Yes, just over a decade or so ago, providing world-class customer service meant running a world-class call center. Then the evolution began. Voice was no longer the only accessible channel for your customer. It became email, then chat and then messaging. As these new channels of communication came about, CALL CENTERS became CONTACT CENTERS.
Filter by: Latest Video
Organizations subscribe to Microsoft Office 365; they synchronize their Active Directory and enable single sign-on (SSO). What they do not know is that they now have a bunch of capabilities available to them, many of them free, from their Microsoft Azure tenant. Yes, you heard correctly, their Azure tenant. But, wait a minute Pat; you said they subscribed to Office 365, not Azure. So how can they have an Azure tenant? Glad you asked.
Predictive analytics, otherwise known as data mining or advanced analytics, has become an area of increased interest in many industries. Predictive analytics leverages existing data sets and statistical algorithms to create models that predict future outcomes. With the advent of Big Data, large data sets combined with predictive analytics have led to jaw-dropping results.
To understand why, imagine a game show where you are asked to identify what picture is being slowly revealed square by square. As each piece of the larger picture is revealed, the chances of you accurately identifying the full picture increase. Similarly, the new ubiquity of data in fields – like healthcare – has increased the utility of predictive analytics.
Today marks the beginning of the next wave of innovation for the Cisco Unified Computing System (UCS). They are always innovating in this space and once again have stepped up!
The new announcements around UCS provides a broader and more powerful portfolio of technologies. They will allow customers to power applications at every scale and add intelligence at the edge, at the core and at the scale of cloud.
During my senior year in college (unfortunately many moons ago), I recall an instance where I was furiously trying to finish my senior design lab project with my teammates. Somewhat delirious from lack of sleep and too much caffeine, we were finishing the final pieces of our 200-page proposal and thesis together when the unthinkable happened: blue screen on my laptop.
The date was June 5th, 1895 and Jedidiah Collinsworth, CFO for General Corporation was having a very perplexing day. General Corporation was the largest maker of hammers in its time. However, the greatest cost to the business was generating power onsite via company owned generators. Every month the bills would stack up to the ceiling to cover the maintenance, new parts and full-time employees it took to generate electric power. Collinsworth thought to himself, “WE MAKE HAMMERS, NOT ELECTRICITY!” Three months later, an accountant working for Jedidiah stopped by his office. “Sir, there’s some men at the door, claiming they can sell us power – something called a utility. We would just flip the switch and only pay for what is consumed. Is this black magic?”
A global conference for virtualization and cloud computing hosted by VMware, VMworld kicked off yesterday at the Moscone Center in San Francisco. With over 22,000 attendees representing 85 countries, it was no surprise that VMware took the opportunity to make some major announcements.
Based on our recent survey of cloud decision makers, security/privacy continues to be the top factor on their influence to allocate compute and storage workloads between on-premise servers, co-location/third-party hosting or public/hybrid clouds.
Public safety services have changed dramatically over the years as technology has disrupted our industry. We now operate under a “mobile first” paradigm, where tools and information are extended from the enterprise to the field as their primary function instead of as an add-on feature set. Security – in the past considered a solution unto itself – is now pervasive at every level of system design.
We are in the middle of security conference season. Therefore, it’s not entirely unexpected to see headlines from Black Hat and other conferences discussing “grave” security threats, and what they mean to our ability to protect our organizations and ourselves.