| Old Articles: <Older 3421-3430 Newer> |
 |
CIO October 1, 2005 Meridith Levinson |
A Strong Job Market for CIOs The average tenure of a CIO in any single job is about five years.  |
CIO October 1, 2005 Alice Dragoon |
Of Course I Want Fries with That In an effort to improve order accuracy, JWB Ventures installed customer display screens from Radiant Systems on the front counter.  |
CIO October 1, 2005 Cassidy Healzer |
Invest For Better Performance If your IT department's performance isn't up to snuff, it may be because you spend too much time maintaining and repairing your existing systems, and not enough time investing in new technologies.  |
CIO October 1, 2005 |
Vendors You Like A survey finds that two of the factors influencing customer loyalty are trustworthiness and how easy a given company is to do business with.  |
CRM October 1, 2005 David Myron |
Back to Double-Digit Growth There will likely come a time when not one, but all CRM application vendors in the large enterprise category offer a hosted solution.  |
CRM October 1, 2005 Ken Landoline |
Contact Centers' Next Development It's hard to ignore the value of risk-averse pricing that IP-hosted call center solutions can bring to enterprises.  |
CRM October 1, 2005 Coreen Bailor |
On the Scene--Talk Good: Best Practices in Speech Deployment Industry experts provide guidance for considering and deploying speech technologies.  |
CRM October 1, 2005 Marshall Lager |
The Hot Skinny on Hackers What do they know, and how do they find out? A recent "hackers convention" revealed some of their secrets.  |
CRM October 1, 2005 Colin Beasty |
Required Reading: The Mobile Revolution Rings True An interview with Dan Steinbock, affiliate researcher at Columbia's Graduate School of Business who has traced the evolution and impact of mobile technology extensively. Here, the author discusses his book The Mobile Revolution.  |
CRM October 1, 2005 |
The Pulse: How Much Risk do You Think Fraudulent E-mails Pose to Your Business? Readers weigh in on the importance of e-mail security.  |
| <Older 3421-3430 Newer> Return to current articles. |