Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it organization

Results 1 - 25 of 5258Sort Results By: Published Date | Title | Company Name
Published By: 6th Sense Analytics     Published Date: Sep 18, 2007
This whitepaper outlines a way for organizations to build a modern framework for managing distributed teams that overcomes the structural challenges of working across far-flung locations, and ensures projects come in as expected—on time, on budget and on target with business goals. This framework reuses your existing development infrastructure to restore visibility and empowered decision making within your globally distributed software development projects.
Tags : 
offshore, offshoring, outsource, outsourcing, cost, costs, cost savings, spend management, spending, cost efficient, 6th sense
    
6th Sense Analytics
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
WMPH has nine sub-brands, each of which sells cruises to customers through distinct websites, including iCruise.com, AlaskaCruises,com and HawaiiCruiseOutlet.com. Given that each consumer has unique expectations from a cruise, the organization uses its websites as a touch-point to educate buyers about different options. Once buyers learn the different options available, they are then encouraged to interact with the contact center for a one-on-one consultation to help design a cruise which meets their unique needs.
Tags : 
wmph, icruise.com, alaskacruises.com, hawaiicruiseoutlet.com, touch-point, cloud contact center
    
8x8 Inc.
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
The right contact center solution should integrate tightly with your CRM solution and add value to it. Your contact center software should be able to capture all email, chat and standard telephone interactions and link them to the customer records database. Not only does this ensure continuity in all your customer communications, it gives the CRM database more information to use in constructing a better picture of your customers’ behavior. So how do you choose the right contact center for your organization? Following are three examples of forward-thinking businesses that found the right answer with cloud communication technology.
Tags : 
contact center, crm, telephone interactions, communications
    
8x8 Inc.
Published By: 8x8 Inc.     Published Date: Jun 16, 2017
Some companies opt to deploy UC solutions on-premises, but the cloudbased model is gaining popularity. Cloud-based UC solutions are ideal for businesses that have limited IT staff, a distributed workforce and/or a desire for pay-as-you-go flexibility. By enabling diverse communication media to be carried over a common IP network, UC solutions make it possible to manage a full suite of capabilities from a single point—and use them with common devices. But what’s the best way to maximize UC capabilities for your specific workplace? Spiceworks surveyed IT decision makers to get their insights on identifying and deploying collaboration and communication solutions across their organizations. This white paper explores the survey results, including key concerns, pain points, and roadmaps around driving UC strategies.
Tags : 
technology solutions, mobile workforce, interface optimization, 8x8, desk phones, internal collaboration, remote employees, cost reduction
    
8x8 Inc.
Published By: 8x8 Inc.     Published Date: Aug 09, 2017
Do you know what happens when a customer connects with your contact center? Not just the way in which he or she is routed to an agent, or the information accessed during the interaction— but what really happens in the conversation that makes the encounter an exceptional one? Do you have any insight into how your agent responded to that individual user, or a way to proactively ensure that other prospects and customers on any channel can have a consistent and positive experience? Are you leveraging all employees in your organization who have a stake in the customer experience, either directly or because their job influences the process? Do you feel confident that you have every metric at your disposal to make the best business decisions? Download now to learn more!
Tags : 
modern customer, contact center, customer engagement, branding
    
8x8 Inc.
Published By: Aasonn     Published Date: Oct 07, 2014
Despite the availability of a large potential workforce, finding, developing and retaining the right talent can be time consuming, frustrating, and sometimes an exercise in futility. Organizations that combine technology with enhanced employee value propositions are finding some answers to these challenges. Three things can help overcome these very real obstacles: a clear value proposition, empowered employees, and a forecast of future needs. Download our new White Paper on Turning Potential Workforce into the Right Talent Strategy to learn how you can conquer these hurdles and help your business thrive.
Tags : 
aasonn, workforce, talent, value proposition, empowered employees, talent strategy
    
Aasonn
Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
Consumer-focused technologies that are deployed by employees can provide tremendous value to any business and can provide IT organizations with more functionality than they can afford or are willing to deploy. However, consumer technologies must be appropriately managed in order to satisfy corporate security, compliance and other requirements. This means integrating consumer technologies into the existing IT fabric in order to achieve the greatest possible synergies between consumer-focused and IT-deployed technologies.
Tags : 
yousendit, ftp replacement, secure file transfering, online fire sharing, uploading files, consumerization of it, ip storage, network attached storage
    
Aberdeen - youSENDit
Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
Aberdeen Group research finds that file transfer has transformed from a loose collection of low-level protocols to full-featured, enterprise-class solutions for secure, reliable managed file transfer. This report examines how organizations benefit from managed file transfer solutions, and recommends steps to success for all organizations.
Tags : 
yousendit, technology, greater business value, reliable file transfer, low-level protocols, security
    
Aberdeen - youSENDit
Published By: Aberdeen Group     Published Date: Sep 11, 2012
Customers are the lifeblood of business, but their importance is sometimes forgotten when it comes time to collect payment. For most organizations, accounts receivable is one of the largest assets on the balance sheet. To maintain a competitive position in the market, companies are looking to improve asset-to-cash conversion performance. From the financial supply chain perspective, the goal of the order-to-cash cycle is simple: to translate successful sales into actual financial benefit for the organization.
Tags : 
aberdeen, accounts receivable, customers, business, organization, conversion performance
    
Aberdeen Group
Published By: Aberdeen Group     Published Date: Sep 11, 2012
The purpose of this paper is to introduce the cloud computing adoption framework from IBM and make it available for use by any organization looking for a standardized frame of reference for cloud computing discussions.
Tags : 
cloud, computing, aberdeen, technology, ibm, cloud, cloud adoption, data center
    
Aberdeen Group
Published By: Aberdeen-IBM     Published Date: Sep 12, 2012
The purpose of this paper is to introduce the cloud computing adoption framework from IBM and make it available for use by any organization looking for a standardized frame of reference for cloud computing discussions.
Tags : 
cloud, computing, aberdeen, technology, ibm, cloud, cloud adoption, application integration
    
Aberdeen-IBM
Published By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm
    
Absolute Software
Published By: Absolute Software     Published Date: Jan 27, 2010
This whitepaper explains how organizations can reduce their energy bills by remotely regulating computers. Topics include typical workplace computer usage, how to calculate your potential energy savings, debunking power management myths, and how you can assign multiple power saving profiles to clients.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 09, 2011
Join Michael Scarpelli, Technical Support Manager for La Jolla Institute for Allergy & Immunology, as he shares how his team streamlines and automates computer setup and maintenance for a rapidly growing network of more than 500 machines.
Tags : 
absolute, technical support, healthcare organizations, operating environment
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace, laptop
    
Absolute Software
Published By: Absolute Software     Published Date: Nov 21, 2011
Like most IT teams, LIAI technicians are committed to optimizing staff productivity. With the organization steadily growing and IT demands increasing, maintaining this commitment proved challenging. They needed began to minimize the burden of administrative duties and maximize IT efficiency.
Tags : 
la jolla, absolute, immunology, productivity, it demands, efficiency, liai, resources, resource allocation, configuration, software, hardware, requirements
    
Absolute Software
Published By: Absolute Software     Published Date: Apr 11, 2013
There has yet to be a demonstrated case where an organization has reduced ITSSM spending over a five-year period solely on the basis of licensing in the SaaS model versus the perpetual model.
Tags : 
absolute software, saas, ssm, saas model, cost savings, perpetual model, itssm
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
The US healthcare industry has historically lagged behind others in the maturity of security capabilities, only recently catching up on data security and privacy in response to HIPAA. But there is a wide range of other mounting risks unique to healthcare that S&R pros in healthcare can’t ignore — greater regulatory pressure, increasing targeted attacks, the frightening uncertainty of IoT security, and global economic pressures. This report outlines the most important security capabilities for security leaders in this sector to implement in the face of these challenges.
Tags : 
healthcare, security capabilities, data security, best practices, security
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
The OCR conducts HIPAA audits of covered entities and their business associates and subcontractors. If HIPAA violations are discovered during these audits, the OCR will implement significant penalties. Additionally, since OCR is posting the details of every breach affecting 500 or more individuals on a public website1 , the organizations involved have become susceptible to class-action lawsuits.
Tags : 
best practices, business analytics, productivity
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
IT leaders today are reinventing their infrastructure to support a mobile workforce and a complex array of connected devices. Against this backdrop of mobility and connectivity, Healthcare IT is tasked with meeting compliance challenges in an intricate and transformational regulatory environment. With a host of new data protection regulations and increasingly high settlement fees for data breaches, data security has never been more important to Healthcare organizations
Tags : 
mobility, mobile computing, best practices, data security
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
The release of a new Microsoft operating system is always an important event for IT departments, and Windows 10 is no exception. IT organizations and end users have been looking forward to a wide range of new features in Windows 10, with interest particularly high as users of Windows 7 and 8 can upgrade for free.
Tags : 
data, security, mobility, mobile computing, best practices
    
Absolute Software
Published By: Absorb     Published Date: May 10, 2018
In a business environment where being able to build and maintain a solid brand reputation and lasting relationships with your customers is essential for ongoing success, effective compliance training for team members is critical. Assembling quality course content, either through purchasing off-the-shelf compliance courseware or developing training material in-house or in partnership with an external developer, and delivering that material in a consistent manner, can help protect your organization and minimize the damage from compliance transgressions.
Tags : 
elearning, training, business, brand, reputation, relationship, building
    
Absorb
Published By: Absorb     Published Date: Sep 05, 2018
Would you choose your LMS again? It happens to us all. We adopt learning technology expecting it to make us more efficient, prepared, and successful. At some point we wonder if it’s doing the opposite. Questions can be immediate or emerge over time. Either way, you’re stuck with technology that’s misaligned with where your organization’s going. So how do you know when it’s time to make an LMS change? After reading this checklist, “10 Ways Your LMS is Falling Short” you’ll understand: • Ten LMS challenges you may be experiencing • Risks these present to your organization • Features you need to start propelling your success Don’t let your LMS hold you back! Get the checklist
Tags : 
    
Absorb
Published By: Absorb     Published Date: Sep 05, 2018
Your LMS and You: Thriving or Surviving? How to Tell if Your LMS Still Fits Your Organization's Needs Technology. Shoes. Milk. Nothing lasts forever. Your LMS is no different. But how can you tell if it's time to call it quits with your current LMS? Well, it starts by asking the right questions. After reading this white paper you'll: • Understand your LMS needs • Identify areas for improvement in your content delivery • Hone the tech needs of your users and admins • Document the features and services most important to you Get the white paper.
Tags : 
    
Absorb
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.