rsa

Results 176 - 200 of 575Sort Results By: Published Date | Title | Company Name
By: Brainshark     Published Date: Apr 24, 2015
This exclusive report takes an in-depth look at the sales productivity problem, with a focus on the role content plays in enabling more effective and efficient sales conversations.
Tags : sales marketing alignment, sales content, sales enablement, content marketing, product marketing, sales productivity, sales effectiveness, sales management, sales training, sales meetings, sales coaching, sales performance
     Brainshark
By: Box     Published Date: Nov 12, 2014
Box for Salesforce lets sales teams easily access, manage, and share contracts, presentations, and more, all from within Salesforce. Learn how Boc helps sales people accelerate the sales cycle, streamline the sales process, and drive compelling customer conversations.
Tags : sales teams, management, sales cycles, streamline sales, customer conversations
     Box
By: BitSight Technologies     Published Date: Jan 27, 2016
During this webinar, BitSight CTO and Co-Founder Stephen Boyer shows you how to use Security Ratings to quickly and accurately assess the security risk an acquisition target (or other third party) brings to your information ecosystem.
Tags : cybersecurity, security risk, acquisition target, security ratings, risk-based conversations, security, it management, enterprise applications
     BitSight Technologies
By: IBM     Published Date: Aug 16, 2016
In this executive report, based on cumulative research over the past five years by the IBM Institute for Business Value we will explore how the emergence of digital technology, and the increasing willingness of consumers to use it, has disrupted the retail industry at virtually every level – from shoppers, to megastores, to digital to social media, and more. Further, we will provide recommendations that can enable retailers to position themselves to slice through this disruption and provide seamless, omnichannel customer experiences and conversations that can help build customer loyalty, create value and positively impact the bottom line.
Tags : ibm, commerce, retail, customer analytics, ibm institute for business value, digital technology, enterprise applications
     IBM
By: IBM     Published Date: Oct 28, 2016
In this webinar, you will learn: - How to create a safe environment for honest feedback so it’s an invitation, not an imposition - Best practices for collecting feedback, from unstructured conversations to regular pulse surveys - What to do with the data you’ve collected, and how to use insights to create action plans that result in happier employees and better business performance
Tags : ibm, engagement social, employee engagement, kenexa, enterprise applications
     IBM
By: Genesys     Published Date: Feb 21, 2018
Artificial Intelligence (AI) is staggering in its speed of handling simple requests and automating conversations. But AI solutions are not enough for the best customer experiences. Human emotions sometimes demand the human touch that only live agents can provide. Kate, Customer Experience AI by Genesys, combined with the power of human touch can improve customer experience, empower employees and dramatically reduce costs. This seamless combination of AI technology and humans, or “Blended AI by Genesys,” addresses the entire customer journey for the best possible outcomes. Download the eBook and learn how Kate and Blended AI lets you: • Personalize self-service • Connect customer conversations • Create smart agent experiences • Start small and deploy fast with MicroApps
Tags : artificial intelligence, customer experience, automation, genesys
     Genesys
By: Genesys     Published Date: Feb 22, 2018
Bots and automation collide with the power of human touch. Artificial Intelligence (AI) is staggering in its speed of handling simple requests and automating conversations. But AI solutions are not enough for the best customer experiences. Human emotions sometimes demand the human touch that only live agents can provide. Kate, Customer Experience AI by Genesys, combined with the power of human touch can improve customer experience, empower employees and dramatically reduce costs. This seamless combination of AI technology and humans, or “Blended AI by Genesys,” addresses the entire customer journey for the best possible outcomes. Download the eBook and learn how Kate and Blended AI lets you: • Personalize self-service • Connect customer conversations • Create smart agent experiences • Start small and deploy fast with MicroApps
Tags : artificial intelligence, customer experience, automation, genesys
     Genesys
By: Monotype     Published Date: Feb 15, 2018
Technology is blurring geographic boundaries, bringing cultures together and connecting brands with consumers across the globe. But for brands trying to serve a global customer base, that can pose a real challenge. Fortunately, something as (seemingly) simple as fonts can help. This eBook highlights a few ways type can transform your global brand, as well as a few guidelines to help you get the conversation started.
Tags : branding, marketing best practices, branding best practices, customer experience, global brand, monotype, marketing, design, digital advertising, web fonts, global marketing, emerging marketing, user experience, display advertising, creative, responsive advertising, dynamic advertising, mobile advertising, creative professionals, customer marketing
     Monotype
By: Sprinklr     Published Date: Feb 28, 2018
"Retail depends on social. Social depends on you. Learn best practices for building a better retail experience through social. To help kick-start your planning, we've gathered our most popular retail content in ""Social Strategies for Retail."""
Tags : social strategies, retail, social media, consumers, digital, social media, social, physical locations, data, social conversations, visual experiences, sprinklr, consumer reviews, consumer ratings, location intelligence, social engagement, marketing strategy
     Sprinklr
By: IBM     Published Date: May 23, 2017
IBM DB2 with BLU Acceleration helps tackle the challenges presented by big data. It delivers analytics at the speed of thought, always-available transactions, future-proof versatility, disaster recovery and streamlined ease-of-use to unlock the value of data.
Tags : cloud strategy, database projects, disaster recover, geographic reach, large database, ibm, analytics, management optimization
     IBM
By: IBM     Published Date: Nov 08, 2017
IBM DB2 with BLU Acceleration helps tackle the challenges presented by big data. It delivers analytics at the speed of thought, always-available transactions, future-proof versatility, disaster recovery and streamlined ease-of-use to unlock the value of data.
Tags : ibm, cloud, cloud computing, database, ibm db2
     IBM
By: CrowdStrike     Published Date: Aug 01, 2017
Download this white paper to learn:?The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence?How fileless attacks exploit trusted systems —the types of processes compromised, the specific exploit tactics used to gain a foothold, and more?Why traditional technologies fail to protect against fileless attacks and what you can do to better defend your organization against them
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Feb 05, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries,investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence, Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security pos
Tags : 
     CrowdStrike
By: CyberX     Published Date: Aug 21, 2017
Today, a range of diverse cyber-adversaries — including nation-states, cybercriminals, competitors, hacktivists, and insiders/contractors — pose financial, reputational and regulatory risk to industrial and critical infrastructure organizations. The business impact can include costly production downtime, safety failures, and environmental release of hazardous materials, as well as theft of corporate secrets such as sensitive information about formulas and proprietary manufacturing processes. The challenge is compounded as organizations adopt digitization initiatives and IT/OT convergence to support the business — removing any “air-gaps” that may have existed in the past. To help security and operations teams stay ahead of the latest ICS/SCADA threats, CyberX — the industrial cybersecurity company founded by military cyber experts with nation-state experience securing critical infrastructure — has partnered with SANS to create educational content about emerging ICS threat vectors and
Tags : ics, scada, cyberx, cyber security, hacking, randomware
     CyberX
By: Datastax     Published Date: Nov 07, 2017
Regular customer experience solutions just segment and stereotype their customers and perform in a sort of action-reaction, request-response manner, rather than being instantly responsive. Being responsive means adjusting to each additional interaction and observed behavior, and making every action, every click, every scroll, every email, every second spent on your app part of a larger conversation. You need to have the systems in place that can effectively engage a customer in that conversation and not just analyze it with historical data or after the fact.
Tags : 
     Datastax
By: Riversand     Published Date: Oct 30, 2017
MDM can add value to the business in many different ways. It most often does so indirectly, as an enabler for other business and IT initiatives. Some of these areas of potential benefit support shorter-term or tactical efforts at helping the business operate more efficiently — that is, they help to reduce the cost bases to "run the business." Some benefit areas of MDM are related more to helping users "grow the business." That is, they help to increase the revenue and market share within a given business model or framework. Yet other areas of opportunity fall into the "transform the business" arena — for example, allowing customer support representatives to perform inside sales activities enabled by trusted customer and product master data.
Tags : 
     Riversand
By: Group M_IBM Q1'18     Published Date: Jan 23, 2018
IBM DB2 with BLU Acceleration helps tackle the challenges presented by big data. It delivers analytics at the speed of thought, always-available transactions, future-proof versatility, disaster recovery and streamlined ease-of-use to unlock the value of data.
Tags : db2. blu accelaration, big data, data analytics, disaster recovery
     Group M_IBM Q1'18
By: IBM     Published Date: Apr 19, 2018
IBM DB2 with BLU Acceleration helps tackle the challenges presented by big data. It delivers analytics at the speed of thought, always-available transactions, future-proof versatility, disaster recovery and streamlined ease-of-use to unlock the value of data.
Tags : db2, data migration, ibm, oracle
     IBM
By: IBM     Published Date: May 09, 2018
Does the future of digital trust lie in artificial intelligence (AI)? Join the conversation between Valerie Bradford, product marketing manager at IBM Security, and Andras Cser, vice president and principal analyst serving security and risk professionals at Forrester, to discover how AI is changing the landscape of digital identity. Key takeaways: Understand how AI is helping organizations respond to current changes in the threat landscape. Examine how companies are using AI to establish trust in digital identities. Hear how AI is changing the end-to-end customer journey by improving the digital experience.
Tags : digital trust, security, digital identity
     IBM
By: LogMeIn     Published Date: Feb 27, 2018
When Facebook released their bot feature, M, the virtual assistant living inside their Messenger platform, it was billed as the next generation of how people connect and interact with the internet. Since then, over 18,000 companies have created their own branded chatbots with the help of Facebook’s platform. Never ones to miss out on a trend, Microsoft, Google and Apple have all been hard at work developing their own integrated chatbot features. Brands of all shapes and sizes, from American Express to 1800-Flowers to Domino’s Pizza, all have their own chatbots, proving the versatility of the concept. As Microsoft CEO Satya Nadella said at the 2016 Build conference, “As an industry, we are on the cusp of a new frontier that pairs the power of natural human language with advanced machine intelligence.”
Tags : 
     LogMeIn
By: LogMeIn     Published Date: Feb 27, 2018
Customer service organizations are struggling to react to the pace of innovation and the explosion of channels and devices. To get ahead of these challenges, AD&D pros must deeply invest in automation — automated answers, automated conversations, automated agent guidance, and automated end-to-end processes. They must also invest in intelligence to ensure automated technologies evolve and learn from prior interactions over time. Automation and intelligence quell the headcount increases. They will free agents from working on low-value or repetitive tasks, as they will only have to address highly complex customer scenarios or exceptions to standard operations. This also enables them to focus on building connections with customers to garner their satisfaction and loyalty.
Tags : customer, service, operations, optimization
     LogMeIn
By: Eaton     Published Date: Jun 12, 2018
We’re all human and we all make mistakes. But mistakes in the electrical field can prove costly. Codes and standards work together to reduce mistakes and save lives, which is what makes NEC (National Electrical Code) Section 240.87, Incident Energy Reduction, so significant.
Tags : 
     Eaton
By: Iterable     Published Date: Sep 07, 2018
Since the term “omni-channel” was first coined by the Harvard Business Review in 2011, some marketing technology vendors claimed that they could provide businesses with this holy grail of brand ubiquity. Unfortunately, most of these early claims were false starts where vendors over-promised and under-delivered. The good news is that a select number of solutions have caught up with all the promises and can now turn them into action. In this guide, we explain why the conversation around omni-channel marketing has changed and how you can transform your marketing strategy to leverage this new, powerful technology. We’ll give you a heads up on the roadblocks you’ll encounter on your journey to achieving omni-channel relevance and the benefits you’ll gain once you reach your destination. No highfalutin jargon, no talking in circles and no nonsense. Just practical advice on how to create a superb customer experience.
Tags : 
     Iterable
By: SEMrush     Published Date: Nov 30, 2018
No matter how many “common rules” and “universal laws” of SEO have been invented over the years, certain tasks require a unique approach. At SEMrush, we use your feedback as the main source of insights and ideas for our future tools. We thoroughly analyse our customers’ workflow so that the tools we build are of maximum value to their users.
Tags : seo, semrush, e-commerce, market analysis, strategy
     SEMrush
By: Group M_IBM Q119     Published Date: Dec 20, 2018
In Forrester's evaluation of the emerging market for conversational computing platforms, we identified the seven most significant providers — Amazon, Google, IBM, Microsoft, Nuance Communications, Oracle, and Rulai — in the category and evaluated them. This report details our findings about how each vendor scored against nine criteria and where they stand in relation to each other. Application developers should use this review to select the right partners for their conversational computing platform needs.
Tags : 
     Group M_IBM Q119
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com