RSS feed Get our RSS feed

News by Topic

media

Results 326 - 350 of 2307Sort Results By: Published Date | Title | Company Name
By: ClickExpress     Published Date: May 01, 2013
The cost of ineffective customer service visits isn't just in money: the greater cost is in customer satisfaction. When a mobile workforce employee doesn't arrive on time, is missing equipment, or doesn't resolve the issue on the first visit, it leads to customer dissatisfaction, lost business, and today, public complaints in the media and social networks. Every single service organization understands the crucial value of great customer service. Every single visit to a customer is critical. In this paper, we reveal the 3 steps to a great visit every time.
Tags : employees, customer, mobile, workforce, organization, service
     ClickExpress
By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
     Viavi Solutions
By: Lumesse     Published Date: Aug 21, 2013
Recruiters need to harness the power of social media, mobile tools, and the potential of Big Data to transform the recruiting process. Download our presentation “A Futurist's Perspective on Talent Acquisition and Tomorrow's Tech Trends.”
Tags : talent acquisition, workforce management, recruiting, candidate engagement, candidate engagement tools
     Lumesse
By: Socialbakers     Published Date: Jan 20, 2015
In this exclusive report, you’ll find out how to use deep social media data to pursue new clients, perfect your data-driven pitches, and master the results with custom, easy-to-read reporting. It’s a data world, and agencies need to bring the best insights on the market to win new clients and keep existing business. This guide will get you started.
Tags : benefits of using social media data, social media, advertising agencies, customer experience/engagement, social media marketing, data management/analytics
     Socialbakers
By: NetApp     Published Date: Mar 05, 2018
New innovations in storage technology are changing the game for data centers, and NetApp is working to help our customers capitalize on them. The introduction of faster and faster media types and more efficient mechanisms to access those media across well-defined SAN and Ethernet infrastructures will unlock unprecedented speeds, lower latencies, and dramatic improvements in system and application efficiency.
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
By: LifeLock     Published Date: Mar 02, 2015
Mobile devices enable workers to take care of business from virtually anywhere, at any time. But, what’s the catch? Mobile, social media-savvy employees and customers may be more likely to become identity fraud victims.
Tags : 
     LifeLock
By: VMware AirWatch     Published Date: Jul 19, 2017
VMware AirWatch® features a new – and more efficient – approach to Windows lifecycle management across any use case – whether deploying the OS to your remote workers, onboarding employees’ BYO machines, corporate deployments across your branch offices or managing a special line of business terminal. The unified endpoint management technologies fundamentally changes how organizations approach PC lifecycle management, allowing IT to deploy security patches and remediate vulnerabilities faster, install software more reliably and quickly and consolidate operational processes across devices on or off the domain.
Tags : 
     VMware AirWatch
By: Dynatrace     Published Date: May 20, 2016
The 2016 Digital Experience Report provides a comparative performance assessment for the largest companies across six major industries — banking, brokerage, insurance, media, retail, and travel.
Tags : dynatrace, devops, digital experience, customer experience, digital interactions, performance
     Dynatrace
By: Dynatrace     Published Date: Mar 06, 2017
This new report outlines how today's hyper-scaled, complex application environment has pushed IT Operations to a tipping point, and why a new approach is critical. It outlines why it is not adequate anymore to simply attempt to enable IT better, why you need to start using automation and AI (artificial intelligence), and steps you can take immediately to begin doing that.
Tags : it operations, dynatrace, itoa, automation
     Dynatrace
By: Dynatrace     Published Date: Mar 06, 2017
This new report from Dynatrace and O'Reilly Media details the 3 stages that businesses move through as they migrate to the cloud, and a winning strategy for each stage. It includes case studies that will show you how to tackle both technical and cultural challenges along the way.
Tags : cloud, cloud evolution, dynatrace, cloud-native, virtualized infrastructure, paas, software
     Dynatrace
By: Cisco     Published Date: Apr 11, 2016
En este documento se identifican las funcionalidades esenciales necesarias en una solución de protección contra malware avanzado y las preguntas clave que debe formularle a su proveedor, y se muestra cómo Cisco combate los ataques de malware avanzado actuales mediante una combinación de cuatro técnicas
Tags : 
     Cisco
By: Staples     Published Date: Oct 24, 2018
Personal devices on corporate networks. Social media in the office. Millennials in the workforce. Technology is changing fast in the workplace and corporate IT managers are working to support a wider variety of user segments without putting the organization at risk. Watch this on-demand webinar to hear two IT experts diagnose the impact of the latest technology trends in the workplace and provide useful advice on how to support new user segments securely.
Tags : it security, mobility, it user segments, technology trends, enterprise technology
     Staples
By: Pegasystems     Published Date: May 02, 2016
This report, sponsored by Accenture and Pegasystems, explores how companies are managing their digital transformation initiatives, their goals, drivers and challenges, and how they are boosting their digital capabilities.
Tags : pegasystems, digital transformation, analytics, mobile marketing, social media, digitisation, web analytics, customer experience/engagement
     Pegasystems
By: AWS     Published Date: Jun 15, 2016
The cloud is now the center of most enterprise IT strategies. Many enterprises find that a well-planned “lift and shift” move to the cloud results in an immediate business payoff. This whitepaper is intended for IT pros and business decision makers in Microsoft-centric organizations who want to take a cloud-based approach to IT and must modernize existing business-critical applications built on Microsoft Windows Server and Microsoft SQL Server. This paper covers the benefits of modernizing applications on Amazon Web Services (AWS) and how to get started on the journey.
Tags : 
     AWS
By: CA Technologies     Published Date: Jun 26, 2017
As the United Kingdom and the rest of Europe prepare for Brexit (Britain’s exit from the European Union), information security experts are left wondering what this would mean to the security and risk management processes that have been put in place in the past and how they need to adjust to the emerging reality. This document discusses the impact of Brexit on privileged access management and what information security professionals may consider as immediate solutions to mitigate risks.
Tags : 
     CA Technologies
By: Evariant     Published Date: Aug 22, 2018
Health systems that implement CRM-based engagement solutions stand to achieve significant strategic gains, from acquiring and retaining patients to supporting more positive clinical outcomes to increasing referrals to member providers and practices. Driven by easy access to rich consumer data and analytic profiling, as well as patient encounter histories, CRM-based engagement centers optimized for healthcare enable health system CSRs to quickly offer personalized responses to consumer or patient inquiries via multiple in- and outbound media, including telephone, email, social, and web.
Tags : call center, healthcare crm, patient experience, patient acquisition, healthcare transformation
     Evariant
By: Micron     Published Date: Oct 14, 2016
Today’s IT professionals are well aware that users expect fast, reliable access to ever-growing amounts of data – from web content, to videos, to business intelligence data and more. Meeting the challenges of this exponential growth is nearly impossible with existing, spinning media storage technology. Hard disk drives (HDDs) have been the standard in data storage for decades, but they can no longer satisfy. They create bottlenecks in data access, they fail to meet the growing demands of higher user expectations, and they consume too much power. Download to learn how to solve this issue.
Tags : 
     Micron
By: Sprinklr     Published Date: Nov 22, 2016
A whitepaper that details the mobile ads landscape and the role of social media within it.
Tags : mobile adverting, mobile ads, social media ads, social ads, social advertising, social media advertising
     Sprinklr
By: Sprinklr     Published Date: Nov 22, 2016
You’ll learn some handy information in this guide, including: - Why your company should be thinking about LinkedIn ads. - How HSBC and Nissan are running successful campaigns on LinkedIn. - Actionable advice for taking your first steps, courtesy of thought leaders who live and breathe LinkedIn.
Tags : social ads, social advertising, social media advertising, linkedin ads, linkedin advertising.
     Sprinklr
By: Sprinklr     Published Date: Nov 22, 2016
A quick fact sheet that details the reach and audience of major messaging apps to help companies know which platform would be best suited to their audience.
Tags : messaging app research, messaging app data, social media data, social media intelligence, snapchat data, snapchat statistics, wechat data, wechat statistics
     Sprinklr
By: Sprinklr     Published Date: Nov 22, 2016
A whitepaper that details why user generated content is important, and using UGC in your marketing strategy
Tags : user generated content, ugc, marketing strategy, social media strategy, social strategy, ugc strategy, ugc marketing strategy
     Sprinklr
By: Sprinklr     Published Date: Nov 29, 2016
A whitepaper that discusses the impact of social media on customer service models, and how companies need to shift their strategy to effectively manage customer experience.
Tags : customer service, customer experience, customer retention, voice of the customer, social customer service, social customer care, customer care
     Sprinklr
By: Progress     Published Date: Mar 06, 2017
Formerly, buyers were limited in the ways they could gather product information. But because of the web and social media, buyer behaviors have changed. Because buyer interactions can number in the thousands or millions, businesses must use automated tools to personalize the buyer’s online experience and drive them toward a purchase decision.
Tags : data driven marketing, buyer behavior, buyer interactions, web content management, content management systems
     Progress
By: Progress     Published Date: Oct 09, 2017
Formerly, buyers were limited in the ways they could gather product information. But because of the web and social media, buyer behaviors have changed. Because buyer interactions can number in the thousands or millions, businesses must use automated tools to personalize the buyer’s online experience and drive them toward a purchase decision.
Tags : 
     Progress
By: CrowdStrike     Published Date: Feb 01, 2017
This year’s Cyber Intrusion Services Casebook focuses on in-depth digital forensics, incident response (IR) and remediation services performed on behalf of actual CrowdStrike clients. Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016 — including the now-infamous hack of the Democratic National Committee (DNC) —are covered with an emphasis on best practices organizations can follow to identify and eject attackers before a devastating breach occurs. Download this report to learn: • How CrowdStrike’s Falcon OverWatch and professional services teams discovered and attributed the DNC intrusion to nation-state threat actors FANCY BEAR and COZY BEAR • The gaps in security processes and planning that your organization can address now to stop the next breach • The specific tactics, techniques and procedures (TTPs) a range of nation-state and eCrime adversaries used to penetrate their victims’ defenses, and how they attempted to cover their tracks
Tags : 
     CrowdStrike
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics