ood

Results 1 - 25 of 1126Sort Results By: Published Date | Title | Company Name
Published By: Global Payments     Published Date: May 02, 2019
China is becoming one of the most important markets for luxury goods in the world. The rise of the Chinese luxury consumer is bringing a world of opportunities to luxury retail giants across the globe. By 2025, it is expected that consumers in China will account for 44% of the $339 billion in luxury goods spending worldwide. This infographic highlights these projected luxury sales increases and identifies the primary drivers and the preferred payment methods for Chinese consumers.
Tags : 
luxury goods, global payments, unified commerce, retail, wechat pay, alipay, chinese wallets, global commerce, mobile payments
    
Global Payments
Published By: Global Payments     Published Date: May 02, 2019
In just a few decades we've gone from face-to-face, catalog and phone omnichannel: endless retail/multiple ways to buy and receive goods. That change has expolded sales.  Download this interesting Infographic to see more.
Tags : 
ecommerce, secure buying, global payments, automatic payments, online shopping, luxury goods, retail, wechat pay, alipay, chinese wallets, global commerce, mobile payments, unified commerce, payment convenience, global payments technology, e-retail, pos technology
    
Global Payments
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
    
Fidelis Cybersecurity
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 21, 2019
One of the largest consumer product goods conglomerates wanted their entire platform to be re-hosted, and also enhance its storage and stability. The LTI-developed Cloud Native app on Azure PaaS also helped drive the business value for sourcing through the integration of S2P transformation. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: IBM APAC     Published Date: May 14, 2019
Machine Learning For Dummies, IBM Limited Edition, gives you insights into what machine learning is all about and how it can impact the way you can weaponize data to gain unimaginable insights. Your data is only as good as what you do with it and how you manage it. In this book, you discover types of machine learning techniques, models, and algorithms that can help achieve results for your company. This information helps both business and technical leaders learn how to apply machine learning to anticipate and predict the future. You will find topics like: - What is machine learning? - Explaining the business imperative - The key machine learning algorithms - Skills for your data science team - How businesses are using machine learning - The future of machine learning
Tags : 
    
IBM APAC
Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
As the information age matures, data has become the most powerful resource enterprises have at their disposal. Businesses have embraced digital transformation, often staking their reputations on insights extracted from collected data. While decision-makers hone in on hot topics like AI and the potential of data to drive businesses into the future, many underestimate the pitfalls of poor data governance. If business decision-makers can’t trust the data within their organization, how can stakeholders and customers know they are in good hands? Information that is not correctly distributed, or abandoned within an IT silo, can prove harmful to the integrity of business decisions.
Tags : 
    
Group M_IBM Q2'19
Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
Published By: Genesys     Published Date: Feb 12, 2019
The maturity of cloud platforms inspires new confidence in moving mission critical systems to the cloud to gain agility, scale, and cost benefits. How can your company achieve these benefits? What steps are necessary to begin your contact centre’s inevitable move to the cloud? Choosing the right contact centre partner will ensure your cloud journey success. Do you know how to find the right contact centre partner to help move to the cloud? This eBook offers ten key considerations for selecting a partner and moving to a cloud-based contact centre. Having a good sense for your business requirements, your prospective partner’s capabilities, and the cultural fit will pay off in helping you realize your business goals in the long run.
Tags : 
    
Genesys
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing, network architecture, servers, traffic management, cloud computing, data center design and management
    
Coyote Point Systems
Published By: CareerBuilder     Published Date: Sep 07, 2010
Whether you've had an employee referral program for years, are only in the initial stages of building one, or have never had one at all, this e-book is full of tips and advice on making your program the best it can be.
Tags : 
careerbuilder, employee referral, recruiting, qualified, ebook, social networking, roi, training, hiring, global hr management, human resources management, staffing, training and development
    
CareerBuilder
Published By: iCorps     Published Date: Jun 11, 2009
Finding the right IT service provider is not as simple as it may seem. Choosing a service provider based exclusively on low price may be good for your bottom line, but may fall short on delivering the right level of IT expertise and resource scalability for long-term advantage.
Tags : 
icorps, it service provider, it outsourcing, competitive advantage, roi, oursourcing, advantage, business management, it spending, project management, return on investment, workforce management, productivity, service management
    
iCorps
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, identity management, internet security, security management, security policies, data protection, database security, vulnerability management
    
Ounce Labs, an IBM Company
Published By: OneUpWeb     Published Date: Jul 27, 2010
Separate fact from fiction with Oneupweb's new white paper on social media. By now you've heard the buzz about social media, and it's true, it is a cornerstone for branding, sales growth and PR.
Tags : 
oneupweb, usability, driving sales, e-commerce, ecommerce, task, clickability, demographics, design, website design, social media, marketing plans, growth
    
OneUpWeb
Published By: OneUpWeb     Published Date: Nov 23, 2010
Does social media marketing really work? How do you separate fact from fiction as you navigate your way through the buzz about "going viral"? Amidst the chatter about Twitter, Facebook, FourSquare, Digg, Delicious, and Linked In-what will really get your business ahead? Tune in to find out as Oneupweb CEO Lisa Wehr and Social Media Director, Maureen Michaels team up to unveil the truth.
Tags : 
oneupweb, usability, driving sales, e-commerce, ecommerce, task, clickability, demographics, design, website design, social media, marketing plans, growth
    
OneUpWeb
Published By: Good Technology     Published Date: Sep 27, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
    
Good Technology
Published By: Domino     Published Date: May 14, 2019
Lasers have been around since the 1960s, and the technology has proven to be transformative across a wide range of applications and industries. From cutting steel and reshaping retinas to storing and reading data, lasers have become so commonplace that it’s easy to forget the word itself is an acronym that describes the process by which this amazing light is created: Light Amplification by Stimulated Emission of Radiation
Tags : 
    
Domino
Published By: Information Builders     Published Date: Sep 24, 2008
Business Intelligence helps retailers, warehouse staff, customer services agents, and your value chain realize new innovations, improve margins, and propel profits to new heights. Learn how Ace Hardware, Food Lion, and others leverage our software.
Tags : 
information builders, infobuilders, business intelligence, soa, roi, crm, marketing value
    
Information Builders
Published By: Cotendo     Published Date: Sep 01, 2010
The company wanted a high-performing CDN partner that understood and supported AdBrite's vision and provided the same transparency in its services.
Tags : 
cotendo, case study, adbrite, high-speed ad delivery, cdn, content delivery, content integration, content management system, document management, information management
    
Cotendo
Published By: HPE APAC     Published Date: Jun 16, 2017
This white paper examines the various threats faced by mid-sized businesses and explains why a comprehensive approach to protection and resilience makes good business sense, and helps IT managers benchmark their company’s security posture against their peers’.
Tags : 
    
HPE APAC
Published By: Spectrum Enterprise     Published Date: Oct 29, 2018
Bandwidth. Speed. Throughput. These terms are not interchangeable. They are interrelated concepts in data networking that help measure capacity, the time it takes to get from one point to the next and the actual amount of data you’re receiving, respectively. When you buy an Internet connection from Spectrum Enterprise, you’re buying a pipe between your office and the Internet with a set capacity, whether it is 25 Mbps, 10 Gbps, or any increment in between. However, the bandwidth we provide does not tell the whole story; it is the throughput of the entire system that matters. Throughput is affected by obstacles, overhead and latency, meaning the throughput of the system will never equal the bandwidth of your Internet connection. The good news is that an Internet connection from Spectrum Enterprise is engineered to ensure you receive the capacity you purchase; we proactively monitor your bandwidth to ensure problems are dealt with promptly, and we are your advocates across the Internet w
Tags : 
    
Spectrum Enterprise
Published By: Cisco     Published Date: Dec 20, 2018
Knowledge workers today have a rich portfolio of team collaboration tools to help them get their jobs done, starting with email and encompassing texting, file sharing, online chat and message boards, social media and video conferencing. Yet collaboration across these tools can be a frustrating experience, due to the complexity of the technology and lack of integration. The good news: the application of emerging technologies and artificial intelligence (AI) enables more people to connect when and how they need to. And that makes for more productive teams.
Tags : 
    
Cisco
Published By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldn’t be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. It’s also highly likely that other threats, such as unauthorized M
Tags : 
    
Cisco EMEA
Published By: Automation Anywhere APAC     Published Date: Apr 18, 2019
Robotic process automation (RPA) has emerged as a hugely popular business-IT priority – and with good reason. RPA platforms grow more and more sophisticated by the day, opening up fresh automation opportunities throughout the enterprise and business. But RPA platforms generally aren’t a one-size-fits-all investment. In this market guide, find out how the top RPA vendors stack up against one another on key investment criteria, including ideal use cases, unique RPA capabilities, and more.
Tags : 
    
Automation Anywhere APAC
Published By: HERE Technologies     Published Date: Jan 16, 2019
Audience segmentation is key for successful ad campaigns. Without it, a brand is flying blind – wasting spend and resources. However, the good news is that increasingly sophisticated technology makes it possible for brands to gain a deeper understanding of their target audiences – and how to reach them. This is especially true of location intelligence-driven advertising which can give more timely and complete insights into audiences than ever before. As one of the world’s leading location platforms in 2018, HERE Technologies shares insights and solutions to buying location data for better audience segmentation. Find out about the challenges and questions to ask when buying location data and download the Buyers Guide for Marketers.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.