CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

desk

Results 351 - 375 of 1075Sort Results By: Published Date | Title | Company Name
Published By: Freshdesk     Published Date: Aug 15, 2016
A Zombie-apocalypse is not something that keeps most support teams paranoid about. After all, it isn’t something that happens every day. But that is exactly what’s so scary about it? Zombie attacks can stem out of pretty much anything, right from a barrel of toxic gas that was accidentally opened, to a Black Friday sale with deep discounts on the latest gadget. And you can be pretty sure that the attack is going to start quick and grow big with very little warning. Unless your support team is ready when it strikes, you might wake up the next morning to find a burnt-up help desk, and a lot fewer customers. So how can you can you get your customer support to be ready for the zombie apocalypse? This guide will walk you through everything you can and should do to make your support team proactive before the zombies rise, effective during the attack, and heroes after.
Tags : 
    
Freshdesk
Published By: Freshdesk     Published Date: Aug 15, 2016
When 76% of consumers say they view customer service as the true test of how much a company values them, you have to make sure that your strategy, and tool, are top notch. Here's a collection of best practices, drawn from our conversations with customers, to help you improve your agents' productivity and win customer love. In this whitepaper, we detail how you can - Provide your agents with complete context by pulling data from your third party systems into your helpdesk - Reduce ticket volume and help customers help themselves by setting up a knowledge base - Automatically assign tickets to the right team with ease thus reducing your agent's workload and many more!
Tags : 
    
Freshdesk
Published By: Freshdesk     Published Date: Aug 15, 2016
Choosing the right helpdesk software for your team can be a path so perilous that even Hercules’ labours pale in comparison. But the truth is, if you have the right information, it doesn’t have to be that hard. In this whitepaper, we discuss some of the core things you should know when you shop for a helpdesk solution like: - Why you need support software and why you need just one tool - The advantages of hosted helpdesks over on-premise software - A feature list to help make that shopping experience a little less painful
Tags : 
    
Freshdesk
Published By: Freshdesk     Published Date: Aug 15, 2016
Every helpdesk agent at every customer support team, anywhere in the world, dreams about Inbox Zero. However as most businesses grows from just a handful of support queries to hundreds of customers chocking the support hotline, they make the mistake of going on a hiring binge to reach that elusive promised land. The only problem? Hiring more support staff may not be the best way to scale up your customer support. This whitepaper talks about how you can scale your customer support without blindly scaling the team, with tips, ideas and insights like: - How to puncture the customer support hot-air balloon - Proactively identifying red flags and overloads - Top 4 things to know before you hire - Monitoring, understanding and reporting support trends - Tips to streamline your support process
Tags : 
    
Freshdesk
Published By: Freshdesk     Published Date: Aug 15, 2016
While email is perfect for one-to-one communication, it doesn't work half as well for managing many-to-many conversations like a helpdesk would. When businesses use email to support customers, they leave room for conversations to get lost, ignored or forgotten. Not to mention, the lack of accountability and metrics to gauge the process and figure out what's working and what's not working. In this whitepaper, we discuss, for those businesses, the advantages a helpdesk has over email and lay out just how easy it can be to win customer love.
Tags : 
    
Freshdesk
Published By: Freshdesk     Published Date: Aug 15, 2016
There are quite a few things that your customers just aren’t telling you. But since you aren’t a telepath and you don’t own a Cerebro, the only thing you can do is wait for them to come to you with it. But not anymore. In this whitepaper, you'll learn the most important things that your support team should already know, but customers will never tell you, like: - Why you should design intelligence into your self-service experience - When you should resort to analytics and when "gut-feel" helps - How you can proactively manage, and prevent customer frustrations - What your core support bottlenecks are, and how to identify them - How to set a "Priority" driven support work-flow
Tags : 
    
Freshdesk
Published By: Genesys     Published Date: Jul 27, 2016
Download this eBook to learn: What is an omnichannel agent desktop and how it can help transform customer experience Five capabilities to look for in an omnichannel desktop Success stories of how industry leaders have achieved improvements in agent efficiency, first contact resolution, average handle time and NPS
Tags : 
genesys, omnichannel, contact center, customer experience, metrics, enterprise applications
    
Genesys
Published By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
best practices, security, technology, next gen
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
Many internal control programs are still undergoing major modifications due to increased PCAOB requirements, adoption of the 2013 COSO Framework, and board focus on risk and compliance processes. Organizations are using several technology approaches to manage the process—some with more success than others. Read this white paper to learn why organizations need to utilize the tools that optimize collaboration and focus on productivity, the pros and cons of desktop-based spreadsheets and GRC platforms, and the merits of taking a fresh approach to technology to manage internal control processes.
Tags : 
business technology
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
Workiva commissioned Forrester Consulting to conduct a Total Economic ImpactTM study and examine the potential return on investment (ROI) enterprises may realize by deploying Wdesk for Controls Management. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Wdesk on their organizations and how it can be leveraged to optimize the processes necessary to deliver Sarbanes-Oxley (SOX) compliance. This in-depth financial summary finds a 238% three-year, risk-adjusted ROI for a large auto parts retailer. Key outcomes include reduced the effort required to formulate and update processes and controls for SOX compliance resulting in a three-year benefit of $190,568, and simplified audit efforts with improved audit trails in financial controls, delivering three-year present value benefits of $128,965.
Tags : 
cloud reporting, business management, economic impact, forrester, consulting, business technology, data center
    
IBM
Published By: Dell     Published Date: Jul 08, 2016
Organizations looking to implement desktop and app virtualization traditionally play a guessing game where storage is concerned. When considering local and physical storage, determining what would be necessary for the virtualized world is difficult and can be overwhelming. This is especially true when determining how virtualizing desktops will impact the storage architecture. Organizations risk over sizing their environment thereby wasting CapEx, or under-sizing and potentially ruining the user experience. Software-defined storage solutions, such as VMware Virtual SAN, provide simplified solutions with high performance data stores that offer fine-grained scalability with linearly-predictable performance as demand grows. Dell’s validated and certified desktop virtualization solutions incorporate vSphere and Virtual SAN, and provide a complete end-to-end solution that allows companies to grow and expand without large capital investments in SAN hardware.
Tags : 
technology, best practices, data, virtualization, storage, data, business technology
    
Dell
Published By: Dell     Published Date: Jul 08, 2016
Dell Virtual SAN Ready Nodes with Horizon abstract and aggregate compute and memory resources into logical pools of compute capacity, while Virtual SAN pools server-attached storage to create a high-performance, shared datastore for virtual machines.
Tags : 
technology, best practices, poweredge, hyper converged, networking, mobile computing, productivity, business technology
    
Dell
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015.1 However, only half of enterprises today are using some type of endpoint backup.2 That means that the volume of endpoint data that is in jeopardy is nothing short of significant.
Tags : 
encryption, data loss prevention, mobile app
    
Commvault
Published By: Adobe     Published Date: Jul 04, 2016
More and more interactions are shifting from the desktop to smartphones and tablets, so the value of that screen and the massive potential it represents grows daily. As do the opportunitie —and potential pitfalls—for marketers.
Tags : 
mobile, mobility, customer interaction, mobile devices
    
Adobe
Published By: IBM MaaS360     Published Date: Jul 01, 2016
In Forrester’s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the 11 most significant EMM providers — AirWatch by VMware, BlackBerry, Citrix, Good Technology, IBM, Landesk, Microsoft, MobileIron, SAP, Sophos, and Soti — and analyzed their offerings. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&O) professionals select the right partner for their enterprise mobile management.
Tags : 
ibm, forrester, enterprise mobile management, mobile, security, wireless
    
IBM MaaS360
Published By: Mitel     Published Date: Jun 29, 2016
Think back to the last time all of your employees were in the office, at their desks, on the same day. Having trouble? Between travel schedules and off-site meetings, remote staff and teleworkers, flexible schedules and sick days, it’s no wonder that having everyone in the office at the same time has become a rarity. Balance that with the fact that in today’s competitive business climate, organisations are driven and employees are measured by achieving results, and it’s clear how important it is to maintain productivity no matter where staff are located. But it’s not always easy to do. Here are five ways you can improve employee productivity in your organisation.
Tags : 
best practices, business optimization, business management, productivity
    
Mitel
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
This white paper explains the benefits of using Kaspersky Security for Virtualization and its Light Agent technology.
Tags : 
security application, virtualisation, security, kaspersky, security solutions, application security, internet security, security management
    
Kaspersky Lab Australia and New Zealand
Published By: Polycom     Published Date: Jun 08, 2016
"There are many ways to take advantage of the rich set of collaboration tools provided by Microsoft Skype for Business. IT leaders should consider a cap-and-grow Skype for Business strategy and then think through how it can be leveraged as a replacement technology. Digest this white paper by leading UC analyst Zeus Kerravala for insight on the 14 best practices for a Skype for Business Enterprise Voice deployment. Enabling IM and presence first, expanding desktop applications, and more are details in this informative piece. "
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, productivity
    
Polycom
Published By: VMware AirWatch     Published Date: May 24, 2016
Recentemente, una delle domande più comuni dei clienti è: “In che modo AirWatch supporta Office 365?” Molti chiedono se AirWatch possa controllare l’accesso ad Office 365 (O365) non solo sul loro sistema del desktop aziendale, ma soprattutto dai dispositivi mobili.
Tags : 
best practices, business optimization, business management, mobile, support
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 24, 2016
In letzter Zeit stellen Kunden immer häufiger die Frage, wie AirWatch Office 365 unterstützt. Viele fragen, ob AirWatch den Zugang zu Office 365 (O365) nicht nur auf ihren geschäftlichen Desktop-Systemen, sondern auch auf ihren Mobilgeräten steuern kann.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 19, 2016
In Forrester’s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the 11 most significant EMM providers — AirWatch by VMware, BlackBerry, Citrix, Good Technology, IBM, Landesk, Microsoft, MobileIron, SAP, Sophos, and Soti — and analyzed their offerings. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&O) professionals select the right partner for their enterprise mobile management.
Tags : 
mobile management, best practices, providers, vendors, enterprise, network management, productivity
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 18, 2016
One of the most common questions being asked by many customers recently is “How does VMware AirWatch support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices. Fortunately, AirWatch provides tremendous support to help organizations leverage O365 on their mobile devices and our recent integration with VMware® Identity Manager provides an industry-first adaptive access control framework to ensure that all work applications, including O365, can only be accessed on managed and compliant devices.
Tags : 
application management, best practices, mobile support, mobile, systems management, business optimization, network management, application security
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 18, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak.
Tags : 
data management, business practices, data center. data application, enterprise applications, security
    
VMware AirWatch
Published By: Dell EMC     Published Date: May 12, 2016
See how boosting performance for 3D graphics apps with EMC XtremIO-powered virtual desktops helped a national government department.
Tags : 
customer boosted performance, 3d graphics apps, xtremeio, virtual desktops, enterprise applications
    
Dell EMC
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search