IT Services  >   Telecommunications Services  >  

Prepaid Telecommunications Services

RSS Feed    Add to Google    Add to My Yahoo!
Prepaid Telecommunications Services White Papers (View All Report Types)
 
Prepaid Loyalty: Fact or Fiction?
sponsored by Amdocs Management LTD
WHITE PAPER: Achieving customer loyalty is a business goal shared by virtually every service provider. Prepaid subscribers present a greater challenge because the business model has no contracts or commitments. This paper examines the business and marketing strategies that service providers can deploy to create and build loyalty among prepaid customers.
Posted: 17 Sep 2009 | Published: 17 Sep 2009

Amdocs Management LTD

Research Report: Delivering Enterprise Value with Service Management
sponsored by ServiceNow
WHITE PAPER: This IDC Research report provides an analysis of the business value that 10 businesses are achieving with cloud-based service management services.
Posted: 21 May 2015 | Published: 21 May 2015

ServiceNow

Simplify Multi-Vendor IT Support to Drive Innovation and Reduce Cost
sponsored by IBM
WHITE PAPER: Take a close-up look into a support strategy for managing your multi-vendor IT environment. Learn how you can simplify IT complexity and support higher availability, reduce IT costs through more effective lifecycle maintenance, and more.
Posted: 07 Jun 2016 | Published: 31 Dec 2015

IBM

Eight Essential Helpdesk Tools Every MSP Needs
sponsored by Solarwinds N-able
WHITE PAPER: Everyone knows that you need the right tools for the job. The problem is that there are so many tools on the market that it is hard to determine which are best for your business. Access this white paper to learn about the eight must-have tools for your MSP business.
Posted: 20 Apr 2016 | Published: 06 Apr 2016

Solarwinds N-able

A Field Guide to Marketing in the IT Channel
sponsored by Intronis
WHITE PAPER: Discover insights into how managed service providers become highly effective in their marketing efforts, including which channels they use, tactics that work best, and tools that help them make marketing a priority.
Posted: 06 May 2016 | Published: 06 May 2016

Intronis

The CIO's Guide to Avoiding IT Irrelevance: Build a Bridge with BYOD
sponsored by Matrix42
WHITE PAPER: Discover 7 crucial steps to avoid IT irrelevance by beating Shadow IT with BYOD. Dig into the key aspects of this EMM-based approach, and learn how to eliminate barriers for users with self-service and social ITSM, and more.
Posted: 29 Feb 2016 | Published: 31 Dec 2015

Matrix42

Understanding NIST's Cloud Computing Reference Architecture: Part I
sponsored by Global Knowledge
WHITE PAPER: This second white paper in a series on Cloud Computing Reference Architecture focuses on the activities, processes, and requirements that cloud players need to follow in order to ensure a successful delivery of cloud services. It addresses the three active cloud players that may be involved in delivering cloud services to cloud consumers.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Global Knowledge

Legacy ITSM Systems Leave Businesses in the Lurch
sponsored by ServiceNow
WHITE PAPER: This resource explains why legacy ITSM systems aren't able to meet today's challenges. Learn how obsolete service management systems are preventing you from being able to allocate more of the IT budget toward innovative projects, harness the talents of the millennial workforce, and more.
Posted: 03 Mar 2016 | Published: 31 Dec 2015

ServiceNow

Pricing E-book: 5 Proven Tips for Maximizing Profits with BPM
sponsored by ConnectWise
WHITE PAPER: In this white paper, discover 5 best practices for determining a price-point to maximize profitability, including: know the difference between cost and value, prove your worth, and 3 more. Additionally, learn how a business management platform can assist you in putting these best practices to work.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

ConnectWise

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement