Mon.Jan 30, 2017

article thumbnail

Top Trends For Customer Service In 2017: Operations Become Smarter And More Strategic

Forrester IT

In today's world, customers decide how customer-centric a company is. Good customer service should capture the fundamentals of a great experience: ease, effectiveness, and emotion. Looking ahead, Forrester sees 10 trends for 2017 that customer service professionals should take into account as they move the needle on the quality of service that they deliver: Here are six of them: Customer service organizations address a smaller volume of simple voice-based customer contacts as they mature the

Trends 327
article thumbnail

Many firms in the dark on cyber security investment

Computer Weekly

UK businesses need to adopt a risk-based approach to cyber security spending to ensure the best ROI and most appropriate data protection, says industry expert Michael Dieroff.

Security 203
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Around the world, strong public cloud platform Leaders mask local complexity and difference

Forrester IT

( Public Domain image taken taken by US Astronaut Terry Virts, Jan. 30, 2015 ). Towards the end of last year, Forrester published four tightly connected Wave evaluations. These assessed the 18 most significant providers of public cloud platforms , looking globally , in Australia and New Zealand , in Europe , and in China. Now we've published a fifth document, which digs into the trends we observe across all four regions.

Cloud 216
article thumbnail

Webinar 31 Jan: Lessons Learned For Government Enterprises From The Highest Performing Commercial Firms

CTOvision

Bob Gourley. Cognitio is participating in a webinar 31 Jan at 1pm Eastern, 11am Pacific, which will provide information of use to enterprise technologists from across the federal mission space. The webinar will discuss the very latest issues and trends from the rapidly moving enterprise technology space, leading to conclusions relevant to technology leaders.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Only 49% of marketers are pushed to reinvent customer service due to technology

Computer Weekly

Technology is causing disruption in most markets, but only 49% of marketers believe they are pressured to develop their customer service as a result of disruptive technology

article thumbnail

Open Mesh New Universal A-Series APs Are the Best of All Worlds

IT Toolbox

The value-driven networking vendor Open Mesh is on a good run. I see colleagues in the wireless community increasingly interested in the notion that decent cloud-managed network equipment doesn’t have to come with expensive and restrictive licenses, so this underdog’s brand awareness is growing.

Licensing 157

More Trending

article thumbnail

How an Operational Data Hub Becomes the Data Detective

Data Center Knowledge

With the amount of data created and stored growing exponentially, discovering the relationships that exist among your data requires more than a keen mind. It requires the right technology, too. Read More.

Data 134
article thumbnail

Australian organisations forced to take cyber insurance seriously

Computer Weekly

The take-up of cyber security insurance in Australia remains low, but it could increase if data breach notification regulations come into force

Insurance 161
article thumbnail

Cops use pacemaker data to charge homeowner with arson, insurance fraud

Network World

If you are dependent upon an embedded medical device, should the device that helps keep you alive also be allowed to incriminate you in a crime? After all, the Fifth Amendment of the U.S. Constitution protects a person from being forced to incriminate themselves. Nonetheless, that’s what happened after a house fire in Middletown, Ohio. WCPO Cincinnati caught video of the actual fire , as well delivered news that the owner’s cat died in the fire.

Insurance 131
article thumbnail

Report blames human and legacy system failure for Yorkshire hospital problems

Computer Weekly

Old technology and human error combined to cause major IT outage at Yorkshire NHS trust, review finds

System 165
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

AI Could Undermine Customer Confidence

IT Toolbox

Popularity of Artificial Intelligence and machine learning tools has grown by leaps and bounds in the last 18 months. With the promise of providing better customer services with reduced head counts, what?s not to like?

article thumbnail

Consumers do not trust companies with personal data, survey shows

Computer Weekly

UK firms still have much work to do in preparing for GDPR compliance, minimising the risk of identity theft and regaining trust, according to law firm Winckworth Sherwood.

Survey 131
article thumbnail

Concepts of a 'Layered Architecture'

IT Toolbox

The highest layer does not have an (N+1)-layer above it, and the lowest layer does not have an (N-1)-layer below it. The physical medium is not a part of the layered architecture.

article thumbnail

Bellway Homes signs Hyperoptic for Welwyn Garden City development

Computer Weekly

Developer Bellway Homes chooses FTTP broadband supplier Hyperoptic to supply ultrafast services to new homes in Welwyn Garden City

article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

How Conventional UC is Falling Short - it's Network-Centric

IT Toolbox

This is the second of three posts where I’m examining ways in which conventional UC offerings fall short, and it’s better that you have these insights now than after the fact. Before continuing, it’s important to reiterate why my focus is on “conventional” UC solutions.

Network 109
article thumbnail

Vertiv Uses Machine Learning to Automate Data Center Cooling

Data Center Knowledge

New software feature meant to eliminate manual fine-tuning of cooling system elements Read More.

article thumbnail

Cloud Integration: Oracle HCM Cloud Integration Deep Dive Using Magic xpi Integration Platform - Working With Business Object Services

IT Toolbox

This Magic xpi cloud integration recipe calls for Oracle HCM Cloud integration with your other enterprise systems using Business Object Services.

Oracle 118
article thumbnail

QTS Buys Large Dallas Data Center from Insurer HCSC

Data Center Knowledge

Pays $50M to expand in one of the hottest US data center markets Read More.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Open Systems Interconnection Environments

IT Toolbox

Since some of these activities may imply exchange of information among the interconnected open systems, they may be of concern to OSI.

System 122
article thumbnail

Delta Cancels 280 Flights Due to IT Outage

Data Center Knowledge

Says essential IT systems went down for hours Read More.

System 153
article thumbnail

ERP implementation transforms city operations

IT Toolbox

Long Beach, California, has begun implementing its first-ever enterprise resource planning system to replace isolated software used by every department of the municipal government. The new system has been dubbed LB COAST for Long Beach City Operations and Strategic Technologies. Tyler Technologies Inc. won the contract over nine other vendors with an initial price tag of $8.

Resources 100
article thumbnail

Cloud Boom Buoys Microsoft, Intel, Alphabet Results

Data Center Knowledge

Biggest growth in businesses that deliver computing over internet Read More.

Intel 141
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Major customer retention project launching for auto dealers

IT Toolbox

Increased competition within the auto sales markets means that dealers must increase their focus on a wider range of services beyond simple vehicle sales in order to retain customers and keep them coming back to the same dealership for future purchases. Enhanced CRM technology configured to their requirements is an essential part of this process.

100
100
article thumbnail

'Essential IT systems' failure and 'automation issues' ground hundreds of Delta flights

Tech Republic Data Center

Delta and many other carries have recently experienced major IT failures that resulted in cancelled flights. Here's how your business can protect itself.

System 107
article thumbnail

VoIP innovation and growth depend on technology patents

IT Toolbox

Technology patents are a critical way for technology communications companies to differentiate themselves from their competitors. The award of patents helps safeguard the intellectual property of firms plowing considerable R&D dollars into the VoIP market, providing a legally stable platform for building further innovation.

VOIP 100
article thumbnail

IDG Contributor Network: How to practice cybersecurity (and why it's different from IT security)

Network World

Keeping companies safe from attackers is no longer just a technical issue of having the right defensive technologies in place. To me, this is practicing IT security, which is still needed but doesn’t address what happens after the attackers infiltrate your organization (and they will, despite your best efforts to keep them out). I’m trying to draw attention to this topic to get security teams, businesses executives and corporate boards to realize that IT security will not help them once attacker

Network 95
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Career Craft: I have a conflict!

IT Toolbox

This post is the first installment in Chapter 2 of the Career Craft story. To see the entire series, click here. By Wednesday morning, James couldn't stop thinking of the webinar that afternoon.

100
100
article thumbnail

IDG Contributor Network: Hackers could use hidden mal-audio to attack Google Now

Network World

There's a fabulous story about a slew of Amazon Echo devices that took it upon themselves to order expensive doll houses from the ecommerce retailer all because a news show host uttered the phrase “Alexa ordered me a dollhouse” on air. The machines heard it from the TV switched on in the room. Researchers say it’s not an unlikely scenario. They say not only can attackers issue mal-audio voice commands to any AI listening device that is in audible range, but they can also do it using hidden voice

Network 92
article thumbnail

Re-Tuning Your Big Data Application

IT Toolbox

Big data applications are here to stay. Most large IT enterprises have implemented one or more large data stores, hybrid hardware/software solutions and high-speed business analytics packages. The promise of this technology is the ability to quickly and easily analyze large amounts of data and derive from that analysis changes to customer-facing systems.

Big Data 100
article thumbnail

Spear phishing tough to block, even when using automation tools

Network World

Trying to filter out phishing emails is tough work, even for organizations trying to find a better way through automation, according to a new study from security software company GreatHorn. The company makes software that seeks out phishing attempts and can autonomously block them, but even its customers don’t switch on all the features, according to GreatHorn’s study of how customers dealt with just over half a million spear phishing attempts.

Tools 90
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.