RSS feed Get our RSS feed

News by Topic

social media

Results 176 - 200 of 1124Sort Results By: Published Date | Title | Company Name
By: Sage People     Published Date: Nov 02, 2017
These are the end times for traditional enterprise resource planning (ERP) solutions. Overstatement? Not really—especially for growing businesses like yours. Old-school ERP systems are simply too slow, complex, and inflexible to keep up with today’s business climate. Think about your existing ERP. Does it support industry-specific best practices, ever-changing regulatory requirements, and emerging technologies such as social media, mobile, cloud, and analytics? If not, you could risk losing ground to your competitors as a result.
Tags : workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting
     Sage People
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
     CA Technologies
By: Avaya     Published Date: Dec 18, 2013
Your contact center is a hotbed of activity, constantly processing calls and emails, chats and social media posts, problems and solutions. As a result, it generates the kind of “big data” that other departments wish they had. But collecting that data is just the beginning. The next step is turning it into a plan of action.
Tags : avaya, big data, contact center, social media
     Avaya
By: Avaya     Published Date: Dec 18, 2013
By now, we’re all aware of what a powerful force social media can be for a business — be it positive or negative. But how should your business address what’s happening in social media? Avaya believes you should do it in same way you take on other customer concerns — with your contact center.
Tags : avaya, social media, contact center, customer service, customer concern, cem, customer experience management
     Avaya
By: Avaya     Published Date: Dec 18, 2013
Seven Trends Driving Effectiveness in the Contact Center
Tags : avaya, contact center, mobile, social media, customer service, cem, customer experience management
     Avaya
By: ServiceNow     Published Date: Aug 24, 2011
This white paper takes a look at the adoption and evolution of social IT within ServiceNow.
Tags : social it, social media, build relationships, improve service, collaboration, post it, tag it, tweet it
     ServiceNow
By: ServiceNow     Published Date: Feb 07, 2012
Download the white paper to find out more about next-gen IT solutions - and how IT in the cloud will help your organization not only keep up with today's complex IT ecosystem, but manage it more efficiently than ever before!
Tags : powering, transformation, cloud, investments, integration, access data, performance, revolution
     ServiceNow
By: Spredfast, Inc.     Published Date: Oct 22, 2014
During the busy holiday season, it takes exceptional marketing to stand out from the crowd. Make a statement with social integrations that place your customer at the heart of your campaign. It’s a timeless look. During the 2013 holiday season, luxury watch retailer Tourneau increased watch sales 57% by helping fans find the perfect gift with their omni-channel #TourneauKnows campaign. Just as in fashion, your brand should seek campaign inspiration further afield. Take a cue from tech sector giant, Cisco, who breathed new life into the banner ad by creating socially powered ad units. It was an arresting experience that aligned with readers of The Huffington Post, where the ads were displayed. If you are seeking new, innovative ways to capture your audience’s attention this holiday season—look no further—we’ve curated the top five social experiences for the holidays to inspire your efforts.
Tags : spredfast, holidays, social media, social experiences, creativity, instagram, daily deals, black friday
     Spredfast, Inc.
By: Spredfast, Inc.     Published Date: Oct 22, 2014
Here at Spredfast, we were as caught up in the World Cup as the rest of the planet. As much as we enjoyed watching the strategy on the field, we were also really excited about the social strategies implemented during the tournament by savvy brands and media properties.
Tags : spredfast, marketing, campaign tips, world cup, media properties, social content, technologies, integrations
     Spredfast, Inc.
By: LogMeIn     Published Date: May 15, 2012
The way in which consumers communicate is evolving; they are rapidly adopting communities, web self-service and social media for both personal and business interactions. Customer support organizations must adapt their strategies in order to provide effective online tools to engage with the customer on the customer's terms.
Tags : logmein, marketing, customer service, customer satisfation, customer feedback, crm solutions/software, customer experience/engagement, business intelligence
     LogMeIn
By: hybris software     Published Date: Aug 01, 2012
Industry leaders are engaging in multichannel integration for some very good reasons. More effective cross-channel strategies lead to more satisfied consumers as well as more efficient, more profitable retail operations. In fact, as the survey indicates, consumers expect integrated multichannel experience from their favorite brands.
Tags : multichannel, retailing, multichannel retailing, technology considerations, hybris, pos, point of sale, print
     hybris software
By: SAP     Published Date: Nov 28, 2012
A social media analytics strategy should be developed as an enterprise wide framework even as socialytics capability is incubated and developed with digital marketing, public relations, or e-commerce. Read on to learn about social business of retail.
Tags : socialytics, idc, sap, marketing, merchandising, commerce, product design, quality
     SAP
By: SAP     Published Date: Nov 28, 2012
No U.S. industry has changed as much in the last few years as that of banking. The mortgage crisis and its trickle down effect has its way with nearly every business in the U.S. Read on to learn more about what consumers are saying about banking.
Tags : social media, marketing research
     SAP
By: SAP     Published Date: Nov 29, 2012
How are you perceived by your customers? In this age, on social media, your buyers are posting their opinions about your products and services. To better serve them, build your brand, and protect your position. How do you listen and understand?
Tags : sap, analytics, social media, customer experience, customer perception, brand positioning, brand equity, emerging marketing
     SAP
By: SAP     Published Date: Nov 29, 2012
"Customer centric" is a term we can all be familiar with and with good reason: Customers buy products and contract for services ass well as contribute on social media and blog sites sharing information on your products. How can we analyze this info?
Tags : analytics, sap, social media, customer centric, analytics technology, emerging marketing, marketing research
     SAP
By: Genesys     Published Date: May 14, 2013
Today, the gap between a customer’s expecta-tions and the service they receive is huge. Customers are increasingly knowledgeable about the products they use, and demand value-added, personalized customer service in real-time, using voice, text-based media types like email and chat, and social media.
Tags : genesys, customer service, social media, personalized customer service, text-based media, people management
     Genesys
By: Oracle     Published Date: Jan 15, 2014
Empowering Modern Government
Tags : oracle, government, government agencies, social media, mobile devices
     Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics