Security

Five Signs That You Might Need to Outsource

Five Signs That You Might Need to Outsource

If you’ve been able to resist outsourcing while the world around you is doing it, that’s great. However, it might be a good idea to start looking at the outsourcing option if you’re seeing one or more of the following happening in your company. 1. You just can’t find the right people. If you find […]

How to Use Customer Data to Improve Your Customer Experience in the Call Center

How to Use Customer Data to Improve Your Customer Experience in the Call Center

Customers are telling you exactly how to win and keep them. They share their data willingly, in exchange for a great brand experience. It’s up to savvy customer experience teams to make use of that data.  Learn about best in class strategies in the new Harte Hanks point of view paper “How to Use Your […]

Is Your Maintenance & Support Approach Making Your IT Sick?

Is Your Maintenance & Support Approach Making Your IT Sick?

Rx for World Class Support: A Dose of Prediction Leads to Problem Prevention I just returned from a fantastic week on Italy’s Amalfi Coast to celebrate my mother’s birthday!  A trip that we’d talked about for years, planned last minute in April and started to regret in May. How could anyone regret a trip to […]

It’s Time to Get Serious About Protecting Confidential BPS Information

It’s Time to Get Serious About Protecting Confidential BPS Information

The BPS Industry has a long history of exchanging confidential information between clients and providers.  Yet more often than not, parties recognize the confidential nature of the information but do little to safeguard and protect unauthorized disclosure.  Disclosure of this information can have devastating effects on relationships, deals, business and trust.  The time has come […]

What Keeps Shared Services Executives Up At Night?

What Keeps Shared Services Executives Up At Night?

What keeps shared services executives up at night? Here’s one example. Your company consolidated all its BPO functions into a shared services center. However, the center outsourced specific pieces of processes that it determined a service provider indeed could do better, faster and cheaper than you could. And then one morning you wake up to […]

Ready or Not, The Internet of Things is Here

Ready or Not, The Internet of Things is Here

Remember, back in the day, when we thought the smartphone was the ultimate in connectivity? At last, we were “unchained from our desks,” armed with a portable email inbox, calendar and a boatload of apps to make our personal and business lives better. Of course, we still had to wake up for that early morning […]

Privacy Concerns and the Monetization of Big Data

Privacy Concerns and the Monetization of Big Data

It is easy to get caught up in the greatness of Big Data analytics. It’s a marketer’s dream: tracking customer activity; understanding what he or she is thinking, doing—using this information to transform every interaction into unexpected delight. To know the customer is to love the customer, and companies everywhere are showing that love through […]

The Impact of Wearable Mobile on MDM Strategies

The Impact of Wearable Mobile on MDM Strategies

Move over, Rolex. Step aside, Armani. If the predictions hold true, tomorrow’s corporate climbers will all be ditching the designer accessories for the next big thing: namely, wearable computing devices. From smart watches to augmented reality glasses and contact lenses, today’s emerging tech toys have the potential to become tomorrow’s most valuable business tools. You […]

Criminals Turn to Outsourcing to Launch Distributed Denial of Service Attacks

Criminals Turn to Outsourcing to Launch Distributed Denial of Service Attacks

Here’s one sign that outsourcing has become an accepted global business strategy: the criminals have adopted it! Yes, friends, neighbors and countrymen, criminals are hiring IT experts to perform distributed denial-of-service (DDoS) attacks, which effectively bring down Websites. NSFOCUS, Inc., a company that provides enterprise-level network security solutions and services, tracked 168,459 individual DDoS attacks […]

The New-Age Social Revolution

The New-Age Social Revolution

Companies can use social media effectively to generate and spread ideas, to collaborate and communicate in real-time across the organization. In a world where the death of a butterfly in Mexico and rise of forest fires in Australia are connected, where opposing calamities like droughts and floods are the result of one cause, does it […]

Five Reasons Why Non-US Providers Are Beefing Up Their US Centers and Why This is Good for Outsourcing

Five Reasons Why Non-US Providers Are Beefing Up Their US Centers and Why This is Good for Outsourcing

Non-US-based outsourcing service providers are currently beefing up their US operations. A constellation of events are making this beneficial for both outsourcing buyers and providers. “Every provider wants a US presence,” observes Denis Winkler, Director at Alsbridge. “And if they already have a presence, it’s growing.” Some of the factors creating this new geographical attitude […]

The Two Cups of Coffee Attack and Other Data Security Breaches You May Never Suspect

The Two Cups of Coffee Attack and Other Data Security Breaches You May Never Suspect

You’ve spent a lot of time securing your company’s data—with firewalls and intrusion detectors, passwords and policies. You’ve invested in vulnerability tests to identify your weakest links and conducted penetration testing to find out if these vulnerabilities could turn into liabilities. But, with all these security precautions in place, one guy, carrying two cups of […]

How Big Data is Becoming Predictive, Helping Executives Make Better Decisions

How Big Data is Becoming Predictive, Helping Executives Make Better Decisions

Businesses have always wanted a crystal ball to predict the future. Now they can almost have one if they combine Big Data, analytic prowess and deep domain and process knowledge. For the first time, analytics is becoming predictive and can help executives make less risky decisions that affect their corporate futures. The key is you […]

Open Hybrid Clouds: The Best of Both Worlds

Open Hybrid Clouds: The Best of Both Worlds

Everyone loves hybrid models. Who doesn’t want the best of both worlds? IT organizations everywhere crave “a little bit of this and a little bit of that” approach to spread their risk. They want to keep control over infrastructure, business critical apps, data and processes that help preserve IP or enable a competitive edge while […]

Get More Bang for Your Buck: Do’s and Don’ts in Formulating Cloud Computing Contracts

Get More Bang for Your Buck: Do’s and Don’ts in Formulating Cloud Computing Contracts

In late September, high-profile cloud storage start up Nirvanix told its customers to stop replicating data on its servers and migrate to other providers like Microsoft Azure, IBM SoftLayer and Amazon S3. For several reasons, Nirvanix, sitting on a tidy $70 million in funding, was shutting down . Users had until October 15 to download […]

Social Media and Mobile Collaboration: Game Changer for Financial Services Industry

Social Media and Mobile Collaboration: Game Changer for Financial Services Industry

For centuries, banks have built their business models on the foundation of customer confidentiality. Secrecy and security are by-words in the world of banking. How can they be expected to embrace social media, a platform where things appear to be “open” and “public”? There is much for banks and financial institutions to worry about when […]