Flylib.com
List of Sidebars
Previous page
Table of content
Chapter 1: Why Doesn’t CRM Work?—Does the Customer Really Want to be Managed?
How Much Empowerment Is Too Much?
Chapter 3: “One Girl in a Convertible...”—It Takes More than a Database
The Kraft Online Community
Chapter 4: Why Do We Have Two Ears and Only One Mouth?—The importance of dialog
Winning the Game
Chapter 7: Type, Point, Click, and Send Now—Cheaper and faster than a letter, less intrusive than a phone call, less hassle than a fax
E-Mail Etiquette Tips
Chapter 9: Personalization Technology—Boon or Bust? Empowering the Customer Requires More than Just Personalization
Let Your Customers Know What You Are Doing
Why Personalize?
Chapter 10: But What About the Loyalty Card?—Does CMR Mean the End of Traditional Loyalty Marketing?
Use of Customer Information from Loyalty Cards
Chapter 12: All Cows Look Alike: Brand Building—It Begins and Ends with the Customer
Key Points
Chapter 14: Customer Service—Who Cares?—CMR Doesn’t Mean “Best Customer Service” for Everyone
It’s More than Good Service: It’s About ROI
A Few Reminders
Chapter 15: Which Customers and Why—You Can’t Make Everyone Happy
Final Reminders
Chapter 17: There’s No Free Lunch—But CMR Should Not be an Added Expense
The New Rules of CMR
Conclusion
Concepts to Get You Started
Previous page
Table of content
Why CRM Doesnt Work: How to Win By Letting Customers Manage the Relationship
ISBN: 1576601323
EAN: 2147483647
Year: 2003
Pages: 141
Authors:
Frederick Newell
,
Seth Godin
BUY ON AMAZON
Java I/O
Buffers and Channels
Little-Endian Numbers
JavaDoc
Nonblocking I/O
Selectors
High-Speed Signal Propagation[c] Advanced Black Magic
Scaling Copper Transmission Media
Normalizing the Output of an FFT Routine
Useful Fourier Transform-Pairs
Coaxial Cabling
Reduced-Voltage Signaling
A+ Fast Pass
Domain 1 Installation, Configuration, and Upgrading
Domain 4 Motherboard/Processors/Memory
Domain 5 Printers
Domain 2 Installation, Configuration, and Upgrading
Domain 4 Networks
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Using vectors Instead of Arrays
Giving Each Instance of a Class a Unique Identifier
Extracting a File Extension from a String
Computing the Sum and Mean of Elements in a Container
Hardcoding a Unicode String
SQL Hacks
Hack 14. Generate Combinations
Hack 50. Combine Tables Containing Different Data
Hack 73. Mix File and Database Storage
Hack 85. Traverse a Simple Tree
Wider Access
PMP Practice Questions Exam Cram 2
Exam Prep Questions
Exam Prep Questions
Project Closing
Professional Responsibility
Answers and Explanations
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies