IT Management  >   Systems Design and Development  >   Systems Implementation  >   Systems Integration  >  

Computer Telephony

RSS Feed    Add to Google    Add to My Yahoo!
Computer TelephonyReports
 
Extra Space Storage Dials Up Sales with inContact & Salesforce CRM
sponsored by inContact
CASE STUDY: This paper describes the benefits Extra Space Storage experienced by combining inContact’s on-demand platform and integrated with customer CRM software from salesforce.com. Read on to learn more about these benefits and learn how your company can experience the same results.
Posted: 11 Oct 2010 | Published: 11 Oct 2010

inContact

Simplifying Contact Center Technology
sponsored by Oracle Corporation
WHITE PAPER: Computer telephony integration (CTI) enabled contact centers realize immense cost savings, increased reliability and improved performance. Learn how an on-demand solution can simplify your organization’s contact center technology.
Posted: 26 Sep 2007 | Published: 01 Aug 2006

Oracle Corporation

E-Book: The Executive’s Guide to Contact Center Technology Planning
sponsored by inContact
EBOOK: In this e-book learn about emerging contact center technology trends and newer options like self-service technology, analytics and Web 2.0. Find out about 10 must-have technologies for the contemporary contact center. Learn how to select the best technology to meet your needs, and read expert advice for setting up contact center technology.
Posted: 12 May 2010 | Published: 12 May 2010

inContact

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Five Security Considerations in the Mobile Age
sponsored by IBM
WHITE PAPER: This white paper enumerates five security considerations for enterprises in the mobile age and provides a thorough introduction to enterprise mobile applications.
Posted: 07 Oct 2014 | Published: 31 Dec 2012

IBM

Cloud Migration: A Security Architect Case Study
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This use case describes CenturyLink's partnership with a global shipping and logistics firm looking to adopt cloud technologies to lower IT support costs and refocus its resources.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

CenturyLink Technology Solutions

Outsourcing IT Projects to Managed Hosting or the Cloud
sponsored by Rackspace
WHITE PAPER: View this white paper to discover 12 critical success factors when outsourcing IT to managed hosting or the cloud.
Posted: 14 Oct 2014 | Published: 07 Jun 2014

Rackspace

Hybrid IT: The Best of All Worlds
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This exclusive whitepaper offers up a hybrid IT approach as the solution for meeting the rapid changes and demands of today's business world.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

CenturyLink Technology Solutions

Don't Let Legacy Infrastructure Be Your Legacy
sponsored by Red Hat
VIDEO: This whitepaper explains the advantages of using Linux to upgrade your legacy infrastructure, including more uptime and seamless app migration.
Posted: 17 Oct 2014 | Premiered: 23 May 2014

Red Hat

Gartner Predicts 2014: Identity and Access Management
sponsored by IBM
WHITE PAPER: Find out what Gartner's security analysts predict for the identity and access management space for 2014 and beyond.
Posted: 08 Oct 2014 | Published: 26 Nov 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement