customer relationship management system

G.VIJAY,S.PORKAMALAM

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:3         Issue:2         Year: 25 August,2014         Pages:375-379

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Customer Relationship Management or CRM is a business strategy designed to optimize revenue and increasing customer satisfaction, attracting new customer, retaining existing customers and understanding customers better. A successful CRM implementation can improve the business process by improving selling and servicing functions. Because of the internet, markets move faster and competition is much more fierce. Currently they employ diverse information system to maintain different aspect of customer relationships separate system often give incomplete and outdated information on the customer. CRM provides an integrated system to maintain good relationship with customer. CRM is the fastest growing segment of the enterprise application market today. The major driver of this growth is the internet. The rapid growth of E-commerce has caused the most significant change in CRM application. CRM packages allow the organization to internet with, sell to and service Customers through different channels.

Kewords

CRM, WEB ANALYSIS.

Reference

[1] Chieh-Jen Cheng, Chao-Ching Wang, Wei-Chun Ku, Tien-Fu Chen , and Jinn-Shyan Wang, “Scalable High-Performance Virus Detection Processor Against a Large Pattern Set for Embedded Network Security” Commun. vol. 51, pp. 62–70,2011. [2] O. Villa, D. P. Scarpazza, and F. Petrini, “Accelerating real-time string searching with multicore processors,” Computer, vol. 41, pp. 42–50,2008. [3] D. P. Scarpazza, O. Villa, and F. Petrini, “High-speed string searching against large dictionaries on the Cell/B.E. processor,” in Proc. IEEE Int. Symp. Parallel Distrib. Process., 2008, pp. 1–8. [4] D. P. Scarpazza, O. Villa, and F. Petrini, “Peak-performance DFA based string matching on the Cell processor,” in Proc. IEEE Int. Symp. Parallel Distrib. Process., 2007, pp. 1–8. [5] L. Tan and T. Sherwood, “A high throughput string matching architecture for intrusion detection and prevention,”in Proc. 32nd Annu. Int. Symp. Comput. Arch., 2005, pp. 112–122. [6] S. Dharmapurikar, P. Krishnamurthy, and T. S. Sproull, “Deep packet inspection using parallel bloom filters,” IEEE Micro, vol. 24, no. 1, pp.52–61, Jan. 2004. [7] R.-T. Liu, N.-F. Huang, C.-N. Kao, and C.-H. Chen, “A fast string matching algorithm for network processor-based intrusion detection system,” ACMTrans. Embed. Comput. Syst., vol. 3, pp. 614–633, 2004. [8] F. Yu, R. H. Katz, and T. V. Lakshman, “Gigabit rate packet pattern matching using TCAM,” in Proc. 12th IEEE Int. Conf. Netw. Protocols, 2004, pp. 174–178.intrusion detection system,” ACMTrans. Embed. Comput. Syst., vol. 3, pp. 614–633, 2004. [9] R. S. Boyer and J. S. Moore, “A fast string searching algorithm,”Commun. ACM, vol. 20, pp. 762–772, 1977. [10] V. Aho and M. J. Corasick, “Efficient string matching: An aid to bibliographic search,” Commun. ACM, vol. 18, pp. 333–340, 1975