CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

web based applications

Results 1 - 25 of 41Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies
Published By: IBM     Published Date: May 23, 2017
Flexible deployment options, licensing models help take the challenges out of change. As you move toward the cloud, you're likely planning or managing a mixed environment of on- premises and on- cloud applications. To help you succeed in this transition, you need a trans-formative, mixed-workload database that can handle a massive volume of data while delivering high performance, data availability and the flexibility to adapt respond to business changes.
Tags : 
cloud applications, mobile optimization, web-based applications, data availability, ibm, db2
    
IBM
Published By: IBM     Published Date: Dec 15, 2016
Watch to learn: - How to tackle the challenge of multi-speed IT with WebSphere Application Server's unique approach to delivering application infrastructure based on Java EE 7 - How to provide continuous availability for running modern apps that require on-demand dynamic scalability and high operational resiliency - How the lighweight and modular architecture of WebSphere Liberty provides an ideal foundation to develop and deploy microservices - How to deliver flexibility to develop, deploy and consume application infrastructure - on-premises or on the cloud, including emerging virtualization technologies such as Docker - How to manage and monitor thousands of applications and servers with a single management interface for ease of problem determination
Tags : 
ibm, middleware, it transformation, websphere application server, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 07, 2016
The new capabilities of WebSphere Application Server Liberty profile, based on Java EE 7 standards, are designed for enhanced developer productivity, dynamic scale, resilient production deployments and ease of integration into modern DevOps workflows. These new production ready capabilities of Liberty profile enable development and delivery of engaging and responsive applications by providing the application infrastructure that meets expectations for speed, agility and user friendliness.
Tags : 
ibm, middleware, cloud, platform services, websphere application server, java ee 7, websphere application server liberty, networking
    
IBM
Published By: CloudEndure     Published Date: Mar 23, 2016
While a public cloud provides an easy and scalable way to manage and deploy your app or website, you also need to have a contingency plan for business continuity and disaster recovery. Often overlooked on Amazon Web Services (AWS), an extremely effective cloud disaster recovery (DR) strategy is to spread the application stack across regions versus availability zones. This eBook provides a guide for planning and implementing a robust cross-region cloud disaster recovery (CDR) plan for business continuity and critical application uptime on AWS-based applications.
Tags : 
cloudendure, aws, cloud disaster recovery plan, disaster recovery, cloud, cloud computing
    
CloudEndure
Published By: IBM     Published Date: Oct 02, 2015
TechWell, IBM, uTest, and Keynote partnered on a powerful new survey that explores where today’s testers are spending their time, what obstacles they most often encounter, and where they think their attention should be focused.
Tags : 
testing, ibm, release cycles, testing services, applications, development, web-based applications, mobile applications
    
IBM
Published By: F5 Networks Inc     Published Date: Jul 27, 2015
Today, enterprises are extending their businesses by using more web-based and cloud-hosted applications, so a robust and agile web application firewall (WAF) isn't a luxury--it is a requirement. This whitepaper breaksdown some of the key factors you should consider when selecting a WAF to protect your business.
Tags : 
web application firewall, waf, cloud-hosted applications, it solutions, it security, web-based applications, networking, security
    
F5 Networks Inc
Published By: Riverbed     Published Date: Apr 24, 2015
This ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) whitepaper examines the scope of challenges for assuring web-based and SaaS application performance, and reviews a solution offered by Riverbed that is designed to meet these new requirements.
Tags : 
web-based applications, saas, enterprise-class applications, it management, user experience, cost efficiency and flexibility
    
Riverbed
Published By: Nginx     Published Date: Feb 05, 2015
The success of your web-based service or application is all about serving at the pleasure of the user. Learn what users want in a web experience, the business impact of poor application performance, and how NGINX and NGINX Plus are designed to improve the user experience of your applications. After all, users ultimately decide which sites to visit or apps to use based on what they can get to when it counts.
Tags : 
web-based service, web experience, application performance, user experience, enterprise applications
    
Nginx
Published By: Esker     Published Date: Dec 08, 2014
Is your company looking to gain the efficiencies and savings of automated accounts payable processing? Find out how you can: • Quickly deploy one easy, web-based AP workflow solution for all users and systems • Ensure a continuous invoice audit trail • Simplify shared services setup In this white paper, you'll learn important cost and risk factors to consider with AP tools installed inside ERP applications — especially if you have multiple ERP instances or a mix of different enterprise applications. Download the white paper to learn more!
Tags : 
automation, best practices, ap workflow, cost, erp system, data recognition, applications, invoicing
    
Esker
Published By: Lumension     Published Date: Oct 20, 2014
"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information. "
Tags : 
secure, ios, android, mobile security, data protection, security
    
Lumension
Published By: Riverbed     Published Date: Sep 05, 2014
If you work on a network operations team, you know how increasingly hard it is to understand and ensure application performance for your end users. You need visibility into areas where issues may occur – end-user devices, network and infrastructure – in order to identify and diagnose problems quickly and minimize downtime. But it hasn’t been easy to gain this level of visibility across the WAN or hybrid network without deploying additional probes, packet capture devices or remote site technicians. Blind spots are everywhere making it difficult to focus on managing and monitoring the applications that matter the most to your business. And when nearly 50% of a network’s traffic is web-based and it all looks the same to the network, identifying your important applications and staying ahead of their performance problem is more difficult than ever. That could mean inefficient troubleshooting, longer time to resolution, and an overall lack of application intelligence. Who wants that?
Tags : 
application, network, performance, nirvana, visibility, infrastructure, enterprise applications
    
Riverbed
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Webroot     Published Date: Sep 18, 2013
This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as: • Better defense against zero-day threats and spam servers • More comprehensive signature and URL database • Supports remote users more securely and without the cost of putting servers in every location
Tags : 
web threat, content filtering, the cloud, security, web gateway, cloud-based applications, business technology, cloud computing
    
Webroot
Published By: Symantec Corporation     Published Date: Aug 28, 2013
SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. For example, they protect remote communications via webmail, chat and IM. Browser-to-server communications for cloud-based services require SSL certificates to protect confidential information. In addition, SSL certificates are used to secure server-to-server communications for applications and data exchange. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services.
Tags : 
ssl certificates, communication, webmail, technical support, technology, data, security, knowledge management
    
Symantec Corporation
Published By: Riverbed     Published Date: Nov 08, 2012
Stingray traffic manager 9.0 now includes the capability for industry-leading web content optimization, dramatically accelerating web-based applications and more. Read on to learn about the industry's only ADC with complete WCO integration.
Tags : 
stingray, adc, wco, wco integration, web content management, web content optimization, enterprise applications, business technology
    
Riverbed
Published By: Asure Software     Published Date: Sep 10, 2012
In this case study, you'll learn how DPT's research into time and attendance systems lead them to Asure Software. After reviewing various vendors, DPT selected Asure Software as their vendor and partner because they knew AsureForceT Time & Labor Management Solutions would provide accuracy and room for company growth.
Tags : 
time and attendance systems, workforce management, payroll solutions, human resources, web-based applications
    
Asure Software
Published By: SAP     Published Date: Jul 17, 2012
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
business, sap, white paper, technology, location, intelligence, business value, data services
    
SAP
Published By: Internap     Published Date: Dec 29, 2011
Performance plays a vital role in the success of your online applications and web-based content - whether you are processing millions of transactions, delivering business-critical software or servicing a massive gaming community. Research shows that even one second of delay on a typical website can result in 7% fewer customer conversions. For many businesses, that means lost revenue and damage to their brand. As cloud is becoming an increasingly viable infrastructure choice for enterprise applications, it is essential to select a high-performance cloud service that will support the best possible experience for your end users. Determining the right cloud solution for your needs also necessitates thorough analysis of the level of security, control, customization and support your business requires. In this webcast, thought leaders from Gartner and Internap outline the performance factors that affect your cloud decision-making process and discuss how to optimize your IT Infrastructure to create satisfied end users.
Tags : 
enterprise cloud, cloud computing, technology, cloud solution
    
Internap
Published By: IBM     Published Date: Nov 28, 2011
Download this IBM white paper from Web Buyer's Guide to learn the next generation solutions for application servers.
Tags : 
solutions, applications, hybrid, computing, scaled-out, web-based applications
    
IBM
Published By: Gomez IT     Published Date: Apr 01, 2011
Compuware recently commissioned a global IDC survey of 474 business and IT decision makers to better understand what performance and availability information they need to have in order to effectively operate their Internet-enabled business activities.
Tags : 
compuware, performance optimization, idc survey, internet-enabled business, business risk
    
Gomez IT
Published By: SAP     Published Date: Mar 24, 2011
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
location-based bi, business value, geographic enhancement
    
SAP
Published By: IBM Corporation     Published Date: Sep 20, 2010
The IBMWebSphere® portfolio offers extreme transaction processing(XTP) capabilities that ensure you have a SMART SOA™-based application infrastructure, which can support your most demanding business-critical applications.
Tags : 
ibm caching and cloud, websphere datapower, distributed caching products, transaction processing, xtp, soa, cache, cloud computing
    
IBM Corporation
Published By: Trend Micro, Inc.     Published Date: Nov 25, 2009
The increasing adoption of electronic health records greatly complicates the tasks of security and privacy requirements. In this webcast, *Trend Micro* and *Beth Israel Deaconess Medical Center* discuss how to successfully navigate through the challenges associated with securing Web-based applications.
Tags : 
trend, trend micro, webcast, security, hitrust, web, privacy, ehrs
    
Trend Micro, Inc.
Published By: IBM ILOG.     Published Date: Oct 26, 2009
This case study will showcase the challenges of clinical trial data management, but the highlighted techniques are applicable to any business needing smart, dynamic and adaptive Web-based user interfaces.
Tags : 
brms, business logic, business rules, claims management, data management, data validation, healthcare, productivity
    
IBM ILOG.
Previous   1 2    Next    
Search