CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

traffic

Results 201 - 225 of 529Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Jun 05, 2017
For many of us, the term “smart city” conjures up images of sensors collecting data about everything from traffic patterns to energy use. It’s common for government leaders to think, “That’s not for us. We’re not there yet.” But if your organization is collecting data of any kind, you are in a position to use that data to create a smarter city for your citizens.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 05, 2017
"How do you make your brick-and-mortar stores as smart as your website – so when customers walk in the door, you recognize them and cater to their individual tastes? What’s the key to making in-store shopping as frictionless for your customer as online shopping? Read this research summary from the International Institute for Analytics to get started. You’ll learn how to use analytics to gain advanced insight from the Internet of Things: tracking chips, in-store infrared traffic monitors, interactive kiosks and customer mobile devices, to name a few. With analytics, you’ll identify who’s walking in your store, understand their behavior and preferences, and create engaging experiences for your connected customers at every turn. "
Tags : 
    
SAS
Published By: Optimizely     Published Date: Jun 05, 2017
Learn about statistical significance, statistical error, and the concepts behind Optimizely’s Stats Engine: - Best practices for running your experiments to statistical significance - Tips for communicating results, optimizing low-traffic pages, using confidence intervals, and more - How Optimizely is creating an always-valid view of statistical significance
Tags : 
optimizely, online experiments, statistics, statistical significance, optimizely stats engine
    
Optimizely
Published By: Oath     Published Date: May 31, 2017
Searching for auto-related terms signals that a consumer is interested in a vehicle. And, 96% of people who search for auto-related terms can be found on a Yahoo site within a week of searching. Learn how to leverage these search signals to re-target consumers with native advertising by reading our infographic.
Tags : 
search advertising, native advertising, search ads, native ads
    
Oath
Published By: Akamai Technologies     Published Date: May 24, 2017
Wir haben alle unsere persönlichen Lieblingsapps. Aber können Sie auch nur drei mobile Websites nennen, die Ihnen gefallen? Wohl nicht. Und das liegt daran, dass die Nutzererwartungen allzu häufig enttäuscht werden, wenn Webdesigns, die für Desktop-PCs konzipiert wurden, für Mobilgeräte nachgerüstet werden. Dennoch ist der Smartphone-Traffic höher denn je und steigt weiter an. Dieser Bericht von Forrester-Analysten zeigt, warum es höchste Zeit für einen radikalen Neuanfang ist und wie Ihre Website mit leuchtendem Beispiel vorangehen kann. Laden Sie den Bericht heute noch herunter.
Tags : 
    
Akamai Technologies
Published By: Intel     Published Date: May 24, 2017
An unprecedented level of network traffic is driving enterprises and communications service providers (CommSPs) to look for equipment that delivers greater operational agility and economics.
Tags : 
    
Intel
Published By: Intel     Published Date: May 19, 2017
An unprecedented level of network traffic is driving enterprises and communications service providers (CommSPs) to look for equipment that delivers greater operational agility and economics.
Tags : 
infrastructure, data, software, nfv, intel, network architecture, virtualization
    
Intel
Published By: Akamai Technologies     Published Date: May 08, 2017
This paper, which has been jointly developed by Akamai and Wuaki.tv — an OTT service provider — covers the importance of satisfying viewer expectations for a broadcast-quality experience by quickly and reliably streaming video online. It explains why it is challenging to do so and outlines best practices for online video delivery. It also explores the option of splitting traffic across multiple content delivery networks (CDNs) versus tightly integrating video player technology with a single CDN in order to improve online video delivery in a strategic manner. Finally, the paper shows how Wuaki.tv chose the latter option and boosted customer retention, customer referrals, and revenues as a result.
Tags : 
content delivery, online video delivery, broadcast quality, viewer expectations, video streaming
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 05, 2017
Everybody has their favorite apps…but can you name even three mobile websites you like? Probably not – and that’s because retrofitting desktop web designs fails to meet users’ mobile expectations. Yet in spite of that, smartphone traffic is at its highest point ever and will only continue to increase. This report, written by Forrester analysts, outlines why it’s time for a radical web reset and how you can make your mobile website a “first-class citizen.” Download it today.
Tags : 
mobile applications, ebusiness, web design, web traffic, mobile websites
    
Akamai Technologies
Published By: Intel     Published Date: May 02, 2017
Enabling communications service providers to scale up and support rapidly rising 4G LTE traffic while controlling costs
Tags : 
virtualisation, cost reduction, network transformation
    
Intel
Published By: Viavi Solutions     Published Date: Apr 14, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
network security, security validation, technical security, cyber attacks, database security, it security, traffic analytics, data report
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 14, 2017
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network. This white paper guides you through the essentials of VoIP troubleshooting, including common problems and the metrics you should employ to fix and prevent them. You’ll learn how these metrics relate to one another and to overall VoIP health. You’ll also learn the best practices for keeping your VoIP network flowing smoothly, your time-to-resolution low, and end users happy.
Tags : 
sensitive information, data protection, network security, asset protection, network performance, network analysis, troubleshooting solutions
    
Viavi Solutions
Published By: BrightRoll Exchange     Published Date: Apr 03, 2017
Take a peek at Yahoo’s proprietary data findings and the solutions available for QSR marketers.
Tags : 
qsr, qsr marketing, qsr customers, fast food, fast food marketing, casual dining marketing, customer, in-store traffic
    
BrightRoll Exchange
Published By: Fitbit     Published Date: Mar 21, 2017
February may have been the official American Heart Month - but it's never too late for you and your employees to take better care of your tickers. Fitbit Group Health has designed a poster and three tip sheets, that you can share within your organization. Your employees will get the heart-healthy advice they need, and you’ll get to shine as the wellness rock star that you are. Things to keep in mind as you download the kit: * The posters and tip sheets can be shared any number of ways, including via print, email, or uploaded to your company intranet. * Consider hanging the poster in well-trafficked areas like your lobby, kitchen, and hallways. * Think about giving one tip sheet a week to keep heart health top of mind. Enjoy the poster and tip sheets and good for you, for helping your employees love their hearts this month.
Tags : 
    
Fitbit
Published By: Fitbit     Published Date: Mar 20, 2017
February may have been the official American Heart Month - but it's never too late for you and your employees to take better care of your tickers. Fitbit Group Health has designed a poster and three tip sheets, that you can share within your organization. Your employees will get the heart-healthy advice they need, and you’ll get to shine as the wellness rock star that you are. Things to keep in mind as you download the kit: * The posters and tip sheets can be shared any number of ways, including via print, email, or uploaded to your company intranet. * Consider hanging the poster in well-trafficked areas like your lobby, kitchen, and hallways. * Think about giving one tip sheet a week to keep heart health top of mind. Enjoy the poster and tip sheets and good for you, for helping your employees love their hearts this month.
Tags : 
    
Fitbit
Published By: ThousandEyes     Published Date: Mar 14, 2017
Internet Outage Detection provides insights from global traffic and routing data into outages that cause path termination in ISPs and unreachable BGP prefixes.
Tags : 
    
ThousandEyes
Published By: Akamai Technologies     Published Date: Mar 09, 2017
For many financial institutions, traffic from bots (aggregators, scrapers, crawlers) can account for up to 40-60% of their overall website traffic — from good bots engaged in essential business tasks to bad bots performing harmful activities. Banks, traders, asset managers, and insurers might know how much of their traffic is from bots, but what they may not know is the impact those bots may be having on their business. Read the report to learn more about: • Managing Financial Data Aggregators • How Bots Affect the Digital Experience • What a good bot looks like?
Tags : 
financial services, financial data, bots, bot management, website traffic, the digital experience
    
Akamai Technologies
Published By: Akamai     Published Date: Mar 08, 2017
Video leads mobile data traffic. Read this infographic to find out more facts about video and mobile data traffic.
Tags : 
video, mobile data traffic, mobile data, mobile video, infographic
    
Akamai
Published By: Akamai     Published Date: Mar 08, 2017
Akamai’s Predictive Content Delivery (PCD) technology was developed to help satisfy the growing demand of mobile video. It is designed to optimize the delivery of data-heavy video traffic terminating on mobile devices and provide mobile customers with a video service that exceeds their expectations in the form of high-quality, always-available video with instant startup. Read on to find out more.
Tags : 
content, predictive content delivery, pcd, video, traffic, mobile video
    
Akamai
Published By: F5 Networks Inc     Published Date: Jan 31, 2017
Organizations considering moving enterprise applications to the public cloud should ensure that they also move the application delivery services their applications rely on in the data center. In addition, cloud migration presents an opportunity to organize and rationalize security and access, gain visibility into cloud-based application traffic, and architect a strong disaster recovery plan. Download to read the 5 rules to follow when lifting and shifting apps to the the cloud.
Tags : 
apps, cloud, enterprise applications, public cloud, networking
    
F5 Networks Inc
Published By: Cisco     Published Date: Dec 21, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Imagine you manage a warehouse for a small shipping firm. You have a simple job: route packages. But your employer expands to 25 western cities and 50 locations. After further expansion you now need to track packages coming by truck, rail, and plane and route them based on contents and weight to 10,000 different locations worldwide. While keeping traffic in and out tightly secured, making sure each package reaches its destination on time, and without going over budget. You
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security.
Tags : 
    
Cisco
Published By: ThousandEyes     Published Date: Nov 17, 2016
As the Internet becomes the WAN backbone, Software-defined-WAN (SD-WAN) is gaining popularity. SD-WAN provides the flexibility to choose the most optimal transport and dynamically steer traffic over hybrid access networks. Download now to learn more!
Tags : 
    
ThousandEyes
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search