Service Management White Papers

The term Service Management is most widely used as the component of Operations Support Systems responsible for service delivery, such as order management, inventory management, provisioning and activation, network topology management and maintenance, and stability/performance diagnostics of communication service providers and their networks. A service management system automates manual operations of the network, delivery services, and support, making these areas more efficient and error-free.
Results 1 - 25 of 337Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Oct 22, 2014

A buyer's guide for executives.

Tags : it service management solutions, itsm, service management
    
By: CA Technologies     Published Date: Oct 22, 2014

How CA Cloud Service Management Speeds Deployment and Time to Value.

Tags : cloud service management, speed up deployment, ca cloud service management, accelerate time to value, system management software, service management, cloud computing
    
By: CA Technologies     Published Date: Oct 22, 2014

A buyer's guide for executives.

Tags : it service management solutions, itsm, service management
    
By: CA Technologies     Published Date: Oct 22, 2014

How CA Cloud Service Management Speeds Deployment and Time to Value.

Tags : cloud service management, speed up deployment, ca cloud service management, accelerate time to value, service management, cloud computing
    
By: CA Technologies     Published Date: Oct 22, 2014

A buyer's guide for executives.

Tags : it service management solutions, itsm, service management
    
By: CA Technologies     Published Date: Oct 22, 2014

A buyer's guide for executives.

Tags : it service management solutions, itsm, service management
    
By: CA Technologies     Published Date: Oct 22, 2014

How CA Cloud Service Management Speeds Deployment and Time to Value.

Tags : cloud service management, speed up deployment, ca cloud service management, accelerate time to value, web service management, service management, cloud computing
    
By: CA Technologies     Published Date: Oct 22, 2014

How CA Cloud Service Management Speeds Deployment and Time to Value.

Tags : cloud service management, speed up deployment, ca cloud service management, accelerate time to value, web service security, web service management, service management, cloud computing
    
By: CA Technologies     Published Date: Oct 22, 2014

How CA Cloud Service Management Speeds Deployment and Time to Value.

Tags : cloud service management, speed up deployment, ca cloud service management, accelerate time to value, web services, web service management, service management, cloud computing
    
By: IBM     Published Date: Oct 10, 2014

Get the essentials about agile testing and service virtualization from several different perspectives – get an analyst’s take from Diego Lo Giudice of Forrester Research on how to remove agile testing bottlenecks and ways to calculate your potential return on investment for Service Virtualization

Tags : ibm, virtualization, service virtualization, service components, deploying service, team productivity, software quality, dependent services
    
By: IBM     Published Date: Oct 10, 2014

Delivering applications that meet the needs of the business can be a challenge in a complex business climate that is constantly changing. Diverse, multiple heterogeneous environments are the norm, all of which must be maintained and deployed. Multiple tools and technologies connect, support and create work.

Tags : ibm, software delivery, collaborative platform, investments, application delivery, customer feedback, standardized process, deployed
    
By: IBM     Published Date: Oct 10, 2014

Continuous engineering is explained in easy to understand terms in this Dummies book, appropriate for all levels of product and systems development stakeholders.

Tags : ibm, continuous engineering, product designs, engineering resources, corralling complexity, analyzing continuously, traditional processes, market analytics
    
By: xMatters     Published Date: Sep 22, 2014

When it comes to data breaches and service outages, it’s no longer a question of if but when. Governments worldwide increasingly have new laws, pending legislation, privacy regulations and “strong suggestions” for protecting sensitive information and taking action when breaches or service outages occur. Get the Complimentary White Paper and learn how you need to prepare for these new laws and more. The white paper examines current regional legislation and how you can implement communication best practices for maintaining transparency and trust in the face of consumer-facing service disruptions.

Tags : communication, best practices, data, breaches, enterprise, consumer, confidence, science
    
By: Lenovo     Published Date: Sep 16, 2014

Renewed interest in Virtualized Desktop Infrastructure (VDI) comes largely from the need to solve mobility and BYOD demands. Though traditional VDI vendors bring their own solutions to market, is it time to consider smarter alternatives? By focusing on where VDI excels, where it falls short, and where web and cloud services are most compatible, agencies can take a smarter approach to these difficult decisions. Understand the tradeoffs, and learn why more agencies are taking notice to emerging web technologies through this executive summary.

Tags : vdi, cloud alternatives, byod demands, emerging web technologies, business intelligence, data protection, database security, productivity
    
By: IBM     Published Date: Sep 15, 2014

This white paper highlights how a real world FIS client’s utilization of IBM FlashSystem together with the FIS Profile® banking solution1 yielded dramatic performance improvements, truly accelerating the pace of global banking. This client has been an FIS outsourcing client for 14+ years and counting.

Tags : global banking, banking solutions, fis outsourcing, banking information technology, flash technology, business activity monitoring, business analytics, business process automation
    
By: TeamQuest     Published Date: Sep 05, 2014

Verizon Wireless uses TeamQuest software to prove a need before purchasing hardware, to plan for peak demands, and to monitor performance on a daily basis

Tags : business activity monitoring, business intelligence, project management, service management
    
By: TeamQuest     Published Date: Sep 05, 2014

TeamQuest Director of Market Development Dave Wagner and Chris Lynn, Safeway's Capacity Manager and Performance Analyst, cover the application of automatic, exception-oriented analytics to a wide variety of IT and business metrics in order to simultaneously optimize service performance and IT cost. Multiple conceptual approaches are shared, including pros and cons. Most of the presentation includes real examples by which Safeway has integrated performance, capacity, business, and power data into an automated optimization process spanning 1000s of servers and virtual servers and their applications.

Tags : automated analytics, automated optimization, it cost, power data, application performance management, business intelligence, business process automation, productivity
    
By: Workday     Published Date: Aug 27, 2014

This paper describes—in three steps—the approach Workday is taking to create the next generation of enterprise business solutions "from the ground up."

Tags : innovation, enterprise business solutions, workday, saas, platforms, storage, data management, mobile computing
    
By: Global Knowledge     Published Date: Aug 19, 2014

IT service managers are now required to rethink the way they deliver and support services. This white paper provides a snapshot of challenges for IT service and support and explains why the Service Desk is now more critical than ever.

Tags : it support, omnichannel support, cloud based services, end-user experience, it services, customer relationship management, customer satisfaction, customer service
    
By: CA Technologies     Published Date: Jul 16, 2014

This paper provides findings and statistics on users demands and an important list of 5 ways to satisfy both business and user demands for IT Service.

Tags : cloud service management, mobile computing, mobile data systems, customer interaction service, service management, cloud computing
    
By: Global Knowledge     Published Date: Apr 08, 2014

Refresh and reset are powerful additions to the arsenal of recovery tools found in Windows 8. Resetting reverts a machine back to a base image of the initial installation; refreshing a machine is a little less drastic in that it keeps some applications, and more importantly, keeps all user data safe while still fully cleansing a PC of many troublesome issues.

Tags : global knowkedge, windows, recovery, refresh, reset, windows 8, windows server, productivity
    
By: Global Knowledge     Published Date: Apr 08, 2014

Microsoft SQL Server 2014 has some great new features that will allow you to develop higher performing, more scalable next-generation applications using the hybrid cloud. Microsoft is building on the established foundation of SQL Server 2008 and 2012. Using similar architecture and management tools, customers will be able to smoothly upgrade their systems and skills based on the need for the new features and according to their own schedule.

Tags : microsoft exchange, project management, service management, cloud computing
    
By: Bit9     Published Date: Sep 30, 2014

For enterprises, relying on perimeter defenses as well as traditional endpoint protection is no longer suitable to combat today’s threats. There is a good reason for that, since solutions including signature-based antivirus have not kept pace in combating advanced threats or zero-day attacks leaving devices defenseless.

Tags : endpoint protection, server security, perimeter defenses, security, business analytics, risk management, content management system, service management
    
By: Bit9     Published Date: Sep 30, 2014

Regardless of how they initially enter the organization, most attackers today still aim to compromise internal servers to steal user credentials, steal sensitive data, and turn compromised servers into hosting platforms used to help attackers steal even more assets. This SANS whitepaper discusses the methodology of internal and external attacks on data center servers and the applications running on them. It also discusses why, even with our layers of security in place today, servers are still vulnerable, and how organizations can leverage application controls to permit what is known and trusted while denying everything else.

Tags : server security, platform protection, data center servers, server vulnerability, security, knowledge management, best practices, project management
    
By: JumpCloud     Published Date: Sep 29, 2014

Learn how innovative IT and ops teams are leveraging hosted LDAP solutions to minimize hassles.

Tags : ldap, active directory, user management, idaas, iam, ssh access, linux, hosted ldap
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End