social media

Results 176 - 200 of 1127Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement, application performance management, customer interaction service, customer satisfaction, secure content management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement, application performance management, customer interaction service, customer satisfaction, secure content management
    
CA Technologies
Published By: Avaya     Published Date: Dec 18, 2013
Your contact center is a hotbed of activity, constantly processing calls and emails, chats and social media posts, problems and solutions. As a result, it generates the kind of “big data” that other departments wish they had. But collecting that data is just the beginning. The next step is turning it into a plan of action.
Tags : 
avaya, big data, contact center, social media, software development, it management, data center
    
Avaya
Published By: Avaya     Published Date: Dec 18, 2013
By now, we’re all aware of what a powerful force social media can be for a business — be it positive or negative. But how should your business address what’s happening in social media? Avaya believes you should do it in same way you take on other customer concerns — with your contact center.
Tags : 
avaya, social media, contact center, customer service, customer concern, cem, customer experience management, software development, it management, data center
    
Avaya
Published By: Avaya     Published Date: Dec 18, 2013
Seven Trends Driving Effectiveness in the Contact Center
Tags : 
avaya, contact center, mobile, social media, customer service, cem, customer experience management, it management
    
Avaya
Published By: ServiceNow     Published Date: Feb 07, 2012
Download the white paper to find out more about next-gen IT solutions - and how IT in the cloud will help your organization not only keep up with today's complex IT ecosystem, but manage it more efficiently than ever before!
Tags : 
powering, transformation, cloud, investments, integration, access data, performance, revolution, ecosystem, manage, next-gen it, social media, build relationships, improve service, collaboration, post it, tag it, tweet it, like it, facebook
    
ServiceNow
Published By: Spredfast, Inc.     Published Date: Oct 22, 2014
During the busy holiday season, it takes exceptional marketing to stand out from the crowd. Make a statement with social integrations that place your customer at the heart of your campaign. It’s a timeless look. During the 2013 holiday season, luxury watch retailer Tourneau increased watch sales 57% by helping fans find the perfect gift with their omni-channel #TourneauKnows campaign. Just as in fashion, your brand should seek campaign inspiration further afield. Take a cue from tech sector giant, Cisco, who breathed new life into the banner ad by creating socially powered ad units. It was an arresting experience that aligned with readers of The Huffington Post, where the ads were displayed. If you are seeking new, innovative ways to capture your audience’s attention this holiday season—look no further—we’ve curated the top five social experiences for the holidays to inspire your efforts.
Tags : 
spredfast, holidays, social media, social experiences, creativity, instagram, daily deals, black friday, captions
    
Spredfast, Inc.
Published By: Spredfast, Inc.     Published Date: Oct 22, 2014
Here at Spredfast, we were as caught up in the World Cup as the rest of the planet. As much as we enjoyed watching the strategy on the field, we were also really excited about the social strategies implemented during the tournament by savvy brands and media properties.
Tags : 
spredfast, marketing, campaign tips, world cup, media properties, social content, technologies, integrations, facebook, instagram, twitter
    
Spredfast, Inc.
Published By: LogMeIn     Published Date: May 15, 2012
The way in which consumers communicate is evolving; they are rapidly adopting communities, web self-service and social media for both personal and business interactions. Customer support organizations must adapt their strategies in order to provide effective online tools to engage with the customer on the customer's terms.
Tags : 
logmein, marketing, customer service, customer satisfation, customer feedback
    
LogMeIn
Published By: hybris software     Published Date: Aug 01, 2012
Industry leaders are engaging in multichannel integration for some very good reasons. More effective cross-channel strategies lead to more satisfied consumers as well as more efficient, more profitable retail operations. In fact, as the survey indicates, consumers expect integrated multichannel experience from their favorite brands.
Tags : 
multichannel, retailing, multichannel retailing, technology considerations, hybris, pos, point of sale, print, mobile, call center, social media, website, integrated multichannel experience, cross-channel strategies, synergy, buy online, immediacy, convenience, cost savings, aisle kiosks
    
hybris software
Published By: SAP     Published Date: Nov 28, 2012
A social media analytics strategy should be developed as an enterprise wide framework even as socialytics capability is incubated and developed with digital marketing, public relations, or e-commerce. Read on to learn about social business of retail.
Tags : 
socialytics, idc, sap, marketing, merchandising, commerce, product design, quality, business technology
    
SAP
Published By: SAP     Published Date: Nov 28, 2012
No U.S. industry has changed as much in the last few years as that of banking. The mortgage crisis and its trickle down effect has its way with nearly every business in the U.S. Read on to learn more about what consumers are saying about banking.
Tags : 
business technology
    
SAP
Published By: SAP     Published Date: Nov 29, 2012
How are you perceived by your customers? In this age, on social media, your buyers are posting their opinions about your products and services. To better serve them, build your brand, and protect your position. How do you listen and understand?
Tags : 
sap, analytics, social media, customer experience, customer perception, brand positioning, brand equity, business technology
    
SAP
Published By: SAP     Published Date: Nov 29, 2012
"Customer centric" is a term we can all be familiar with and with good reason: Customers buy products and contract for services ass well as contribute on social media and blog sites sharing information on your products. How can we analyze this info?
Tags : 
analytics, sap, social media, customer centric, analytics technology, business technology
    
SAP
Published By: Genesys     Published Date: May 14, 2013
Today, the gap between a customer’s expecta-tions and the service they receive is huge. Customers are increasingly knowledgeable about the products they use, and demand value-added, personalized customer service in real-time, using voice, text-based media types like email and chat, and social media.
Tags : 
genesys, customer service, social media, personalized customer service, text-based media, people management
    
Genesys
Published By: Oracle     Published Date: Jan 15, 2014
Empowering Modern Government
Tags : 
oracle, government, government agencies, social media, mobile devices
    
Oracle
Published By: Smarsh     Published Date: Dec 07, 2016
This guide contains practical steps that will help you develop a social media strategy so you gain maximum business value from your social efforts. It also outlines some smart policy suggestions—so you can ensure that your organization is protected from damage to your brand’s reputation and the risk of litigation.
Tags : 
    
Smarsh
Published By: Smarsh     Published Date: Mar 13, 2017
With no room for error, how can you keep your marketing engines revving while you stay on course with the regulators? The key to success is automation. Download now to learn more.
Tags : 
    
Smarsh
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.