CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

service provider

Results 651 - 675 of 720Sort Results By: Published Date | Title | Company Name
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Today’s service providers face more pressure than ever to keep remote equipment up and running as customers continue to demand higher levels of reliable service while keeping costs competitive. Thus, there is a growing need for remote site management solutions that can help service providers monitor, access and control telecom equipment located at customer sites.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Organizations today depend upon their networks to increase productivity and reduce network infrastructure and maintenance costs. Accordingly, these networks must be secure and perform reliably in order to accommodate geographically dispersed users. Unplanned remote site downtime due to equipment failure or adverse environmental conditions can severely impair network service.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Simple voicemail has evolved into complex integrated messaging platforms and the generic black handset has been replaced by a plethora of devices. Service providers can become critical partners for companies looking to ensure availability of their voice network.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: WiChorus     Published Date: Oct 12, 2007
Wireless technologies are migrating from complex hierarchical voice-oriented architectures to flatter, low latency, all-IP based designs – reducing cost and complexity for service providers while efficiently supporting real time IP services. Coupled with this trend is the migration to higher performance OFDMA air links with MIMO and AAS, providing much greater bandwidth with improved interference characteristics.
Tags : 
wimax, access controller, asn-gw, gateway, base station, ofdma, edge router, farpoint group, controller, wichorus, wireless
    
WiChorus
Published By: Tideway Systems     Published Date: Dec 11, 2007
IT service providers need to offer services that deliver new business opportunities whilst increasing levels of availability, controlling risks and reducing costs. This paper provides you with practical guidance based on the practices in ITIL® V3 that will help you manage application and infrastructure changes and configurations.
Tags : 
service management, itil, change management, configuration management, knowledge management, service strategy, service design, tideway, tideway systems
    
Tideway Systems
Published By: Clarus Systems     Published Date: Mar 18, 2008
Clarus Systems, Inc. answers the demands of the market by providing enterprises, systems integrators and managed service providers with scaleable IP Communications solutions that maximize ongoing operations and ensure increased end user confidence and efficiency. Learn more about Clarus Systems and how they can help your business in this data sheet.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: BlueHornet     Published Date: Apr 12, 2010
Email marketing service provider BlueHornet recently partnered with mobile marketing solutions provider SmartReply to develop an automated sign up process via mobile text messaging for email marketing communications. In this free case study, learn how Chuck E. Cheese's, a nationally recognized leader in full-service family entertainment and dining, used text messaging as a sign up method for their Chuck E-Club email program to grow their email list and increase engagement levels.
Tags : 
bluehornet, email marketing, mobile text messaging
    
BlueHornet
Published By: Bronto     Published Date: Jan 03, 2013
If you're an online merchant, finding the right long-term Email Service Provider (ESP) is absolutely critical to your success. Your revenue depends on it!
Tags : 
esp, email marketing, retail, automation, automated, marketing, digital marketing, software, advertising agencies
    
Bronto
Published By: Tail-f Systems     Published Date: Sep 16, 2008
The NETCONF protocol is a modern building block for device management automation, offering a unified approach to network configuration, rather than a device-specific methodology. To equipment vendors, NETCONF is a way to standardize the management interface of network elements. To service providers, NETCONF is a way to optimize the administrative workflow, by moving management intelligence out of the device under management, and consolidating this management into higher-level applications.
Tags : 
netconf, netconf standard, device management automation, network standard, ietf standard, tail-f, tailf, networking, network management
    
Tail-f Systems
Published By: TailoredMail     Published Date: Nov 21, 2008
Learn how email service provider, TailoredMail, helped an automotive agency easily handle hundreds of dealer accounts yet effortlessly give each a personal touch.
Tags : 
tailored mail, email service provider, email marketing program, outsell, email newsletters
    
TailoredMail
Published By: TailoredMail     Published Date: Nov 21, 2008
Leading-edge email service provider introduces new concept of delivering emails to the inbox, resulting in up to a 20% increase in delivery and open rates.
Tags : 
tailored mail, email service provider, email marketing, email deliverability
    
TailoredMail
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial services providers—from the solo accounting professional to the midsize accounting firm to world’s largest corporation, from CPAs to CFPs to credit counselors—have never been as challenging as they are in today’s turbulent times. And although the large data breaches at the most recognizable companies receive the most publicity, small companies and solo offices can also be victims, according to the Better Business Bureau.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Symantec.cloud     Published Date: Feb 03, 2010
Hosted security is an efficient and cost-effective solution for many midmarket organizations. Learn how to evaluate hosted security services, and make a business case for reliable security with predictable costs.
Tags : 
messagelabs, symantec hosted services, hosted security provider, total cost of ownership, tco, application security, business continuity, security management
    
Symantec.cloud
Published By: CEEOA     Published Date: Dec 03, 2010
CEEOA released its annual report on the state of IT outsourcing service providers market in the CEE region 'Central and Eastern Europe IT Outsourcing Review 2010'.
Tags : 
it outsourcing, software development, research, cee region, software outsourcing
    
CEEOA
Published By: OSF Global Services     Published Date: Feb 03, 2011
You've selected your CRM software. Now what? This white paper offers guidance on how to choose the CRM implementation service provider best suited to small and midsized businesses.
Tags : 
crm implementation, crm integration, installing a crm, implementing a crm
    
OSF Global Services
Published By: Sixth Sense Media     Published Date: Apr 14, 2011
This paper will review growth drivers, and outline steps service providers can take to enter a new age of lifecycle marketing and promotions to increase ARPU and address churn.
Tags : 
mobile subscriber marketing, telecommunications marketing, mobile services marketing, reduce subscriber churn, telecom services, subscriber marketing
    
Sixth Sense Media
Published By: GMS Inc     Published Date: May 18, 2011
Insights into the service and support offerings of GMS and business software providers alike
Tags : 
accounting, causes, charity, community, consultants, donation, donations, donorexpress, donorperfect, donorworks, education, environment, finance, fundraising, funds, grants, inspiration, loans, non-profit, nonprofits
    
GMS Inc
Published By: Dell Storage     Published Date: Aug 14, 2012
The importance of healthcare providers to assure their patients the utmost security, confidentiality and integrity of their sensitive information cannot be understated. This means being HIPAA compliant within every aspect of their practice, with a particular emphasis on the components of their healthcare IT infrastructure This white paper described elements and best practices of a HIPAA compliant data center. This comprehensive guide spans the administrative, physical, and technical safeguards of the HIPAA Security rule from the physical security and environmental controls necessary of the facility itself, to the requirements needed between a Covered Entity (CE) and the data center provider when outsourcing. Detailing both the benefits and risks of a third-party partnership, this white paper provides answers to key questions such as what exactly makes a data center HIPAA compliant, what to look for when choosing a service provider to work with, and why a Business Associate Agreement (BAA) is important for establishing accountability with these partners.
Tags : 
hipaa, compliant, data, center, centers, healthcare, providers, assure, patients, utmost, security, confidentiality, integrity, sensitive, information, compliant, compliance, practice, particular, emphasis
    
Dell Storage
Published By: Infoblox     Published Date: Dec 28, 2012
Learn about defeating Dos/DDoS attacks in real time -- Know about the causes of rapid growth in the number of Denial of Service (DoS/DDoS) attacks and more.
Tags : 
infoblox, dos, ddos, denial of service attacks, security, denial of service, isp, internet service provider, it management, business technology
    
Infoblox
Published By: HP - Intel® Xeon® processors     Published Date: May 06, 2013
This paper examines how seven enterprise and midsize companies spanning the equipment rental, healthcare, retail, research, and telecommunications (service provider) industries were able to reduce their annual IT cost to deliver compute services by 58% by migrating to a blade platform.
Tags : 
blade, infrastructure, server, virtualization, enterprise, midsize, blade platform
    
HP - Intel® Xeon® processors
Published By: Blue Jeans Network     Published Date: Oct 17, 2013
In this white paper, you will learn how third-party service providers can help Lync to become the ubiquitous solution empowering information workers, speeding decision making, and enabling the next generation of B2B and B2C communications.
Tags : 
visual collaboration, video conferencing, collaboration, unified communications, it management, enterprise applications
    
Blue Jeans Network
Published By: Blue Jeans Network     Published Date: Oct 17, 2013
In this white paper, you will learn how third-party service providers can help Lync to become the ubiquitous solution empowering information workers, speeding decision making, and enabling the next generation of B2B and B2C communications.
Tags : 
visual collaboration, video conferencing, collaboration, unified communications
    
Blue Jeans Network
Published By: CDW     Published Date: Sep 10, 2014
Leading organizations don’t think of data protection in traditional back-office terms—and that’s no accident. They think and act like service providers, and in doing so transform data protection operations from mere cost centers to business enablers. Traditional data protection architectures can’t meet today’s challenges of massive growth, application performance, and data availability. And they aren't designed for services-oriented business models.
Tags : 
protection, storage, architecture, massive growth, integrated, data
    
CDW
Published By: Datto Inc.     Published Date: Jan 31, 2013
You can even conquer a Superstorm when all the pieces come together. Read how the entire Datto team, from product and technical support to the CEO, worked with Partners and their clients to make it through Sandy with data intact and minimal downtime.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
    
Datto Inc.
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search