driven, transformation, political
    
SAP
Published By: Oath     Published Date: Nov 20, 2017
On the road, traffic slows you down— online, it drives sales. When AutoWeb, a leading automotive marketing site, saw success with its search campaigns via Oath’s Yahoo Gemini, it began to test additional Oath ad solutions and found that a layered approach can be a win/win.
Tags : 
    
Oath
Published By: Oath     Published Date: Nov 20, 2017
On the road, traffic slows you down— online, it drives sales. When AutoWeb, a leading automotive marketing site, saw success with its search campaigns via Oath’s Yahoo Gemini, it began to test additional Oath ad solutions and found that a layered approach can be a win/win.
Tags : 
    
Oath
Published By: Oath     Published Date: Nov 15, 2017
On the road, traffic slows you down— online, it drives sales. When AutoWeb, a leading automotive marketing site, saw success with its search campaigns via Oath’s Yahoo Gemini, it began to test additional Oath ad solutions and found that a layered approach can be a win/win.
Tags : 
    
Oath
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : 
anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Nov 13, 2017
In the not so distant past, the way we worked looked very different. Most work was done in an office, on desktops that were always connected to the corporate network. The applications and infrastructure that we used sat behind a firewall. Branch offices would backhaul traffic to headquarters, so they would get the same security protection. The focus from a security perspective was to secure the network perimeter. Today, that picture has changed a great deal.
Tags : 
malware, ransomware, compromised accounts, malicious insiders, visibility, coverage, data breaches, compliance
    
Cisco EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search