RSS feed Get our RSS feed

News by Topic

merge

Results 326 - 350 of 429Sort Results By: Published Date | Title | Company Name
By: Bridgeline Digital     Published Date: May 17, 2013
Digital touchpoints support an increasingly large percentage of the overall customer experience. 2012 saw the emergence of several important digital customer experience trends that will gain momentum as firms look to unify the cross-touchpoint experiences they deliver in 2013. This report outlines key trends that will make up the landscape that customer experience professionals will be working in as they take strides to improve their digital customer experiences in 2013.
Tags : forrester, digital customer experience, customer experience management, customer experience trends, digital experiences
     Bridgeline Digital
By: QTS Data Centers     Published Date: May 02, 2017
The Internet boom of the late 90s and early 2000s launched a mass migration of enterprises seeking the benefits of IT outsourcing. The emergence of virtualized infrastructure and cloud computing created a new business landscape of opportunities along with escalating challenges in capacity and complexity.
Tags : 
     QTS Data Centers
By: Qvidian     Published Date: May 04, 2015
Sales playbooks merge your organization’s sales processes with the supportive content, tools, messages and strategies a sales team needs to close business at each stage of the buying process. They provide salespeople with the guidance and situational coaching they need to advance and win deals. And they can be developed for any recurring selling situation that you want to drive repeatable behavior and remain agile. A winning sales playbook consists of a series of “plays” that are based on what’s proven to work in previous sales engagements. Download this playbook today to learn how to shorten sales cycles, increase win rates, ramp up new salespeople, bolster deal sizes and optimize overall sales performance!
Tags : qvidian, sales playbook, buying process, sales solutions, sales enablement, content management, emerging marketing, business intelligence
     Qvidian
By: Brandwatch     Published Date: Dec 01, 2015
Luxury fashion brands have been slow to adapt to the emergence of social media, and have suffered from a series of missed opportunities that range across product development, marketing and sales departments. Download this Brandwatch report to learn how social media presents these brands with valuable opportunities to understand their audience and which brands are setting the trends on social platforms.
Tags : social media, social intelligence, social media monitoring, social listening, social insights, luxury, luxury fashion, fashion
     Brandwatch
By: Signal     Published Date: Nov 09, 2016
With the emergence of people-based marketing, an identity graph is the foundation required to recognize people across channels and devices at every step of the customer journey to deliver true 1:1 marketing at scale.
Tags : signal, marketing, people-based marketing, identity graphs, id graphs, cross channel, traditional marketing
     Signal
By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi
     Tripwire
By: IBM     Published Date: Aug 05, 2014
The MDM of customer data solutions market segment grew healthily in 2012. New acquisitions and integrations of prior acquisitions by the Leaders have continued, and several visions for linking MDM and social data have emerged. This Magic Quadrant will help you find the right vendor for your needs.
Tags : ibm, magic quadrant, master data, data, management, solutions, mdm, vendor
     IBM
By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM) healthcare can rest easy that staff, doctors and nurses are equipped to deal with all emergencies.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, cloud, social business, big data, data security, data protection, privacy, security
     IBM
By: IBM     Published Date: Oct 06, 2015
Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data.
Tags : ibm, data security, big data, endpoint devices, safeguarding, security
     IBM
By: IBM     Published Date: Jan 07, 2016
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents.
Tags : ibm, cyber crime, trend, threat, security
     IBM
By: IBM     Published Date: Apr 04, 2016
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents.
Tags : ibm, cybersecurity, ibm emergency response services, cyber crime trends, security
     IBM
By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, data security, risk management, big data, security
     IBM
By: Group M_IBM Q4'19     Published Date: Sep 17, 2019
The “Future of Identity” infographic provides highlights and surprising statistics from the "Future of Identity" study that revealed global and generational preferences and concerns on emergent sign-on methods. 3,997 respondents from the United States, European Union, and Asia Pacific regions weighed in.
Tags : 
     Group M_IBM Q4'19
By: Cisco     Published Date: Jul 11, 2016
Digitization is reshaping the business landscape at an unprecedented rate. The disruption of established businesses used to take decades, but natively digital organizations such as Uber, Google and Amazon have disrupted their respective markets in fewer than 10 years. Digital transformation is creating new winners and losers faster than ever before. Exhibit 1 shows that in 1960, on average, businesses remained on the S&P 500 Index for 50 to 60 years; by 1980, the rate of change was cut in half. Based on these trends, by 2025, businesses are forecast to stay on the index for an average of only 12 years. Leveraging this economic data, ZK Research predicts that 75% of the index will turn over in the next 10 years. New market leaders will emerge, and established organizations will struggle to survive.
Tags : 
     Cisco
By: IBM     Published Date: Oct 19, 2017
Customer engagement has emerged as the most critical competitive factor in the current environment. Fueled by widespread mobile access and constant social connectedness, customers are demanding that every interaction, across every channel, be simple, streamlined and seamless. High expectations mean high stakes. When options abound and patience is low, customers don’t stick around. Companies need to get it right the first time. This new customer-centric standard and the ability to connect directly with customers is fueling a depth and breadth of enterprise reinvention. Ensuring that every customer experience across every conceivable channel delights and adds value calls for a Smarter Process approach and a new perspective on business process management.
Tags : 
     IBM
By: InMage     Published Date: Feb 18, 2009
The concept of Continuous Data Technologies (CDT) emerged on the scene two years ago, and is now transforming the data storage industry. Nearly every major storage vendor has one or more CDT products in their offering roadmap, in addition to a vital community of emerging vendors who are the true innovators in this space.
Tags : inmage, taneja group, continuous data technologies, cdt, dr scout, continuous data protection, cdp, continuous data imaging
     InMage
By: Gigya     Published Date: Jun 30, 2010
Enabling people to register using an existing identity from Facebook, Twitter, Yahoo, or other provider is one of the most powerful registration tools to emerge in the last few years. Registering people through an established online identity not only streamlines the registration process but also gives your business a head start on building deeper relationships with them.
Tags : gigya, social identity, social media, branding, brands, facebook, myspace, social media marketing
     Gigya
By: GoToWebinar     Published Date: Jul 16, 2010
Webinars are powerful tools - especially when you know how to create, promote and deliver them like a power user. Interactive online webinars have emerged as the gold standard in B2B marketing. This new eBook provides webinar tips, tactics and techniques from some of the sharpest minds in B2B marketing and includes helpful checklists for promoting a webinar, integrating social media, creating content and more. "
Tags : webinar event, online conference, technology configuration, event scheduling, promotion, content creation, analytics, citrix
     GoToWebinar
By: Conductor     Published Date: Nov 16, 2010
Huge opportunities and technology advances in natural search are compelling search marketers to turn to SEO platforms to gain the upper hand. SEO has long been running to keep up with its digital family but the SEO platform is changing the way SEO is being practiced.
Tags : seo, seo platform, conductor, search engine optimization, website, analysis, analyze, serps
     Conductor
By: GoToMyPC     Published Date: Apr 06, 2011
This comprehensive emergency telecommuting guide provides critical information and just-in-time solutions for those who find themselves unexpectedly working from a distance.
Tags : telecommuting, teleworker, emergency, virtualworks, citrix, telework program, telecommuter, productivity
     GoToMyPC
By: Cisco     Published Date: Nov 17, 2014
Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.
Tags : spyware, rootkits, hacking, cisco, advanced threat protection, security
     Cisco
By: AT&T     Published Date: Nov 07, 2011
The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.
Tags : network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att, at&t, at+t
     AT&T
By: IBM     Published Date: May 20, 2013
Reliance Life Insurance launched a comprehensive self-service portal solution that has enabled it to expand rapidly and cost effectively in India’s burgeoning life insurance market, and gain market insights into the kinds of offerings Indian consumers are looking for. By optimizing its product portfolio, Reliance was able to double its market share and become one of the most competitive companies. Getting the right products and features to market 50 percent faster enabled Reliance to emerge as an innovator in India’s life insurance industry.
Tags : reliance life insurance, gaining, market, leadership, self-service, portal, solution, ibm
     IBM
By: Esker     Published Date: Dec 19, 2016
In today’s highly competitive business environment, many organizations are expanding through mergers and acquisitions (M&As). Unfortunately, success comes at a cost. Growth via M&A activity often involves absorbing disparate ERP applications, which, over time, can create significant inefficiencies — particularly in the accounts payable (AP) department. The good news is, AP automation is emerging as an end-to-end solution that forward-thinking organizations can use to eliminate AP-related silos and maximize their market potential. Businesses with a complex ERP environment have several choices when it comes to AP automation solutions. This white paper is intended to assist AP and finance leaders, along with ERP system administrators, in evaluating their options, simplifying the decision-making process, and getting the absolute most out of their AP automation investment.
Tags : 
     Esker
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics