IT Management  >   Systems Operations  >   Systems Management  >  

Helpdesk

RSS Feed    Add to Google    Add to My Yahoo!
HelpdeskReports
 
Help Desk Best Practices
sponsored by LabTech Software
WHITE PAPER: Explore the top 5 help desk best practices every service provider should be aware of to ensure responsive and timely support for your clients when issues do arise.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

LabTech Software

Mobility is moving fast. To stay in control, you have to prepare for change
sponsored by IBM
WHITE PAPER: Mobile use is becoming an integral part of the business landscape. Bring your own device (BYOD) policies are expected to grow, and it's clear that mobility is here to stay. Read this white paper to learn more about issues you may not have considered and the significant consequences that could result by overlooking security from every angle.
Posted: 24 Aug 2012 | Published: 06 Dec 2011

IBM

ROI Case Study: Quest Foglight at Imperial College London
sponsored by ComputerWeekly.com
ANALYST REPORT: Imperial College London deployed Quest Foglight to manage the performance of its applications, databases, and services and reduce system downtime. Nucleus Reseach evaluates the ROI of the project.
Posted: 27 Jun 2012 | Published: 27 Jun 2012

ComputerWeekly.com

ITIL: The building blocks of an ITSM strategy
sponsored by FrontRange Solutions Inc.
EGUIDE: Services are the building blocks of an ITSM strategy, but how does an enterprise begin to pick and choose the "right" services to manage or develop? Inside this e-guide, get the answer to this question and more. Gain expert insight into utilizing ITIL for continuous improvement in asset management, ITSM, and help desk operations.
Posted: 09 Jan 2012 | Published: 06 Jan 2012

FrontRange Solutions Inc.

Modernizing IT: Strategies for Improving Service Quality and Reducing IT Costs
sponsored by BMC Software, Inc.
WHITE PAPER: Working harder simply won't get you there. No matter how many people you allocate, sinking more labor into old IT practices cannot concurrently meet rising demands on IT and cut costs. Read about cost-effective, automated ways to meet this challenge head-on in our latest article, “Strategies for Modernizing IT, Reducing Costs, and..”
Posted: 17 Jun 2009 | Published: 15 Jun 2009

BMC Software, Inc.

End-User Monitoring: Gaining Visibility into Hidden Business Risks
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how to implement effective end-user transaction monitoring and management to attain greater visibility into the user experience.
Posted: 18 Sep 2007 | Published: 01 Aug 2007

CA Technologies.

Driving IT help desk efficiency with customer-centric remote support
sponsored by GoToAssist
WHITE PAPER: Help desk managers servicing large mobile workforces, such as remote employees and workers on the road, face significant challenges. This white paper will examine key IT help desk challenges and reveal the many advantages of customer-centric remote support.
Posted: 07 May 2009 | Published: 01 May 2008

GoToAssist

E-Guide: Best practices and considerations to ensure help desk management success
sponsored by SysAid Technologies
EGUIDE: This e-guide from SearchDataCenter.com explains why it is essential analyze the performance of your service desk to ensure optimal results. Gain expert insight into how to improve IT help desk services with vendor support. And find out how to help staff be more productive by providing them with extra support.
Posted: 20 Apr 2011 | Published: 20 Apr 2011

SysAid Technologies

Best Practices in Lifecycle Management: Comparing KACE, Altiris, LANDesk, and Microsoft SMS
sponsored by KACE
WHITE PAPER: This Enterprise Management Associates (EMA) white paper explains key best practices in lifecycle management, uses these as a framework for functional comparison, and includes a cost comparison to determine overall solution value.
Posted: 06 Nov 2008 | Published: 01 Jan 2007

KACE

The True Costs of E-mail Encryption
sponsored by Trend Micro
WHITE PAPER: Currently, e-mail encryption is a bit of a paradox. Large organizations understand and want privacy, but e-mail encryption technology is too in-depth for mass usage. Fortunately things are changing. Read this paper to learn so much more.
Posted: 11 Aug 2010 | Published: 11 Aug 2010

Trend Micro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement