personal

Results 326 - 350 of 1273Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: Mar 14, 2019
The EU General Data Protection Regulation (GDPR) is now in effect, requiring global organizations to significantly address how they process and protect the personal data of EU citizens. Confused about the requirements and what next steps to take? Read our GDPR eBook to learn about the regulation and its key requirements.
Tags : 
gdpr, data protection, regulation, data protection regulation, general data protection regulation, data discovery, breach response, compliance, data governance, personal data, european union, breach detection
    
Forcepoint
Published By: LexisNexis     Published Date: Mar 25, 2013
Achieving personal injury settlements can be a time-and-fact-intensive process. The settlement proposals Kashi develops often reference hundreds of documents-medical bills, medical chart notations and expert facts.
Tags : 
timemap, casemap, lexis nexis, legal solutions, quick settlement, effectiveness, reduced time and efforts, personal injury claims
    
LexisNexis
Published By: IBM     Published Date: Apr 11, 2016
In this IBM limited-edition Dummies book, you’ll learn what operational decision management (ODM) is and how it can benefit your organization by helping to: *Enable faster and more agile change so your business can react more quickly to opportunities and threats *Automatically capture knowledge so it can be reused to make better business decisions *Manage compliance better by providing a clear record of the rules that govern business operations *Make operational decisions more predictable and repeatable while also allowing you to model, measure, collaborate on and refine these decisions as your business needs change *Improve customer service with more consistent and accurate rules-based decisions, as well as by personalizing the user experience
Tags : 
ibm, odm, operational decision management, odm, business operations, knowledge management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Oct 13, 2016
Use big data to build an integrated, more personalized approach to marketing, business strategy, customer service and more.
Tags : 
ibm, analytics, data, mdm, ibm software, business strategy, customer service, knowledge management, enterprise applications, business technology
    
IBM
Published By: Egress ABM Pilot     Published Date: Oct 09, 2017
Patients trust healthcare organisations with vast amounts of their sensitive data – not just details on their medical and social wellbeing, but also personally identifiable information such as dates of birth and residential addresses. People will always make mistakes – and, unfortunately, in busy and stressful workplaces, such as hospitals and medical clinics, the likelihood of this increases. Without the right processes and technologies in place to help overcome this to avoid mistakes, sensitive patient information remains at risk.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
Egress ABM Pilot
Published By: Oracle     Published Date: Mar 01, 2019
Join Oracle’s Director CX Strategy EMEA Director, Harald Behnke and Daryn Mason, Independent Customer Experience Leader, as they list their top three hyped technologies, and discuss innovations such as conversational Interface, AI and IoT.In particular, customer experience is all about personalised intelligence at scale, and IoT connects product to Front Office with convenient new options. Find out what’s happening in customer experience across the globe, and get inspired by the smart revolution.
Tags : 
    
Oracle
Published By: Znode     Published Date: Jan 10, 2011
Using a Multi-Store Ecommerce Strategy to Significantly Increase Customer Acquisition. As Ecommerce becomes a leading strategy for businesses, online retailers are presented with a challenge: how to increase sales by personalizing the customer shopping experience and strengthening the brand. The solution is to develop a multi-store strategy that "divides and conquers" this challenge. Retailers can develop several online stores that cater to distinct customer demographics, optimize separate checkout flows based on product, or improve conversion rates in marketing campaigns.
Tags : 
znode, marketing, ecommerce, online distribution, retail, development, integration, erp
    
Znode
Published By: Vidyo, Inc.     Published Date: Aug 29, 2012
The value of video conferencing is well understood: a recent Frost & Sullivan survey of more than 200 C-level executives shows that the technology is in use in 51 percent of organizations, and is personally used by 41 percent of respondents.
Tags : 
vidyo, mobile, video conferencing, frost & sullivan, collaboration, videoconferencing, video conference
    
Vidyo, Inc.
Published By: Citrix Systems     Published Date: Jul 25, 2016
The modern enterprise workforce poses new challenges for IT. Today’s employees work in more places, on more devices— personal or company-owned—and over more networks than ever, using a diverse array of datacenter applications, mobile apps, SaaS and cloud services. As they move among apps, networks and devices, IT needs to be able to control access and ensure data and application security without impeding productivity. That means enabling users to get to work quickly and easily in any scenario without having to deal with different ways of accessing each app. Traditional VPNs and point solutions add complexity for both users and IT, increase costs and fail to enable a holistic approach to business mobility. Over the years, many IT organizations have addressed these evolving requirements through point solutions and by case-by-case configuration of access methods. The resulting fragmented experience poses a key roadblock to productivity and increases user frustration. For IT, the lack of a
Tags : 
    
Citrix Systems
Published By: LogMeIn     Published Date: May 15, 2012
The way in which consumers communicate is evolving; they are rapidly adopting communities, web self-service and social media for both personal and business interactions. Customer support organizations must adapt their strategies in order to provide effective online tools to engage with the customer on the customer's terms.
Tags : 
logmein, marketing, customer service, customer satisfation, customer feedback
    
LogMeIn
Published By: Data Stax     Published Date: Oct 05, 2016
Customers demand speed, convenience, and in-context experiences. Netflix, Mint Bills, and Clear Capital know their customers won’t give them a second chance. Learn how these leaders use DataStax Enterprise to provide an experience their customers can’t get anywhere else.
Tags : 
datastax, netflix, mint bills, digital, personalization
    
Data Stax
Published By: Data Stax     Published Date: Oct 14, 2016
Financial services companies engage with customers across multiple channels and across a range of financial products. This wealth of customer information is often stored in isolated data silos. Building a 360° view of the customer can directly impact customer experience and help banks grow customer retention, upsell products and provide compelling interactions. This paper examines the challenges these institutions face when creating a 360° view of every customer interaction, what database requirements the lines of business should look into, and use cases to benefit from by leveraging DataStax Enterprise, the database platform purpose built to power cloud applications.
Tags : 
datastax, netflix, mint bills, digital, personalization
    
Data Stax
Published By: Genesys     Published Date: May 14, 2013
Today, the gap between a customer’s expecta-tions and the service they receive is huge. Customers are increasingly knowledgeable about the products they use, and demand value-added, personalized customer service in real-time, using voice, text-based media types like email and chat, and social media.
Tags : 
genesys, customer service, social media, personalized customer service, text-based media, people management
    
Genesys
Published By: Sitecore     Published Date: Sep 15, 2014
5 essentials for turning advanced personalization solutions into bottom-line results.
Tags : 
delivering, personalized, experience, solution, results, visitors, test, customer, strategic, business, objectives, technologies, serendipity, automapping, mechanics, it management, business technology
    
Sitecore
Published By: KANA®, A Verint® Company     Published Date: Aug 14, 2014
In the words of Forrester Research Inc's Senior Analyst, David Aponovich, "the time is now to reinvent yourself to operate in a digital, connected, omnichannel world where the customer has more information, more choice, and is demanding better and more personalized service and support. Hear why he anticipates that 'Consumers are going to slide with the businesses that best deliver these things in the most effective and personal way.
Tags : 
kana, forrester, omnichannel, consumer, personalized service, support, customer service, knowledge management, enterprise applications
    
KANA®, A Verint® Company
Published By: Olapic     Published Date: Jun 05, 2018
Olapic is an innovator in visual content solutions, offering the technology and expertise to help brands create authentic, personalized, and effective customer experiences along their entire journey. Through user-generated content – content that is earned from consumers; influencer-generated content – content that is requested from specific creators; and enhanced branded content – existing image or long-form video content that is transformed into short form videos, Olapic helps brands get the right visual content, use it across marketing channels, and understand its impact on performance and ROI.
Tags : 
user generated content, content marketing, marketing trends, visual marketing, video marketing, brand building, brand marketing, social media marketing, customer marketing, increasing engagement, visual content, brand building, customer marketing, earned content, digital marketing strategies
    
Olapic
Published By: Kontiki     Published Date: Sep 16, 2014
Learn how to reach and engage remote employees within your organization and see how this will strengthen employee engagement, create personal connection with executives, and increase collaboration between teams and employees.
Tags : 
employee engagement, adoptions trends, solutions, best practices, video webcasting, internal communication, company-wide participation
    
Kontiki
Published By: SmartFocus     Published Date: Sep 04, 2015
1,75 Mrd. Menschen besitzen heute ein Smartphone. Somit können Ihre Kunden permanent online sein. Deshalb ist es für den Kampagnenerfolg entscheidend, das mobile Benutzererlebnis zu verstehen und sicherzustellen, dass alle Teile Ihrer Kampagne für die mobile Nutzung optimiert sind. Wenn Sie nicht handeln, leidet Ihre Kundenbindung. Schlimmstenfalls wandern Ihre besten Kunden zur Konkurrenz ab. Unsere einfach zu implementierenden Tipps fürs mobile Marketing können auch Ihnen helfen, Kampagneneffizienz zu steigern und Wettbewerbsvorteile zu sichern.
Tags : 
mobiles marketing, personalisierung, kontextualisierung, kundenreise, kundenverhalten, kundenerlebnis, kundenbindung, kundenbeziehungen, marketingstrategie, kampagnen
    
SmartFocus
Published By: ServiceNow     Published Date: May 21, 2015
The Internet has created radical changes in our personal lives. We now live in a “consumerized” online world where we shop for products and services with a few taps on a smartphone. Social media gives us a global forum where anyone can speak their mind. We see news as it unfolds, watch videos on YouTube, stream music from Spotify, and make friends on Facebook. We expect the web to be automated, on demand, and always on – delivering instant gratification no matter where we are.
Tags : 
consumerized, spotify, facebook, smartphone, purchase orders, it management
    
ServiceNow
Published By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Apr 11, 2018
Consumer technology trends are clearly driving the evolution of modern work. As consumers (i.e. employees) become more mobile, they want their work lives to be just as flexible and responsive to their needs. They want to be able to use their own device — instead of a company-issued device — for all their personal and business-related responsibilities. As a result, consumer choice is now the driving force behind mobile enterprise decisions, and demand for the traditional locked-down enterprise device is rapidly decreasing.
Tags : 
guide, unified, endpoint, management, consumers, business, device, enterprise
    
MobileIron
Published By: MobileIron     Published Date: Oct 29, 2018
For every mobile user, staying productive requires secure access to critical apps such as email, contacts, and calendar. These personal information management (PIM) apps are some of the most commonly used apps in the enterprise, so IT must ensure that users can seamlessly and securely access them on any device, including Android and iOS. The ultimate goal is to prevent data loss while preserving the native app experience users expect.
Tags : 
    
MobileIron
Published By: Mimecast     Published Date: Mar 13, 2017
The European Union’s General Data Protection Regulation (GDPR) is triggering a change in how organizations need to protect personal data, including data contained in email and contact databases. Regardless of your organization’s physical location, you must be in GDPR compliance for EU resident personal data by May 2018—or face dire consequences. Download the White Paper, to learn: • Why compliance requires unprecedented levels of effort if you control or process personal data • What specific security, privacy, and protection measures you need to take to comply with GDPR • How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and its associated penalties
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Dec 20, 2018
Over the last few years government agencies have been concerned with protection of personal data and consequences of data breaches on business and citizens. That’s driven businesses to look how rules and regulations can help guide organizations to build systems and processes that protect peoples data. Watch now to learn more.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. An “eligible data breach” will occur where: ? There is unauthorised access to, or unauthorised disclosure of, the information; and ? A reasonable person would conclude that the access or disclosure would be likely to result in serious harm to any of the individuals to whom the information relates The amended legislation provides greater clarity to Australian citizens about the privacy of their personal information and will affect Australian companies as well as international organisations with Australian operations. It also means that businesses must carefully think about the practical issues related to data breach responses and the disruptive consequences of any un
Tags : 
    
Mimecast
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee