Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

esi

Results 76 - 100 of 3171Sort Results By: Published Date | Title | Company Name
Published By: Interactions     Published Date: Feb 27, 2019
The quality of a customer care strategy can make or break a company. Simply resolving a customer service issue or complaint is no longer enough— in a compettve, customer-obsessed environment, there is always room for improvement. In a recent research report on Customer Efort, Interactons found that customers simply aren’t willing to spend a lot of tme getng their issues resolved. That’s why brands today need to design a modern customer care strategy that not only addresses their customers needs, but also removes efort and frustraton. And do all of this while reducing the ever increasing cost and complexity of customer care. So how do you get started with developing a successful customer care strategy? We’ve outlined 4 steps that address the major points you need to consider when building a customer care roadmap.
Tags : 
    
Interactions
Published By: GoToWebinar     Published Date: Oct 08, 2013
We've all grown used to ordinary customer experiences, so when something extraordinary happens, we pay attention. No matter whether your business is a one-person show just getting started or a multi-national corporation, whether you are a front-line worker or a top-level executive, you can create awesome. This brief by Scott Stratten, best-selling author and president of UnMarketing, shares stories that’ll inspire you to find your own unique brand of business awesome.
Tags : 
marketing, scott stratten, good to awesome, citrix, go to meeting, the book of business awesome
    
GoToWebinar
Published By: SAS     Published Date: Apr 16, 2015
SAS Institute is gearing up to make a self-service data preparation play with its new Data Loader for Hadoop offering. Designed for profiling, cleansing, transforming and preparing data to load it into the open source data processing framework for analysis, Data Loader for Hadoop is a lynchpin in SAS's data management strategy for 2015. This strategy centers on three key themes: 'big data' management and governance involving Hadoop, the streamlining of access to information, and the use of its federation and integration offerings to enable the right data to be available, at the right time.
Tags : 
    
SAS
Published By: Metafuse     Published Date: Sep 26, 2007
In speaking with project managers, directors of operations, vice presidents of professional services, chief financial offers, and other project team members every day, we hear familiar stories repeatedly and there are some trends, or commonalities. This document outlines five of the most common project management challenges.
Tags : 
project management, document management, project planning, project, enterprise resource planning, erp, planning, metafuse
    
Metafuse
Published By: GrapeCity, Inc.     Published Date: Feb 25, 2013
When it comes to explaining information, this white paper outlines a few basic data visualization tips to improve the impact of visualizations, ensuring that the story in the data is expressed as effectively as possible.
Tags : 
ad hoc reporting, ad hoc report designer, self-service bi, business intelligence, reporting, activereports, web-based reporting, mobile bi
    
GrapeCity, Inc.
Published By: iCims     Published Date: Apr 01, 2015
In order for your organization to recruit and maintain top talent, you need modern, specialized recruitment technology that is designed to meet today's talent acquisition challenges. Learn what to look for when evaluating talent acquisition software in our free whitepaper.
Tags : 
recruiting, staffing, hiring
    
iCims
Published By: LogMeIn     Published Date: Mar 01, 2012
Traditional remote access and meeting tools were not designed as remote support tools for helpdesks and IT professionals. LogMeIn consults daily with helpdesk and operations managers and here's what we've learned are the top five hidden costs of using legacy tools to provide remote support.
Tags : 
support tools, customer support, technical support, technology, it support, service desk, help desk
    
LogMeIn
Published By: CA Technologies     Published Date: Mar 06, 2015
Le API (Application Programming Interface) costituiscono le fondamenta di questa nuova azienda "aperta", consentendo alle società di riutilizzare le risorse informative esistenti al di là dei confini dell'organizzazione.
Tags : 
    
CA Technologies
Published By: Aditi     Published Date: Jun 11, 2015
Your mobile device is speaking to your garage door. Your alarm is telling your coffee maker you are up and it’s time to get that caffeine kick going. Your car is dropping your thermostat a message, telling it to keep the house warm before you step in. This isn’t a quote from an Issac Asimov novel, it’s the reality of how the Internet of Things is making a difference to our lives. Most of us are consciously making the shift to a connected world, while at home or at work. While this has caught the public imagination, enterprises are chasing to fulfil their Internet-of-Things-ambitions and transform their customer experience. In this e-book we aim to address the 5 fundamental questions that one should not hesitate to ask about your foray into the world of Internet of Things, while telling you how it can reshape your business.
Tags : 
aditi, rfids scada, c-suite, optimization, lot, hybrid cloud, it management
    
Aditi
Published By: Brooks Digital Marketing     Published Date: Sep 22, 2010
This white paper brings to light the critical but often hidden issues involved with creating a website that many web designers are not aware of themselves.
Tags : 
website design
    
Brooks Digital Marketing
Published By: Group M_IBM Q418     Published Date: Nov 13, 2018
Since data encryption is a core piece of any security strategy, start by talking with your CIO. This guide is designed to help you determine the right questions to ask your CIO to become better informed about your bank’s cybersecurity position.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q119     Published Date: Jan 18, 2019
Since data encryption is a core piece of any security strategy, start by talking with your CIO. This guide is designed to help you determine the right questions to ask your CIO to become better informed about your bank’s cybersecurity position.
Tags : 
    
Group M_IBM Q119
Published By: Datto Inc.     Published Date: May 08, 2013
The growth of the backup and disaster recovery market, and desire for increased revenues, has prompted MSPs to consider building their own BDR solutions. Learn the top 5 reasons factors MSPs need to evaluate when considering a “do-it-yourself” BDR.
Tags : 
datto, backup, disaster recovery, bdr, backup and recovery
    
Datto Inc.
Published By: Dell EMC     Published Date: May 12, 2016
A remote or branch office is very different from a traditional data center. It needs converged appliances that offer manageability, performance, flexibility, and a unique form factor.
Tags : 
    
Dell EMC
Published By: Oracle APAC     Published Date: May 24, 2018
By optimizing their on-premises IT environments and moving processes and workloads to the cloud, businesses can reduce time-to-market, increase agility, and minimize total cost of ownership. Oracle’s Linux and Virtualization offerings are designed to help you easily optimize your current on-premises environment, and offer a clear path to cloud—so you can migrate your workloads when the time is right.
Tags : 
    
Oracle APAC
Published By: GrapeCity, Inc.     Published Date: Feb 25, 2013
Since business-wide deployment of ad hoc reporting tools can be a resource-intensive process, this white paper offers five-step roadmap of evaluation steps to help fully assess the quality of the products under consideration.
Tags : 
ad hoc reporting, ad hoc report designer, self-service bi, business intelligence, reporting, activereports, web-based reporting, mobile bi
    
GrapeCity, Inc.
Published By: Schneider Electric     Published Date: Aug 15, 2017
The reference guide lays out for data center managers a step-by step approach to data center consolidation. By breaking down the process into clear and identifiable actions – all of which are covered in the sections below – a data center consolidation becomes much more manageable, and the odds of its success much higher.
Tags : 
assessment, strategical planning, design, commission, operation, additional resources, schneider electric
    
Schneider Electric
Published By: EMA     Published Date: Oct 01, 2014
A new mantra is emerging for IT professionals – Quality of Experience (QoE). In order to align monitoring and management practices with the true demands of the business, IT professionals must expand beyond traditional comfort zones of watching network and system health metrics to begin measuring and understanding the experience IT end users are having. Join EMA Vice President of Research, Jim Frey, and Fluke Networks Director of Products, Doug Roberts, for this on-demand webinar and discussion that will reveal:
Tags : 
quality of experience, qoe, monitoring, network, systems, applications, services, proactive practices
    
EMA
Published By: Juniper Networks     Published Date: Oct 19, 2015
The guidelines provided in this white paper make up some of the best practices entailed in creating an overall security policy for your organization that underlies deployment of effective firewalls.
Tags : 
juniper, firewall, threat, security, policy, configuration, packet, networking
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 18, 2015
The 5 Steps to Firewall Planning and Design Guide provides a step-by-step summary for planning your network firewall. It also contains links to the more detailed list of useful sites and publications on the subject. If you’re designing your company’s firewall architecture, read this first.
Tags : 
firewall planning, network firewall, security policy, http, terminal server, network
    
Juniper Networks
Published By: Resilient Systems, Inc.     Published Date: Nov 24, 2015
It’s practically impossible to be completely prepared for a security incident – invariably something happens that best laid plans don’t address. But that doesn’t mean organizations shouldn’t try.
Tags : 
resilient systems, cyber security, incident response, plan, guide, security
    
Resilient Systems, Inc.
Published By: Carbonite     Published Date: Feb 22, 2017
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
backup, disaster, recovery, bdr, carbonite, environment
    
Carbonite
Published By: Carbonite     Published Date: Apr 09, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Apr 11, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.