Skip to main content
 

call back

Results 1 - 25 of 67Sort Results By: Published Date | Title | Company Name
Published By: Microsoft Office 365     Published Date: Sep 20, 2016
Going with a single-vendor collaboration platform is an easy call, right? Employees can communicate and share more easily, and your IT team only has to deal with implementation from one vendor, not dozens. But, in case you’re still pondering, here are five reasons a collaboration suite makes sense: Saved time and increased productivity Lower costs and less complexity End-to-end security compliance Scaling at your pace Control over the back end Download the Better Together eBook for complete details.
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: Nov 03, 2016
Going with a single-vendor collaboration platform is an easy call, right? Employees can communicate and share more easily, and your IT team only has to deal with implementation from one vendor, not dozens. Still pondering? Here are five reasons it makes sense: Saved time and increased productivity Lower costs and less complexity End-to-end security compliance Scaling at your pace Control over the back end Download the eBook for complete details.
Tags : 
    
Microsoft Office 365
Published By: Zendesk     Published Date: May 21, 2018
Customers are more technically savvy than everand have come to prefer the DIY approach to solving their issues and answering their own questions. Years of research by ICMI has confirmed that customers prefer to resolve issues themselves and within their channels of choice. Furthermore, customers onlyseek direct interactions when they unsuccessfully exhaust their self-service options. This is backed up by data from American Express, which found that 48% of consumers prefer to speak with a customer service rep when dealing with complex issues, but only16% prefer the same contact for simple issues. The goal of this paper is simple: We want to help you build an all-in-one knowledge base, community, and customer portal. All of which can be accomplished with a help center like Zendesk Guide.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Jun 29, 2018
Customers are more technically savvy than ever and have come to prefer the DIY approach to solving their issues and answering their own questions. Years of research by ICMI has confirmed that customers prefer to resolve issues themselves and within their channels of choice. Furthermore, customers only seek direct interactions when they unsuccessfully exhaust their self-service options. This is backed up by data from American Express, which found that 48% of consumers prefer to speak with a customer service rep when dealing with complex issues, but only 16% prefer the same contact for simple issues. The goal of this paper is simple: We want to help you build an all-in-one knowledge base, community, and customer portal. All of which can be accomplished with a help center like Zendesk Guide.
Tags : 
    
Zendesk
Published By: Sage EMEA     Published Date: Nov 05, 2018
This report was produced specifically for the UK and Ireland (UK/I) region and is based on data gathered from real-world business leaders explaining how they perform tasks on a daily basis. In the report, we will look at how business managers can step up from the operational tasks and focus on work that will propel their business forward. We will: • Touch on the priorities of what we could be termed 'accelerated business leader's': those decision makers leading their industries forward in a way that harnesses emerging technologies and agile new ways of working. • Examine key factors that hold businesses back and limit business growth. • Explore the technologies that can drive operational agility and scale.
Tags : 
finance, cashflow, compliance, process efficiency, automation
    
Sage EMEA
Published By: Pepperdata     Published Date: Jun 25, 2015
Download this whitepaper to learn how real-¬time cluster optimization technology can be used in multi¬-tenancy Hadoop environments to: • Eliminate the expense of having to physically isolate workloads • Enforce service level agreements (SLAs) based on customer¬ defined policies • Enable cluster usage tracking by job, task and user to speed troubleshooting and help with chargebacks
Tags : 
    
Pepperdata
Published By: Panasonic Business Mobility Solutions     Published Date: Sep 06, 2016
A surprising 80% of the 30 million1 warehouse workers worldwide, in the field of transportation and logistics, are still using pen and paper in a physically-intensive environment that increasingly demands accuracy and real time feedback. With warehouse efficiency, so closely tied to customer satisfaction in areas like ecommerce, the low penetration of digital solutions—20% as recent as 2014, is surprising. Unless an organization has a fully automated warehouse, the job is heavily labor-intensive. VDC research reveals that as long as human labor plays a dominant role in warehousing, any technology that optimizes workflows and improves accuracy will add tremendous value
Tags : 
mobile workforce, laptops, tablet, mobile computing, productivity, rugged, mobile handheld, mobile scanner
    
Panasonic Business Mobility Solutions
Published By: WebiMax     Published Date: Oct 29, 2014
In most use cases involving flash storage deployments, the business environment changes, driving a need for higher-performance storage. However, the case of Epic Systems Corporation software is the opposite—the storage requirements haven’t changed recently, but the options for addressing them have. Epic, a privately-held company founded in 1979 and based in Verona,Wisconsin, makes applications for medical groups, hospitals and other healthcare organizations. Epic software typically exhibits high frequency,random storage accesses with stringent latency requirements. IBM has been working with Epic to develop host-side and storage-side solutions to meet these requirements. Extensive testing has demonstrated that the combination of IBM® POWER8™ servers and IBM FlashSystem™ storage more than meets the performance levels Epic recommends for the backend storage supporting its software implementations—at a cost point multiple times lower than other storage alternatives.
Tags : 
webimax, ibm, flashsystem storage, epic systems corporation, epic requirements, performance levels
    
WebiMax
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The ‘80s Called… … And they don’t want their enterprise Project and Portfolio Management (PPM) tools back. If your Project Management Office (PMO) is still relying on the same or similar processes and systems used when neon and mullets were trending, it will never keep pace with today’s market demands or shifts in technology. Six-month deployment schedules and command and control models of yesteryear are actively being replaced with continuous delivery methods and practices like agile and lean—all in the interest of driving greater customer engagement.
Tags : 
    
CA Technologies EMEA
Published By: Genesys     Published Date: Oct 16, 2013
Enterprise Workload Management gets the right work to the right person at the right time, eliminating the outdated manual distribution of work model. Enterprise Workload Management finally gives organizations the ability to correlate the work that customer service interactions create in the front office -- with the best resource within the organization required to complete that work in the back office. Enterprise Workload Management ensures that the highest priority work is being handled by the right resource, and gives managers real-time visibility into when the work will be completed, as well as reports that show the outcomes of the work. Customers get notified when an order or application is processed instead of waiting to hear or having to repeated call back. Employees get specific coaching and training plans based on the results of their work.
Tags : 
contact center, customer service, customer relationship management, technology, business process management, bpm, crm
    
Genesys
Published By: Quick Base     Published Date: Dec 18, 2017
IT leaders are in a tough spot. Business leaders need help improving processes, but IT needs to focus resources on its own mission-critical innovation projects. Over the past 18 months IT backlogs have risen by 29%, resulting in growing tensions between IT and the business. Across industries, IT leaders are increasingly turning to no-code application development to free themselves from the burden of the backlog. In this 30-minute webinar, Adam Hoover, Solutions Engineer at Quick Base, Inc. will discuss how a no-code application development platform can enable you to drastically reduce your backlog and keep your team focused on the projects that have the greatest impact. He’ll cover how to identify partnership opportunities between the business and IT – and share three effective models for working together while maintaining high quality across the IT ecosystem.
Tags : 
    
Quick Base
Published By: Bluecore     Published Date: Oct 23, 2018
The second purchase has taken on almost mythical qualities over the past few years because of both the difficulty many retailers face in attaining it and the potential it holds for those retailers who can make it happen. For example, converting just 5% of one-time buyers into two-time buyers can lead to an additional $550,000 in potential revenue over the next two years. But crossing the chasm from first purchase to second purchase is typically the most difficult for retailers. So what does it take? We’ve got your back with a special Second Purchase edition of our Rethinking Retail Playbook, featuring five ideas to help you make sure one-time buyers don’t become only-time buyers.
Tags : 
retail, playbook, buyer, bluecore
    
Bluecore
Published By: CyberSource EMEA     Published Date: May 04, 2018
The digital economy is dramatically changing how consumers shop and interact with businesses. They expect a fast, convenient and highly secure digital experience. With the average company lifespan decreasing rapidly, merchants have to operate as a true digital enterprise to stay competitive and to stay in business. Payment and fraud management is no longer a back-office utility. It is a prime differentiator, critical to achieving competitive advantage, improving customer experience and reducing risk. Digital transformation is not simply a market buzz word. It is real. And those who don’t embrace it are in a position to lose. By 2020, eCommerce sales as a percentage of retail sales are forecast to be 12.4% compared to 8.0% in 2016, according to eMarketer. And engaging customers digitally across channels remains a top digital initiative. While there are several drivers of growth in the digital economy, none are more significant than the force of mobile and cloud technologies. Innovation
Tags : 
    
CyberSource EMEA
Published By: Damballa     Published Date: Nov 13, 2012
Frost & Sullivan is proud to present the 2011 North American New Product Innovation Award in Cyber Threat Protection to Damballa Inc.
Tags : 
advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper, call-back, virtual analysis, zero-day threats, tdl4, stuxnet, spyeye, zeus, malware detection, cyber attacks, cybersecurity, cyber threats, cyber espionage
    
Damballa
Published By: Plex Systems     Published Date: Aug 15, 2014
There has been no shortage of high profile recalls over the past several years. Suppliers are being required to provide more robust quality management systems, provide better real-time visablity into manufacturing data, and may even be held accountable for additional charge-back and warranty claims. Take a next generation approach to quality management.
Tags : 
    
Plex Systems
Published By: CA WA     Published Date: May 12, 2008
Although typically thought of as an artifact of legacy computing, batch processes remain vital to today’s real-time enterprises. Behind the real time systems that power the real time enterprise, such as customer order fulfillment, account management, supply chain scheduling and optimization, or financial trading systems, are regularly-updated back office business systems. Over the years, batch technology has evolved from script-based automation to rules or policy-driven workload automation.
Tags : 
bpa, business process automation, soa, service oriented, workload automation, ca wa
    
CA WA
Published By: Genesys     Published Date: Feb 26, 2018
Historically, upgrading your contact center solution was a costly endeavor. The Genesys® PureCloud™ solution breaks the mold with a three-year 571% ROI and payback in less than three months.
Tags : 
genesys purecloud, forrester, purecloud platform, omnichannel contact center solution
    
Genesys
Published By: Sage     Published Date: Nov 28, 2017
In just a few short years, we’ve gone from “there’s an app for that” to “there are way too many apps for that.” Whether you call it app overload or app sprawl, the issue of too many applications, systems, and processes has created inefficiencies in business management and an unnecessary gap between the front office and back office. This article takes a look at the phenomenon. It also offers a solution to dissolve the obstacles and boundaries that hinder your business. Read more.
Tags : 
    
Sage
Published By: VMware Dell     Published Date: Jul 02, 2008
In this case study, you'll discover the tangible benefits to IRMC when they used VMware Virtual Desktop Infrastructure to virtualize their call center operations and support multiple call centers from a central data center. Their IT staff achieved increased flexibility, faster provisioning, redeployed IT staff, reduced IT costs, and improved competitiveness. Finally, review a detailed financial analysis to back up IRMC's 73% annual ROI, and see how they saved.
Tags : 
call center, vmware, virtual, virtualization, virtual machine, callcenter, it savings, cost savings, flexibility
    
VMware Dell
Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Never before have state and local governments been expected to do so much with so little. Even as budgets remain tight in a post-recession environment, tech-savvy citizens demand higher levels of service, they want to pay taxes by credit card, renew their driver's license online, and check traffic from their smartphone. These responsibilities make cyber security critical for state agencies, municipalities, and public utilities. Governments possess residents' most sensitive information - including inviolable personal data such as Social Security numbers and birth certificates. This white paper highlights: Why traditional tools fail to detect advanced attacks; Gaining a cohesive, correlated view of all major threat vectors; How to leverage signature-less, real-time security that thwarts zero-Day attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Cyber attacks are growing more sophisticated and, more often than not, target small and midsize businesses (SMBs). One unlucky click - a malicious email attachment, a link to a legitimate but compromised website - could result in a costly data breach that drains your bank account and customer trust. This paper explains targeted attacks and examines reasons cyber attackers are aiming at small and midsize businesses, including: Value of your data; Low risk and high returns for criminals; Why SMBs are easier targets.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Whether they work for an up-and-coming startup or an industry giant, security response teams are under siege as never before. Today's cyber attacks are sophisticated, relentless, and devastating, costing U.S. businesses $8.9 million a year each on average. Attacking in multiple stages across multiple vectors, advanced persistent threats (APTs) and other sophisticated attacks easily evade signature-based detection and other traditional defenses. Thiswhite paper describes: The 10 most common mistakes, strategic and technical, that incident response teams make; The effect of these mistakes and how to avoid them with a well-defined incident response plan.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.