ComputerWeekly.com Research Library

Powered by Bitpipe.com

IT Service Centers Research

  • Visibility to Containers: Measurable outcomes from CMDB

    Sponsored by: ServiceNow

    Containers couple both applications and systems dependencies together into a single artifact and introduce a new layer of abstraction, simplifying DevOps. Access this eBook to learn how teams can leverage this efficiency to transform legacy IT into fast IT through automation, reduced costs, and improved productivity.

  • How to Provide Customers with Better Help Desk Experiences with Luma, the Virtual Agent

    Sponsored by: Serviceaide

    Inside, learn why support teams have an opportunity to transform their service desks using virtual agents, and how machine-driven support and human-based conversations can help provide better CX.

  • 24x7 Customer Service Without Additional Headcount

    Sponsored by: Serviceaide

    Download this white paper to learn how the IT service desk demonstrates how the internal CX is influenced by the journey through interaction touchpoints, and why achieving this often requires a redesign of company culture, new technology, and modernized processes.

  • IT Service Excellence: How to Exceed Customer Expectations and Ensure Retention

    Sponsored by: ConnectWise

    This 105-page e-book serves as your go-to resource on the fundamentals of IT service delivery, featuring a blueprint for successfully managing and delivering services to your customers. Download the full e-book here.

  • Pricing IT Services: A Complete E-book

    Sponsored by: ConnectWise

    In this e-book, you'll learn how to calculate your full hourly overhead in 3 steps–so you can set the right price for your IT services. View it here to get started.

  • IT outsourcing in the digital age

    Sponsored by: ComputerWeekly.com

    In this e-guide, discover how cloud computing continues to change the IT outsourcing industry, how Indian staff are making up a larger proportion of the workforces at large western companies, and find out how IT is disrupting the legal firms that support the outsourcing industry.

  • Switch Stories: How 5 Enterprises Left Their Legacy ITSM Behind

    Sponsored by: ServiceNow

    An unorganized and ill-prepared ITSM can bog down many of the processes and tools that keep service delivery running smoothly. Learn how a group of leading companies revaluated their legacy ITSM strategies to deliver increased value to their users and save their businesses money.

  • Benelux Salary Survey 2016/2017

    Sponsored by: ComputerWeekly.com

    he Computer Weekly 2016-2017 salary survey, which questioned 190 IT and business professionals in Benelux, found that, as expected, senior IT managers command the highest salaries, with an average annual income of €128,180.

  • Focus: Enterprise digital transformation

    Sponsored by: ComputerWeekly.com

    In this e-guide we look at how businesses can stay on track through collaboration, innovation, listening to user needs and partnering with suppliers.

  • Harnessing Business-Led IT

    Sponsored by: ComputerWeekly.com

    CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues

  • ROI Case Study: Quest Foglight at Imperial College London

    Sponsored by: ComputerWeekly.com

    Imperial College London deployed Quest Foglight to manage the performance of its applications, databases, and services and reduce system downtime. Nucleus Reseach evaluates the ROI of the project.

  • Conflicker Working Group - Lessons learned from Conflicker

    Sponsored by: ComputerWeekly.com

    In November 2008, Conficker A, the first of five variants of the malware, rapidly began infecting computers which had failed to install a Microsoft patch released just weeks earlier. In late December 2008, Conficker B added new mechanisms for distribution including USB storage devices.

  • Open Group: FAIR -ISO/IEC 27005 Cookbook

    Sponsored by: ComputerWeekly.com

    The purpose of this document is to help the security practitioner responsible for their organization’s risk estimation function to utilize The Open Group Risk Management Frameworkin an ISO/IEC 27005 structured process.

  • G-Cloud Report: Service Specification Approach

    Sponsored by: ComputerWeekly.com

    The G-Cloud, Government Applications Store and Data Centre Consolidation Phase 2 programme started on 5 October 2009 and will run till 12 February 2010. The programme comprises seven workstrands and a Programme Office function.

  • IT hiring activity and salary changes for 2010

    Sponsored by: ComputerWeekly.com

    Our IT division recruits permanent and contract professionals into financial servicesfirms, including investment banks, hedgefunds and asset managers, and companies inthe commerce and industry and professional services sectors. We recruit business technologists from support to CTO level.

  • IT jobswatch – trends in media IT recruitment

    Sponsored by: ComputerWeekly.com

    This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.

  • Bare Metal Clouds: The Pros and Cons of a Non-Virtualized Option

    Sponsored by: IBM

    This informative guide explores the pros and cons of a "bare metal cloud" – a cloud service that is not virtualized.

  • A Better Way to Manage Desktops: HP Workplace Management Services

    Sponsored by: Hewlett-Packard Enterprise

    Enterprises need to give employees a full, flexible and configurable managed desktop environment to meet diverse business requirements and user productivity needs. Find out how HP can help.

  • Your Guide to Improving IT Service Visibility

    Sponsored by: Pangea Systems

    This whitepaper details the importance of IT service visibility for providing the performance your users demand and justifying the value of your services.

  • ITSM: Connecting Service Desk Operations to IT Strategies

    Sponsored by: IBM

    This expert e-guide examines the changes that ITIL and IT service management are bringing to your IT departments

  • Get Quick & Easy Access to IT Staffing with IM Link

    Sponsored by: Ingram Micro

    This webcast covers an IT staffing service that will help fill in the holes in your understaffed IT department however you need it, and without breaking the bank.

  • Converged Infrastructure Trend 2- New skill sets

    Sponsored by: Hewlett-Packard Enterprise and Intel ®

    This short video discusses emerging trends that are impacting IT pros jobs, and learn about skill sets you need in order to be successful in this new style of IT.

  • Cisco® ONE: The Value of Advanced Flow Control

    Sponsored by: Cisco Systems, Inc.

    Discover how utilizing the advanced flow control capability in Cisco Open Network Environment (ONE) can help you overcome the complex monitoring challenges you are facing today.

  • ITIL: The building blocks of an ITSM strategy

    Sponsored by: FrontRange Solutions Inc.

    Services are the building blocks of an ITSM strategy, but how does an enterprise begin to pick and choose the "right" services to manage or develop? Inside this e-guide, get the answer to this question and more. Gain expert insight into utilizing ITIL for continuous improvement in asset management, ITSM, and help desk operations.

  • IT Service Assurance: Achieve proactive IT operations

    Sponsored by: BMC-Accenture

    This white paper explores the role of a command center in helping companies monitor and manage individual technologies and explains why a service-oriented approach is essential.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.