Your Search returned 14 results from our Editorial content

Sort By
   
1 2 Next

Your Search returned 38 results from our White Paper Library

Sort By
Informatica

Security

Dynamic Data Masking

In this video you will learn how dynamic data masking can help your organization comply with various privacy regulations. Discover an end-to-end solution...


Citrix

CRM Services

Strategies to Master the New Wave of Mobile Support

This white paper discusses the Front End of the Front Office (FEFO), where customers access services directly. Read on for strategies to help you master...


Citrix

CRM Services

Achieving Seamless Support

This white paper can help you achieve seamless support when leveraging self-service as a key service channel. Find out how to get the most out of self-service....


IBM

Analytics Software

Five Predictive Imperatives for Maximizing Customer Value...

This white paper from IBM describes how a set of five predictive imperatives can help ensure that your company maximizes the value of its customer relationships...


IBM

Analytics Software

Five Steps to Improving Business Performance Through Customer...

Read this white paper to learn five practical steps your company can take to achieve customer intimacy.


SAP

Application Development

CIOs Embrace Custom Application Development

Read this report to discover how custom application development is emerging as a popular way to enhance customer service with tailored solutions.


Oracle

Sales Management

Web 2.0 and Sales Process Management

This report discusses how Web 2.0 systems and applications can support management of sales processes. Instead of focusing on specific technologies such...


Oracle

CRM

Business Agility for Midsize Organizations

Discover solutions that are easy to use and inexpensive to maintain. Find out how to build an IT process that can help you save costs, improve customer...


1 2 4 Next

Recommended for You

phil-muncaster

Why does China spot security vulnerabilities quicker than the US?

Phil Muncaster reports on China and beyond

silhouette

Everything you need to know about... Blockchain

IDG Connect tackles the tech stories that matter to you

kathryn-cave

What will be the single biggest security threat of 2018?

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

If it were legal, would your organization hack back?