CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

outbound communications

Results 1 - 8 of 8Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Dec 04, 2015
Infrastructure is used by customer and employee service and support centers, inbound and outbound telemarketing services, help desk services, government-operated support centers, and other types of structured communications operations.
Tags : 
cisco, zk research, wifi, multigigabit network, networking, wireless
    
Cisco
Published By: Genesys     Published Date: May 10, 2016
This white paper will identify the key components of a comprehensive outbound engagement strategy and detail the benefits organizations can achieve with outbound communications.
Tags : 
genesys, frost & sullivan, communication, conversation, proactive, outbound engagement, customer experience, enterprise applications
    
Genesys
Published By: Genesys     Published Date: Aug 11, 2016
This white paper will identify the key components of a comprehensive outbound engagement strategy and detail the benefits organizations can achieve with outbound communications. Are you ready to lean how?
Tags : 
outbound engagement strategy, outbound communications, genesys, support costs
    
Genesys
Published By: Proofpoint     Published Date: Apr 22, 2010
This report summarizes the findings of Proofpoint's sixth-annual email security and data loss prevention study, including surprising statistics about how large companies manage the risks associated with outbound email, blog postings, media sharing sites, social networking sites, mobile Internet-connected devices and other electronic communications streams.
Tags : 
proofpoint, outbound email, data loss prevention, email security, social networking, electronic messaging, mobile email, internet security
    
Proofpoint
Published By: Bronto     Published Date: Sep 09, 2013
Short Message Service (SMS) marketing, or text messaging, has become one of the most widely used and effective media for both inbound and outbound marketing communications. This represents a tremendous opportunity for e-commerce marketers to use SMS marketing as an extension of their email marketing program to increase customer engagement and drive more revenue.
Tags : 
sms messaging, email marketing, strategic email marketing, e-commerce solutions, customer engagement
    
Bronto
Published By: Cisco     Published Date: Dec 04, 2015
Gartner defines contact center infrastructure (CCI) as the products (equipment, software and services) needed to operate call centers for telephony support and contact centers for multichannel support. This type of infrastructure is used by customer and employee service and support centers, inbound and outbound telemarketing services, help desk services, government-operated support centers, and other types of structured communications operations.
Tags : 
cisco, gartner, magic quadrant, contact center, infrastructure, telephony support, networking, research
    
Cisco
Published By: Cisco     Published Date: Dec 04, 2015
Infrastructure is used by customer and employee service and support centers, inbound and outbound telemarketing services, help desk services, government-operated support centers, and other types of structured communications operations.
Tags : 
cisco, magic quadrant, contact center infrastructure, worldwide, support center, networking
    
Cisco
Published By: Mimecast     Published Date: Oct 02, 2019
When it comes to securing email and protecting against cyberattacks, most organizations focus their attention and resources on inbound emails. Yet, only 40% of email originates through inbound system traffic. The other 60% of email traffic is introduced via internal-to-internal (40%) or outbound (20%) email communications. This E-book takes a close look at several email-related activities that employees often engage in that contribute to the spread of insider threats and discusses what measures organizations can take to protect themselves.
Tags : 
    
Mimecast
Search