Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

point service

Results 176 - 200 of 210Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Sep 06, 2010
HP Networking is a leading provider of converged infrastructure solutions, including networking. With its recently enhanced core and data center portfolio, HP has provided another proof point of its commitment to offering enterprise-class networking solutions. By bringing this new broader networking portfolio to market through HP's direct and indirect sales channels and combining it with HP service offerings, HP Networking has further strengthened its position as a global contender and provider to enterprises and major verticals.
Tags : 
3com, roi, core, network, infrastructure, data center, portfolio, network architecture, network management, small business networks, data center design and management
    
HP
Published By: Proofpoint     Published Date: Apr 23, 2010
This whitepaper discusses the dramatic cost savings that companies can realize by adopting a SaaS (Software-as-a-Service) model for email archiving versus an on-premises approach.
Tags : 
proofpoint, email archiving, saas, software-as-a-service, tco, roi
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 23, 2010
This whitepaper discusses the dramatic cost savings that companies can realize by adopting a SaaS (Software-as-a-Service) model for email security versus an on-premises approach.
Tags : 
proofpoint, saas, email security, software-as-a-service
    
Proofpoint
Published By: Neolane, Inc.     Published Date: Apr 01, 2010
This whitepaper is a call-to-action for all marketers to re-assess antiquated outbound marketing techniques. Marketers need to develop dialogues with customers and prospects to deliver relevant, timely, personalized information throughout the customer lifecycle and reinforce consistent messages across inbound and outbound channels.
Tags : 
neolane, customer experiences, inbound, outbound, call centers, point-of-service, customer service, crm
    
Neolane, Inc.
Published By: Microsoft Dynamics CRM     Published Date: Mar 11, 2010
Covering All Points of Attack. As the availability of product and service information on the Internet grows, both the providers and receivers of service have larger networks through which to communicate, interact and transact.
Tags : 
microsoft dynamic crm, service delivery, contact center, customer satisfaction, customer relationship management
    
Microsoft Dynamics CRM
Published By: En Pointe Global Services     Published Date: Jan 25, 2010
So how do you make sure you will gain the benefits of outsourcing and avoid the pitfalls? We have done the research and drawn from our own experience to bring you.
Tags : 
en pointe global services, outsourcing, help desk, it service delivery, single point of contact, spoc, roi
    
En Pointe Global Services
Published By: MatchPoint     Published Date: Oct 20, 2009
Executives use MatchPoint because they want to transition from the workforce into business ownership. MatchPoint Network offers it's complimentary services of providing expert guidance through the process of finding the right franchise business for you. Owning their own business allows executives to make their own choices and stay in control of their own future.
Tags : 
matchpoint, business franchise, roi, investment, franchise, small business, consulting
    
MatchPoint
Published By: IBM     Published Date: Sep 10, 2009
Data protection and recovery can be a complicated problem in remote offices. But there are options. This white paper explores a range of possibilities, and shows how an adaptive data protection solution can protect remotely stored data for enterprises of all sizes.
Tags : 
ibm, applications, risks, rcovery considerations, backup, tivoli software, tivoliŽ storage manager fastback, remote office, oracle, sap, sql, recovery point objective, rpo, recovery time objective, rto, tape backup, mirroring, asynchronous replication, continuous data protection, wide area file services
    
IBM
Published By: BMC ESM     Published Date: Aug 20, 2009
What if you could predict disruptive IT events and automate their resolution — all before they disrupt your business?  Software Consultant Ron Coleman provides a demonstration and discusses the key points of Service Assurance from BMC Software.
Tags : 
service assurance, bmc, it events, it automation, software demo, automate, it management, enterprise applications
    
BMC ESM
Published By: BMC ESM     Published Date: Aug 20, 2009
BMC Service Automation automates repetitive, manual tasks (such as provisioning, patching and compliance) to reduce the margin for error, allowing IT to get things done more quickly, and across organizational silos.  Software Consultant Ron Coleman provides a demonstration and discusses the key points of Service Automation from BMC Software.
Tags : 
bmc, automation, service automation, silos, software, margin for error, error reduction, patching, provisioning, compliance, manual task, business process automation
    
BMC ESM
Published By: IBM ILOG.     Published Date: Jul 14, 2009
Increase success at point-of-contact with more frequent and focused cross-sell and upsell improve customer and partner satisfaction with better service and support. Increase revenue, profitability and wallet-share through greater acceptance. Improve auditability with consolidation of siloed and divisional approaches. Learn more today!
Tags : 
ibm, ilog brms, objective, organization, automate, experience, interaction, companys best sales customer service, purchasing, customers, solution, application, support, profitablity, enterprise applications
    
IBM ILOG.
Published By: HP     Published Date: Jul 08, 2009
Data deduplication technology represents one of the most significant storage enhancements in recent years, promising to reshape future data protection and disaster recovery solutions. Data deduplication offers the ability to store more on a given amount of storage and replicate data using lower bandwidth links at a significantly reduced cost. This white paper explains how deduplication technologies work in practice, the pros and cons of each approach, and when to choose a particular type.
Tags : 
data, data deduplication, data dedupe, disaster recovery, data protection, storage, bandwidth, virtual library system, vls, d2d, disk to disk, san, vtl, virtual tape libraries, pacs, retention, data rate, recovery point objectives, rpos, service level agreements
    
HP
Published By: SPSS     Published Date: Jun 30, 2009
Read how Cabelcom recognized the key to tackling churn and was able to identify the point at which customers become dissatisfied with their service.
Tags : 
spss, cablecom, customer retention, crm, churn rate, reduce churn, predictive analytics, statistics, statistical analysis, cable network operator, tailored marketing, targeted marketing, best-of-breed, data mining technology, customer feedback, customer lifecycle, cross-selling, data management, data analysis, decision-making
    
SPSS
Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale, pos, application-layer vulnerabilities, web 2.0, virtual servers, service oriented architecture (soa), lightweight technologies, insider threat, holistic control model, software development lifecycle, sdlc, wafs
    
VeriSign Incorp.
Published By: HP Data Center     Published Date: Apr 16, 2009
This paper examines both the centralized WLAN switch architecture and the optimized WLAN architecture, so that the wireless network choice an organization makes today will protect its investment and allow it to experience the substantial benefits of 802.11 for years to come.
Tags : 
hp data center, 802.11n, architectural evolution, wlan, lan, scalability, collaboration, wireless, wireless networks, high-bandwidth, access points, aps, quality of service, qos, rf configuration, infrastructure, lan backbone, bottleneck, hp procurve, network architecture
    
HP Data Center
Published By: WebEx     Published Date: Apr 02, 2009
This document educates end-users and decision makers on Software-as-a-Service (SaaS), where it differs from traditional software, and what the key benefits are when deploying SaaS applications. In addition, this document also provides the reader with a comprehensive look at the Total Cost of Ownership (TCO) analysis any decision maker should complete before making a choice between a SaaS or a traditional software deployment.
Tags : 
webex, software-as-a-service, saas, saas applications, tco, total cost of ownership, traditional software deployment, break-even point, on-demand software, apis, multi-tenant, single-tenant, application service provider, asp, it requirements, core software applications, context software applications, cost allocations, eos, groupware applications
    
WebEx
Published By: WebEx     Published Date: Apr 02, 2009
The business of taking care of remote hardware and software has never been bigger:-Managed systems and services for retail, point of sale, hospitality, and other distributed operations are a hot growth area.- Enterprise help desks manage an increasingly dispersed array of hardware and software.- Enterprise software providers are moving to managed services and other value added support offerings to preserve margins in the face of increasing price pressure.
Tags : 
webex, virtual support networks, virtual support network, vsn technology, standard remote management, it server management, local area network, lan, firewall, virtual private network, vpn, security, support costs, isdn, wifi, slas, tco, it management, local area networking
    
WebEx
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
Read how Cabelcom recognized the key to tackling churn and was able to identify the point at which customers become dissatisfied with their service.
Tags : 
spss, cablecom, customer retention, crm, churn rate, reduce churn, predictive analytics, statistics, statistical analysis, cable network operator, tailored marketing, targeted marketing, best-of-breed, data mining technology, customer feedback, customer lifecycle, cross-selling, data management, data analysis, decision-making
    
SPSS, Inc.
Published By: OwlPoint, LLC     Published Date: Feb 11, 2009
IT Service Management (ITSM) is a proven, mature framework that can be utilized to support Green IT programs. Green IT and ITSM share common goals, such as operational efficiencies and metrics based improvements. Existing processes and supporting ITSM tools can easily be adapted to support Green IT initiatives. ITSM provides the structure to be successful as well as for documenting and sharing the achievements. This white paper explains how a service management framework can contribute to you.
Tags : 
owlpoint, itsm, green it, it service management, service management framework, it management
    
OwlPoint, LLC
Published By: YouSendIt     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report, compliance, privacy, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report, compliance, privacy, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment
    
YouSendIt, Inc.
Published By: YouSendIt     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report
    
YouSendIt, Inc.
Published By: Stratus Technologies     Published Date: Sep 30, 2008
The Choices from many reputable suppliers of IT managed services can appear very much alike. Yet when you have a mission-critical business process whose function must not be interrupted, you know your requirements call for something above and beyond. This paper serves as a field guide to help you identify key characteristics that set a critical managed IT service apart from even highly capable general-purpose offerings.
Tags : 
stratus technologies, it services, business impact analysis (bia), recovery point (rpo), recovery time objectives (rto), business continuity (bc), disaster recovery (dr) protection, service level agreement (sla), software development, it management
    
Stratus Technologies
Published By: YouSendIt     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Find out why countless companies are making the move—download your copy now.
Tags : 
cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment, multimedia attachment, audio attachment, video attachment, large attachment, file size, digital content, digital content delivery, managed delivery service, large file delivery
    
YouSendIt
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.