Search Results

Results 1401-1420 of 3282 for Staff

Social Media Adventures in the New Customer World

"Not every businesses' audience is online-savvy, so first determine if using social media outreach for customer service will be worth your time," said Staples' Deschenes. "If you do decide to use social media outlets for customer service, you must be ready to be responsive. Take time to train your staff to ensure that you offer the same quality customer service, regardless of customer channel."

Social Nets Need New Privacy Rule Book, Says Senator

"We were surprised by Senator Schumer's comments and look forward to sitting down with him and his staff to clarify," spokesperson Andrew Noyes told the E-Commerce Times "As Internet users seek a more social and interactive experience, Facebook has responded," Noyes said. "Las...

EXPERT ADVICE

No-Cost Innovation: Capitalize on Customer Ideas

The top echelons of management expect innovative ideas from their employees. However, customer-facing staff either feels intimidated about discussing a customer idea or think it is too impractical to implement. Let us consider this example: An insurance company customer sugge...

White House Gives Back: Drupal Gets New Custom Code

Indeed, "the contributions being made by the WhiteHouse.gov developers and support staff are significant, meaningful pieces of code for improved scalability, email outreach and accessibility that can benefit any and all Drupal users," Jay Lyman, analyst for enterprise software with the 451 Group, told LinuxInsider...

Google’s Tablet Plot Thickens With Agnilux Buy

Agnilux was launched by a group of former employees of P.A. Semi, a chip company acquired by Apple in 2008, which was reputed to have designed the chip for the iPad. Other Agnilux staffers reportedly came from Cisco, IBM, TiVo, Boeing and RealNetworks. Google did not return t...

Microsoft Gives SMB Sysadmins a Place in the Cloud

Windows Intune is intended to make it easier or IT staff to manage and secure PCs from anywhere using the cloud. Its beta was released to 1,000 customers and IT partners in the United States, Canada, Mexico and Puerto Rico Monday Users can manage PCs through a Web-based consol...

EXPERT ADVICE

Top Three IT Time-Wasters

In many organizations, the expectation is that technical personnel will manually review log file information on a periodic (in some cases, like what's required by PCI, daily) basis. Given that a typical organization might produce gigabytes of log file data per day, how reasonable is it to expect staffers to weed through it by hand? Best case, it gets done at Herculean effort and expense -- worst case, folks don't have the time to do it and it falls by the wayside. Not only is it hard (some would say impossible) to do this right without automation, can you imagine a more boring and unfulfilling job for a technical staffer than reading through gigabytes of log files on a daily basis? It's inefficient at best and a sure path to "flight risk" resources at worst...

School District Accused of Snapping Thousands of Shots of Students at Home

Carol Cafiero, a technology coordinator now on leave from Harriton High School, "may be a voyeur," the motion suggests. Responding to an email from an IT staffer about how viewing students from the computer webcams amounted to a sort of "[school district] soap opera," Cafiero responded, "I know, I love it," according to the recent filing...

EXCLUSIVE INTERVIEW

Security Is an Infrastructure Problem: Q&A With Trend Micro CEO Eva Chen

Our surveys show that small-business owners think they're too small to be targeted so they're on lower alert and don't have security staff. But we've recently seen a lot of attacks against small businesses TNW: Well, why don't businesses enforce policies more strictly?...

EXCLUSIVE INTERVIEW

Security Is an Infrastructure Problem: Q&A With Trend Micro CEO Eva Chen

Our surveys show that small-business owners think they're too small to be targeted so they're on lower alert and don't have security staff. But we've recently seen a lot of attacks against small businesses TNW: Well, why don't businesses enforce policies more strictly?...

EXCLUSIVE INTERVIEW

Security Is an Infrastructure Problem: Q&A With Trend Micro CEO Eva Chen

Our surveys show that small-business owners think they're too small to be targeted so they're on lower alert and don't have security staff. But we've recently seen a lot of attacks against small businesses TNW: Well, why don't businesses enforce policies more strictly?...

Obama on Space Exploration: We’ve Got to Be Smart

Not only that, but "the strategy he outlined is actually one that's been developed over recent years by teams of very professional space strategists," Oberg pointed out. "These ideas are not something Obama or his staff made up." Essentially, Obama's policy "resets the game cl...

OPINION

That Was The Week That Was in Online Journalism

The Pulitzer jury thought so too. Although it didn't give a lot of details in its citation other than: "Awarded to The Seattle Times Staff for its comprehensive coverage, in print and online, of the shooting deaths of four police officers in a coffee house and the 40-hour manhunt for the suspect," the telling point is in its description of the Breaking News category -- "For a distinguished example of local reporting of breaking news, with special emphasis on the speed and accuracy of the initial coverage, presented in print or online or both." In this case, Twitter and Google Wave did not get in the way of speed or accuracy, as social media's critics have crowed...

NSA Chief: Cyberwar Rules of Engagement a Policy Minefield

Requests by TechNewsWorld to obtain a copy of Alexander's response from the Department of Defense and the Senate committee were denied. "Responses to questions from Congressional committee members are the property of that committee," spokesperson USAF Lt. Col. Rene White told TechNewsWorld. "It would be inappropriate for the Defense Department to release that information." A committee staffer told TechNewsWorld that it was against the panel's policy to release the material to the public...

OPINION

From CRM to Reality: Turning Data Into Action

Here's one for the sales managers: sales reps' vertical momentum. Your sales staff may be bringing in good numbers, but are there areas where specific sales people could be focused to make those numbers better? Examining the velocity that types of leads move through the funnel when attended to by specific sales people can help you understand the patterns in your sales and can help you steer the right kinds of leads to the right sales people...

Will HTC Incredible Live Up to Its Name?

Despite the rapid growth of the Android platform, however, Hazelton expects the iPhone will have an edge with enterprise users because of greater familiarity and comfort among corporate IT staff, as well as greater security controls than are currently available on the open Android platform...

Cities of the Future, Part 4: Open Source Avenue

In the educational sector, the Saugus Union School District in northern Los Angeles County moved its network operating system (NOS) from Novell to Red Hat Linux back in 2008. At that time, it handled 11,000 student accounts at 15 K-6 campuses and handled 800 staff accounts. The NOS also provided authentication through LDAP and authorization to 50 to 60 programs...

ANALYSIS

How Hoover’s Users Clean Up Inside-Sales Performance

While the traditional utilization by sales and marketing staff are predictably high, it should be noted that a number of other departments within end-user organizations use sales intelligence in double-digit percentages, and some, such as executive management and operations, who are not consistently involved in market- or customer-facing activities but nevertheless derive value from direct access to this content.

Salesforce.com Cuts Ribbon on Chatter App Exchange

For example, a Saleforce.com staffer mentioned on Chatter that he would be traveling to Austin and "immediately received a series of emails from local people in Austin and other people in the company that knew of certain situations or leads or prospects that this person might want to follow," noted Kaplan. "The only way that might have happened in the past was with an email blast, which would not have been appropriate." ...

EXPERT ADVICE

6 Critical Technologies for Combating Targeted Attacks

Hiring a professional penetration tester is often a humbling experience. Using a mix of simple social engineering and technology savvy, a professional is often able to expose dangerous security holes in an organization's IT infrastructure with ease. In a few days, a penetration tester can identify security vulnerabilities overlooked by the IT staff. ...

E-Commerce Times Channels