RSS feed Get our RSS feed

News by Topic

share information

Results 26 - 50 of 108Sort Results By: Published Date | Title | Company Name
By: Quocirca     Published Date: Sep 07, 2007
Companies are faced with increasing pressures on the communications capabilities they offer their employees.  More employees are mobile, working from home or in other remote locations with a growing need to talk and share information with their colleagues.  This cuts across fixed and mobile communications, but businesses still want the flexibility of mobile, and the costs, predictability, quality and service models of fixed.
Tags : telecom, quocirca, mobility, soho, voip, ip telephony, convergence, small business
     Quocirca
By: Group M_IBM Q1'18     Published Date: Feb 09, 2018
Thrill customers and empower employees with omni-channel, socially-infused digital experiences to drive better business outcomes IBM Customer Experience Suite features rich, integrated capabilities for managing web content, rich-media assets, real-time social communications, robust customer self-service capabilities, business analytics and mobile device delivery IBM Employee Experience Suite enables employees to easily find and share relevant information across multiple platforms, diverse geographies with multiple languages, and within the context of business applications
Tags : digital experience, ibm, software
     Group M_IBM Q1'18
By: IBM     Published Date: Aug 07, 2012
Most organizations appreciate the potential benefits that customer can reap but many face difficulties effectively turning information into actionable insights. Read this white paper to learn how an effective customer analytics strategy can help drive top-line growth, avoid unnecessary costs and increase customer satisfaction. Understand where your organization is in its pursuit to gain deeper customer insights with four stages of organizational capabilities and associated customer analytics strategies: gain insight from the information explosion; share information internally and across value chain; move from reaction to prediction; and adapt business models that enable faster creation of value.
Tags : customer amalytics. ibm, analytics framework, external data sharing, internal data sharing, increased loyalty, cross sell, wallet share, net promoter score
     IBM
By: Oracle Service Cloud     Published Date: Mar 23, 2016
This document defines Oracle’s Customer Experience (CX) Value Equation as the strategic method to identify and measure the value of organizational CX. This model was originally documented in “CX Metrics and KPIs – September 2012.” It has received wide support, and has been the #1 searched hit and downloaded CX KPI document for 3+ years – a significant achievement in this industry – in an era where concepts are replaced daily with the latest, greatest fad. Since the original publication, I have received significant feedback that has been overwhelmingly positive, but with a request to comment on additional topics – most notably: brand impact, shared services, and Oracle’s Road to Modern. This updated paper leverages the original work, adds information around these additional topics and incorporates our continued client experience.
Tags : oracle, service cloud, service management, customer interaction
     Oracle Service Cloud
By: EMC     Published Date: Oct 13, 2015
MG Group explains their adoption of EMC Documentum Capital Projects to streamline information control and effective management in the world’s largest PET production plant.
Tags : emc documentum capital projects, document management, share information, share documents
     EMC
By: EMC     Published Date: Oct 13, 2015
MG Group explains their adoption of EMC Documentum Capital Projects to streamline information control and effective management in the world’s largest PET production plant
Tags : emc documentum capital projects, document management, share information, share documents
     EMC
By: Citrix ShareFile     Published Date: Apr 11, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : data security, financial services, client data protection, security risk
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 14, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : data security, data protection, network security, firewall security, it security, technology security
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 14, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : data security, data protection, network security, firewall security, it security, technology security, anti virus
     Citrix ShareFile
By: IBM     Published Date: Aug 05, 2014
Watson Explorer provides organizations with a combined, trusted 360-degree view of both structured and unstructured data. The solution indexes information from unstructured data sources (PDFs, Microsoft SharePoint, flat files, social media, blogs and so on) as well as structured sources for search and discovery. Organizations can leverage their data in place, respecting existing security models when creating this virtual access point to all information. Watson Explorer requires trusted master data to ensure that links are accurate and reliable, so the end user can confidently leverage a holistic view of a customer or product.
Tags : ibm, data, customer, watson explorer, master data, structured
     IBM
By: Attivio     Published Date: Apr 07, 2010
The wealth and volume of content and data, including new applications and data sources, cloud computing, SaaS, email, SharePoint and public content, have made information integration more important than ever.
Tags : attivio, unified information access, voc, voice of the customer, customer service, crm
     Attivio
By: OpenText     Published Date: Apr 13, 2012
SharePoint is now an important element of the information management infrastructure in many of the world's largest organizations. In many cases, these organizations must now consider how SharePoint, and the massive (and growing) amount of content it creates, will be managed as well as how it will integrate within the broader information infrastructure.
Tags : opentext, technology, sharepoint, application integration, user security, technology security
     OpenText
By: IBM     Published Date: Jul 09, 2014
If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.
Tags : ibm, disaster recovery, disaster recovery solution, cloud technology, it operation, restoration, disaster as a service, draas
     IBM
By: IBM     Published Date: Oct 14, 2014
If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.
Tags : disaster recovery operations, cloud technologies, cloud computing, critical business aplplications
     IBM
By: Citrix ShareFile     Published Date: Apr 11, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: • Lose data when colleagues share passwords with others, especially through email. • Face risk by not knowing if an unauthorised person has accessed your files. • Have clients’ PDF files cracked by hackers in minutes.
Tags : pdf protection, data security, password protection, hacker prevention
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 14, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, your accountancy firm’s data and your clients’ information could easily be exposed to hackers. Download this white paper to learn more about PDF password protection failures that: • Expose data when people share passwords with others, especially through email. • Prevent your firm from knowing when files are read by unauthorized individuals. • Allow hackers to easily to gain access to confidential financial documents within minutes.
Tags : business documents, file sharing, file security, file backup, file sync, file delivery, data protection, data security
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 14, 2017
Do Passwords Really Protect Your PDFs? Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: • Lose data when colleagues share passwords with others, especially through email. • Face risk by not knowing if an unauthorised person has accessed your files. • Have clients’ PDF files cracked by hackers in minutes.
Tags : password protection, account management, document protection, data protection, data management, password vulnerability, encryption, data integration
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: Lose data when colleagues share passwords with others, especially through email. Face risk by not knowing if an unauthorized person has accessed your files. Have clients’ PDF files cracked by hackers in minutes.
Tags : data security, passwords, password protection, data vulnerability
     Citrix ShareFile
By: SRC,LLC     Published Date: Jun 01, 2009
Companies spend millions of dollars every year on building data warehouses, buying business intelligence (BI) software tools and managing their analytic processes in the hope of gaining consumer insight and winning market share. Yet, many companies fail to realize the full benefits of their technology investments because they are hamstrung by the layers of expertise and the complexity of technology tools needed to integrate various data warehouses and associated tools within their existing analytic environments. Since analysis is only as good as the accessibility, timeliness and accuracy of the information being analyzed, the interoperability of any data warehouse with any analytic environment is essential to achieving insightful, actionable analysis and making better decisions.
Tags : src, enterprise, streamline, analytics, economy, analytic imperative, business intelligence, seamless
     SRC,LLC
By: Group M_IBM Q119     Published Date: Dec 20, 2018
We are renegades and realists who blend strategy, technology and creativity to tackle every client challenge. We imagine the businesses that will shape tomorrow’s world and help our clients make them real. We uncover insights from data that others can’t see and deliver progressive ideas through the use of IBM Design Thinking. We ground every strategy with a focus on delivering the ultimate experience – for customers, for employees, for shareholders. Everything we do drives measurable impact at scale. For more information, visit ibm.com/ibmix
Tags : 
     Group M_IBM Q119
By: Oblong     Published Date: Nov 18, 2016
Fujitsu created the Open Innovation Gateway (OIG) in the Silicon Valley as a platform dedicated to advancing the implementation of innovative practices in June 2015. The OIG spurs practical results and achieves goals based on collaboration throughout the organization from a wide range of fields. Fujitsu has been using the immersive Mezzanine solution as the collaborative heart of the OIG. Mezzanine allows remote teams to simultaneously share information on any device. Meeting participants can gesturally move and organize information across an immersive digital workspace. To achieve the same collaborative results as Fujitsu, schedule a demo at one of our locations and experience an immersive digital workspace first hand.
Tags : 
     Oblong
By: Smarsh     Published Date: Dec 07, 2016
For companies in highly regulated or litigious industries, it’s now more important than ever to understand how compliance and legal departments can work together to share information, reduce inefficiencies, overcome challenges, and align technologies.
Tags : 
     Smarsh
By: BlackBerry     Published Date: Oct 03, 2012
This white paper discusses what's needed to ensure that mobile workers can talk across space and time boundaries and share information to speed processes.
Tags : ucc, mobile workforce, ucc solutions
     BlackBerry
By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and shared information through the capabilities of better networking technologies, opportunities have never been greater for using technology to improve the way the government interacts with constituents. However, increasing dependence on web and network services also makes government a tempting target for hackers. Distributed Denial of Service attacks, data breaches, leaks, the risks can be enormous. Recent events have shown us that now more than ever, government servers are getting victimized by well-funded teams of foreign hackers, possibly funded by their government.
Tags : 
     Cox Business
By: Citrix ShareFile     Published Date: Jul 11, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: The common challenges of data security Steps to solve these challenges And much more
Tags : finance, data security, security risks, encryption
     Citrix ShareFile
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics