Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

centric

Results 376 - 400 of 525Sort Results By: Published Date | Title | Company Name
Published By: Riverbed     Published Date: Jan 28, 2014
Riverbed Cascade provides enterprise-wide network and application visibility with a full set of application-centric, site-centric, and business-centric views. While Cascade can coexist or integrate with a variety of other IT management solutions, it will likely become your first line of defense against application performance problems.
Tags : 
application performance management, application performance monitoring, big data apm, network performance management, network performance monitoring, network performance troubleshooting, networking, it management
    
Riverbed
Published By: Bazaarvoice     Published Date: Jan 17, 2014
Digitally, consumers today share knowledge and self-organize online, seizing more collective power than ever. This is the connected economy, where consumers rule. Learn the four trends businesses must learn to succeed in their reign
Tags : 
consumer-centricity, consumer engagement, brand messaging, customer relationships, branding, connected economy
    
Bazaarvoice
Published By: Bazaarvoice     Published Date: Jan 17, 2014
Consumer reviews can have an impact on sales, but did you know that negative reviews can actually improve purchase intent? The linchpin: How brands respond. Read new research about the power of responding to consumers.
Tags : 
consumer-centric, consumer engagement, brand messaging, branding, brand response, consumer conversations
    
Bazaarvoice
Published By: Bazaarvoice     Published Date: Jan 17, 2014
The marketing landscape is changing before our eyes. New entrants, empowered consumers, and fragmented media options require marketers to change their tune – forever. Learn to prepare for the new environment and how to measure your success.
Tags : 
consumer-centricity, consumer engagement, brand messaging
    
Bazaarvoice
Published By: Avaya     Published Date: Jan 15, 2014
Communication solutions are reaching an ideal balance of sophistication and ease-of-use. But are you making the most of these technologies by integrating them into your daily workflows to make innovation and collaboration part of every interaction?
Tags : 
avaya, collaboration, integration, integrating technology, workflow, productivity, innovation, communication solutions
    
Avaya
Published By: Avaya     Published Date: Jan 15, 2014
How are you collaborating with the amazing communication technology now available? Chances are your organization is doing collaboration ... all wrong. Let's look at 5 common collaboration fails tripping up companies today.
Tags : 
avaya, collaboration, integration, integrating technology, workflow, productivity, innovation, communication solutions
    
Avaya
Published By: LogMeIn     Published Date: Jan 15, 2014
This white paper includes highlights from the e-tailing group’s European Chat Mystery Shopping.
Tags : 
logmein, live chat, chat opportunities, e-tailing, boldchat, add live chat, retail community, quantitative elements
    
LogMeIn
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies
Published By: IBM     Published Date: Jan 09, 2014
Simply put, software defined storage is the abstraction of storage services from storage hardware. This term is more than just marketing hype, it’s the logical evolution of storage virtualization from simply being a storage aggregator to the end goal of storage as a service. To achieve this goal, software defined storage needs a platform from which to centralize.
Tags : 
ibm, storage switzerland, storage platform, sds, software defined storage, data center, storage virtualization, data protection
    
IBM
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies
Published By: Cisco Systems     Published Date: Dec 23, 2013
Faced with trends like cloud and the rapid rise of mobile devices, IT needs a new, simpler model of building networks to support and optimize applications. In this Lippis Report, learn how the Cisco ISR Application Experience Router helps you improve application speed, security, and control. Read Now
Tags : 
cisco, lippis, centric networking, cloud computing, network engineers, bandwidth, wan, wide area networks
    
Cisco Systems
Published By: Cisco Systems     Published Date: Dec 23, 2013
Are you ready to leverage the flexibility and power of mobile and cloud computing? ZK Research outlines the limitations of legacy WANs and provides recommendations for transforming your network into a strategic asset. See why the Cisco ISR 4451-AX is your building block for evolving the WAN. Read Now
Tags : 
cisco, zk research, wan, virtualization, data center, wireless network, wide area network, network-centric
    
Cisco Systems
Published By: NETIQ     Published Date: Dec 03, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : 
security compliance, users access management, it management compliance
    
NETIQ
Published By: Clarabridge     Published Date: Dec 03, 2013
The purpose of this white paper is to provide organizations with a four step roadmap that details how organizations can use VoC to make Product Management more customer-centric and significantly increase the odds of consistently delivering products that are successful in the marketplace.
Tags : 
clarabridge, customer behaviors, social media program, interacting with customers, product and service problems, respond quickly, customer satisfaction, customer loyalty
    
Clarabridge
Published By: ServiceNow     Published Date: Nov 22, 2013
This document discusses how self-service cloud provisioning can serve as a pragmatic customer-centric approach for managing the proliferation of public and private clouds. It discusses customer expectations, critical success factors, and key metrics required for a successful implementation of such an offering.
Tags : 
servicenow, enterprise it, cloud computing, cloud provisioning, customer-centric cloud, it operations and governance, virtual resources, service catalog
    
ServiceNow
Published By: Coveo     Published Date: Nov 13, 2013
This case study details how CA leverages its entire knowledge ecosystem, consisting of more than 70 different systems, to bring relevant content directly into the context of support agents and customers.
Tags : 
enterprise search, advanced enterprise search, enterprise search solutions, customer service engagement, customer centricity
    
Coveo
Published By: IBM     Published Date: Nov 12, 2013
Customers are more demanding, the competitive landscape is more dynamic, and the very structure of companies is evolving rapidly. What can executives and business leaders do to stay ahead of the curve? Read this eBook to find out how software as a service (SaaS) can transform your business into a more competitive, customer-centric organization.
Tags : 
software as a service, saas, executive, saas solutions, business process innovation, analytics, enterprise applications, cloud computing
    
IBM
Published By: Microsoft     Published Date: Nov 08, 2013
Find out why developers increasingly choose .NET to create new applications faster and more efficiently and why it offers the clearest path from the client/server world to the emerging device/cloud world.
Tags : 
microsoft, develop better applications, technology guide, business applications, application patterns, devices, web applications, native applications
    
Microsoft
Published By: Dell Software     Published Date: Oct 03, 2013
Download Transaction-Centric vs. Infrastructure Centric Application Performance Management from TRAC Research to examine the major differences between the two approaches, the pros and cons of both in difference use cases, and finally which technology better fits your organization.
Tags : 
transaction, dell foglight, apm, infrastructure, technology, application performance management, best practices, enterprise applications
    
Dell Software
Published By: Interactive Intelligence     Published Date: Sep 11, 2013
Contact centers have long played a vital role in the insurance industry. Prospects and customers use them to get product information and quotes and then submit applications. Insurance agents and advisors rely on contact centers to tap into expertise and handle business and technical issues. Policyholders and members make inquiries or changes to their policies, or conduct financial transactions. Claimants call in to report accidents and check on the status of their claims. The list could go on, but the meaning is clear. Contact centers are major contributors to many key parts of the insurance business, especially the parts that require direct interaction with customers or agents. As a result, contact centers now play a critical role in an insurer’s journey toward becoming more customer-centric.
Tags : 
interactive intelligence, contact centers, insurance industry, prospects, customers, product information, quotes, members
    
Interactive Intelligence
Published By: IBM     Published Date: Sep 11, 2013
Learn how customer-centric transformation can lead to deeper relationships, increased revenue, and streamlined operations
Tags : 
bank, customer, customer-centric transformation, increased revenue, streamlined operations
    
IBM
Published By: Bronto     Published Date: Sep 09, 2013
Is your email marketing solution just a communication vehicle or is it built to drive revenue?
Tags : 
email marketing, email marketing plaform, email marketing solutions
    
Bronto
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.