X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 complaint logging


Bolstering the Call Center with Service Resolution Management Processes
Integrated customer relationship management and call center solutions (sometimes referred to as service resolution management) have, despite initial glitches

complaint logging  service call (customer inquiry, complaint, etc.) comes in, and the agent fields it by performing a search. A technical bulletin, written by a product manager and stored on a network drive, comes up in the query results because the knowledge base searches both structured and unstructured knowledge. This very issue has been documented, and a resolution has been built to ensure that an answer can be provided. A wizard pops up and prompts the technical support agent to walk the customer through a setup

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Firewall RFI/RFP Template

Firewall Type, Decision Engine, Scalability, Network Interfaces, Operating Systems, Routing and Network Protocols, SNMP, NAT, Policy Features, Proxies, Authentication, Logging, Content Filtering, VPN and Encryption, Attack Resiliency, Certification, and more 

Evaluate Now

Documents related to » complaint logging

10 Steps to Continuous Compliance: Putting in Place an Enterprise-wide Compliance Strategy


Understanding the full scope of risk in today’s complex business environment is a must for achieving compliance with governmental mandates and industry regulations. However, many companies have a limited perception of risk and struggle to make compliance an enterprise-wide, integrated process. Compliance is no longer a one-time isolated project; it’s an ongoing effort—and you’re just tens steps away from discovering why.

complaint logging   Read More

Check Point Leads Firewall Market


With a workforce of 800+ employees, Check Point continues to see record revenues selling firewall and related information security solutions.

complaint logging   Read More

Telco Charged with Trickery on Technology


Bell Atlantic is charged with failing to fulfill promises to bring DSL and other high-speed Internet access to the home.

complaint logging   Read More

The Future of SOA-based Applications and Infrastructure


The ultimate winner in the SOA market will have to provide industry-specific solutions solving essential problems that others cannot. Focus must move away from technology lock-in and vendor dependency, to best solutions for customers, even if it means customers can use competitor products.

complaint logging   Read More

May a New Day Begin for Mature Enterprise Applications - Part 2


Part 1 of this blog series outlined the trend of enterprise applications vendors’ attempts to win their users’ hearts and minds (as well as wallets) via more intuitive and appealing user interface (UI) and user experience (UX) design. What that means is that users can now more quickly obtain all of the relevant information they need in a personalized way, with drill-downs and other slick

complaint logging   Read More

Identity-based NAC: Using Identity to Put the “Control” in Network Access Control


Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the identities of users and devices, and knows what resource they are authorized to access, allowing enterprises to tightly control access, and the devices and behavior of users.

complaint logging   Read More

Integrated Security: A New Network Approach


The challenge is to ensure that the right people gain access and the wrong people do not, making the role of information security even more critical to enabling today’s businesses. An integrated security approach offers the most effective security posture.

complaint logging   Read More

Marketing Automation: Coming of Age Slowly


Marketing is possibly the only remaining major business function yet to revise its core processes to take advantage of IT that can cut time, costs, and improve the quality of its operation. Nevertheless with marketing automation there are huge untapped opportunities for business improvement, given marketing has a unique vantage point in any enterprise to understand the customer needs, buying behavior, and value perception.

complaint logging   Read More

Oracle Further Orchestrates Its SOA Forays Part Six: Weaknesses and User Recommendations


Time will tell whether Oracle's vocal endorsement of open technologies such as J2EE and BPEL will allow customers to readily adopt solutions that fit their needs and that quickly integrate with their existing infrastructure.

complaint logging   Read More

The Art, Science & Software Behind (Optimal) Retail Pricing - Part 5


Part 1 of this series expanded on some of TEC’s earlier articles about companies’ need for better pricing management and optimization practices. This series, which focuses on the complexity of pricing and promotions in retailing, was inspired by JDA Software’s recent “edu-nouncement” on leading retailers consumer-centric pricing and promotions strategies, and by Revionics’ recent (and still

complaint logging   Read More