bolt

Results 1 - 21 of 21Sort Results By: Published Date | Title | Company Name

3 Ways to Break Through Barriers to Omnichannel Success

Published By: ttec     Published Date: Jul 24, 2019
Omnichannel is one of those words everyone uses, but few use correctly. It’s not another word for multichannel. It’s a different state of existence. In our experience, multichannel is the ability to interact with customers across many different channels, but not necessarily in a cohesive fashion. As new channels become available, they are “bolted on” to existing customer experience infrastructure such as CRM or customer support systems. Too frequently, the management of these channels becomes siloed (web versus in-store sales, for example). The effect of this from the customer experience standpoint can be disjointed and jarring. For example, the resolution of an issue following a customer conversation with an associate in the contact center may not be reflected when the customer goes online or into a store. Yet the ability to offer multichannel service experience is table stakes for today’s business. If you’re not available in the channels where customers want you to be, you cease to b
Tags : 
    
ttec

End-To-End Server Security: The IT Leader's Guide

Published By: Dell EMC     Published Date: Feb 07, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell EMC

Use Technology to Empower Your Cash Management Strategy and Help Protect Profits

Published By: Western Union Business Solutions     Published Date: Oct 26, 2016
Download the eBook, “Using Technology to Help Protect Profits,” now to discover the nuts and bolts for building a successful risk management strategy, and see how new online tools, like the WU EDGE platform, can empower you at every step to help protect profits
Tags : 
cash flow hedge, cash flow tool, cash flow management, cash flow management tools, cash management strategy, currency risk management, foreign risk management, foreign currency risk management, foreign currency risk exposure, currency risk exposure, hedging fx risk, hedge fx risk, fx exposure, fx management, exchange risk management, foreign exchange risk, foreign exchange rate risk, forex risk management, exchange rate exposure, foreign exchange exposure
    
Western Union Business Solutions

PPM Tool Selection: It Matters

Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Project and portfolio management or PPM software can make or break an organization’s ability to deliver. The recent growth in portfolio management as a strategic business function has led to many vendors of software related to elements of project execution “bolting on” project and portfolio management (PPM) modules. This is a clear attempt to try and get a piece of a growing, lucrative market. Twenty five years ago, PPM software was nothing more than project management software with the ability to publish or share information across projects. It was capable of doing a lot, but none of it was intuitive and therefore wasn’t particularly useful. Compared to today’s solutions, those products were dinosaurs. Since then, many vendors have invested a lot of money into their solutions, developing world-class offerings that can truly support effective management of the portfolio, and, more important, of the business that portfolio drives.
Tags : 
    
CA Technologies EMEA

End-To-End Server Security: The IT Leader's Guide

Published By: Dell     Published Date: Feb 02, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell

The Essential Guide to Personalisation

Published By: Monetate     Published Date: Jun 15, 2018
Personalisation for retail customers has advanced well beyond segmentation to include real one-to-one connections made in real-time. not only are consumers expecting hyper-personalized experiences across all touches, but companies who are able to implement them are seeing unprecedented growth and a new level of customer loyalty. This essential guide walks you through personalisation from the nuts and bolts of what it can do, through 5 levels of implementation that businesses can use to benchmark their path to increased revenue. In the guide you’ll learn: • The latest advancements in personalisation technology and what companies can expect to gain with implementation. • Four myths about personalisation that may be holding your company back. • Tips for getting started and 5 benchmarking levels to help you create a personalisation roadmap for your company. • Eight questions to ask when shopping for a personalisation partner that will help you ensure you are getting the right tools a
Tags : 
    
Monetate

Measure Up: Mobile Testing

Published By: Oracle OMC     Published Date: Oct 26, 2018
Mobile Device and Audience Testing: Difference between mobile, web, and apps 4 steps to Shaping Mobile Experience The Nuts & Bolts of Testing 7 Ways to Speed Development Time for Your Tests
Tags : 
    
Oracle OMC

Put Mobile First: A 3-Step Guide to Help You Get Started

Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Companies today can’t just “bolt on” mobile capabilities. To succeed, you have to put mobile first. Read—Moving Beyond BYOD to Mobile First: A 3-Step Approach for CIOs—to learn how a making mobile a core part of your IT strategy increases revenue.
Tags : 
mobile collaboration, byod management, byod solutions, byod strategy, enterprise collaboration, enterprise mobility, mobile device management
    
Good Technology Corporation

5 Critical Requirements for Customer Experience in an Ultra-Connected Era

Published By: Genesys     Published Date: Feb 08, 2019
Customers today expect their customer service to be as connected as they are. If you can’t deliver a seamless omnichannel customer experience or easily add digital channels such as mobile, social media and web, you risk being left behind. Some companies try to deliver omnichannel with dated technology, a tangle of point solutions, bolted together with duct tape. But you don’t have to. Read this ebook and see: Why force-fitting more channels into an aging infrastructure is not the right approach How to create a future-ready customer experience How an integrated approach improves your metrics and reduces operating costs
Tags : 
    
Genesys

5 Critical Requirements for Customer Experience in an Ultra-Connected Era

Published By: Genesys     Published Date: Feb 12, 2019
Customers today expect their customer service to be as connected as they are. If you can’t deliver a seamless omnichannel customer experience or easily add digital channels such as mobile, social media and web, you risk being left behind. Some companies try to deliver omnichannel with dated technology, a tangle of point solutions, bolted together with duct tape. But you don’t have to. Read this ebook and see: Why force-fitting more channels into an aging infrastructure is not the right approach How to create a future-ready customer experience How an integrated approach improves your metrics and reduces operating costs
Tags : 
    
Genesys

Load Balancing 101: Nuts and Bolts

Published By: F5 Networks Inc     Published Date: Jan 22, 2009
The pervasiveness of load balancing technology does not mean it is universally understood, nor is it typically discussed other than from a basic, network-centric viewpoint. This White Paper thoroughly explains load balancing and strips away some of the mystery and magic from basic load balancing practices.
Tags : 
load balancing technology, load balancing, networking, ip networks, ip telephony, server virtualization
    
F5 Networks Inc

Don’t bolt on your data center security after the fact. Build it in for comprehensive protection.

Published By: McAfee     Published Date: Feb 06, 2013
By building in comprehensive security measures at the design and architectural phase of data center build-outs, organizations can optimize business-critical service availability and minimize potential downtime.
Tags : 
data center, data center security, server virtualization, cloud computing, data center deployment, virtual data center, next generation data center, hybrid data center, virtual machines, virtualization, infrastructure, infrastructure management
    
McAfee

The Nuts and Bolts of T&E Policies

Published By: Concur Technologies     Published Date: Oct 09, 2015
Millions in losses, millions more in fines. Yet research shows 82% of travel and entertainment fraud is committed by just 5% of employees. This eBook explains what’s at stake and how automating expense reports can uncover fraud or head it off before it happens, and help employees make the right choices.
Tags : 
t&e, concur, compliance, financial services, fraud
    
Concur Technologies

Building Smarter Defenses

Published By: Infosys     Published Date: May 22, 2018
When one of our client's most strategic web applications was hacked, it was something of a wake-up call. Application security is surprisingly often an afterthought, and serious investment is only sometimes made when security breaches are discovered. Effectively, companies try to close the stable door after the horse has bolted. However, preventive security maintenance of apps is far more cost-effective and less damaging than reactive security. Our client therefore asked us to put in place an app security testing program early in the development life cycle to reduce the chances of similar breaches in the future.
Tags : 
security, technology, data, app, device, web
    
Infosys

The Essential Guide to Personalization

Published By: Monetate     Published Date: Apr 06, 2018
Personalization for retail customers has advanced well beyond segmentation to include real one-to-one connections made in real-time. Not only are consumers expecting hyperpersonalized experiences across all touches, but companies who are able to implement them are seeing unprecedented growth and a new level of customer loyalty. This essential guide walks you through personalization from the nuts and bolts of what it can do, through 5 levels of implementation that businesses can use to benchmark their path to increased revenue. In the guide you’ll learn: • The latest advancements in personalization technology and what companies can expect to gain with implementation. • Four myths about personalization that may be holding your company back. • Tips for getting started and 5 benchmarking levels to help you create a personalization roadmap for your company. • Eight questions to ask when shopping for a personalization partner that will help you ensure you are getting the right tools and expe
Tags : 
    
Monetate

Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks

Published By: Palo Alto Networks     Published Date: Dec 11, 2013
Legacy firewalls aren't designed to address today's complex network traffic consisting of applications, users, and threats. They rely on outdated technology. Read how a new modern security platform safely enables any technology and application. - Learn why yesterday's methods can't handle today's cyberthreats - Find out if your firewall has the ability to see and control traffic, and prevent APTs - Discover how you can deliver modern security without compromising performance - Read why bolt-on security is a costly approach to security
Tags : 
cybersecurity, firewalls, palo alto, technology, application, network traffic security, prevent atps, application security
    
Palo Alto Networks

Preventing Proxy Abuse in Schools

Published By: SmoothWall     Published Date: Jun 03, 2009
Proxy abuse is an increasingly pervasive problem in schools. It only takes one anonymous proxy to put a gaping hole in your network security. Using a web filtering solution that doesn't block proxies is the equivalent of putting a big bolt on your front door but leaving the back door wide open.
Tags : 
smoothwall, web filtering, anonymous proxies, anonymizers, proxy abuse, ssl proxies, web content filtering, school web filtering, access control, anti spam, anti spyware, anti virus, application security, encryption, firewalls, phishing, ssl
    
SmoothWall

How to Socially Enable Your Contact Center

Published By: Oracle     Published Date: Nov 27, 2013
Social-enabled customer service requires three primary capabilities. The capability to: 1. Listen and Respond: Treat Social Media as an Integrated Interaction Channel Most social-enabled contact centers are at the early adopter stage, attempting to “bolt on” social media as a side process. Many are experiencing inconsistent customer experiences, higher costs and negligible return on investments. Download this White Paper for more info.
Tags : 
contact centers, business value, functions, applications, inbound, outbound calling, social media analytics, integration tools, mobile crm tools, technology, knowledge management
    
Oracle

How to Socially Enable Your Contact Center

Published By: Oracle     Published Date: Nov 27, 2013
Social-enabled customer service requires three primary capabilities. The capability to: 1. Listen and Respond: Treat Social Media as an Integrated Interaction Channel Most social-enabled contact centers are at the early adopter stage, attempting to “bolt on” social media as a side process. Many are experiencing inconsistent customer experiences, higher costs and negligible return on investments. Download this White Paper for more info.
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing, lead quality, lead scoring, sales automation, sales channels, sales force automation, sales management, knowledge management
    
Oracle

23 Reasons Why Companies Choose Integrated XBRL

Published By: IBM Business Analytics     Published Date: Jun 23, 2011
Companies globally must determine the approach to compliance with mandated use of XBRL and significantly accelerating financial reporting. Here are 23 reasons to why an integrated approach towards external reporting is required by organizations today.
Tags : 
ibm business analytics, integrated xbrl tagging, extensible business reporting language, bolt-on, tag once, taxonomy collaboration, validation, xhtml, business analytics, business intelligence, business management, business metrics, analytical applications, financial management
    
IBM Business Analytics

Five Critical Requirements for Customer Experience in an Ultra-Connected Era

Published By: Genesys     Published Date: Dec 20, 2018
Customers today expect their customer service to be as connected as they are. If you can’t deliver a seamless omnichannel customer experience or easily add digital channels such as mobile, social media and web, you risk being left behind. Some companies try to deliver omnichannel with dated technology, a tangle of point solutions, bolted together with duct tape. But you don’t have to. Read this ebook and see: • Why force-fitting more channels into an aging infrastructure is not the right approach • How to create a future-ready customer experience • How an integrated approach improves your metrics and reduces operating costs
Tags : 
    
Genesys
Search      

Add Research

Get your company's research in the hands of targeted business professionals.