Customer Operations For Dummies, 2nd ServiceNow Special Edition
By: ServiceNow View more from ServiceNow >>
Download this next:
E-book: Customer Operations 101
By: ServiceNow
Type: eBook
Customers want answers to their issues and requests yesterday. So, how can you empower your teams to deliver proactive service?
Enter Customer Operations for Dummies, 2nd ServiceNow Special Edition, your guide for fueling seamless customer experiences.
Inside, you’ll learn the secret to connecting teams across your enterprise, enabling you to gain visibility over all issues, gift customers the ability to self-serve, and meet ever-evolving customer needs – all at a lower cost.
These are also closely related to: "Customer Operations For Dummies, 2nd ServiceNow Special Edition"
-
Discover the power of embedded analytics for your business
By: Qlik
Type: eBook
Digital transformation necessitates high-quality analytics for wider audiences. Embedded analytics integrates analytical tools into applications, enhancing accessibility and adoption.
This digital edition of the popular For Dummies series of reference books shines a light on the ins and outs of embedded analytics, including:
- The evolution of embedded analytics
- Top considerations and how to measure success
- Key sectors that benefit from embedded analytics
- And more
Discover how embedded analytics offers immediate, relevant insights for smarter decisions and increased business value. Download the full 35-page eBook to learn more.
-
Attack surface management
By: Palo Alto Networks
Type: eBook
With more cloud environments and digital assets in play than ever before, the enterprise attack surface has become increasingly complex and difficult to manage.
This Attack Surface Management (ASM) for Dummies, e-book presents a coherent overview of ASM, teaching you about the important security protocol through 6 key stages:
- The Current State of Attack Surface Management
- Defining Attack Surface Management
- Preventing Common Attacks with Attack Surface Management
- And 3 more
Download now to unlock the extensive e-book and all the insights contained within it.
Find more content like what you just read:
-
Software Escrow Essentials: Safeguarding Critical Applications
By: NCC Group
Type: eBook
Software escrow is a critical tool to mitigate risks from vendor failure or disruption. This e-book explains how escrow works, the benefits, and how to choose the right escrow agreement and verification level for your needs. Read the full e-book to learn how to protect your software investments.
-
Cloud analytics automation best practices
By: Alteryx
Type: eBook
In this 48-page For Dummies e-book, you’ll discover how leveraging the cloud for analytics automation enables enterprise customers to connect their disparate data sources across multiple clouds and their on-premises data centers. Read on to learn how you can get the most out of your data.
-
For Dummies 46-pg e-book: Data warehouse automation in Azure
By: Qlik
Type: eBook
In this 46-page For Dummies e-book, you'll learn about the benefits of cloud data warehousing, including scalability, security, and real-time analytics. Read on now to find out how you can build an agile data pipeline and accelerate time to value.
-
Software Firewalls for dummies
By: Palo Alto Networks
Type: eBook
In this free Software Firewalls for dummies e-book, discover everything you need to know about today’s demands for software firewalls and zero trust, and find out the 10 essential questions you need to ask your software firewall vendor.
-
Security leader’s guide to Microsoft 365 data backup
By: Veeam Software
Type: eBook
Protecting Microsoft 365 data is essential to any modern cybersecurity strategy, since the suite’s applications are so commonly used in businesses of all sizes and industries. Read this e-book for 10 steps you can take to build a more proactive approach to security.
-
Storage as a Service for Dummies
By: Pure Storage
Type: eBook
Download your free copy of Storage as a Service for dummies for your essential, comprehensive introduction to how your organization can make the most out of storage as a service solutions.
-
Security orchestration 101: What is it?
By: Palo Alto Networks
Type: eBook
Security refers to the integration of security tools, unifying intelligence and automating tasks, resulting is a more effective security operations center that better detects and responds to threats. Dive into this e-book to start your security orchestration journey today.
-
Finance Analytics
By: Alteryx
Type: eBook
The Office of Finance has insight into every business unit throughout the organization so it’s no surprise CFOs are assuming more strategic roles. This e-book will discuss how forward-thinking leaders are leveraging emerging technologies and data analytics to transform their teams in this changing world of finance. Read on now to learn more.
-
Finance Analytics
By: Alteryx
Type: eBook
The Office of Finance has insight across the organization, positioning CFOs in more strategic roles with rising expectations from stakeholders. This e-book explores how leaders use emerging tech and data analytics to transform finance teams. Access the e-book to learn more.
-
Data Fabric For Dummies
By: Hitachi Pentaho
Type: eBook
In this digital edition of the popular For Dummies series of reference books, step into the world of data fabrics: inside, learn what a data fabric is and how to realize its benefits, how to effectively build and deploy a data fabric, best practices for optimizing and modernizing data access, and more.
-
Hybrid Cloud Backup for Dummies
By: Veeam Software
Type: eBook
Tap into this Hybrid Cloud Backup for Dummies e-book to discover the importance of employing purpose-built backup and recovery for each of your environments, while retaining ownership of your data.
-
The Definitive Guide to Securing Containerized Applications
By: Palo Alto Networks
Type: eBook
Securing container environments requires understanding tools and policies for protecting infrastructure, applications, and components. This guide explores container security across the lifecycle, from build to runtime, and offers a roadmap to prepare your environment and secure your containers. Read the full e-book to learn more.
-
Data You Can Trust: The Complete Guide to Data Quality
By: Qlik
Type: White Paper
This comprehensive guide explores factors that contribute to creating high-quality data and offers guidance on how enterprises can ensure their data meets high standards. Download the white paper now to learn how you can prioritize data quality and unlock its full potential.
-
Data You Can Trust: The Complete Guide to Data Quality
By: Qlik
Type: White Paper
This comprehensive guide explores factors that contribute to creating high-quality data and offers guidance on how enterprises can ensure their data meets high standards. Download the white paper now to learn how you can prioritize data quality and unlock its full potential.
-
Productivity Driving With Service Operations
By: Service Now x Agineo
Type: eBook
This eBook explores how modern, unified, and automated service operations can empower teams, improve service availability, and drive business impact. Learn how to unlock innovation and deliver extraordinary technology experiences. Read the full eBook today.
-
5 important CMDB pain points to address
By: Tanium
Type: eBook
99% of organizations using CMDB tooling that do not confront configuration item data quality gaps will experience visible business disruptions according to Gartner. So, how can you level-up your CMDB? Browse this e-book to discover how Tanium and ServiceNow deliver asset management peace of mind and can improve your CMDB.
-
Future of Work
By: TechTarget ComputerWeekly.com
Type: Book
In this extract from his book, The Future of Work, Jacob Morgan looks at the five key factors shaping the way we work.
-
ServiceNow Customer Insights: Customer Experience Testimonials
By: ServiceNow
Type: eBook
Discover in this e-book how ServiceNow customers continue to persevere— do more with less—while still managing to improve customer satisfaction.
-
The components and objectives of privacy engineering
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
-
The LLM Mesh: A Practical Guide to Using Generative AI in the Enterprise
By: Dataiku
Type: eBook
This data, from a 2024 Dataiku and Cognizant survey of 200 senior analytics and IT leaders, highlights that GenAI is a top priority at the highest level — nearly three-quarters of respondents (73%) will spend over $500,000 on the tech in the next 12 months.
-
Collaboration software in the era of Gen-Z
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, learn how Microsoft is dominating the Software-as-a-Service space thanks to its strength in collaboration software and how the new generation of collaboration software could be stoking communication overload. Also, check out our chart comparing Slack, Microsoft Teams and Spark.
-
Zoom Workplace Vs. Microsoft Teams: Which Is Best For Your Organization?
By: Zoom Video Communications
Type: eBook
Explore the differences between Zoom Workplace and Microsoft Teams to determine the best collaboration solution for your organization. Compare features, costs, and more to see how Zoom can reduce your total cost of ownership. Read the full eBook to learn which platform best fits your needs.
-
How do Iconic Business Models such as Airbnb Emerge?
By: TechTarget ComputerWeekly.com
Type: Research Content
Brands such as Airbnb disrupt industries and change how consumers think about the market, according to this research from Cass Business School, City University London.
-
Proactive Field Service Roadmap: 5 Key Priorities
By: ServiceNow
Type: eBook
This report explores transitioning from reactive to proactive field service model, highlighting 5 priorities. Read on to understand them and to see how ServiceNow enhances operations by connecting teams, streamlining tasks, and empowering customers with its platform and Field Service Management app.
-
Who will win the world's biggest cloud contract?
By: TechTarget ComputerWeekly.com
Type: Essential Guide
In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.
-
Preview! Identity Security for Software Development (O'Reilly)
By: CyberArk
Type: eBook
Whether you’re just starting your coding journey or a seasoned veteran, this e-book serves as a comprehensive resource for those who want to develop a deep understanding of secure coding principles and best practices. Read the O’Reilly e-book to understand today’s identity security and secure development essentials.
-
Cloud computing storage key management
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
-
How to Democratize Analytics
By: Alteryx
Type: eBook
Data democratization is a challenging, ongoing process that requires a clear strategy and buy-in from crucial people within your business. Download this guide to identify and address democratization challenges, learn what you need to do to successfully democratize, and discover the ROI you could see from your efforts.
-
Don't Rip and Replace: How Insurance Providers Can Do More with Data in the Cloud
By: Silk Technologies Inc
Type: White Paper
By leveraging the cloud, insurance providers can unlock numerous benefits, including better customer experiences and data security. Yet, providers face roadblocks on the path to cloud adoption. To learn how to overcome them, explore this white paper.
-
Cloud Native Application Protection Platforms
By: Palo Alto Networks
Type: eBook
This e-book explores cloud native application protection platforms (CNAPPs) and how they enable collaborative security across development, DevOps, and security teams. Learn how CNAPPs provide a holistic approach to securing cloud native applications from code to cloud. Discover the foundations of comprehensive cloud security.
-
Strategic collaboration: The key to marketing success
By: Asana
Type: Research Content
Strategic collaboration is critical for marketing success in today's complex landscape. This report reveals insights on aligning goals, embracing data-driven practices, and harnessing AI to drive marketing innovation. Read the full report to unlock the power of collaboration and gain a competitive edge.
-
How to keep your hybrid workforce productive
By: Tanium
Type: White Paper
Organizations of all sizes have very similar goals: keeping the workforce productive, including hybrid workers, lessening the burden on the IT help desk, and putting care into the employee experience. With the digital employee experience (DEX) being a focus of employee’s today, employers that get it right will succeed. Read on to learn more.
-
Observability Engineering: Achieving Production Excellence
By: Honeycomb
Type: eBook
Observability is critical for managing today's software.This O'Reilly e-book presents 321 pages of expert insights on the state of observability engineering, giving you the information you need to understand the most prevalent trends and strategies. Read on to learn more.
-
The complete guide to building an identity protection strategy
By: CrowdStrike
Type: White Paper
This white paper explores the threat of identity-based attacks and outlines a modern identity security strategy to protect your organization. Learn to gain unified visibility, detect anomalies in real-time, and implement risk-based conditional access to stop breaches. Read the full white paper to build an effective identity protection strategy.
-
Kubernetes Patterns: Reusable Elements for Designing Cloud Native Apps
By: Red Hat
Type: eBook
This exhaustive O'Reilly e-book aims to help developers discover and learn about the most common patterns for creating cloud-native applications with Kubernetes. Read the book now, or save it for reference material in a pinch.
-
AWS for RMS Modern Revenue Management in the Cloud
By: Amazon Web Services
Type: White Paper
This guide is designed to help business and technical leaders in the travel and hospitality (T&H) industry modernize and optimize their revenue management(RM) practices to improve company profitability. Click here to learn more.
-
AWS for RMS Modern Revenue Management in the Cloud
By: Amazon Web Services
Type: White Paper
This guide is designed to help business and technical leaders in the travel and hospitality (T&H) industry modernize and optimize their revenue management(RM) practices to improve company profitability. Click here to learn more.
-
Dash to Flash
By: MicroScope
Type: Ezine
It's time for flash Users have started to move towards flash storage in serous numbers and now is the time for the channel to get behind the technology
-
Create a production-ready AI environment in 6 steps
By: Red Hat
Type: eBook
In this e-book, you’ll discover how you can leverage the transformative power of artificial intelligence (AI), machine learning (ML), and deep learning (DL) to make the most of your data. Read on to learn how you can overcome the most troublesome deployment challenges and build a production-ready AI/ML environment.
-
AI/ML deployment: How to overcome key challenges
By: Red Hat
Type: eBook
Artificial intelligence and machine learning (AI/ML) technologies employ data to deliver business insights, automate tasks, and advance system capabilities. This e-book shows how organizations across industries are using Red Hat technologies to build AI/ML solutions that deliver real business value.
-
Red Hat OpenShift AI: Customer success stories
By: Red Hat
Type: eBook
Download this e-book to learn the 6 essential steps to building a production-ready AI/ML environment.
-
WAAP Buying Guide
By: F5 Inc.
Type: White Paper
Distributed cloud apps and APIs require advanced protection to prevent data breaches, downtime, and account takeovers. Learn the key elements of an effective web application and API protection (WAAP) solution in this buyer's guide.
-
Enhance financial services security and user experience
By: Sinch
Type: eBook
Explore how zero-click two-factor authentication can enhance security and user experience for financial services. Learn about innovative solutions like Data Verification and Flash Call Verification that streamline authentication without compromising protection. Read the full guide to discover how these methods can transform your processes.
-
Generative AI in the enterprise with AMD Accelerators
By: Dell Technologies & AMD
Type: White Paper
How can you ensure your organization is leveraging GenAI to the best of its abilities. This design guide describes the architecture and design of the Dell Validated Design for Generative AI with AMD accelerators. Read now to learn more. Dell PowerEdge server with AMD Instinct™ Accelerators.
-
Revolutionize your contact center with conversational IVR
By: Boost.ai
Type: White Paper
Discover how conversational IVR can revolutionize your contact center. This guide explores the benefits of voice bots, including increased accuracy, flexibility, and reduced costs. Learn the 5 steps to a successful voice project and how boost.ai's solutions can transform your customer experience. Read the full white paper.
-
IT leader's guide: AIOps for monitoring
By: LogicMonitor
Type: eBook
IT departments, under increasing pressure to work faster and deliver results while reducing costs, could use the benefits offered by AI. In this eBook, learn how an AIOps approach that builds on observability and automation enables IT to gain the insights they need to work more proactively and perform more effectively.
-
Red Hat Ansible Automation Platform: A Beginner’s Guide
By: Red Hat
Type: eBook
Download this e-book for a beginner’s guide to IT automation, and find out how Red Hat Ansible Automation Platform can help you in your journey.