social

Results 251 - 275 of 2109Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 03, 2012
This white paper from IBM showcases five organizations that are strategically integrating emerging social software and tools with their existing investments and seeing measurable results in return on investment.
Tags : 
social business, ibm social software, global workforce, collaboration, social technology, online experience, web experience
    
IBM
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Sitecore EMEA     Published Date: Jan 23, 2018
The global beauty company provides an exhilarating example of the power of context-driven commerce. When customers can rely on brands to achieve the outcomes that are important to them, brand owners can shift their focus from nonstop customer acquisition to long-term customer engagement. The Sitecore Experience Platform and the underlying Sitecore Experience Database are foundation technologies for IT organizations wanting to implement context-driven commerce environments that function elegantly today and into the future. Sitecore puts an end to digital retailers’ obsession with cart abandonment, replacing it with opportunities to delight customers with personal, meaningful commerce offers.
Tags : 
advertising, revenue, customers, social channels, sitecore
    
Sitecore EMEA
Published By: Workday     Published Date: Feb 04, 2019
Human capital management technology plays a key role in helping organizations navigate the rise of the social enterprise, providing the ability to manage the full worker lifecycle, from recruitment to retention, and delivering the analytics needed to drive key business decisions. Read about the four steps businesses should take now.
Tags : 
workday, workforce technology, digital strategy
    
Workday
Published By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that can’t be patched: people. That’s why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employee’s inbox.
Tags : 
security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
    
Proofpoint
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
Published By: iCims     Published Date: Jan 24, 2017
here are many benefits to social recruiting. To start, social recruiting enables organizations to hire the best talent. This can be done by connecting, educating, and inspiring people through social networks. While some businesses have dabbled in the social arena, the majority are hesitant to fully pursue social recruiting.
Tags : 
    
iCims
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems UK
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems UK
Published By: Success Factors     Published Date: Feb 16, 2012
Do your leaders have what it takes to generate improved performance and execution from their employees. Get your report now, compliments of SuccessFactors, and ensure that your business has the leadership capital it needs.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy
    
Success Factors
Published By: Success Factors     Published Date: Feb 16, 2012
Attracting the best talent is a never-ending challenge. Learn five strategies for getting ahead, even in the worst business environments. Get your report now, compliments of SuccessFactors.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy
    
Success Factors
Published By: Success Factors     Published Date: Feb 16, 2012
With today's shortage of critical talent, strategic workforce planning is one of HR's most important responsibilities. Discover the common pitfalls that trap many companies-and how to avoid them. Get your compliments report from SuccessFactors now.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy
    
Success Factors
Published By: Success Factors     Published Date: Feb 16, 2012
These days, a company success depends on whether it hired the right people to effectively execute its strategies. Download this paper, compliments of SuccessFactors, and learn the critical questions you should ask before interviewing talent.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy
    
Success Factors
Published By: Success Factors     Published Date: Aug 22, 2012
This white paper discusses six ways to connect with high-quality candidates-from using high-quality descriptions to managing recruiting on the go, using social tools, forecasting your needs, partnering with learning managers, boosting your brand, and more. Learn how to use these approaches in your candidate search. Download your white paper today.
Tags : 
successfactors, sap, best practices, recruiting manager, talent powerhouse, candidate search, applicant search, high-quality candidate
    
Success Factors
Published By: Force.com     Published Date: Apr 11, 2012
As a result of IT departments struggling to adapt to new economic realities and a rapidly changing technology environment, a new applications layer is being developed - the social employee application layer. Find out more now!
Tags : 
    
Force.com
Published By: Force.com     Published Date: Sep 05, 2012
Aligning the Core Back Office with the Social Front Office in Today's Connected World
Tags : 
best connected businesses, back office salesforce, technology, computing
    
Force.com
Published By: Genesys     Published Date: Oct 16, 2013
The existing upgrade paths from legacy PBX and ACD suppliers make it difficult for contact center executives to contemplate the future of customer service on their own terms. If your ACD-based contact center has become a road block for adding capacity or adding channels such as social media and mobile, you might want to think about making the switch to a SIP-based contact center solution. SIP delivers two important advantages over legacy switching: 1. SIP is based on open standards, so you can choose hardware and software that is best suited for your environment. 2. SIP’s capability extends beyond voice to new media types such as mobile, social media and video. SIP-based contact centers provide a roadmap to sophisticated features without the complexity and expense of traditional proprietary ACDs. Learn more about how to build the next-generation customer service platform.
Tags : 
contact center, customer service, social media, mobile, sip, technology solution, technology
    
Genesys
Published By: Genesys     Published Date: Oct 16, 2013
Earlier this year, Gartner released the 2013 Magic Quadrant for Call Center Infrastructure, an annual report that analyzes call center infrastructure vendors for completeness of vision and ability to execute. Explore and compare contact center solutions from today's top vendors and decide which solution is right for you. This is the fifth consecutive year that Genesys has been named a worldwide Leader for Contact Center Infrastructure. The Genesys Customer Engagement platform (referred to as the Customer Interaction Management or ‘CIM’ platform in the report), is the industry’s most complete platform on which companies can deploy an all-in-one, end-to-end scalable contact center Get the 2013 Gartner Magic Quadrant for Contact Center Infrastructure now!
Tags : 
contact centers, business value, functions, applications, inbound, outbound calling, social media analytics, integration tools
    
Genesys
Published By: Peoplefluent     Published Date: Apr 02, 2013
Today’s “connected” generation is comprised of tech-savvy workers whose strengths must be harnessed for competitive advantage. Read how to reach “Gen C” and develop talent management strategies to attract, engage and retain this workforce segment.
Tags : 
collaboration, generation c, talent management, mobile, social, social hcm software, talent management software, talent management strategies
    
Peoplefluent
Published By: Peoplefluent     Published Date: Apr 02, 2013
HR has an important opportunity to drive enterprise social collaboration. Read how social technology enables employee productivity, how HR can add value to social communication, and how social tools can improve HR functions.
Tags : 
social, collaboration, social collaboration, enterprise social collaboration, social technologies, enterprise communication, social communication, social hcm
    
Peoplefluent
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.