digital guidance

Results 1 - 12 of 12Sort Results By: Published Date | Title | Company Name
Published By: Moxie     Published Date: Nov 01, 2017
Boscov’s is a family-owned retailer established over 100 years ago and has grown to a billion-dollar company. Boscov's eCommerce team partnered with Moxie to remove barriers in the online customer journey with a blend of innovative digital guidance and assisted channels that have increased sales and productivity.
Tags : 
ecommerce, customer journey, digital guidance, assisted channels, digital commerce
    
Moxie
Published By: Moxie     Published Date: Nov 01, 2017
Get an insider’s view on the newest contextual guidance tool that is expanding customer relationships through a virtual online concierge.
Tags : 
customer relationships, virtual online concierge, digital guidance, customer experience, customer engagement
    
Moxie
Published By: Venafi     Published Date: Aug 10, 2015
This paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches.
Tags : 
attacks, cyberattacks, protect certificates, how to remediate breaches, security, security applications
    
Venafi
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: Oracle     Published Date: May 13, 2017
Each chapter is illustrated by examples from successful businesses that have embraced digital technologies and the best practices being implemented so that CFOs and their finance teams have the opportunity to become the new organisational wide digital guidance system for their business.
Tags : 
modern finance, digital age, cloud, social, mobile, big data, big data analytics, digital transformation
    
Oracle
Published By: Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017     Published Date: Jul 12, 2017
Relentless digital developments have created the chance for the finance team to become true strategic leaders across the business—but they have also raised expectations and generated new challenges. In this digibook, we explore the growth of cloud, social, mobile and big data, and how smart CFOs are taking advantage. We show how to use your big data analytics and smooth procurement systems as a launchpad to holding your own in the Digital Age. Each chapter is illustrated by examples from successful businesses that have embraced the new ways of working as well as guidance on how to plan for and implement the changes that are right for you.
Tags : 
data analytics, digital age, digital transformation, cloud, big data, growth
    
Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017
Published By: Teradata     Published Date: Feb 04, 2015
The Enterprise Priorities in Digital Marketing report, produced by Econsultancy in partnership with Teradata, provides guidance for the future through specific benchmarks from digital marketing leaders at enterprise organizations. The report focuses on the technology priorities of the world's largest companies, the strategies they support and the marketing budgets with which they're aligned. The report is based on an international survey of 402 senior marketers (director and above) from global enterprises. Respondents were from companies with more than $500 million in revenue, with 56% having revenues over $3 billion.
Tags : 
teradata, marketing, strategic direction, attribution, cloud, application, audience, management, conversion, data, platform, social, tag, content, email, technology, digital, retention, media, measurement
    
Teradata
Published By: K2     Published Date: Jan 07, 2016
The business context for process excellence and business process management (BPM) has changed dramatically since the 2009-to-2010 recession. During the recession, BPM software and services saw impressive double-digit growth as a result of enterprises slashing costs and boosting worker productivity. Now, executive agendas have shifted to focus on growing revenue, expanding the customer base, and delivering new digital products and services. Enterprise and process architects are reshaping their business cases for BPM around these new drivers. This is not an easy task. However, process excellence will play a critical role for forward-thinking enterprise architects that invest the time to link BPM to new front-office drivers to help the organization drive digital transformation. This report replaces “Building The Case For Your BPM Initiative” in the business process management playbook and provides guidance on developing revenue and customer-focused business cases.
Tags : 
bpm, business process management, process excellence, best practices
    
K2
Published By: IBM     Published Date: Jul 22, 2016
"Increasingly, brands are looking to differentiate based on an exceptional customer experience. The key to improving the customer experience is being able to effectively measure what’s working and what you need to improve. IBM host a webinar presenting tips on how to measure the customer experience for your brand and how to use that data to build better journeys. Please join IBM and guest speaker Andrew Hogan from Forrester Research as we share tips on how to best measure the digital experiences customers have with your brand and how to use that information to build better journeys. The webinar will provide attendees with: • Best practices to measure the quality of digital customer experiences • Guidance on the kinds of tools to use to capture the right CX metrics • Tips for integrating metrics, including the role of customer journeys • Techniques to drive action and improve digital experiences"
Tags : 
ibm, commerce, customer analytics, marketing, customer experience, customer insight, forrester, digital experience, crm & customer care, marketing research, traditional marketing
    
IBM
Published By: IBM     Published Date: Aug 17, 2016
The webinar will provide attendees with: - Best practices to measure the quality of digital customer experiences - Guidance on the kinds of tools to use to capture the right CX metrics - Tips for integrating metrics, including the role of customer journeys - Techniques to drive action and improve digital experiences"
Tags : 
ibm, customer experience, commerce, digital, digital customer experiences, cx metrics, crm & customer care
    
IBM
Published By: IBM     Published Date: Oct 12, 2016
Please join IBM and guest speaker Andrew Hogan from Forrester Research as we share tips on how to best measure the digital experiences customers have with your brand and how to use that information to build better journeys. The webinar will provide attendees with: - Best practices to measure the quality of digital customer experiences - Guidance on the kinds of tools to use to capture the right CX metrics - Tips for integrating metrics, including the role of customer journeys - Techniques to drive action and improve digital experiences"
Tags : 
ibm, commerce, customer analytics, customer experience, forrester research
    
IBM
Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: