social

Results 1976 - 2000 of 2002Sort Results By: Published Date | Title | Company Name
Published By: Salesforce     Published Date: Nov 19, 2015
In the next five years, more than $2 trillion is expected to transfer between generations. To capitalize on this massive redistribution of wealth, today’s financial advisors need to meet the demands of today’s clients who are social, mobile, more connected, better informed and looking to collaborate with their advisors when they want, where they want.
Tags : 
salesforce, financial services, cloud, mobile, data, data center
    
Salesforce
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
To drive organizational change and achieve successful results, growth CMOs focus on fostering five specific adaptive capabilities: technology, omnichannel, measurement, social connectivity, and talent
Tags : 
    
Tyco Integrated Security
Published By: Meltwater     Published Date: Jul 29, 2015
When a brand crisis hits, your most important asset is media intelligence. But don’t wait for all hell to break loose to get up to speed on the latest tools and best practices for crisis communications in the age of social media. Get the tools you need to help spot early warning signs, stay organized, and enforce due process should a crisis hit—Download our Media Intelligence for Crisis Communications e-book today.
Tags : 
media monitoring, social media monitoring, media intelligence, crisis communication, crisis communication plan, crisis management, crisis preparation, crisis planning, social listening, brand crisis, brand monitoring, brand protection, reputation management, corporate communications, public relations
    
Meltwater
Published By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management, knowledge management, data management
    
Mimecast
Published By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management, knowledge management, data management
    
Mimecast
Published By: Lumesse     Published Date: Feb 13, 2015
This White Paper illustrates the trends that increase the complexity of recruitment, causing talent acquisition managers and HR leaders significant concern: the emergence of new technology, changing demographics and recruiting across borders and increasing globalisation.
Tags : 
use of technology in recruitment, new recruitment methods, mobile jobseekers
    
Lumesse
Published By: IBM     Published Date: Apr 01, 2015
Is email still the “killer app” it used to be? Social technologies and mobile capabilities are changing the way people communicate in the workplace. Many organizations are employing BYOD strategies and embracing social business tools like file sharing, chat, wikis and communities. In the past, email was used for storing and sharing documents and having conversations with groups. Tasks which are much better suited for today's social cloud collaboration tools. Email usage may be evolving, but email is not dead. In fact, everyone in the organization from executives to factory workers needs email to stay connected. And many organizations are moving their messaging to cloud to take advantage of the flexibility and cost savings a cloud environment provides. In this webcast, you will learn: • How the nature of email has changed and why everyone in your organization needs it. • Why the cloud makes sense for messaging for everyone from executives, to sales, to boundary workers, either as hybrid solution or for the entire workforce. • How email complements social business technologies and how you can start using your email more efficiently in the workplace. • How moving messaging to the cloud can help reduce IT cost and complexity.
Tags : 
email, social technologies, byod, file sharing, chat, cloud, ibm, networking, it management, business technology
    
IBM
Published By: Microsoft Azure     Published Date: Apr 10, 2018
Help your sellers work smarter and build stronger relationships Sales teams work so hard, they can burn out quickly. It’s tough when customer contacts, sales goals, productivity tools, and social networking are all separated and siloed. Instead of working in separate systems that make day-to-day selling complex, you can help simplify the way your sellers work. And empower your team to be more productive and efficient. Our e-book, “The Savvy Seller’s Guide to Building Profitable Relationships,” is packed with advice for making selling much less painful—and more profitable. Did you know if your lead has had prior exposure to content from your company’s brand, that they’re 25% more likely to respond to your InMail? You’ll find this and more helpful facts in the e-book, including actionable insights to help your team: Identify the right leads—including pinpointing who’s on the buying committee Capture buyers’ attention Use insights and predictive intelligence from AI and machine learni
Tags : 
    
Microsoft Azure
Published By: IBM     Published Date: Jul 08, 2015
For years, organizations have recognized that a better understanding of customers can translate to more sales, increased customer satisfaction and reduced customer churn. Initiatives focused on a 360-degree view of the customer have gone a long way toward providing those benefits by synthesizing customer profiles, sales history and other structured data from multiple sources across the enterprise. But today, customer-centric organizations are discovering that there is more opportunity for growth when they enhance that 360-degree view with information from more sources, both within and beyond the enterprise (see Figure 1). Information in email messages, unstructured documents and social media sentiments—previously beyond reach—is now extending the 360-degree view.
Tags : 
ibm, e360, customer satisfaction, customer retention, sales history, big data, it management, knowledge management, enterprise applications, business technology
    
IBM
Published By: FICO     Published Date: Dec 04, 2017
As consumers, we’re all having more experiences that seem almost magical: You’re in a mall when suddenly your smartphone beeps. It’s an offer for 20% off a pair of shoes you’ve been looking at online — from the store you just walked past! As business people, we know it’s not magic, but rather analytics powering these outstanding customer experiences. Analytics have evolved to the point where they answer an expanding range of useful questions. But understanding the different types of analytics – descriptive, diagnostic, predictive and prescriptive - and how to use them in your business can be challenging. Download the eBook to learn about the least understood – yet most powerful – tool in the analytic arsenal. Prescriptive analytics enable you to estimate and compare the likely outcomes of any number of actions, and choose the very best action to advance business objectives. Getting there isn’t as difficult as you think. Start your journey. Download the eBook today.
Tags : 
profits, analytics, credit, social, media, services, customer, consumers
    
FICO
Published By: Pega     Published Date: Jun 21, 2016
IT leaders working on customer service projects must display an incredible amount of diligence. An organization’s CRM system has become its lifeline to customers, but as customer needs evolve so has the requirements of CRM. According to Gartner, today’s CRM solution must include a laundry list of capabilities outside its traditional core functionality including: native mobile support of the vendor's customer service and support business applications; real-time analytics; industry-specific functionality and workflow; context mining of voice and text; scalable cloud-based systems; social media engagement; suggested next agent action; multimodal capabilities, such as chat within mobile self-service; and even co-browsing. Gartner surveyed the CRM field and evaluated each vendor including Pegasystems.
Tags : 
    
Pega
Published By: Qlik     Published Date: Oct 13, 2015
Business intelligence and analytics leaders must re-evaluate and evolve the capabilities of their teams to ensure that they can leverage bimodal work practices to engage, communicate and adapt to new developments in business analytics, including diagnostic and predictive analytics.
Tags : 
qlik, data discovery, business intelligence, analytics, user produced content, cloud, social, data visualization, bimodal work practices, predictive analytics, data management, business technology, data center
    
Qlik
Published By: Uberflip     Published Date: Jan 09, 2017
A content marketer's job isn't done after hitting publish. Learn how the best B2B marketers effectively distribute their content.
Tags : 
content marketing, content distribution, b2b content distribution, demand generation, b2b demand generation, inbound marketing, email marketing, b2b email marketing, b2b social media, content syndication, b2b seo, search engine optimization
    
Uberflip
Published By: Oracle_Hospitality Hotels     Published Date: Sep 26, 2016
Here are the pros and cons of social players and the benefits of OVPs, followed by an overview of the type of content that works best for each in a blended strategy.
Tags : 
    
Oracle_Hospitality Hotels
Published By: Blue Valley Telemarketing     Published Date: Sep 12, 2016
Download this eBook to learn how Telemarketing is perfectly paired with other forms of distribution to proactively assure that your content reaches your target audience at the right time and is of value to recipients.
Tags : 
telemarketing, lead generation, sales pipeline, social media, content management
    
Blue Valley Telemarketing
Published By: Microsoft Office 365     Published Date: Oct 14, 2016
“Hi, this is Kevin from IT. We've been notified of a virus on your department’s machines.” Add some authentic hold music, and a social-engineering attacker can trick employees into sharing company info, like passwords. Learn how to use technology and prevention strategies to guard against dumpster diving, spear phishing, and other tactics with: Real-world prevention strategies Tools to spot suspicious actions Real-time behavioral malware analysis
Tags : 
protection, prevention, malware, security, cyber attacks, information
    
Microsoft Office 365
Published By: Amazon Web Services     Published Date: May 18, 2018
We’ve become a world of instant information. We carry mobile devices that answer questions in seconds and we track our morning runs from screens on our wrists. News spreads immediately across our social feeds, and traffic alerts direct us away from road closures. As consumers, we have come to expect answers now, in real time. Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data
Tags : 
    
Amazon Web Services
Published By: Oracle HCM Cloud     Published Date: Nov 30, 2016
Western Union enhances the recruiting experience for both candidates and recruiters with the Oracle Talent Acquisition Cloud by leveraging a flexible and robust recruiting tool with social media capabilities and a referral program.
Tags : 
    
Oracle HCM Cloud
Published By: Sprinklr     Published Date: Jan 05, 2018
Long wait times, dropped calls, repeating a single problem dozens of times – one could write a novella about the countless pain points of customer service. To customers, these pain points are, well, painful. To companies, they’re a necessary part of doing business. When you’re a multibillion-dollar brand with hundreds of locations worldwide, scale equals survival. Call centers are the epitome of scale. Fixated on efficiency, many companies forget what it’s like to be on the other end of the line. They forget about the customer experience.
Tags : 
    
Sprinklr
Published By: IBM     Published Date: Oct 26, 2017
Improper user access to applications can expose an organization to cyber attacks, with wide-ranging financial, social, public relations and legal implications for a compromised enterprise. To address these risks—and to meet regulatory requirements for authentication, data privacy and security—organizations sometimes find themselves wrestling with complex and costly access-management approaches.
Tags : 
critical data, access security, user experience, it strategy, identity federation
    
IBM
Published By: Comcast Business     Published Date: Oct 19, 2018
Technology has had a truly transformative impact on the healthcare space. Thanks to innovations in technology, tools and their respective processes, the practice of treating patients has shifted from mostly reactive to proactive, enabling physicians and caregivers to approach healthcare in a more holistic fashion. As part of that shift, hospitals, wellness centers and physicians’ offices are focusing on providing value over volume1, taking healthcare beyond the four walls of the facility and into patients’ homes, places of work and social centers. The concept of whole health is much easier to attain with technology such as artificial intelligence, analytics, wearables and mobile health (mHealth) apps, to name a few.
Tags : 
    
Comcast Business
Published By: Progress     Published Date: Mar 06, 2017
Formerly, buyers were limited in the ways they could gather product information. But because of the web and social media, buyer behaviors have changed. Because buyer interactions can number in the thousands or millions, businesses must use automated tools to personalize the buyer’s online experience and drive them toward a purchase decision.
Tags : 
    
Progress
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This white paper outlines a framework that emphasizes digitization and business transformation and the new opportunities pull processes bring. The mechanism of “Pull” processes—those triggered by an actual event instead of a forecast—is nothing new. It is at the heart of many successful manufacturing strategies. Recent technological advances in digitization, including the harnessing of Big Data analytics, the use of the cloud, Business Process Management (BPM), social media, IIoT, and mobility, have extended the power of Pull beyond Lean manufacturing. In the wake of the current technological innovation wave, it is not uncommon for manufacturers to not know what next step to take. In light of these new developments, this white paper will focus on the mechanism of business transformation enabled by these technologies, which can be attributed to two major forces: the power of Pull and digitization. Nine practical applications are detailed, showing how innovative manufacturers can better
Tags : 
    
Dassault Systèmes
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
OAuth permet à l’utilisateur de déléguer ses droits d’accès à une API, permettant ainsi à un service d’être intégré à un autre pour le compte de cet utilisateur. Ce sont les mêmes fournisseurs du Web social qui ont popularisé le schéma d’exposition d’une API afin de permettre à des développeurs tiers d’enrichir leurs plates-formes qui ont été les premiers à avoir appliqué ces mécanismes de délégation des autorisations. Créé en 2006, le protocole OAuth a permis de standardiser les mécanismes de ce type.
Tags : 
    
CA Technologies EMEA
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Every minute, the equivalent of one garbage truck of plastic waste enters our oceans—a total of 8 million metric tons a year. This plastic waste litters the seafloor and floats on the surface in vast plastic patches, poisoning seabirds and other marine life. By the year 2050, one estimate suggests there will be more plastic than fish in the world’s oceans. Founded in May 2013, social enterprise The Plastic Bank aims to tackle ocean pollution head-on.
Tags : 
    
Group M_IBM Q418
Start   Previous    67 68 69 70 71 72 73 74 75 76 77 78 79 80 81    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.