IT Services  >   Telecommunications Services  >   Telephony Services  >  

Caller Identification Services

RSS Feed    Add to Google    Add to My Yahoo!
Caller Identification Services Multimedia (View All Report Types)
 
Transforming Your Data-Driven IT Organization
sponsored by Windsor Group
VIDEO: Tune into this video to learn how to transform your data-driven organization and service delivery by leveraging the market insight and expertise of one ITSM provider. Learn how to determine the best ITSM sourcing strategy for you, and transform your IT operations with an alternative delivery and market pricing model evaluation.
Posted: 16 May 2016 | Premiered: 16 May 2016

Windsor Group

Gaining Support for ITAM: Improve IT Operations Through Data Curation
sponsored by BDNA
VIDEO: Tune into this webinar to learn how to enforce enterprise-wide data consistency and improve IT operations with robust ITAM that transforms multi-source data into actionable business insight.
Posted: 03 Nov 2016 | Premiered: 31 Jul 2016

BDNA

Amelco Case Study: Continuous Delivery Using Ansible Automation
sponsored by Red Hat
VIDEO: Tune in as Amelco illustrates how one IT automation engine empowered effective multi-environment management for its diverse application infrastructure—with no downtime. Learn here how to unify management and provide continuous delivery of Linux-based apps, and more.
Posted: 16 Jan 2017 | Premiered: 01 Sep 2016

Red Hat

Home Suite Home
sponsored by Avaya
VIDEOCAST: This videocast exemplifies a unified communications system that enables companies to experience real-time business communications solutions that allow them to collaborate in any mode they want—voice, video, email, or IM—on virtually any device they want.
Posted: 01 Sep 2011 | Premiered: Sep 1, 2011

Avaya

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat

One-Stop Shop: Best Practices to Streamline your Service Desk
sponsored by Nimsoft, Inc.
WEBCAST: Your service desk should be the one stop shop for internal and external customers. But, in order for IT to be the orchestrator of knowledge and the service catalog, you need to provide excellent service and quick response times. Watch this webcast and discover the most current recommendations for service delivery and management best practices.
Posted: 05 Jan 2012 | Premiered: Sep 22, 2011

Nimsoft, Inc.

Get Cost Visibility and Chargeback for Your Cloud Services
sponsored by Hewlett Packard Enterprise
VIRTUAL ENVIRONMENT: This in-depth webcast, presented by Daniel Galecki, a software veteran and IT asset management guru, covers the IT transformation from a cost center to an IT service broker, and explains why analysts agree that chargeback is critical to the success of your cloud projects.
Posted: 17 Jun 2014 | Premiered: 10 Jun 2014

Hewlett Packard Enterprise

The shift from servers to services: Charting your future in the cloud era
sponsored by Hewlett Packard Enterprise
WEBCAST: The cloud is not only changing how IT organizations source and deliver technology – it's also leading IT organizations to be more service centric. This webcast explores what it means to be "service-centric" at both the organizational level and for IT professionals.
Posted: 26 Nov 2013 | Premiered: Nov 26, 2013

Hewlett Packard Enterprise

Business Phone Systems - Virtual PBX
sponsored by RingCentral
WEBCAST: View this webcast to explore a cloud-enabled phone system that offers greater call, fax, and text message flexibility so that employees aren't confined to on-premise hardware to conduct business.
Posted: 18 Feb 2014 | Premiered: Jul 17, 2013

RingCentral

Trusted Computing: Establishing Device Authentication
sponsored by Wave Systems Corp.
VIDEOCAST: View this video to learn the secret to better IT security may be at your fingertips. More likely than not, your PC contains a Trusted Platform Module (TPM), security chip on its motherboard.
Posted: 24 Aug 2010 | Premiered: Aug 24, 2010

Wave Systems Corp.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement