SUBSCRIBE TO TMCnet
TMCnet - World's Largest Communications and Technology Community

WHITE PAPER LIBRARY

TMCNET eNEWSLETTER SIGNUP

TMCnet offers this extensive library to help you productively perform research and analysis. Using simplified search criteria, this archive puts actionable, relevant information about communications and technology at your fingertips.

Are you interested in contributing your White Paper into the TMCnet White Paper Library, contact us now !


FEATURED WHITEPAPERS

White Paper Library Search

Title:
Categories:
Company:
 

Aligning People and Technology to Create an Effective Voice Self-Service Channel
VoltDelta
2/28/2014 3:29:17 PM
It takes more than a vision to create an effective interactive voice response self-service solution in a contact center. There are many factors that contribute to the goal of achieving high self service completion rates along with improved customer satisfaction with this communication channel.

This case study explores two organizations that needed customer self-servicing solutions that would decrease contact center agent call volume. By implementing VoltDelta these organizations were able to improve their self-servicing rates, customer satisfaction, and provide agents with more time to deal with complex issues.

Download the white paper now.
Voice of Your Customers - Listening is only part of the story
JD Power
2/27/2014 12:12:59 PM
A world-class voice of the customer (VOC) research program is important to all business centers, particularly contact centers. More than just a survey, a VOC program provides your organization with critical insights, analytical tools and the appropriate context by which to determine the value of the information collected. Asking questions that truly define and explore the entire customer experience, in timely fashion, can help your contact center to address and improve customer focused efforts. Download this white paper to learn how you can improve your VOC programs and see measurable results.
WebRTC Outlook 2014 Report
TMC
2/27/2014 9:58:50 AM
The WebRTC Outlook 2014 report is based on a survey conducted by WebRTC World in late December 2013. The focus of the survey was to provide feedback to and from the WebRTC community as to how WebRTC would be adopted, how it will be implemented and used and how it will change markets in 2014. The survey was sent to a broad WebRTC user community and over 100 respondents completed the survey. This is the best view of how the WebRTC community views 2104 for WebRTC adoption and use.

The survey had 13 questions, of which eight were multiple choice categories and five were open-ended. The survey was structured to get both defined results and open the responses to a variety of views. In the report, the survey and responses have been organized into five categories:

• Trends in WebRTC - This section identifies trends and general outlook for 2014.
• User Adoption - This section looks at the outlook for user adoption of WebRTC through 2014.
• Industry Adoption and Impact - This looks both at which industries will adopt WebRTC first and where the greatest impact and disruption will be.
• WebRTC Plans – This provides insight into plans by the respondents to use WebRTC in their business in 2014.
• Barriers - What are the barriers to WebRTC in 2014?
Medical Alert: A Success Story
Five9
2/6/2014 10:10:12 AM
For emergency monitoring device provider Medical Alert, staying on top of their contact center operations is the highest priority - the safety of their customers depends on it! So when Medical Alert began to experience rapid growth, they knew their current premise-based phone system wasn't going to cut it.

In this brief case study, explore how Medical Alert implemented a cloud-based contact center technology to overcome the challenges of its outdated phone system, including:

- Frequent outages
- Poor reporting capabilities
- Inability to integrate with Salesforce and other CRM apps

Read on to learn about the benefits this new tool offers Medical Alert, and why choosing the cloud for the contact center could be the right choice for your company as well.
NexRep: A Success Story
Five9
2/6/2014 10:04:56 AM
Today's customers expect efficient, personalized service when they communicate with a business, no matter the channel. So for contact centers, aligning the right agents to the right customers is critical success, as is maximizing agents' time and performance.

In this brief case study, learn how NexRep, a sales-driven call center, implemented a cloud-based inbound and outbound call technology in order to optimize agents for skill and performance, increasing efficiency and keeping customers satisfied.
OnBrand24: A Success Story
Five9
2/6/2014 10:02:50 AM
OnBrand24, a leading US provider of call center outsourcing services, was beginning to feel the weight of an outdated, premise-based phone system. It didn't have the latest contact center features OnBrand's customers were requesting, and the features it did have were less than stellar. In order to please their clients' growing demands, OnBrand24 needed to make a change.

In this brief case study, learn how OnBrand24 implemented a new, cloud-based contact center system that supported inbound and outbound calls. Read on to learn the benefits OnBrand experienced from this technology, including:

- Greater transparency into call results
- Easy integration with other client CRM software
- More effective call prioritization
- And more!
University Bound: A Case Study
Five9
2/6/2014 9:58:23 AM
Call centers today need the right technology to empower agents and help them monitor and manage client campaigns. University Bound, a digital marketing agency that helps colleges recruit students, wanted to be able to generate large numbers of student leads, increase speed to lead, and measure agent performance.

To do this, they chose a cloud-based contact center platform. View this brief case study to learn why University Bound chose this platform, and discover the benefits they experienced, including:

- High functionality and easy-to-access data
- 1 minute speed-to-lead time
- Better reporting tools to measure performance
- And more
Case Study: NJ 2-1-1 Success Story: Passing the Ultimate Test
Five9
2/6/2014 9:55:00 AM
As an emergency information provider, NJ 2-1-1 needs to get the right answers to their customers as fast as possible. When the company realized their legacy contact center couldn't support the necessary call volume, they knew they needed to upgrade.

Check out this brief case study to learn how NJ 2-1-1 implemented a virtual, cloud-based contact center system that successfully handled over 90,000 calls when 2012's Hurricane Sandy hit. Discover the benefits of this system, including:


-Fast, flexible call routing and integration with other providers
-Voicemail box setup for calls that can't be immediately addressed
-Web-based resources so customers and employees have real-time access to data
-And many more
DirectBuy San Diego Success Story: Revving Up Calls- and Profits
Five9
2/6/2014 9:54:29 AM
DirectBuy, a wholesale-direct seller of consumer products and services, was having trouble with a slow outbound calling process. Their contact system was too rigid - it only allowed one-to-one calls and had not efficient means of weeding out "do not call" customers. As a result, DirectBuy suffered from frustrated agents and high cost-per-member.

Check out this brief case study to learn how DirectBuy implemented a cloud-based outbound call automation software in order to reach more prospective clients and handle calls more efficiently. Read on to learn about the specific benefits this tool offers DirectBuy, including:

-Tripled rate of outbound calls
-Decreased cost-per-member by $300
-Lowered leads-per-member by 10
-And more
Customer Magazine: Strategic Solutions Series (JD Power)
JD Power
1/24/2014 10:38:55 AM
Your contact center relies on benchmarking performance to assess and strategize key business objectives. But, is your organization falling victim to benchmarking hazards? In this whitepaper, Mark Miller, senior director of contact center solutions at J.D. Power, explains benchmarking hazards to avoid and tips to improve your benchmarking strategies. These true benchmarks can help an organization reach targets and maintain a culture of ongoing improvement.
Fixing the Everyone Problem
Varonis
1/22/2014 2:55:14 PM
Every organization stores volumes of data on their file servers, NAS devices, and in SharePoint and Exchange, yet it is almost impossible to manually answer critical data management and protection questions. Read this whitepaper to find out how to automate access control clean-up and management - with no performance impact.
The Essential Guide to US Compliance and Regulations
Varonis
1/22/2014 2:52:26 PM
This comprehensive whitepaper reviews key data protection legislation and helps you answer: Does this regulation apply to me? What are my obligations and requirements? How do I achieve compliance? What are the fines and legal ramifications of non-compliance? It covers HIPAA/HITECH, SOX, GLB, FCRA, and EU Safe Harbor Laws.
Faster SharePoint Migrations with Varonis
Varonis
1/22/2014 2:43:00 PM
Varonis data governance software can help expedite and streamline the migration of unstructured data from file shares to SharePoint servers and once complete, Varonis can continue to provide the recommendations for access controls that will ensure need to know based access that is in step with data growth.
VoIP Security: More Than Just IT Risk
VoIPShield
1/14/2014 2:34:55 PM
With VoIP adoption on the rise, businesses face growing risk from a wide range of threats targeted at their data networks. VoIP may be attractive for its economic benefits, but without proper security in place, it will be the weak link in your data security chain that hackers will quickly exploit. This new White Paper is based on research from across the IT sector, and was authored by the highly-regarded analyst consultancy, J Arnold & Associates.
Defend Against Injection-based Attacks
Klocwork
1/7/2014 4:52:28 PM
It goes without saying that as software becomes more prevalent in our daily activities, it becomes imperative that we implement that software in the most secure manner possible.

Software is everywhere and touches everything we do - from the computers we work on to life-saving insulin pumps and pacemakers. Software controls and manages the embedded systems that provide us with electricity, water, natural gas, transportation, communications, and more. Increasingly, all these devices and systems are connected to each other behind the scenes, resulting in a growing "network effect".

Couple this with end-users that expect devices to work properly and don't want to think about the technical ramifications of the software being used and we begin to realize how important it is to write code that is resistant to malicious attack.

This first in a series of white papers explores the most common security vulnerabilities currently plaguing the software development industry, and presents different ways in which Static Code Analysis, or SCA, can detect them. When you download "Defend Against Injection Based Attacks" you will learn:

- A detailed description of the weakness
- How each weakness presents itself to the end user and the developer
- An explanation of the mitigation strategies to help resolve each issue
Making the Leap: Taking your Call Center to the Cloud
Genesys
1/2/2014 2:59:09 PM
If you manage or work in a call center, you're aware that customer frustration is one of the biggest challenges you face. But even the best-managed call centers can only do so much. Fortunately, there's a new way to handle customers where they can feel like they have more control, can get their answers more quickly and get their problem resolved faster.

In this white paper, you will learn why moving to the cloud for SMS messaging, inbound IVR, mobile marketing, and proactive communications in your call center will make for a better customer experience.
Upgrade or Replace?
Mitel
12/12/2013 2:10:47 PM
If you're not getting the most out of your contact center software, it's time to consider something new. But are you in need of an upgrade or should you opt for a new solution altogether? This guide will help you determine if you're ready for an update and whether you should upgrade your software or replace it.
Getting Smart on Analytics in the Contact Center - Measurement is the First Step in the Process
IQOR
12/5/2013 4:41:45 PM
The promise of Big Data has many forward-thinking contact center leaders dreaming of the insights it can deliver, but getting from raw data to actionable insight is a multistep journey that begins with deep thinking about the measurements that matter most. We believe that by taking comprehensive measurements, interpreting them in a scientific way, and then sharing the analyses with relevant stakeholders and contact center leaders can put Big Data to work, driving strategic customer initiatives at the highest levels of the organization.
Understanding Your Customers' DNA - The Key to Intelligent Connections
IQOR
12/5/2013 4:40:33 PM
Your contact center can handle hundreds of millions of customer interactions each year. At iQor, we believe each and every one of these calls, emails, chat sessions, and social media responses generates a series of important data points - small but useful clues, like strands of DNA. Utilizing the right digital network, infrastructure, tools, and processes to analyze, innovate and act, today's advanced contact centers can assemble these strands to help organizations develop a deeper understanding of their customers and, in turn, connect with and delight them more intelligently. Learn to better understand your customers' interactions.
3 Must Follow Guidelines for Mitigating M2M Software Security Risks
Klocwork
12/2/2013 10:27:58 AM
Everywhere we turn today, we find software embedded in our lives – from our smart phones and cars to the planes we fly in and the life saving equipment in hospitals. As all these systems continue to evolve and become more connected to each other and to the internet, the risks associated with unsecured code grow too. And not always from malicious hacking attempts; faulty code in many of these applications can present significant security risks.

Download the “Three Must-Follow Guidelines for Mitigating M2M Software Security Risks” whitepaper from Klocwork and learn why embedded software teams need to follow just a few critical guidelines to protect their systems, including:

• Why address security early, and how to take defensive measures against security threats
• How and why to build security in at the development stage
• How to protect systems against unauthorized changes and malware attacks
First 1 2 3 4 5 6 7 8 9 Last 


LATEST VIDEOS

UPCOMING WEBINARS

MOST POPULAR STORIES





Technology Marketing Corporation

800 Connecticut Ave, 1st Floor East, Norwalk, CT 06854 USA
Ph: 800-243-6002, 203-852-6800
Fx: 203-866-3326

General comments: tmc@tmcnet.com.
Comments about this site: webmaster@tmcnet.com.

STAY CURRENT YOUR WAY

© 2014 Technology Marketing Corporation. All rights reserved.