RSS feed Get our RSS feed

News by Topic

service level

Results 326 - 350 of 364Sort Results By: Published Date | Title | Company Name
By: Echopass     Published Date: Sep 07, 2007
Not all companies that have adopted multi-sourcing have realized the expected levels of savings.  A single over-arching problem is often the cause when multi-sourcing delivers disappointing results in service and/or savings.
Tags : multi-sourcing, call center outsourcing, remote agents, disaster prevention, ip call center, ip contact center, contact center solutions, contact center software
     Echopass
By: Tideway Systems     Published Date: Dec 11, 2007
IT service providers need to offer services that deliver new business opportunities whilst increasing levels of availability, controlling risks and reducing costs. This paper provides you with practical guidance based on the practices in ITIL® V3 that will help you manage application and infrastructure changes and configurations.
Tags : service management, itil, change management, configuration management, knowledge management, service strategy, service design, tideway
     Tideway Systems
By: Oce Business Services     Published Date: Jun 24, 2009
Download this free report to explore the potential of applying business performance management principles to advance document performance management to reduce costs; better manage documents as vital strategic, financial and information assets; and secure positive returns on investments from outsourcing. Learn more today!
Tags : oce, kpi, ekg, document processes, mail center, print/copy operations, records, operations
     Oce Business Services
By: BlueHornet     Published Date: Apr 12, 2010
Email marketing service provider BlueHornet recently partnered with mobile marketing solutions provider SmartReply to develop an automated sign up process via mobile text messaging for email marketing communications. In this free case study, learn how Chuck E. Cheese's, a nationally recognized leader in full-service family entertainment and dining, used text messaging as a sign up method for their Chuck E-Club email program to grow their email list and increase engagement levels.
Tags : bluehornet, email marketing, mobile text messaging, email marketing services/software
     BlueHornet
By: CA ITAM     Published Date: Sep 09, 2008
Robin Bloor addresses the business value to be derived by evaluating key client management processes such as asset management, service management, change management, security and integration/automation against four maturity levels. Read this white paper to learn how to align your people, processes and technology to elevate the maturity of your client management.
Tags : 
     CA ITAM
By: CA ITAM     Published Date: Sep 09, 2008
This white paper discusses how to make the leap from basic asset tracking to a more robust asset management program that can improve decision-making and service levels, reduce costs and mitigate risks. The focus is the CA IT Asset Management solution's ability to accelerate your IT Asset Management program's maturity by providing asset ownership information (the complement to discovery information).
Tags : 
     CA ITAM
By: Tail-f Systems     Published Date: Sep 16, 2008
The NETCONF protocol is a modern building block for device management automation, offering a unified approach to network configuration, rather than a device-specific methodology. To equipment vendors, NETCONF is a way to standardize the management interface of network elements. To service providers, NETCONF is a way to optimize the administrative workflow, by moving management intelligence out of the device under management, and consolidating this management into higher-level applications.
Tags : netconf, netconf standard, device management automation, network standard, ietf standard, tail-f, tailf
     Tail-f Systems
By: HP - Enterprise     Published Date: Jun 04, 2013
Many organizations are now moving parts of their IT infrastructure to the Cloud. However, managing these resources within a comprehensive management framework is still essential. And the management approach for these hybrid environments needs to take a step forward and start to focus on service level management, not the care and feeding of discrete components. This whitepaper provides the information needed on implementing Business Service Management (BSM) in hybrid environments.
Tags : it infrastructure, cloud, business service management, hybrid environments
     HP - Enterprise
By: BMC ESM     Published Date: Jul 17, 2009
Listen to this conversation with Doug Mueller to learn how standards and processes have evolved to bring us the service desk of today and tomorrow. Discover what changes in direction surprise even Doug as he builds architecture for efficient service desks. Doug's enthusiasm for taking the service desk to the next level is noticeable in this podcast, and you just might come away with some new perceptions of the service desk of the future.
Tags : service desk, architecture, podcast, cto, bmc, podcast, customer service levels, outsource
     BMC ESM
By: BMC ESM     Published Date: Jul 22, 2009
Listen to this conversation with Doug Mueller to learn how standards and processes have evolved to bring us the service desk of today and tomorrow. Discover what changes in direction surprise even Doug as he builds architecture for efficient service desks. Doug's enthusiasm for taking the service desk to the next level is noticeable in this podcast, and you just might come away with some new perceptions of the service desk of the future.
Tags : service desk, architecture, podcast, cto, bmc, podcast, customer service levels, outsource
     BMC ESM
By: EBSL Technologies Int'l     Published Date: Sep 26, 2010
This white paper provides an introduction to cloud computing.
Tags : cloud computing, service level agreements (slas), cloud computing security, virtualization, amazon cloud, google
     EBSL Technologies Int'l
By: Intacct Corporation     Published Date: Jul 13, 2011
Download the white paper "Evaluating and Contracting for Cloud Financials: Best Practice Considerations." You'll find practical advice and tips to ensure your choice is both cost-effective and right for your organization.
Tags : intacct, daniel druker, best practices, cloud financials evaluation, business applications, productivity, cloud computing, service level agreements
     Intacct Corporation
By: WOLF Frameworks     Published Date: Jan 31, 2011
Platform-as-a-Service (PaaS) is an increasingly popular paradigm moving from being a buzzword to the mainstream.
Tags : platform-as-a-service, paas, saas, cloud computing, paas types, paas advantages, paas monetization, paas pricing
     WOLF Frameworks
By: HP and Intel® Xeon® processors     Published Date: Aug 01, 2012
It is often said that a chain is only as strong as its weakest link. The corollary is also true-adding an ostensibly strong link to a weak chain doesn't necessarily deliver much tensile value. Yet, from all the rhetoric and hype, you might be forgiven for thinking that solid-state storage will single-handedly strengthen every weak storage chain, wherever the solid-state storage is and however it is used. Specification-based strength added to a weak chain will soon be exposed in the real world, whether it's a tug-of-war team or a storage system.
Tags : hp 3par storage, storage value chain, solid state, optimization, ssd, enterprise storage, i/o service, adaptive optimization
     HP and Intel® Xeon® processors
By: Keynote Systems     Published Date: Mar 25, 2011
Learn about the challenges of monitoring web application performance in increasingly complex cloud application ecosystems
Tags : cloud, apm, service level agreement, sla, performance, monitoring
     Keynote Systems
By: TDi Technologies     Published Date: Aug 29, 2011
It's clear something is wrong. Business interruptions, outages, and other negative consequences happen far too often.
Tags : it infrastructure. it management, service levels, systems adminstrator
     TDi Technologies
By: Attachmate     Published Date: Mar 20, 2013
This short demo shows how Verastream Host Integrator can modernize and service-enable legacy assets for use across your enterprise. Verastream takes a flexible, scalable service-level approach to integration and gets you up and running quickly.
Tags : soa project, mobile now, mobilenow, screen scraping, terminal emulation iphone, terminal emulation ipad, security
     Attachmate
By: SAP     Published Date: Jul 17, 2012
With best-in-class processes supported by the right IT infrastructure, today's service parts organizations can operate at a new level of flexibility, efficiency, and responsiveness. This paper is the first in a five-part series that describes the best-in-class processes of Cat Logistics Services Inc. (Cat Logistics), a wholly owned subsidiary of Caterpillar Inc. It explores how Cat Logistics has optimized its demand-planning processes to proactively address customer demands and drive profitable growth.
Tags : infrastructure, white paper, best processes, growth
     SAP
By: Symantec     Published Date: Jul 29, 2013
Because of the outstanding economy, flexibility, and service levels it offers, virtualization is transforming data centers at breakneck speed: by 2016, an estimated 80 percent of the world's x86 servers will be Virtual Machines (VMs). But the speed of this transformation, along with the high resource utilization, ease of cloning, moving workloads, and other ways virtualization works its magic, raise challenges for “traditional” IT services and the teams that deliver them.
Tags : architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization
     Symantec
By: ServiceNow     Published Date: Apr 19, 2013
Providing a good online shopping experience starts with understanding customer needs and expectations in order to deliver suitable goods and services. Employees expect a similar experience with a Service Catalog. An effective business service catalog captures employee needs and communicates negotiated service offerings and service level agreements. However, hitting service level targets requires more than just listing services. It’s essential to provide an automated self-service portal and open communication.
Tags : employee needs, service offerings, service level agreements, automation, self-service, communication
     ServiceNow
By: CDW     Published Date: Sep 10, 2014
Enterprise-critical applications—those which drive the core of an organization—require the highest availability infrastructure to support the most stringent service levels. EMC meets this need with a high performing, functionally capable, and competitively priced high-end networked storage system—the EMC® Symmetrix® VMAX® 20K system with the Enginuity™ operating environment. The VMAX 20K scale-out architecture helps organizations exceed the performance and capacity demands of hyper-consolidation, cloud deployments, and all-virtual Software Defined Data Centers (SDDCs), while simplifying the costs of data management.
Tags : storage
     CDW
By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
This Enterprise Strategy Group whitepaper reviews HP 3PAR Storage Adaptive Optimization software -- granular, automated, and policy-based service-level optimization and more. Learn how this combination is a thoughtful approach that can deliver.
Tags : hp 3par, optimization, io service levels, optimizing
     Sponsored by HP and Intel® Xeon® processors
By: NETIQ     Published Date: Dec 03, 2013
This flash point paper discusses system and application management and the struggle against service outages. With data overload and data isolation often being the root cause, a services-level approach can reduce the potential of impacting events.
Tags : netiq, service outages, monitoring strategy, system failure, single management view
     NETIQ
By: Cisco     Published Date: Feb 13, 2015
Get CIO perspectives on the changing roles and relevance of IT teams in this report.
Tags : cloud computing, security, compliance vulnerabilities, visibility, service level agreements, cloud technologies
     Cisco
By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : cyveillance, phishing, security, cyberattacks, cybercriminals, threats
     Cyveillance
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics