ComputerWeekly.com Research Library

Powered by Bitpipe.com

Social Networking Research

  • Your Guide to Mobile Application Management

    Sponsored by: TechTarget Security

    This expert E-Guide answers your top questions about mobile application management, mobile device management, consumerization, BYOD, and much more – helping you empower your employees with the freedom of choice without compromising corporate security or control.

  • CIO Decisions E-zine: Collaboration and Social Media

    Sponsored by: TechTarget CIO

    This new edition of CIO Decisions e-zine explores how social collaboration is changing both IT and the enterprise as a whole and details how with the right approach to values, processes, strategies and thinking, IT leaders can leverage social collaboration to better serve business needs. Access now to learn more.

  • Tablets and Smartphones in the Enterprise: Risks and Management Concerns

    Sponsored by: TechTarget Security

    This IT Handbook from SearchConsumerization.com offers a number of ways that you can incorporate BYOD into your company without compromising security – giving your employees what they want and keeping your environment safe and manageable at the same time.

  • Integrating Mobile Device Management with UC Systems and Features

    Sponsored by: TechTarget Security

    This E-Guide from SearchUnifiedCommunications.com explores the issues with combining the unique communications services and interfaces of multiple mobile device operating systems with corporate unified communications (UC) strategies, and best practices to overcome these challenges.

  • The Dos and Don’ts of Social Media Analytics

    Sponsored by: TechTarget Business Analytics

    This three-part expert e-guide demonstrates how to tie social networking analytics to your unique organizational goals. Access now and you'll also learn ways to execute a business-focused social media strategy while mitigating obstacles.

  • E-Guide: Creating an Effective Social Analytics Program

    Sponsored by: IBM

    Read this e-guide to discover the tricks of effective social media analytics, including:knowing, up front, what you hope to achieve with the data; bringing in an analytics software vendor or service provider if you don't plan on analyzing large quantities of data; and using social analytics as a crisis aversion tool.

  • E-Guide: Social Analytics: Opportunities and Challenges

    Sponsored by: IBM

    Read this e-guide to learn how social media analytics can help businesses improve marketing by quantifying customer value at different stages of the life cycle, but also that they need tools like in-memory computing to provide real-time analysis of vast volumes of customer behavior data.

  • E-Guide: Harnessing Social Analytics

    Sponsored by: IBM

    In this e-guide, discover how social media analytics software leverages text analytics capabilities to reveal patterns, trends, and potential business problems within online discussions.

  • How to be influential online

    Sponsored by: TechTarget ComputerWeekly.com

    Web psychologist, Nathalie Nahai explains how to use the web and social media to communicate your message more effectively.

  • CW Special report on Wipro

    Sponsored by: TechTarget ComputerWeekly.com

    This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.

  • Tips and Best practices for Enterprise Social Software Adoption

    Sponsored by: IBM

    Most businesses today are aware of the benefits of social technologies, but many organizations are finding that simply deploying social tools isn't enough to ensure social success or user adoption. Read this e-guide to learn 4 steps that lead to enterprise-wide user adoption and the importance of establishing a collaborative environment.

  • Benchmarking in the contact center: Tips for managing what you measure

    Sponsored by: Avaya

    Benchmarking projects are a great way for contact center organizations to improve their operations in order to reconcile competing demands from customers and the business. Read this white paper to learn best practices for executing a successful contact center benchmarking project.

  • Social Recruiting Guide: How to Effectively Use Social Networks and Avoid Legal Risks

    Sponsored by: Oracle Corporation

    Social networking sites are some of the most powerful tools available to recruiters today. If you're not sure where to start with a social recruiting strategy, this paper will outline why social recruiting is becoming an imperative for companies today, what considerations you need to be aware of, and what first steps you can take.

  • Customer Care in a Social World: Are We There Yet?

    Sponsored by: Oracle Corporation

    This paper explores and explains why the contact center is a key strategic focal point for customer engagement via social channels.

  • The Anywhere Worker: Essential Tools to Keep Teams Connected

    Sponsored by: Citrix

    This white paper takes an in-depth look at the changing role of IT departments in the face of the demand to connect, collaborate and communicate with remote and in-office workers in a similar - if not near exact - fashion. Read now to learn about the best practices and tools available to make this a reality.

  • Cisco IBSG Global Research Reveals New Ways for Banks To Prosper in an Omnichannel World

    Sponsored by: Cisco Systems, Inc.

    Banking customers worldwide are ready for an omnichannel experience – are you ready to give it to them? This resource describes the concept of omnichannel banking, why your customers need it, and why you shouldn't wait to offer it to them.

  • The Social Business: Advent of a new age

    Sponsored by: IBM

    This paper outlines the why organizations need to become social businesses today. Read on to learn how your business can become social through crafting the right blueprint relying on networks, social and real-time collaboration, mobility and integration, how to deepen your customer relationships and the benefits associated with it, and much more.

  • Live and On-Demand: Streaming Video with LifeSize UVC Video Center

    Sponsored by: LifeSize

    Learn why video streaming has become a key part of the communications strategy of today's organizations, and how this tool can help you increase connectivity, save budget dollars, and boost productivity.

  • The mini-guide to social customer service

    Sponsored by: Salesforce.com

    Social media has fundamentally changed the world of customer service. This comprehensive guide outlines the keys to success to realize your social customer service potential. Learn why actively engaging with customers is imperative, 4 vital customer services areas to focus on, and more.

  • Gartner Magic Quadrant reveals fragmented social CRM market

    Sponsored by: Infor CRM

    This tip guide provides you with Gartner's expert insights into this fragmented social CRM market and predictions for the future of social CRM from their 2011 Magic Quadrant for Social CRM.

  • Social Customer Service: The Pivotal Driver of the Social Enterprise

    Sponsored by: LiveOps

    Read this paper to see how you can maximize your customer relationship management efforts through social customer service and foster brand loyalty, higher customer lifetime value, enhanced customer experience, and higher revenues.

  • Geoffrey Moore on Application Transformation –Part 2

    Sponsored by: Hewlett Packard Enterprise

    Watch this video featuring renowned author and venture capitalist Geoffrey Moore as he discusses the future of enterprise IT and specifically how your application strategy can take full advantage of the latest tools and technology from mobile, the cloud, social media and more.

  • The Quest for Killer SIP Apps

    Sponsored by: NACR

    Learn the benefits SIP can bring to your organization – helping you provide a heterogeneous UC environment to your users, increase enterprise mobility, ensure the delivery of communications applications, and more!

  • Bringing Order to the Chaos of “Bring Your Own Device”

    Sponsored by: Enterasys

    In order to fully accept the “Bring Your Own Device” (BYOD) trend in your enterprise, it is vital to find a solution that provides security, scalability, centralized policy, and a superior end-user experience. Learn how you can bring order to the chaos of BYOD, plus details of a solution that can help you achieve this.

  • Risk Management: Safeguarding Against a World of Threats

    Sponsored by: HP Enterprise Security

    Access this expert e-book to discover all the different components that make up a comprehensive risk management policy. Uncover the importance of accurate risk management metrics, why governance, risk, and compliance are a unified framework, 4 components your risk management strategy may be missing, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.