Source Analysis CallsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Source Analysis Calls returned the following results.
RSS What is RSS?
Related Categories

 •   Call Center Management
 •   Customer Service (General)
 •   Contact Center Management
 •   Voice Logging and Quality Assurance Recording
 •   Enterprise Data Protection and Privacy
 •   Automated Security Auditing/ Source Code Analysis
 •   Customer Relationship Management (CRM)
 •   Help Desk and Call Management
 •   Application Servers
 •   Enterprise Systems Management

Related Searches
 •   Build Source Analysis
 •   Business Source Analysis
 •   Patent Source Analysis Calls
 •   Source Analysis Administration
 •   Source Analysis Calls Chart
 •   Source Analysis Calls Documents
 •   Source Analysis Customers
 •   Source Analysis Manual
 •   Source Make
 •   Spreadsheet Source Analysis
Advertisement

ALL RESULTS
1 - 25 of 466 | Next Page

Featured Sponsors

Advanced Meter Infrastructure: Composite Technologies to Meet New Demands in Sales and Customer Service by SAP America, Inc..
Discover what benefits advanced meter infrastructure (AMI) brings and why, and learn how the SAP NetWeaver platform and enterprise service-oriented architecture can support more...
>> Discover more offerings from SAP America, Inc..

Embedded Open Source Analysis by Klocwork

April 2008 - (Free Research)
This white paper explores the results from an analysis of multiple open source projects that are commonly used in embedded development. 
(WHITE PAPER) READ ABSTRACT |

Executive Insight: Multi-Sourcing in the Call Center by inContact

February 2009 - (Free Research)
This paper examines how many executives are beginning to understand that cutting cost by outsourcing call center operations isn't always the best solution. Learn how "cheaper" often comes at the expense of "better". 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Toad for Data Analysis - Query, Understand & Report on Data From Any Source by Dell Software

Toad for Data Analysis is a multi-platform database query tool built for anyone who needs to access data (from any data source), understand data relationships and quickly produce reports. 
(ASP & SOFTWARE PRODUCT)

Call Centre Transformation: Turning Customer Experience Into Profits by SAP AG

December 2007 - (Free Research)
Call centres have been constantly evolving since the last third of the twentieth century. This evolution will continue as innovative information technology and shifting forces of competition drive call centre transformation. Customer interaction has become an important source of differentiation for organisations. Learn more in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Contact Centers for Dummies by Avaya Inc.

November 2008 - (Free Research)
This guide provides a high-level approach to the different methodologies with lots of information not only on running contact centers, but also on implementing technology in contact centers in a profitable way. 
(BOOK) READ ABSTRACT |

FAQ: Jump-start your big data journey with big data exploration by IBM

July 2013 - (Free Research)
You know that there's a wealth of information to unlock inside "big data," but where do you start? Big data exploration allows you to navigate all potential data sources to determine how best to proceed. In this Q and A, learn how to plan and execute a big data exploration project, measure the business benefits of such a project, and much more. 
(WHITE PAPER) READ ABSTRACT |

Addressing Common Contact Center and Enterprise Business Issues with Speech Analytics by Verint Systems

April 2008 - (Free Research)
As a solution to contact center issues, this paper suggests Speech analytics, which gives organizations the ability tap into existing recorded customer interactions to gain actionable intelligence for improving business performance. 
(WHITE PAPER) READ ABSTRACT |

Procurement Technology for Today's Manufacturers by SearchManufacturingERP

April 2014 - (Free Research)
E-sourcing and e-procurement technology have created new opportunities to save money, improve supplier performance -- even make better products. 
(EBOOK) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

Leveraging a Maturity Model to Achieve “Proactive Compliance” by Symantec Corporation

August 2009 - (Free Research)
Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model. 
(WHITE PAPER) READ ABSTRACT |

Improving Agile Development with Continuous Build Scripts & Build Avoidance by OpenMake Software

April 2008 - (Free Research)
This white paper discusses how realize the full benefits of continuous integration in agile development. 
(WHITE PAPER) READ ABSTRACT |

OpenStack, Red Hat and the Cloud System Software Opportunity by Red Hat

May 2014 - (Free Research)
This whitepaper will help you learn more about OpenStack and how it offers an open alternative to proprietary systems. 
(WHITE PAPER) READ ABSTRACT |

6 Best Practices for Preventing Enterprise Data Loss by RSA, The Security Division of EMC

February 2009 - (Free Research)
Nearly 220 million electronic records have been breached since January 2005, according to Privacy Rights Clearinghouse. This paper outlines six best practices for corporations seeking to prevent enterprise data loss in order to protect revenue, limit customer attrition, and meet government regulatory requirements. 
(WHITE PAPER) READ ABSTRACT |

Cisco Unified CRM Connector 3.0. by Cisco Systems, Inc.

The Cisco Unified Communications system is a full-featured business communications system built into an intelligent IP network. 
(SOFTWARE PRODUCT)

Cisco Unified CRM Connector 3.0 by Cisco Systems, Inc.

The Cisco Unified Communications system is a full-featured business communications system built into an intelligent IP network. 
(HARDWARE PRODUCT)

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc. (E-mail this company)

WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support every level of the global organization – executive, analytical, & operational – and make data available, accessible, and meaningful to every person or application that needs it. 
(SOFTWARE PRODUCT)

Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications by Veracode, Inc.

May 2010 - (Free Research)
Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities. 
(WHITE PAPER) READ ABSTRACT |

How Automated Solutions Can Help with Efforts Toward Sarbanes-Oxley Compliance by Varonis

September 2008 - (Free Research)
This document provides a brief overview of the Sarbanes-Oxley Act, (Sections 302 and 404), the impact of SOX on IT Departments, and the Varonis Data Governance solution for critical portions of the Sarbanes-Oxley Act of 2002. 
(WHITE PAPER) READ ABSTRACT |

Secure Internet Single Sign-On (SSO) 101 by Ping Identity Corporation

June 2009 - (Free Research)
Written for anyone interested in understanding how secure Internet SSO works, this white paper explores the limitations of current SSO implementations outside of a single security domain (including identity and access management systems and open source development) and introduces standalone secure Internet SSO as a solution. 
(WHITE PAPER) READ ABSTRACT |

Controlling Software Complexity: The Business Case for Static Source Code Analysis by Coverity

March 2008 - (Free Research)
This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code. 
(WHITE PAPER) READ ABSTRACT |

Constellation Energy Group by EMC Corporation

June 2008 - (Free Research)
In its quest to fully leverage the new technologies, Constellation energy realized it needed to integrate them to one another, as well as integrate them with other business processes and applications. 
(WHITE PAPER) READ ABSTRACT |

Loss from Legacy Call Center Infrastructure by Genesys

September 2013 - (Free Research)
Is your legacy call center infrastructure limiting your organization's ability to increase efficiencies, reduce costs, and raise productivity? What's the true cost of a legacy call center? Answer these questions now by consulting this exclusive infographic. 
(WHITE PAPER) READ ABSTRACT |

Get the Coverity Scan 2010 Open Source Integrity Report featuring the Android Integrity Report by Coverity

January 2011 - (Free Research)
The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others. Read on to learn more about these results. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 466 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts