Risk ReservationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Risk Reservation returned the following results.
RSS What is RSS?
Related Categories

 •   Telephony/ CTI/ VOIP
 •   Wireless Technologies and Mobile Computing
 •   Contact Center Management
 •   Business Process Management (BPM)
 •   Automatic Call Distribution ACD
 •   Business Intelligence Solutions
 •   Call Center Management
 •   Customer Experience Management (CEM)
 •   WAN/ LAN Solutions
 •   Customer Interaction Management

Related Searches
 •   Diagrams Risk Reservation
 •   Guides Risk Reservation
 •   Own Risk Reservation
 •   Resources Risk Reservation
 •   Risk Guides
 •   Risk Reservation Manage
 •   Risk Reservation Offices
 •   Risk Reservation Size
 •   Risk Statements
 •   Starting Risk Reservation
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Hilton Reservations Worldwide Achieves Efficient Staffing by Aspect

September 30, 2013 - (Free Research)
Check out this brief case study to learn how Hilton Reservations Worldwide implemented a workforce management technology that enabled the contact center to plan, manage, and optimize staffing resources, resulting in happier agents and satisfied customers. 
(CASE STUDY) READ ABSTRACT |

Hilton Reservations Worldwide by Aspect

March 2008 - (Free Research)
Since implementing the workforce management capabilities, HRW has seen data accuracy go from within ten percent of actual to within three percent of actual due to Aspect eWorkforce Management. 
(CASE STUDY) READ ABSTRACT |

Virtualize Enterprise Applications with Less Peril, More Payoff by SearchServerVirtualization

January 2014 - (Free Research)
Before you virtualize the applications that keep your business running, learn how to avoid performance and availability issues. 
(EGUIDE) READ ABSTRACT |

The Age of Electronic Ticketing by Hexaware Technologies

May 2008 - (Free Research)
Electronic ticketing or e-ticketing is a recent development in the transport industry designed to eliminate the need for paper based ticketing and to facilitate the check-in procedures at airports and train stations. 
(WHITE PAPER) READ ABSTRACT |

The business benefits of switching to mobile TV by ComputerWeekly.com

November 2010 - (Free Research)
Over the past two years, the mobile TV landscape has changed dramatically. 
(WHITE PAPER) READ ABSTRACT |

Europe's Largest Regional Airline Protects Reservations System and Company Data with Veeam by Veeam Software

December 2013 - (Free Research)
Check out this resource to find out how a leading vendor's backup solution helped Europe's largest regional airline eliminate downtime. 
(WHITE PAPER) READ ABSTRACT |

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud by iovation, Inc.

June 2009 - (Free Research)
Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud. 
(CASE STUDY) READ ABSTRACT |

The Top Five Myths of IP Communications by Cisco Systems, Inc.

February 2008 - (Free Research)
This white paper addresses the top concerns of IT professionals who resist the deployment of pervasive, enterprise-wide wireless networks. It identifies these reservations based on the experience of Cisco Systems and Intel. 
(WHITE PAPER) READ ABSTRACT |

5 Myths about Leading Virtual Teams by Citrix Online Go To Meeting

February 2014 - (Free Research)
Consult the following white paper to learn about the 5 most common myths that negatively affect the performance and usefulness of a virtual team. Also uncover what managers and leaders can do to overcome these issues, ultimately giving rise to the collaborative ability needed in today's market. 
(WHITE PAPER) READ ABSTRACT |

The Truth About Mobile Business Intelligence by Information Builders

August 2012 - (Free Research)
Mobile business intelligence (BI) is not a new concept, but the rumors that it's too complex, cumbersome, expensive, and limited have prevented most organizations from making the investment. Access this exclusive paper to uncover the 5 most common mobile BI myths debunked and how mobile BI can help you gain a competitive advantage. 
(WHITE PAPER) READ ABSTRACT |

The 10 Best Practices for Performance Management by Gomez

August 2009 - (Free Research)
Read this paper to learn the 10 best practices in performance management and how to apply them to your company and your online store to increase the overall customer experience, which is important now more than ever. 
(WHITE PAPER) READ ABSTRACT |

Extra Space Storage Dials Up Sales with inContact & Salesforce CRM by inContact

October 2010 - (Free Research)
This paper describes the benefits Extra Space Storage experienced by combining inContact’s on-demand platform and integrated with customer CRM software from salesforce.com. Read on to learn more about these benefits and learn how your company can experience the same results. 
(CASE STUDY) READ ABSTRACT |

Quality of Service (QoS) in High-Priority Applications by Transition Networks, Inc.

September 2008 - (Free Research)
This paper will discuss both hard and soft QoS techniques including 802.1P, IP Precedence, Differentiated Services, Resource Reservation Protocol (RSVP) and ATM specific priority resources. 
(WHITE PAPER) READ ABSTRACT |

2013 RSA Archer GRC Summit: Key Findings by RSA, The Security Division of EMC

September 2013 - (Free Research)
View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy. 
(WHITE PAPER) READ ABSTRACT |

Measure Risks and Vulnerability Effectively by Hewlett-Packard Limited

May 2013 - (Free Research)
This guide explores strategies for measuring your risks and vulnerabilities, as well as understanding what you must do to achieve these goals. 
(WHITE PAPER) READ ABSTRACT |

Managing Security Risks and Vulnerabilities by IBM

January 2014 - (Free Research)
This white paper highlights the ways in which organizations can focus on protecting high-value assets and provide a scalable, cost-effective, integrated security process the entire IT environment. 
(WHITE PAPER) READ ABSTRACT |

Dealing with Governance, Risk & Compliance in an Info-Centric World by CommVault Systems, Inc.

October 2013 - (Free Research)
View this comprehensive report from Quocirca Research on how to manage multiple aspects of governance, risk, and compliance (GRC), and learn why a comprehensive GRC platform -- as opposed to a combination of different tools -- can help you effectively manage your organization's information assets. 
(WHITE PAPER) READ ABSTRACT |

Financial Institutions: Managing Operational Risk with RSA® Archer® by RSA, The Security Division of EMC

November 2013 - (Free Research)
Access this white paper to discover a solution that today's financial institutions can use to balance risk quantity with management quality in order to ensure an efficient and effective program. 
(WHITE PAPER) READ ABSTRACT |

HP Fundamentals: Decreasing IT Risk in the age of cloud, big data, and virtualization by Hewlett-Packard Company

April 2014 - (Free Research)
Watch this informative webcast to discover how you can lower the risk of adopting more complex IT innovations, such as cloud and virtualization, so your organization can reap the benefits of such technologies without sacrificing security. 
(WEBCAST) READ ABSTRACT |

Why Java Exploits Remain a Top Security Risk by Websense

December 2013 - (Free Research)
Learn how the huge number of Java versions in active use makes it vulnerable to attack. Illustrated are the risks from the use of Java and alternatives on how to address these risks, using internal process, Websense solutions or a mixture of both. 
(WHITE PAPER) READ ABSTRACT |

Risk and Compliance Outlook by McAfee, Inc.

November 2011 - (Free Research)
Forward-thinking companies have implemented or are in the process of developing risk management and compliance initiatives. Learn about options for auditable risk management programs that address IT security as a business risk. 
(WHITE PAPER) READ ABSTRACT |

Understanding the risks of mobile apps by Veracode, Inc.

May 2012 - (Free Research)
Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Managing Risk in an Active Directory Integrated Virtualized Environment by Dell Software

February 2014 - (Free Research)
Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization. 
(WHITE PAPER) READ ABSTRACT |

Managing Risk in an Active Directory Integrated Virtualized Environment by Imperva

February 2014 - (Free Research)
Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts