social

Results 351 - 375 of 1995Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 11, 2016
The Smarter Process platform is IBM’s solution for reinventing business operations in a way that infuses every process with intelligence and expertise to deliver greater customer centricity, which in turn fuels top-line growth.
Tags : 
ibm, smarter process, ibm smarter process platform, business operations, knowledge management, enterprise applications, business technology
    
IBM
Published By: Egress ABM Pilot     Published Date: Oct 09, 2017
Patients trust healthcare organisations with vast amounts of their sensitive data – not just details on their medical and social wellbeing, but also personally identifiable information such as dates of birth and residential addresses. People will always make mistakes – and, unfortunately, in busy and stressful workplaces, such as hospitals and medical clinics, the likelihood of this increases. Without the right processes and technologies in place to help overcome this to avoid mistakes, sensitive patient information remains at risk.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
Egress ABM Pilot
Published By: Sage     Published Date: Nov 02, 2017
These are the end times for traditional enterprise resource planning (ERP) solutions. Overstatement? Not really—especially for growing businesses like yours. Old-school ERP systems are simply too slow, complex, and inflexible to keep up with today’s business climate. Think about your existing ERP. Does it support industry-specific best practices, ever-changing regulatory requirements, and emerging technologies such as social media, mobile, cloud, and analytics? If not, you could risk losing ground to your competitors as a result.
Tags : 
workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting, audits, account reconciliation, accounting automation, accounting audits, financial systems, contract lifecycle management, business intelligence, business analytics
    
Sage
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement, application performance management, customer interaction service, customer satisfaction, secure content management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement, application performance management, customer interaction service, customer satisfaction, secure content management
    
CA Technologies
Published By: Avaya     Published Date: Dec 18, 2013
Your contact center is a hotbed of activity, constantly processing calls and emails, chats and social media posts, problems and solutions. As a result, it generates the kind of “big data” that other departments wish they had. But collecting that data is just the beginning. The next step is turning it into a plan of action.
Tags : 
avaya, big data, contact center, social media, software development, it management, data center
    
Avaya
Published By: Avaya     Published Date: Dec 18, 2013
By now, we’re all aware of what a powerful force social media can be for a business — be it positive or negative. But how should your business address what’s happening in social media? Avaya believes you should do it in same way you take on other customer concerns — with your contact center.
Tags : 
avaya, social media, contact center, customer service, customer concern, cem, customer experience management, software development, it management, wireless, data center
    
Avaya
Published By: Avaya     Published Date: Dec 18, 2013
Seven Trends Driving Effectiveness in the Contact Center
Tags : 
avaya, contact center, mobile, social media, customer service, cem, customer experience management, it management
    
Avaya
Published By: ServiceNow     Published Date: Aug 24, 2011
Read on to discover how modern IT organizations transform to achieve IT 3.0.
Tags : 
collaboration, support, service, business, information technology, enterprise, process, social it, cloud, it 3.0, cloud computing, cloud services, people, transform it, social networks, virtualization, mobility, it for the people., data center
    
ServiceNow
Published By: ServiceNow     Published Date: Feb 07, 2012
Download the white paper to find out more about next-gen IT solutions - and how IT in the cloud will help your organization not only keep up with today's complex IT ecosystem, but manage it more efficiently than ever before!
Tags : 
powering, transformation, cloud, investments, integration, access data, performance, revolution, ecosystem, manage, next-gen it, social media, build relationships, improve service, collaboration, post it, tag it, tweet it, like it, facebook
    
ServiceNow
Published By: Spredfast, Inc.     Published Date: Oct 22, 2014
During the busy holiday season, it takes exceptional marketing to stand out from the crowd. Make a statement with social integrations that place your customer at the heart of your campaign. It’s a timeless look. During the 2013 holiday season, luxury watch retailer Tourneau increased watch sales 57% by helping fans find the perfect gift with their omni-channel #TourneauKnows campaign. Just as in fashion, your brand should seek campaign inspiration further afield. Take a cue from tech sector giant, Cisco, who breathed new life into the banner ad by creating socially powered ad units. It was an arresting experience that aligned with readers of The Huffington Post, where the ads were displayed. If you are seeking new, innovative ways to capture your audience’s attention this holiday season—look no further—we’ve curated the top five social experiences for the holidays to inspire your efforts.
Tags : 
spredfast, holidays, social media, social experiences, creativity, instagram, daily deals, black friday, captions
    
Spredfast, Inc.
Published By: Spredfast, Inc.     Published Date: Oct 22, 2014
Oreo and the Super Bowl. Snickers and Luis Suarez' World Cup bite. By now you have probably read about brands winning big with real-time marketing (RTM) during major events. But real time happens every day, and any brand can succeed with RTM. Learn more about this social marketing strategy and how your brand can incorporate it into your playbook.
Tags : 
spredfast, rtm, real time marketing, social, marketing strategy, messaging, engagement
    
Spredfast, Inc.
Published By: Spredfast, Inc.     Published Date: Oct 22, 2014
Here at Spredfast, we were as caught up in the World Cup as the rest of the planet. As much as we enjoyed watching the strategy on the field, we were also really excited about the social strategies implemented during the tournament by savvy brands and media properties.
Tags : 
spredfast, marketing, campaign tips, world cup, media properties, social content, technologies, integrations, facebook, instagram, twitter
    
Spredfast, Inc.
Published By: Globoforce     Published Date: Apr 01, 2013
Joanna Geraghty from JetBlue can. JetBlue’s Lift program provides deep insights into the company’s performance and culture management, powered by peer feedback and directly linked to the airline’s core values
Tags : 
case study, jetblue, engagement, culture, social recognition, globoforce, employee recognition, employee satisfaction
    
Globoforce
Published By: LogMeIn     Published Date: May 15, 2012
The way in which consumers communicate is evolving; they are rapidly adopting communities, web self-service and social media for both personal and business interactions. Customer support organizations must adapt their strategies in order to provide effective online tools to engage with the customer on the customer's terms.
Tags : 
logmein, marketing, customer service, customer satisfation, customer feedback
    
LogMeIn
Published By: Forrester     Published Date: May 10, 2012
In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decisioning capabilities.This report will help security and risk professionals understand how to control and properly protect sensitive information in this era of big data.
Tags : 
data-centric security, information protection, information management, data protection, security, risk and compliance, data warehousing, database development, database security
    
Forrester
Published By: hybris software     Published Date: Aug 01, 2012
Industry leaders are engaging in multichannel integration for some very good reasons. More effective cross-channel strategies lead to more satisfied consumers as well as more efficient, more profitable retail operations. In fact, as the survey indicates, consumers expect integrated multichannel experience from their favorite brands.
Tags : 
multichannel, retailing, multichannel retailing, technology considerations, hybris, pos, point of sale, print, mobile, call center, social media, website, integrated multichannel experience, cross-channel strategies, synergy, buy online, immediacy, convenience, cost savings, aisle kiosks
    
hybris software
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.