RSS feed Get our RSS feed

News by Topic

social media

Results 101 - 125 of 1152Sort Results By: Published Date | Title | Company Name
By: Dell EMC & Intel     Published Date: Apr 13, 2018
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. The Dell EMC PowerEdge server powered by Intel® Xeon® Platinum processor systems are the CIO’s key tools in this transformation. They are the bedrock of the modern data center – providing scalable system architectures that ensures control of the IT lifecycle while delivering a cyber-resilient environment. Intel Inside®. New Possibilities Outside.
Tags : 
     Dell EMC & Intel
By: Oracle     Published Date: Jan 11, 2017
Cloud, mobile, social media, and big data were once considered intimidating new technologies by CFOs; today they are the cornerstone of any successful financial department. That’s the evolution of digitization. The role of the CFO is evolving to become more strategic and CFOs of established firms are taking notice that going digital creates value.
Tags : 
     Oracle
By: Reevoo     Published Date: Nov 03, 2011
Social shopping has changed the purchase journey beyond all recognition. Get a grip on the new social purchase journey. Get your free whitepaper now!
Tags : social commerce, social media, social media for business, social network, marketing, outsourcing social media marketing, outsourcing, digital frames
     Reevoo
By: Reevoo     Published Date: Apr 17, 2012
Shopping has always been social - whether we're buying a camera, booking a holiday or renting a car. People buy from people and discuss their decisions. Today, social commercie is back in a big way. The travel industry has fully embraced the power of the crowd and it's hard to find a serious travel site that doesn't have some form of traveller reviews. In thisebook, you will learn about weaving social engagement into every step of the new booking journey to make it easy for people to book with you and share their great experience with others.
Tags : reevoo, travel, booking, social media, e-commerce, digital, online, websites
     Reevoo
By: Reevoo     Published Date: Apr 17, 2012
Social shopping has changed the purchase journey beyond all recognition. You need to get to grip with the new purchase journey: a complex, cross-channel and thoroughly social process.The New Social Purchase Journey
Tags : reevoo, marketing, social media, digital, online, social purchase, interactive marketing, web analytics
     Reevoo
By: Reevoo     Published Date: Apr 17, 2012
Shopping has always been social - whether we're buying a camera, booking a holiday or renting a car. People buy from people and discuss their decisions. Today, social commercie is back in a big way. The travel industry has fully embraced the power of the crowd and it's hard to find a serious travel site that doesn't have some form of traveller reviews. In thisebook, you will learn about weaving social engagement into every step of the new booking journey to make it easy for people to book with you and share their great experience with others.
Tags : reevoo, marketing, social media, digital, online, social purchase, interactive marketing, web analytics
     Reevoo
By: Reevoo     Published Date: Jul 09, 2012
Almost 80% of consumers now use their phones to help them shop. Download Reevoo's best practice guide to combining mobile and social to find out how to maximise your m-commerce results.
Tags : marketing, reevoo, social content, m-commerce, marketing campaigns, mobile, social media, emerging marketing
     Reevoo
By: Crowdtap     Published Date: Mar 21, 2013
Learn why the next evolution of social marketing is Collaborative Marketing. Brands that are closest to those who buy, use, and advocate for their products win.
Tags : marketing insights, research, insights, marketing metrics, peer influence, peer influencer, influencer community, brand influence
     Crowdtap
By: Oracle Corp     Published Date: Sep 18, 2013
Confused about how to get started with social customer service or how to take it to the next level? Oracle can help you address the challenges of this rapidly evolving service channel - and help you deliver social customer service that delights your customers. Join our webcast featuring Aphrodite Brinsmead, senior analyst at Ovum, and learn her best practices for social customer service.
Tags : social media, customer service, customer experience management, customer experience/engagement, social media marketing
     Oracle Corp
By: Akamai Technologies     Published Date: May 06, 2019
Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks. The people behind these attacks realize the value of an account, whether it’s to a streaming site, a game, or someone’s social media account. And, they’re willing to do whatever it takes to steal them. This report provides an overview of the recent credential stuffing attacks against these sectors and the risks these attacks pose. We’ll also explore some of the ways adversaries conduct these attacks.
Tags : 
     Akamai Technologies
By: Cisco     Published Date: Apr 20, 2016
Cisco is helping marketers understand and shape the customer experience, onsite, online, via social media, and through mobility platforms.
Tags : cisco, internet of things, customer experience, marketers, social media, internet marketing
     Cisco
By: CA Technologies     Published Date: Aug 22, 2017
Die Welt ist heute digital – Cloud, Mobilität, Social Media und das Internet of Things verändern Arbeit und Freizeit für jeden. Diese sich schnell weiterentwickelnde digitale Welt definiert auch die Beziehung zwischen Ihrem Unternehmen und Ihren Kunden neu. Die Kunden erwarten von ihren bevorzugten Marken heute eine komfortable, interaktive User Experience. Auch die Security ist ein wichtiges Anliegen. Die Risiken wachsen, da Unternehmen und Kunden immer mehr vertrauliche Daten austauschen.
Tags : 
     CA Technologies
By: IBM     Published Date: Apr 14, 2016
Read this Stratecast white paper from Frost & Sullivan to learn about the challenges over-the-top (OTT) competitors such as Google, Hulu, Netflix, and Facebook are causing communications service providers (CSPs). Learn how CSPs can use customer behavior data to deliver personalized experiences and offers, and discover the solutions that can turn data into a competitive advantage.
Tags : ibm, behavior data, social media, csp, telecom, ott, customer experience/engagement
     IBM
By: Oracle     Published Date: Sep 14, 2015
Finden Sie in diesem eBook heraus wie das digitale Zeitalter die Vertriebs- und Marketinglandschaft revolutioniert hat.
Tags : social media, social selling, the value of social selling, social selling solutions, sales leader, content management systems, interactive marketing, sales
     Oracle
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical.
Tags : 
     Oracle PaaS/IaaS/Hardware
By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
     CA Technologies
By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
     Blue Coat Systems UK
By: Blue Coat Systems UK     Published Date: Nov 03, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
     Blue Coat Systems UK
By: Genesys     Published Date: Oct 16, 2013
The existing upgrade paths from legacy PBX and ACD suppliers make it difficult for contact center executives to contemplate the future of customer service on their own terms. If your ACD-based contact center has become a road block for adding capacity or adding channels such as social media and mobile, you might want to think about making the switch to a SIP-based contact center solution. SIP delivers two important advantages over legacy switching: 1. SIP is based on open standards, so you can choose hardware and software that is best suited for your environment. 2. SIP’s capability extends beyond voice to new media types such as mobile, social media and video. SIP-based contact centers provide a roadmap to sophisticated features without the complexity and expense of traditional proprietary ACDs. Learn more about how to build the next-generation customer service platform.
Tags : contact center, customer service, social media, mobile, sip, technology solution, technology
     Genesys
By: Genesys     Published Date: Oct 16, 2013
Earlier this year, Gartner released the 2013 Magic Quadrant for Call Center Infrastructure, an annual report that analyzes call center infrastructure vendors for completeness of vision and ability to execute. Explore and compare contact center solutions from today's top vendors and decide which solution is right for you. This is the fifth consecutive year that Genesys has been named a worldwide Leader for Contact Center Infrastructure. The Genesys Customer Engagement platform (referred to as the Customer Interaction Management or ‘CIM’ platform in the report), is the industry’s most complete platform on which companies can deploy an all-in-one, end-to-end scalable contact center Get the 2013 Gartner Magic Quadrant for Contact Center Infrastructure now!
Tags : contact centers, business value, functions, applications, inbound, outbound calling, social media analytics, integration tools
     Genesys
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics