recommendation

Results 1 - 25 of 457Sort Results By: Published Date | Title | Company Name
Published By: 8x8 Inc.     Published Date: Feb 17, 2017
This Frost & Sullivan paper will outline the difficult challenges faced by all businesses—in a variety of industries and sizes—in creating an exceptional customer experience; discuss the value of a contact center that also supports all channels of choice, disaster recovery, data analytics, and leveraging back-office workers; stress the need for cultural change throughout the organization to truly meet today’s customers’ expectations; and offer best practices recommendations for taking the lead in creating a customer journey that engenders loyalty, delivers total satisfaction, and drives revenues.
Tags : 
frost & sullivan, contact center, customer engagement, cloud, culture gap, scalability, omnichannel, digital tranformation
    
8x8 Inc.
Published By: Aasonn     Published Date: Sep 26, 2014
Download to hear individual reflections and advice from SuccessFactors customers on their implementation journey. Personally listen to the unique takeaways and recommendations from the world’s most experienced Implementation Consultants, Project Managers, SAP Solution Architects, Sales Executives and Strategic Change Management Consultants. Here is your chance to get the insiders view.
Tags : 
aasonn, successfactors, hr project, customer experiences
    
Aasonn
Published By: Acronis     Published Date: Apr 26, 2011
Closing the Virtualization Loop white paper identifies the objectives in the next phase of virtual machine backup and recovery and provides recommendations on how to improve backup and disaster recovery in a hybrid IT environment.
Tags : 
acronis, virtualization, backup and recovery, disaster recovery, roi, tco, virtual server backup, virtual server
    
Acronis
Published By: Act-On     Published Date: Jan 08, 2015
Ad Age, BtoB, and Act-On deliver the results of research into the factors of successful lead-generation strategies and tactics, with findings and recommendations most pertinent to the SMB marketer and sales director.
Tags : 
act-on, lead generation, management, smb, research, ad age, btob, internet marketing
    
Act-On
Published By: Act-On     Published Date: Apr 20, 2015
Our eBook provides five concise recommendations for improving customer engagement and re-defining marketing’s role in the customer lifecycle.
Tags : 
marketing, crm, automation, business intelligence, customer lifecycle, customer experience, content management systems, marketing software
    
Act-On
Published By: Adobe     Published Date: Mar 07, 2013
This paper discusses the different attribution models available to marketers, the channels that should be included when conducting multichannel attribution modelling and recommendations for making attribution a part of your ongoing strategy.
Tags : 
budget allocation, marketing, multichannel marketing, digital marketing, adobe, attribution modelling, emerging marketing
    
Adobe
Published By: Adobe     Published Date: May 13, 2015
The Adobe Digital Index provides its key insights, recommendations and predictions of both Social and Search in this Digital Advertising report
Tags : 
adobe digital advertising, social advertising, search advertising, market research
    
Adobe
Published By: Adobe     Published Date: Aug 04, 2015
This report introduces Forrester's vision of mobile marketing for marketing leaders and provides specific strategic recommendations for brands dealing with demanding mobile customers.
Tags : 
brand tactics, branding, consumer mobility, customer experience management, digital marketing, emerging methods, marketing methods, mobile apps
    
Adobe
Published By: Adobe     Published Date: Apr 20, 2016
To improve your customer engagement, you need to test and learn from every possible interaction. Forrester provides helpful steps and insights in their report, Optimize Customer Experiences with Online Testing and Continuous Optimization. Read the report to learn: • How to establish an online testing strategy based on continuous optimization • How to elevate your testing by achieving four crucial optimization objectives • Recommendations from Forrester on practical next steps in your optimization journey
Tags : 
adobe, marketing, data driven marketing, continuous optimization, customer experience, customer engagement, crm & customer care
    
Adobe
Published By: Adobe     Published Date: Oct 24, 2018
Adobe automates the process of turning insights into action by connecting Adobe Analytics to other solutions in Adobe Experience Cloud, including Adobe Target and Adobe Audience Manager. Four features make this possible: • Anomaly detection. The technology automatically analyzes trends and determines if they are statistically significant — in milliseconds. • Analyze play button. With analytics, you can take insights and connect them to your email, DMP, and personalization platform in seconds. • Intelligent alert. A built-in alerting system sends an SMS text or email when it detects an anomaly. There are also predictive algorithms that help you forecast how often the alert is likely to trigger. You can set these to only notify you of the most important changes. • Intelligent recommendations. It’s simply impossible to manually create every alert you might need, so Adobe is building machine learning directly into analytics to analyze users’ behaviors. Like a virtual data assistant, it co
Tags : 
    
Adobe
Published By: Adobe     Published Date: Sep 23, 2019
Adobe is a leader in personalization engines, according to Gartner. Why Should the Target Audience Care? Finding the right personalisation engine can have a dramatic impact on an organisation’s ability to provide quality, personalised experiences to their clientele. Gartner is a prestigious and respected organisation. Marketers and IT can rely on them to help make make crucial decisions about the best providers to use. Supporting Concepts Gartner conducted an extensive, multi-criteria evaluation of personalisation engines. They researched, analyzed, and scored the most significant ones, in order to help businesses make the right choice of provider. KEY POINTS PROVIDED AS GUIDELINES Adobe is a Leader. Many of Adobe's products include personalization features. However, Adobe Target offers a stand-alone personalization engine for segmentation, optimization and recommendations, and can be integrated with third-party platforms for marketing or digital commerce personalization. M
Tags : 
    
Adobe
Published By: Alert Logic     Published Date: May 23, 2019
Securing web applications in the AWS cloud environment relies on the cloud service provider and the customer working together in a shared responsibility model. Effective security for web applications on AWS requires full visibility into the environment in which the apps live, while also proactively monitoring for attacks without causing delays in application development and delivery. For some customers this may be a challenge due to limited personnel resources or expertise. This is where Alert Logic can help. We will automatically show you why, where, and how to respond to vulnerability findings and provide you with short- and long-term recommendations to stop active attacks. To help guide the way, following are key considerations for providing sound web application security running on the AWS cloud.
Tags : 
    
Alert Logic
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts,risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, rackspace, pci, pci dss, payment security, compliance, cloud pci
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, cloud pci
    
Alert Logic and Sungard Availability Services
Published By: Amazon Web Services     Published Date: Feb 01, 2018
At Amazon, we’ve been investing deeply in AI for more than 20 years. Machine learning (ML) algorithms drive many of our internal systems, and have formed the core of our customers' experience —from the path optimization in our fulfillment centers, and Amazon.com’s recommendations engine, to Echo powered by Alexa, and our new retail experience, Amazon Go. Our mission is to share our learnings and ML capabilities as fully managed services, and put them into the hands of every executive, developer, and data scientist.
Tags : 
machine learning, algorithms, interal systems, amazon
    
Amazon Web Services
Published By: Aon Hewitt     Published Date: Aug 02, 2016
As the trend of moving to the Cloud continues to flow from business function to business function, other trends are emerging. As organizations transform to eliminate complex functions, standardize and integrate systems to reduce costs, and minimize nonvalue add activities, they are challenging themselves to get the most from their investment. The shift from transactional to strategic, and from reporting to actionable and predictive analytics, positions companies for growth like never before. Many organizations look to break down silos, not only within their company but also within their industries, to share lessons and leverage efficiencies from others’ learnings. Our recommendation is to start by breaking down any silos that exist between finance, HR, and IT within your organization today—and discover what moving to cloud and truly adopting the SaaS lifestyle can do for your organization.
Tags : 
aon, finance, cloud, human resources
    
Aon Hewitt
Published By: APC by Schneider Electric     Published Date: Feb 15, 2011
This paper analyzes several of these incidents and makes recommendations for how a basic monitoring system can help reduce the occurrence of these unanticipated events.
Tags : 
apc by schneider electric, monitoring systems, human error, distributed server rooms, remote wiring closet, downtime
    
APC by Schneider Electric
Published By: Artemis Health     Published Date: Aug 08, 2019
The benefits landscape is constantly shifting, and it’s hard for brokers and consultants to keep up with the latest best practices. The key to making great recommendations? Great data. In this whitepaper, you’ll discover: • How a data solution can offer actionable insights in just 1 hour a week • The advantages of a data platform for serving the entire book of business • How more brokers and consultants acknowledge data as a competitive advantage
Tags : 
    
Artemis Health
Published By: AT&T     Published Date: Jun 25, 2008
Whether you’re implementing new technologies, upgrading existing infrastructure or evaluating current needs, consultants can help you identify and document the gap between your current situation and a desired future state. When an assessment is done correctly, it can provide a solid foundation for successful implementation and improvement. The consultant first interviews stakeholders, analyzes data, and compares your business against best practices or specific industry competitors.
Tags : 
consulting, consult, consultant, management, expert, expertise, guidance, implementation
    
AT&T
Published By: Aternity     Published Date: Aug 26, 2011
This whitepaper provides insight, best practices, and recommendations for monitoring the end user experience within Virtual Desktop Infrastructures (VDI).
Tags : 
aternity, vdi, real end user experience, fpi, frontline performance intelligence, virtual desktop infrastructure, application performance, user productivity
    
Aternity
Published By: ATG, Inc.     Published Date: May 07, 2009
Create an e-commerce presence that's easy for merchandisers to manage, and improve the success of online recommendations. When Tommy Hilfiger looked to enhance its relatively limited online store in 2007, ease of use for merchandisers was the key priority.
Tags : 
atg, tommy hilfiger, commerce ondemand, automated merchandising, e-commerce, recommendations
    
ATG, Inc.
Published By: ATG, Inc.     Published Date: Apr 27, 2010
ATG-powered CondisLine.com offers a personalized online experience across channels, from a single commerce platform.
Tags : 
atg, condis, multi channel management, mcm, online shopping, commerce ondemand, automated merchandising, e-commerce
    
ATG, Inc.
Published By: Bazaarvoice     Published Date: Jan 09, 2013
Charles Schwab understands that customers make their best marketers, acquiring 40% of its new business through customer referrals. Charles Schwab shares best practices for financial services organizations to use in their decision to invest in social.
Tags : 
charles schwab, customer acquisition, customer referrals, customer recommendations, client ratings, customer experience, social media, customer experience/engagement
    
Bazaarvoice
Published By: BeyondTrust     Published Date: Apr 04, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage. Our 2018 re
Tags : 
    
BeyondTrust
Published By: BeyondTrust     Published Date: Apr 11, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage.
Tags : 
    
BeyondTrust
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.