RSS feed Get our RSS feed

News by Topic

play

Results 851 - 875 of 1166Sort Results By: Published Date | Title | Company Name
By: Litmos     Published Date: Apr 23, 2015
Download this list of the 10 Rules of Retail Sales training to learn how to optimize employee performance and improve your customers' experience.
Tags : retail sales training, merchandising campaigns, customer satisfaction, merchandise displays, mobile devices, litmos
     Litmos
By: Polycom     Published Date: Mar 13, 2015
Bene is a European company setting trends in office furnishing with its concepts, products and services. The brand is associated with top quality and functionality, modern design and innovative technology. Bene engages in development and manufacture and provides sales and consultancy services under one umbrella. The Austrian firm is a leader in their market, a major player in Europe, and proud to create a forward looking office concepts.
Tags : mobile, unified communication, concept, brand, enterprise, voice, products, services
     Polycom
By: Qvidian     Published Date: May 04, 2015
Sales playbooks merge your organization’s sales processes with the supportive content, tools, messages and strategies a sales team needs to close business at each stage of the buying process. They provide salespeople with the guidance and situational coaching they need to advance and win deals. And they can be developed for any recurring selling situation that you want to drive repeatable behavior and remain agile. A winning sales playbook consists of a series of “plays” that are based on what’s proven to work in previous sales engagements. Download this playbook today to learn how to shorten sales cycles, increase win rates, ramp up new salespeople, bolster deal sizes and optimize overall sales performance!
Tags : qvidian, sales playbook, buying process, sales solutions, sales enablement, content management, emerging marketing, business intelligence
     Qvidian
By: Exablox     Published Date: Feb 04, 2015
Learn how to simplify scalability and data redundancy for your network-attached storage servers and see how these innovations will cause you to rethink your network storage playbook.
Tags : storage management, nas storage, object-based storage, nas storage use case, digital asset management, primary data storage, backup storage, exablox
     Exablox
By: K2     Published Date: Jan 07, 2016
In a world where speed matters, businesses need agility and flexibility to quickly modify their processes and business practices to stay competitive. Historically, large companies have hampered process agility by locking themselves into outdated systems, processes, and ways of working, but a variety of factors – including modernization and customer expectations – are increasingly playing a role in driving companies toward business process transformation, an emerging topic in the realm of process excellence. This white paper, based on the Process Excellence Network’s, “5 Ways to Transform Business Processes to Optimize Agility,” by Rob Speck, Vice President of Services at K2, focuses on what causes and drives process innovation, includes examples of organizations that have done this, and analyzes their return on investment (ROI).
Tags : business processes, agility, business process transformation, process excellence
     K2
By: K2     Published Date: Jan 07, 2016
The business context for process excellence and business process management (BPM) has changed dramatically since the 2009-to-2010 recession. During the recession, BPM software and services saw impressive double-digit growth as a result of enterprises slashing costs and boosting worker productivity. Now, executive agendas have shifted to focus on growing revenue, expanding the customer base, and delivering new digital products and services. Enterprise and process architects are reshaping their business cases for BPM around these new drivers. This is not an easy task. However, process excellence will play a critical role for forward-thinking enterprise architects that invest the time to link BPM to new front-office drivers to help the organization drive digital transformation. This report replaces “Building The Case For Your BPM Initiative” in the business process management playbook and provides guidance on developing revenue and customer-focused business cases.
Tags : bpm, business process management, process excellence, best practices, security
     K2
By: Rackspace     Published Date: Jan 19, 2016
San Francisco-based RockYou purchases the rights to existing social video games, then incorporates in-game ads, and rebrands them as RockYou games.Delivering interactive media content to engaged audiences online, RockYou boasts a portfolio of free-to-play games including dozens of company-owned and partner titles across key platforms, genres and demographics.
Tags : rackspace, social gaming, private cloud, data, rockyou, security
     Rackspace
By: Citrix Online     Published Date: Jul 01, 2010
This new white paper explores the strategic role first-contact resolution plays in support environments, provides best practices for optimising performance and outlines steps for achieving consistent FCR.
Tags : citrix online tech, best practices, first-contact resolution, performance driver, fcr, support centre, tco, problem management
     Citrix Online
By: Citrix Online     Published Date: Aug 09, 2010
When a workplace disruption hits, you need to act fast to ensure your employees are safe, keep them informed and maintain productivity. This new Forrester white paper explores the critical role that the help desk should play in your organization's business continuity planning.
Tags : citrix, business operations, workforce management, recovery, it operations, help desk, critical path, call centers
     Citrix Online
By: TRUSTe     Published Date: Jun 02, 2010
For Ecommerce and Direct Marketing professionals: As a result of displaying the TRUSTe seal, The Pros saw an enormous 84% lift in Purchases by those landing on the page with the TRUSTe seal, and a 72% increase in Revenue per Visitor lift. See how you can mirror these results today.
Tags : truste, suresource, ecommerce, the pros, landing pages, website development, design, a/b
     TRUSTe
By: Limelight     Published Date: Sep 10, 2012
There are a wide variety of video platforms available, each offering a plethora of features. How do you decide which features you need and the features you don't need? Download this whitepaper to find out.
Tags : content management, video player features, online video platform, internet marketing, online video marketing
     Limelight
By: IBM     Published Date: Aug 14, 2014
IBM® Mobile Web Push allows marketers to influence and inform their mobile audience in innovative ways. Web push notifications are dynamically triggered for display on mobile websites based on the actions of your visitors. This personalization is possible without the complications of existing content management, advertisement servers or IT involvement.
Tags : ibm, mobile, web push, free notifications, marketing, emerging marketing
     IBM
By: IBM     Published Date: Dec 22, 2015
Read this white paper to get an in-depth look at the benefits of embracing a digital business model, and find out how sports teams of all types can use cloud service providers with digital marketing and analytics tools to gain a competitive edge on the marketing playing field.
Tags : sports marketing, ibm, digital strategies, cloud, analytics, operations, search marketing, email marketing
     IBM
By: IBM     Published Date: Apr 14, 2016
Read this white paper to get an in-depth look at the benefits of embracing a digital business model, and find out how sports teams of all types can use cloud service providers with digital marketing and analytics tools to gain a competitive edge on the marketing playing field.
Tags : ibm, sports marketing, media, entertainment, digital business model, cloud, customer experience/engagement, market research
     IBM
By: IBM     Published Date: Aug 09, 2016
This brochure displays how Watson Engagement Advisor is transforming the way people and organizations interact with the latest evolution of self-service.
Tags : ibm, watson, customer engagement, customer experience, cognitive computing, watson engagement advisor
     IBM
By: IBM     Published Date: Oct 22, 2014
Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.
Tags : data classification, data discovery, defining data, data identity, security
     IBM
By: IBM MaaS360     Published Date: Oct 08, 2015
Hacktavists have made the move to mobile. Malware, phishing and network attacks are now as likely to strike smartphones and tablets like any other system. Mobile Threat Management is now needed to stay ahead of new vectors of vicious intent.
Tags : ibm, fiberlink, maas360, mobile, malware, hackers, phishing, threat management
     IBM MaaS360
By: IBM MaaS360     Published Date: Jul 01, 2016
Mobile is the new playground for thieves: How to protect against mobile malware
Tags : ibm, mobile, security, mobility
     IBM MaaS360
By: IBM     Published Date: Feb 24, 2015
Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.
Tags : ibm, data discovery, data classification, big data, risk mitigation, security
     IBM
By: IBM     Published Date: Apr 09, 2015
IDC collected and analyzed data on 11 MSSPs within the 2014 IDC MarketScape worldwide managed security services market assessment. While the market arena for MSS is very broad and there are many suppliers that offer these services, IDC narrowed down the field of players that participate in worldwide MSS based on the following criteria: Service capability across the MSS life cycle; Revenue and Geographic presence.
Tags : mssp, idc, idc marketscape, global managed security services, ibm, security
     IBM
By: IBM     Published Date: Aug 29, 2016
Download the TechRadar data security road map from Forrester and find out what it takes to protect your data—and your business.
Tags : ibm, b2b, commerce, b2bi, business to business integration, integration, forrester, data security
     IBM
By: IBM     Published Date: Jun 06, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises. Research
Tags : 
     IBM
By: Group M_IBM Q418     Published Date: Sep 25, 2018
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so after GDPR went into effect May 25, 2018. Under GDPR, organizations are subject to new, uniform data protection requirements—or could potentially face hefty fines. So what factors played into GDPR’s passage? • Changes in users and data. The number, types and actions of users are constantly increasing. The same is true with data. The types and amount of information organizations collect and store is skyrocketing. Critical information should be protected, but often it’s unknown where the data resides, who can access it, when they can access it or what happens once
Tags : 
     Group M_IBM Q418
By: Cisco     Published Date: Jul 11, 2016
Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video. Cloud solutions allow contact centers to gain access to new technology capabilities and channels on demand with the ability to scale up quickly. They offer the best technology innovation as well as the ability to scale agents up and down as business needs change. This whitepaper provides background on cloud contact centers, their advantages and the essential considerations for selecting a vendor.
Tags : 
     Cisco
By: Hewlett-Packard     Published Date: Aug 02, 2013
"Cloud computing, also known as 'IT as a Service', is predicated on delivering IT services on demand, an idea that has support from business leaders as a way to better align IT with business operations. Cloud computing has two key requirements: virtualized applications and seamless support and integration between the server, networking, storage and hypervisor components. In this paper, we explore these concepts and highlight the critical features necessary to move beyond server virtualization by leveraging key integration capabilities between IT components-with a particular focus on the important role that storage plays in the evolution of the datacenter architecture."
Tags : datacenter, architectures, cloud, virtualization
     Hewlett-Packard
Start   Previous    28 29 30 31 32 33 34 35 36 37 38 39 40 41 42    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics