• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

social it

Results 251 - 275 of 1270Sort Results By: Published Date | Title | Company Name
By: Egress ABM Pilot     Published Date: Oct 09, 2017
Patients trust healthcare organisations with vast amounts of their sensitive data – not just details on their medical and social wellbeing, but also personally identifiable information such as dates of birth and residential addresses. People will always make mistakes – and, unfortunately, in busy and stressful workplaces, such as hospitals and medical clinics, the likelihood of this increases. Without the right processes and technologies in place to help overcome this to avoid mistakes, sensitive patient information remains at risk.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
Egress ABM Pilot
By: Sage People     Published Date: Nov 02, 2017
These are the end times for traditional enterprise resource planning (ERP) solutions. Overstatement? Not really—especially for growing businesses like yours. Old-school ERP systems are simply too slow, complex, and inflexible to keep up with today’s business climate. Think about your existing ERP. Does it support industry-specific best practices, ever-changing regulatory requirements, and emerging technologies such as social media, mobile, cloud, and analytics? If not, you could risk losing ground to your competitors as a result.
Tags : 
workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting
    
Sage People
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
By: Avaya     Published Date: Dec 18, 2013
Your contact center is a hotbed of activity, constantly processing calls and emails, chats and social media posts, problems and solutions. As a result, it generates the kind of “big data” that other departments wish they had. But collecting that data is just the beginning. The next step is turning it into a plan of action.
Tags : 
avaya, big data, contact center, social media, software development, it management
    
Avaya
By: Avaya     Published Date: Dec 18, 2013
By now, we’re all aware of what a powerful force social media can be for a business — be it positive or negative. But how should your business address what’s happening in social media? Avaya believes you should do it in same way you take on other customer concerns — with your contact center.
Tags : 
avaya, social media, contact center, customer service, customer concern, cem, customer experience management, software development
    
Avaya
By: ServiceNow     Published Date: Aug 24, 2011
Read on to discover how modern IT organizations transform to achieve IT 3.0.
Tags : 
collaboration, support, service, business, information technology, enterprise, process, social it
    
ServiceNow
By: ServiceNow     Published Date: Aug 24, 2011
This white paper takes a look at the adoption and evolution of social IT within ServiceNow.
Tags : 
social it, social media, build relationships, improve service, collaboration, post it, tag it, tweet it
    
ServiceNow
By: ServiceNow     Published Date: Feb 07, 2012
Download the white paper to find out more about next-gen IT solutions - and how IT in the cloud will help your organization not only keep up with today's complex IT ecosystem, but manage it more efficiently than ever before!
Tags : 
powering, transformation, cloud, investments, integration, access data, performance, revolution
    
ServiceNow
By: Spredfast, Inc.     Published Date: Oct 22, 2014
During the busy holiday season, it takes exceptional marketing to stand out from the crowd. Make a statement with social integrations that place your customer at the heart of your campaign. It’s a timeless look. During the 2013 holiday season, luxury watch retailer Tourneau increased watch sales 57% by helping fans find the perfect gift with their omni-channel #TourneauKnows campaign. Just as in fashion, your brand should seek campaign inspiration further afield. Take a cue from tech sector giant, Cisco, who breathed new life into the banner ad by creating socially powered ad units. It was an arresting experience that aligned with readers of The Huffington Post, where the ads were displayed. If you are seeking new, innovative ways to capture your audience’s attention this holiday season—look no further—we’ve curated the top five social experiences for the holidays to inspire your efforts.
Tags : 
spredfast, holidays, social media, social experiences, creativity, instagram, daily deals, black friday
    
Spredfast, Inc.
By: Spredfast, Inc.     Published Date: Oct 22, 2014
Oreo and the Super Bowl. Snickers and Luis Suarez' World Cup bite. By now you have probably read about brands winning big with real-time marketing (RTM) during major events. But real time happens every day, and any brand can succeed with RTM. Learn more about this social marketing strategy and how your brand can incorporate it into your playbook.
Tags : 
spredfast, rtm, real time marketing, social, marketing strategy, messaging, engagement
    
Spredfast, Inc.
By: Spredfast, Inc.     Published Date: Oct 22, 2014
Here at Spredfast, we were as caught up in the World Cup as the rest of the planet. As much as we enjoyed watching the strategy on the field, we were also really excited about the social strategies implemented during the tournament by savvy brands and media properties.
Tags : 
spredfast, marketing, campaign tips, world cup, media properties, social content, technologies, integrations
    
Spredfast, Inc.
By: Globoforce     Published Date: Apr 01, 2013
Joanna Geraghty from JetBlue can. JetBlue’s Lift program provides deep insights into the company’s performance and culture management, powered by peer feedback and directly linked to the airline’s core values
Tags : 
case study, jetblue, engagement, culture, social recognition, globoforce, employee recognition, employee satisfaction
    
Globoforce
By: LogMeIn     Published Date: May 15, 2012
The way in which consumers communicate is evolving; they are rapidly adopting communities, web self-service and social media for both personal and business interactions. Customer support organizations must adapt their strategies in order to provide effective online tools to engage with the customer on the customer's terms.
Tags : 
logmein, marketing, customer service, customer satisfation, customer feedback
    
LogMeIn
By: Forrester     Published Date: May 10, 2012
In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decisioning capabilities.This report will help security and risk professionals understand how to control and properly protect sensitive information in this era of big data.
Tags : 
data-centric security, information protection, information management, data protection, security, risk and compliance, data warehousing, application security
    
Forrester
By: hybris software     Published Date: Aug 01, 2012
Industry leaders are engaging in multichannel integration for some very good reasons. More effective cross-channel strategies lead to more satisfied consumers as well as more efficient, more profitable retail operations. In fact, as the survey indicates, consumers expect integrated multichannel experience from their favorite brands.
Tags : 
multichannel, retailing, multichannel retailing, technology considerations, hybris, pos, point of sale, print
    
hybris software
By: hybris software     Published Date: Aug 23, 2012
Globalization; social and mobile commerce; and site replacements, upgrades and new launches are driving e-commerce product evaluation and selection. Use this Magic Quadrant as a guide during the vendor evaluation and selection process.
Tags : 
ecommerce, globalization, social commerce, mobile commerce, product evaluation, product selection, gartner, customer relationship management
    
hybris software
By: SAP     Published Date: Nov 28, 2012
A social media analytics strategy should be developed as an enterprise wide framework even as socialytics capability is incubated and developed with digital marketing, public relations, or e-commerce. Read on to learn about social business of retail.
Tags : 
socialytics, idc, sap, marketing, merchandising, commerce, product design, quality
    
SAP
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter