IT Services  >   Telecommunications Services  >   Telephony Services  >  

411 Services

RSS Feed    Add to Google    Add to My Yahoo!
411 Services White Papers (View All Report Types)
 
Advance the Fight against Cyber Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces the benefits of security services and gives you advice on how to best take advantage of them.
Posted: 21 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

ABCs of ITIL®
sponsored by Global Knowledge
WHITE PAPER: Learn the ITIL® concepts of accountability, boundaries, and consistency (the ABCs) and discover how ITIL helps establish, manage, and maintain the ABCs.
Posted: 31 Mar 2015 | Published: 31 Mar 2015

Global Knowledge

IT Hosting Perspective in the Midmarket
sponsored by Vision Solutions
WHITE PAPER: This white paper provides some insight into how providers can create optimized IT hosting for the modern environment.
Posted: 26 Mar 2015 | Published: 31 Dec 2013

Vision Solutions

Industrialising Service Management:The Power of Information, Technology, Service and Management
sponsored by Unisys
WHITE PAPER: Service Management needs to change. This whitepaper examines and uncovers new ways for IT to extend the practice of Service Management and derive greater business value from IT investments.
Posted: 04 May 2015 | Published: 04 May 2015

Unisys

So Many Choices: Get Insider Info on Today's Hottest ITSSM Tools
sponsored by FrontRange Solutions Inc.
WHITE PAPER: Get an insider's look with this rich white paper, which demonstrates the pros and cons of today's hottest ITSSM tools. After learning the strengths and weaknesses of a variety of programs from an unbiased source, I&O managers will have the right information to better support the production environment.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

FrontRange Solutions Inc.

Implement a More Secure Network to Keep Up with Shadow IT
sponsored by Verizon
WHITE PAPER: This white paper examines the ramifications of the growth of shadow IT and examines how you can protect against potential issues. Read on to learn how you can implement a more secure network to keep up with evolving IT demands.
Posted: 12 Nov 2014 | Published: 31 Dec 2013

Verizon

IT Professionals Rate ShoreTel Top in Customer Loyalty, Service, Value
sponsored by ShoreTel
WHITE PAPER: This exclusive research paper details the key factors organizations should look for when choosing a UC provider.  Read on to learn more.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

ShoreTel

The CIO Paradox: Delivering Better Services to the Enterprise
sponsored by Unisys
WHITE PAPER: This exclusive whitepaper explains how IT can become a business services provider to the enterprise using multi-sourced business services platforms that provide the business with immediate, personalized access to services required for effective performance. Read on to learn more.
Posted: 04 May 2015 | Published: 04 May 2015

Unisys

How to Create a Successful Cloud Computing Strategy For Your Business
sponsored by IBM
WHITE PAPER: This white paper explains how to create a proactive, effective approach to cloud computing and why it can help set your business on the path to success.
Posted: 25 Mar 2015 | Published: 30 Sep 2014

IBM

Keep Yourself Secure from Growing Cyber-Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this infographic, discover what you can do to stay safe in an increasingly dangerous cyber landscape, including increasing proactivity in your security strategy and partnering with security services.
Posted: 21 May 2015 | Published: 21 May 2015

Hewlett-Packard Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement