data

Results 1 - 25 of 11851Sort Results By: Published Date | Title | Company Name
Published By: (ISC)²     Published Date: Oct 15, 2010
A four-step approach to establishing leading data protection practices.
Tags : 
isc2, data leak, protection planning, data protection, cloud computing, security, employee
    
(ISC)²
Published By: 1010data     Published Date: Sep 05, 2018
To learn more about 1010data CPG Ecommerce Download Now!
Tags : 
    
1010data
Published By: 1010data     Published Date: Nov 28, 2018
This report analyzes the changes within the grocery industry during July 2017 – June 2018 (the year following Amazon’s acquisition of Whole Foods) and delivers a view of grocery’s biggest disruptors and unforeseen consumer trends.
Tags : 
    
1010data
Published By: 1010data     Published Date: Nov 28, 2018
This report analyzes online private-label sales from Sept 2017 – Aug 2018 at the category and retailer level and delivers insights on which brands pose the biggest threat online today and which categories may expect more disruption down the line.
Tags : 
    
1010data
Published By: 2dev     Published Date: Jan 29, 2007
The goal of this series of articles is to help DBA's having a basic understanding of Oracle's Application Server.
Tags : 
software development, oracle, database, database security, oracle application server, database administrator, dba, database development, 2dev
    
2dev
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
The right contact center solution should integrate tightly with your CRM solution and add value to it. Your contact center software should be able to capture all email, chat and standard telephone interactions and link them to the customer records database. Not only does this ensure continuity in all your customer communications, it gives the CRM database more information to use in constructing a better picture of your customers’ behavior. So how do you choose the right contact center for your organization? Following are three examples of forward-thinking businesses that found the right answer with cloud communication technology.
Tags : 
contact center, crm, telephone interactions, communications
    
8x8 Inc.
Published By: 8x8 Inc.     Published Date: Feb 17, 2017
This Frost & Sullivan paper will outline the difficult challenges faced by all businesses—in a variety of industries and sizes—in creating an exceptional customer experience; discuss the value of a contact center that also supports all channels of choice, disaster recovery, data analytics, and leveraging back-office workers; stress the need for cultural change throughout the organization to truly meet today’s customers’ expectations; and offer best practices recommendations for taking the lead in creating a customer journey that engenders loyalty, delivers total satisfaction, and drives revenues.
Tags : 
frost & sullivan, contact center, customer engagement, cloud, culture gap, scalability, omnichannel, digital tranformation, customer experience
    
8x8 Inc.
Published By: 8x8 Inc.     Published Date: Aug 15, 2017
This paper outlines the difficult challenges faced by all businesses in creating exceptional customer experiences. And discusses the value of a contact center that supports all channels, disaster recovery and data analytics. Contact Centers today must manage cultural change throughout the organization to truly meet customers’ expectations. Read on to learn best practices for taking the lead in creating customer journeys that engender loyalty, delivers satisfaction, and drives revenues.
Tags : 
contact center, modern customer, customer engagement, customer experience, data analytics, disaster recovery
    
8x8 Inc.
Published By: 8x8, Inc.     Published Date: May 13, 2013
As voice, video, and data networks meld into a single user experience, solutions that integrate phone service, unified messaging, voicemail, audio and video capabilities, rich-media conferencing, and mobility solutions are in high demand.
Tags : 
8x8, voip, mobility, pbx, voice over internet protocol
    
8x8, Inc.
Published By: Abacus Labs     Published Date: Jan 11, 2019
Abacus is a real time expense reporting solution that processes individual expenses as they flow into the system. No expense report required. It provides finance teams unprecedented visibility into spend and minimizes the work required to submit expenses. At one time, the most efficient way to get expense documentation from employees to the finance team was to tape receipts together and fill out templated forms. Today we have mobile cameras, automated accounting software, and convenient apps for peer-to-peer payments. We live in a world of real time data. You should be able to submit your expenses as easily as you pay a friend for your half of dinner!
Tags : 
    
Abacus Labs
Published By: Abacus Labs     Published Date: Jan 11, 2019
Abacus is a real time expense reporting solution that processes individual expenses as they flow into the system. No expense report required. It provides finance teams unprecedented visibility into spend and minimizes the work required to submit expenses. At one time, the most efficient way to get expense documentation from employees to the finance team was to tape receipts together and fill out templated forms. Today we have mobile cameras, automated accounting software, and convenient apps for peer-to-peer payments. We live in a world of real time data. You should be able to submit your expenses as easily as you pay a friend for your half of dinner!
Tags : 
    
Abacus Labs
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state, governmental, decisions, data management
    
Aberdeen
Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
YouSendIt is a Web-based secure digital file delivery company, which lets users securely send, receive and track files on demand. It is an alternative to sending large e-mail attachments, using FTP, and sending CDs or DVDs or tape or USB flash drive via Sneakernet. The sender can enter the recipients' e-mail addresses, attach the file and send it; the recipients receive an e-mail notification with a URL that lets them download the file.
Tags : 
yousendit, dortch, large content, file sending, marketing, technology, data management, email security
    
Aberdeen - youSENDit
Published By: Aberdeen Group     Published Date: Jun 02, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state, governmental, decisions, data management
    
Aberdeen Group
Published By: Aberdeen Group     Published Date: Jun 02, 2011
The focus of this document is to quantify the cost of IT-induced business downtime.
Tags : 
aberdeen, datacenter uptime, roi, disaster recovery, best-in-class, industry average, laggard, sla, service level agreement, business continuity, business interruptions, cost of downtime, data protection
    
Aberdeen Group
Published By: Aberdeen Group     Published Date: Jun 02, 2011
Aberdeen has ascertained that companies that backup critical data and systems at remote locations have a faster recovery time from computer-generated business interruptions.
Tags : 
aberdeen, disaster recovery, business disruption, remote data storage, data archiving, data protection
    
Aberdeen Group
Published By: Aberdeen Group     Published Date: Sep 06, 2011
This Aberdeen Group research shows why you should be looking more closely right now at secure/managed file transfer solutions.
Tags : 
aberdeen, secure / managed file transfer, file transfer, collaboration, copy and carry, ftp, dropbox, sftp, ftps, smft, enterprise data, velocity, consumerization, complexity, digital diy
    
Aberdeen Group
Published By: Aberdeen Group     Published Date: Aug 04, 2015
The practice of using predictive analytics for marketing is becoming much more commonplace, but, in many ways, this field is still immature. Marketers are using analytics to identify new prospects, qualify leads, predict close rates, and optimize pricing, but there are still many ways to refine these methods -- along with many pitfalls to avoid. Download this white paper to learn how to win the B2B marketing analytics poker game.
Tags : 
predictive analytics, leads, pricing, close rates, public data, social media, data analysis
    
Aberdeen Group
Published By: Aberdeen Group     Published Date: Nov 13, 2015
Aberdeen’s Content Marketing survey revealed that while 95% of marketers are using or considering using a content marketing strategy, there are some distinct differences between those using content well and those just using content. The Best-in-Class are not only creating content at volume, they are taking a much more data-driven approach to their content marketing strategy — and it’s paying off. Find out how.
Tags : 
customer acquisition, marketing leads, marketing challenges, marketing messages, contact management, data science, demand generation, email marketing, inbound marketing, lead generation, lead intelligence, market research, integrated marketing, lead nurturing, marketing analytics
    
Aberdeen Group
Published By: Aberdeen Group     Published Date: Nov 13, 2015
Aberdeen’s research shows that 90% of Best-in-Class marketers report fueling lead generation efforts with content marketing. What do you need to know to follow this best practice of the Best-in-Class? That’s exactly what this Knowledge Brief is intended to uncover.
Tags : 
customer acquisition, marketing leads, marketing challenges, marketing messages, contact management, data science, demand generation, email marketing, inbound marketing, lead generation, lead intelligence, market research, integrated marketing, lead nurturing, marketing analytics
    
Aberdeen Group
Published By: Aberdeen Group     Published Date: Nov 13, 2015
This report examines the pressing need to break down data silos due to the damage they cause to analytical initiatives and user engagement. Read this report to find out more.
Tags : 
customer acquisition, marketing leads, marketing challenges, marketing messages, contact management, data science, demand generation, email marketing, inbound marketing, lead generation, lead intelligence, market research, integrated marketing, lead nurturing, marketing analytics
    
Aberdeen Group
Published By: Aberdeen Group     Published Date: Nov 23, 2015
This report examines the pressing need to break down data silos due to the damage they cause to analytical initiatives and user engagement. Read this report to find out more.
Tags : 
customer acquisition, marketing leads, marketing challenges, marketing messages, contact management, data science, demand generation, email marketing, inbound marketing, lead generation, lead intelligence, market research, integrated marketing, lead nurturing, marketing analytics
    
Aberdeen Group
Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user, data regulation, encryption
    
Absolute Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library