• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

call volume

Results 26 - 38 of 38Sort Results By: Published Date | Title | Company Name
By: Numara Software     Published Date: Jul 09, 2009
With Numara FootPrints for Customer Service, an award-winning, 100% web-based customer service management solution, you can deliver breakthrough service to customers throughout the world faster, and enhance the quality of your web-based service desk, with less effort than today, and at a low total cost of ownership. Learn more today!
Tags : 
numara, footprints, service excellence, customer experience, hosting service, call center, it service management, call volume
    
Numara Software
By: Numara Software     Published Date: Jul 09, 2009
In this informative webinar, you will learn about the challenges of implementing configuration management along with suggestions on how to get started, and best practices to ensure success. You will also learn how Numara® FootPrints® Configuration Management, with its fast implementation, practical approach to implementing configuration management and automated integration to auto-discovery tools, takes the pain and time out of creating and maintaining a functional CMDB. Learn more today!
Tags : 
configuration management, cmdb, numara, footprints, auto-discovery tools, hardware, itil, service management
    
Numara Software
By: Numara Software     Published Date: Jul 09, 2009
This webinar and service catalog demo will show you how Numara FootPrints Service Catalog will help your organization quickly provide an attractive menu of services tailored to your customers while providing transparency of service costs - all integrated into your service management workflow. Learn more today!
Tags : 
itil v3, numara, footprints, service catalog, service request, service management, call volume, it budget
    
Numara Software
By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec
By: SAS     Published Date: Jan 04, 2019
As the pace of business continues to accelerate, forward-looking organizations are beginning to realize that it is not enough to analyze their data; they must also take action on it. To do this, more businesses are beginning to systematically operationalize their analytics as part of a business process. Operationalizing and embedding analytics is about integrating actionable insights into systems and business processes used to make decisions. These systems might be automated or provide manual, actionable insights. Analytics are currently being embedded into dashboards, applications, devices, systems, and databases. Examples run from simple to complex and organizations are at different stages of operational deployment. Newer examples of operational analytics include support for logistics, customer call centers, fraud detection, and recommendation engines to name just a few. Embedding analytics is certainly not new but has been gaining more attention recently as data volumes and the freq
Tags : 
    
SAS
By: Cisco     Published Date: Jan 15, 2015
While this dramatic growth occurs, projections call for the cloud to account for nearly two-thirds of data center traffic and for cloud-based workloads to quadruple over traditional servers. That adds another element to the picture: changing traffic patterns. Under a cloud model, a university, for example, can build its network to handle average traffic volumes but then offload data on heavier trafficked days to a public cloud service when demand dictates, such as when it’s time to register for the next semester of classes.
Tags : 
cloud, growth, traffic, projection, account, network, it management, enterprise applications
    
Cisco
By: VendorSeek     Published Date: Feb 22, 2010
Choose a call center that can handle the volume of expected incoming and outgoing calls reflective of your campaign.
Tags : 
vendorseek
    
VendorSeek
By: LogMeIn     Published Date: Mar 01, 2012
This brief case study illustrates how Ceridian has improved customer training and first call resolution rates, which has resulted in a decrease in call center volume and an increase in their customer satisfaction rates.
Tags : 
ceridian, high-quality support, customer support, human resources software, hr technology, payroll, customer service, ebusiness
    
LogMeIn
By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
By: Polycom     Published Date: Nov 09, 2015
When it comes to conference calling, the lack of clarity, background noise, and volume issues that you experience on a standard phone, are all solved by a dedicated conference phone—you can hear the difference. This can have a real impact if you’re teleconferencing on a regular basis and you want to remain alert, attentive and productive.
Tags : 
polycom, conference call, background noise, clarity, teleconferencing, knowledge management
    
Polycom
By: Group M_IBM Q418     Published Date: Sep 10, 2018
After several years of relentless hardware and software innovation, the mainframe is at an inflection point. It’s quickly moving from being a supporting platform of transaction revenue to becoming a source of revenue growth and innovation. Organizations are evolving toward what IDC calls the “connected mainframe.” This evolution to the platform is also enabling the mainframe to play a central role in organizations’ digital transformation (DX) journey. Key steps in achieving the connected mainframe require that organizations modernize and integrate the platform with their internal and external environments. IDC finds that these modernization and integration initiatives lead to new business innovations, which in turn are driving revenue growth. Early adopters of a connected mainframe strategy have achieved more than 300% return on investment (ROI). Over 50% of the benefit value came from business productivity gains, realized from higher transaction volumes, new services, and/or business
Tags : 
    
Group M_IBM Q418
By: Cloudian     Published Date: Feb 15, 2018
We are critically aware of the growth in stored data volumes putting pressure on IT budgets and services delivery. Burgeoning volumes of unstructured data commonly drive this ongoing trend. However, growth in database data can be expected as well as enterprises capture and analyze data from the myriad of wireless devices that are now being connected to the Internet. As a result, stored data growth will accelerate. Object-based storage systems are now available that demonstrate these characteristics. While they have a diverse set of use cases, we see several vendors now positioning them as on-premises targets for backups. In addition, integration of object-based data protection storage with cloud storage resources is seen by these vendors as a key enabler of performance at scale, cost savings, and administrative efficiency.
Tags : 
    
Cloudian
By: Cloudian     Published Date: Feb 21, 2018
We are critically aware of the growth in stored data volumes putting pressure on IT budgets and services delivery. Burgeoning volumes of unstructured data commonly drive this ongoing trend. However, growth in database data can be expected as well as enterprises capture and analyze data from the myriad of wireless devices that are now being connected to the Internet. As a result, stored data growth will accelerate. Object-based storage systems are now available that demonstrate these characteristics. While they have a diverse set of use cases, we see several vendors now positioning them as on-premises targets for backups. In addition, integration of object-based data protection storage with cloud storage resources is seen by these vendors as a key enabler of performance at scale, cost savings, and administrative efficiency.
Tags : 
    
Cloudian
Previous    1 2     Next   
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter