> White Papers > Technology > Enterprise Applications

Enterprise Applications

Enterprise Application software performs business functions such as accounting, production scheduling, customer information tracking, bank account maintenance, and the like. It is almost always hosted on servers, and is used by multiple employees of the same organization. Major subcategories include ERP, CRM, and SCM.
Results 1 - 25 of 6110Sort Results By: Published Date | Title | Company Name
By: destinationCRM.com     Published Date: Apr 15, 2015
It's no secret that the use smart phones is exploding. According to a recent report from the Pew Research Center, 34% Americans go online mostly using their phones, and not using some other device such as a desktop or laptop computer. The implication for location based marketing and ecommerce, customer service, and personalized, permission based marketing is enormous, but the rules of engagement are markedly different for mobile communications.
Tags : mobile data, customer engagement, crm, customer data, smartphones
By: destinationCRM.com     Published Date: Mar 25, 2015
The Golden Rule of treating others as you would like to be treated yourself is never more true than in the contact center. Creating an intelligent contact center embodies the essence of the Golden Rule by creating consistent, effective, and efficient methods of delivering customer service, regardless of the customer channel, and being fully integrated with the entire enterprise.
Tags : crm, contact center, contact center intelligence, business intelligence, customer data
By: destinationCRM.com     Published Date: Mar 18, 2015
According to Forrester Research group, "Personalizing Customer Service Interactions" is among the top key trends facing customer service organizations today and a driving trend in 2015. Knowing a customer's history, communications preferences, and other unique data points is crucial to delivering a personalized and customized experience.
Tags : crm, customer data, customer personalization, prospects, business intelligence
By: destinationCRM.com     Published Date: Mar 11, 2015
Your Sales, Marketing and IT teams have put all of their energy into customizing and rolling out the perfect Salesforce system. But right after launch, someone realizes that the team has committed this terrible (and common) mistake. The reports are inaccurate, notes aren't being recorded and customer data is either duplicated or missing. What's going on?
Tags : informatica, salesforce, records management, crm, salesforce
By: Arcserve     Published Date: Feb 26, 2015
In typical organizations, most data resides outside the data center, so it is important that the protection of desktop and laptop computers is given the same priority as file servers and application servers. Have you deployed the right data protection strategy for endpoints? We’re here to help! Arcserve UDP offers a FREE Workstation edition product that specifically focuses on backing up data on endpoints. Not only can desktops and laptops be protected for FREE with award-winning technology that minimizes bandwidth and storage requirements, but they can participate in the global deduplication schema offered by UDP (for 30 days), and have their data protected in public and private clouds, and more! This is too good to pass up! Get your FREE Arcserve UDP Workstation edition now.
Tags : arcserve, unified data protection, software download, bandwidth, deduplication
By: Sitecore     Published Date: Feb 26, 2015
Discover the overall state of Web Content Management (WCM). This report echo’s other recent analyst publications, showing recognition of Sitecore’s leadership in the industry.
Tags : customer service, content management, vendors, digital experience, optimization
By: Sitecore     Published Date: Feb 25, 2015
Choosing the right web content management system plays a central role in the ultimate success of your Internet strategy.
Tags : customer service, content management, vendors, digital experience, optimization
By: Sitecore     Published Date: Feb 25, 2015
Are too many technologies preventing you from having a single customer view? Find out the latest customer lifetime value trends in the new Forbes Insights report.
Tags : content management, vendors, digital experience, optimization, web page
By: Sitecore     Published Date: Feb 25, 2015
Sitecore is named as a Leader in The Forrester Wave™ Web Content Management Systems, Q1 2015.
Tags : content management, vendors, digital experience, optimization, web page
By: IBM     Published Date: Feb 24, 2015
In an unpredictable world, forecasting errors are unavoidable. This webinar offers some valuable guidance, in the form of Six Principles of Forecast Mastery, which point the way to a better future. Watch today and learn why treating forecast error as a friend can help you improve your organization's performance.
Tags : forecasting errors, quality forecasting, best practices, business performance solutions, knowledge management
By: IBM     Published Date: Feb 24, 2015
Mobile capture is quickly becoming an important differentiators for many companies and organizations, especially those in traditionally document-intensive fields like banking, insurance, healthcare and government operations. According to a 2014 study conducted by AIIM, 45% of companies feel that mobile capture is vitally important, pointing to the competitive need for improved process agility and customer service across the board. Discover the top 10 questions to ask before you make your investment in mobile capture.
Tags : mobile capture, ibm, process agility, customer service, it management
By: IBM     Published Date: Feb 24, 2015
Read this report from AIIM to discover what issues on-premise ECM users are facing, how external collaboration support is managed, what cloud and mobile functionalities users are requesting, and what alternative scenarios are being considered.
Tags : ibm, ecm, ecm users, mobile funtionalities, cloud functionalities
By: IBM     Published Date: Feb 24, 2015
Read this report from Forrester Research to learnhow IBM ACM solutions improve the efficiency of knowledge workers, integrate with analytics to create upselling and cross-selling opportunities and reduce the cost and risk of regulatory fines through increased audit consistency.
Tags : ibm, acm solutions, cross-selling opportunities, audit consistency, it management
By: IBM     Published Date: Feb 24, 2015
This paper asks the key questions that IT, legal, records, compliance officers and corporate managers should consider when contemplating an information lifecycle governance solution, and why these elements are critical in addressing e-discovery challenges.
Tags : ibm, lifecycle governance, e-discovery, e-discovery challenges, ilg solutions
By: Bit9     Published Date: Feb 20, 2015
You can’t open a newspaper or visit an online news site these days without some mention of a cyber-attack or data breach. These activities are becoming more prevalent, and as a result, the reporting of these activities is also on the rise. Bit9 + Carbon Black reached out to a series of experts to collect their thoughts and advice on dealing with data security incidents or breaches.
Tags : breach preparation, data breaches, bit9, it data security, security
By: Bit9     Published Date: Feb 20, 2015
Businesses need to view security as a process and leverage solutions that can proactively collect data, apply aggregated threat intelligence, reduce the cost and complexity of incident response and evolve, adapt and learn from your investigation. This eGuide will cover how a continuous approach to response can resolve these challenges and put your organization in a better security posture by proactively preparing for a breach.
Tags : it threat intelligence, aggregated data, bit9, security solutions, incident response
By: Bit9     Published Date: Feb 20, 2015
Most organizations have not proactively prepared for a breach. In fact, a majority of incident responders (52 percent) say they lack the necessary visibility into endpoint vulnerabilities. Without continuous data collection at the endpoint, preparing and responding to a breach is exponentially hampered. Download the SANS Institute’s latest industry survey to understand these key findings.
Tags : endpoint data, bit9, ir capabilities, siem integration tools, security
By: Bit9     Published Date: Feb 20, 2015
With the number of advanced attacks increasing every day—most undiscovered through traditional detection and response solutions—truly hunting for threats within your environment can be a laborious task. To combat this, enterprises must focus on prioritizing endpoint data collection over detection, leveraging comprehensive threat intelligence, and expanding detection beyond the moment of compromise.
Tags : advanced attacks, bit9, endpoint data, it threat intelligence, it security solutions
By: Extreme Networks     Published Date: Feb 20, 2015
Este documento expone cinco criterios clave que cualquier organización que se esté planteando desplegar o evolucionar su red inalámbrica debería tener en cuenta si pretende tomar una decisión de compra acertada.
Tags : soluciones wireless, byod, wi-fi, infraestructura, it management
     Extreme Networks
By: Extreme Networks     Published Date: Feb 20, 2015
Use these questions to help decide which vendor’s SDN platform is best equipped to support your organization as you face a rapidly changing world of technology.
Tags : sdn platform, sdn solutions, software-defined networking, it solutions, it management
     Extreme Networks
By: Extreme Networks     Published Date: Feb 20, 2015
Download this whitepaper to learn key concepts for designing a standards-based data center fabric to meet the requirements of today and tomorrow.
Tags : data center networking, standards-based data center, vendor-specific training, it solutions, it management
     Extreme Networks
By: BitSight Technologies     Published Date: Feb 20, 2015
Download "Continuous Third Party Security Monitoring Powers Business Objectives And Vendor Accountability" (a commissioned study conducted by Forrester Consulting on behalf of BitSight) to learn how companies are continuously managing third party risk.
Tags : bitsight technologies, security, cyber attacks, monitoring, third party security monitoring
     BitSight Technologies
By: IBM     Published Date: Feb 19, 2015
Read how Big Data and Analytics can help businesses deliver on customer needs, acquire customers, increase profitability and help retain the most valuable customers.
Tags : big data, business analytics, customer retention, customer aquisition, it management
By: IBM     Published Date: Feb 19, 2015
Data mining uncovers hidden patterns and relationships in data, driving more informed decisions in organizations of all sizes, and in virtually every industry.
Tags : roi, data mining, big data, business analytics, enterprise applications
By: IBM     Published Date: Feb 19, 2015
Refining business processes can be the key to achieving operational excellence.
Tags : business analytics, ibm, predictive analytics, performance management, it management
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Sub-Categories: Application Integration, Application Performance Management, Best Practices, Business Activity Monitoring, Business Analytics, Business Integration, Business Intelligence, Business Management, Business Metrics, Business Process Automation, Business Process Management, Call Center Management, Call Center Software, Change Management, Corporate Governance, Customer Interaction Service, Customer Relationship Management, Customer Satisfaction, Customer Service, eBusiness, Enterprise Resource Planning, Enterprise Software, eProcurement, Extranets, Groupware Workflow, HIPAA Compliance, Incentive Compensation, International Computing, IP Faxing, IT Spending, Manufacturing Execution Systems, Marketing Automation, Performance Testing, Product Lifecycle Management, Project Management, Return On Investment, Risk Management, Sales & Marketing Software, Sales Automation, Server Virtualization, Simulation Software, Spend Management, Supply Chain Management, System Management Software, Total Cost of Ownership, Video Conferencing, Voice Over IP, Voice Recognition, Workforce Management

Search White Papers      

Related Topics

Application Integration
744 Documents
Application Performance Management
731 Documents
Best Practices
1003 Documents
Business Activity Monitoring
482 Documents
Business Analytics
590 Documents
Business Integration
430 Documents
Business Intelligence
959 Documents
Business Management
865 Documents
Business Metrics
256 Documents
Business Process Automation
437 Documents
Business Process Management
534 Documents
Call Center Management
163 Documents
Call Center Software
134 Documents
Change Management
212 Documents
Corporate Governance
112 Documents
Customer Interaction Service
427 Documents
Customer Relationship Management
620 Documents
Customer Satisfaction
506 Documents
Customer Service
507 Documents
Data Management
1836 Documents
220 Documents
Enterprise Resource Planning
452 Documents
Enterprise Software
516 Documents
64 Documents
27 Documents
Groupware Workflow
56 Documents
HIPAA Compliance
104 Documents
Incentive Compensation
36 Documents
International Computing
110 Documents
IP Faxing
49 Documents
IT Management
2189 Documents
IT Spending
265 Documents
Manufacturing Execution Systems
70 Documents
Marketing Automation
148 Documents
882 Documents
Performance Testing
102 Documents
189 Documents
Product Lifecycle Management
191 Documents
Project Management
248 Documents
Return On Investment
452 Documents
Risk Management
311 Documents
Sales & Marketing Software
184 Documents
Sales Automation
124 Documents
Server Virtualization
485 Documents
Simulation Software
47 Documents
Spend Management
165 Documents
Supply Chain Management
148 Documents
System Management Software
159 Documents
Total Cost of Ownership
258 Documents
Video Conferencing
213 Documents
Voice Over IP
235 Documents
Voice Recognition
75 Documents
Workforce Management
179 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.