ods

Results 51 - 75 of 604Sort Results By: Published Date | Title | Company Name
Published By: Global Payments     Published Date: May 02, 2019
In just a few decades we've gone from face-to-face, catalog and phone omnichannel: endless retail/multiple ways to buy and receive goods. That change has expolded sales.  Download this interesting Infographic to see more.
Tags : 
ecommerce, secure buying, global payments, automatic payments, online shopping, luxury goods, retail, wechat pay, alipay, chinese wallets, global commerce, mobile payments, unified commerce, payment convenience, global payments technology, e-retail, pos technology
    
Global Payments
Published By: Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017     Published Date: Nov 22, 2018
Modern marketers leverage insights on how consumers browse goods or make a purchase, to design smarter cross-channel programs and create relevant campaigns. Brands that leverage cross-channel marketing see a 91% customer retention rate. You can do this too. Learn how other marketers in ASEAN are leveraging cross-channel to create real business impact. Join this webinar and hear from Charlie Loo, an award-winning marketer and our Principal Consultant on: • five practical ways you can use cross-channel marketing • the importance of cross-channel in a mobile first environment • the difference between multi-channel and cross-channel
Tags : 
    
Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017
Published By: Vision Solutions     Published Date: Aug 21, 2014
A report on research findings into the state of resilience and methods used companies to ensure their strength.
Tags : 
data management strategies, data protection, system migrations, data safeguarding
    
Vision Solutions
Published By: Salesforce Commerce Cloud     Published Date: Jul 12, 2016
96% of millennials say they still like to visit actual shops. They are also influenced more by online videos than TV advertising, and still rely on “official” reviews found in newspapers, magazines and online publications. If you want to be successful in this rapidly changing market, you need to attract millennials. Download this free research paper to find out how to attract millennials and adapt your methods to include them.
Tags : 
demandware, social, millennials, impressions, social media, social influence
    
Salesforce Commerce Cloud
Published By: UK Export Finance     Published Date: Feb 26, 2018
This guide explains how UK Export Finance can help you make sure your purchases of goods or services from the UK come with attractive terms of finance. The UK has a long tradition of innovation and excellence, and is the world’s sixth-largest exporter. With an open and friendly business environment, and expertise in sectors ranging from manufacturing and construction to services and technology, the UK is a trusted business partner to buyers around the world. Thanks to our flexible and competitive financing solutions, buying from the UK is more attractive than ever.
Tags : 
finance, government, international, trade, technology, services
    
UK Export Finance
Published By: ServiceNow     Published Date: Oct 18, 2013
Certifying the accuracy of a CMDB with inconsistent, manual methods is unreliable. ServiceNow's built-in data certification gives you the ability to automate the process. Learn how data certification works with the ServiceNow CMDB to deliver a trustworthy single system of record you can rely on.
Tags : 
configuration management, data certification, product management, servicenow, enterprise it cloud, it cloud company, infrastructure applications, management applications, operational applications, identifying configuration items, defining configuration items, integration, webinar, data quality
    
ServiceNow
Published By: Hyland Software     Published Date: Jun 16, 2016
Fueled by new technologies, expanding regulations and greater patient expectations, there’s a clinical content gold rush in the healthcare market. Sources and types of clinical content grow at an exponential rate and through increasingly refined input methods, including voice and improved OCR, clinicians capture more unstructured information about their patients than ever before. Making all clinically relevant content available together, in one place seems like a simple request. Must the response be so complex?
Tags : 
healthcare, technology, solutions, best practices, business management, process management, analytics, content management
    
Hyland Software
Published By: EMC Converged Platforms     Published Date: Oct 22, 2015
Old Dutch Foods, known for its broad selection of snack foods in the midwest United States and Canada, was struggling to get the right products to the right places at the right time. Its data center included outdated physical servers, and batch processing meant that inventory would not be updated until the end of the day as opposed to real time. In addition, recovering from power outages and disk failures could frequently take up to two weeks. To modernize its data center, Old Dutch Foods invested in EMC Converged Infrastructure. The fast and easy deployment of two VCE VBlock® systems running JD Edwards, MS Exchange, mobile device apps, and operation of a backup site with replicated applications and data. This enhanced the IT department's responsiveness to the business, allowed them to shift to real-time inventory, and reduced CapEx and OpEx costs. Operations were simplified by reducing person-hours needed for infrastructure maintenance by 75 percent.
Tags : 
    
EMC Converged Platforms
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Zooz Payments     Published Date: Nov 27, 2015
This ebook explores the connectivity and integration costs of managing a wide range of preferred payment methods and guides you through the hidden consumer costs and foreign exchange fees.
Tags : 
online payments, ecommerce payments, ecommerce, credit card processing, online gateway, payments solutions, payment systems, electronic payment systems, process online payments
    
Zooz Payments
Published By: Oracle     Published Date: Nov 27, 2017
Customer service has an opportunity to be a much more strategic weapon for businesses that understand its power. To do this means moving away from what has traditionally been viewed as a back-end operation and cost center to what is now being viewed as a brand-focused profit center. The primary driver of this sea change is engaged and empowered consumers, who want to get the answers to their questions anytime, anywhere, on any device they choose.
Tags : 
communications, telecom, financial services, insurance, technology, retail, wholesale distribution, manufacturing, discrete, consumer goods
    
Oracle
Published By: MicroStrategy     Published Date: Aug 12, 2012
Providing Store Team Leaders with Easy Access to Sales and Operations KPIs, Enabling Timely and Intelligent Decision-Making.
Tags : 
microstrategy, wholefoods, kpi, decision-making
    
MicroStrategy
Published By: MicroStrategy     Published Date: Aug 12, 2012
Hear how Whole Foods Market is using Mobile Business Intelligence to balance both individual store effectiveness and regional uniqueness while promoting the efficiencies of "oneness."
Tags : 
microstrategy, mobile, wholefoods, oneness
    
MicroStrategy
Published By: Webroot     Published Date: Nov 02, 2012
This paper examines the different endpoint security methods for virtualized environments and presents how Webroot® SecureAnywhereTM Business - Endpoint Protection security provides optimal performance, protection and manageability.
Tags : 
endpoint security, virtualization, virtualized environments
    
Webroot
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile threats, security, cloud, application, technology, solution
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile, workforce, bluecoat, security
    
Blue Coat Systems
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: Box     Published Date: Nov 24, 2015
One of the biggest problems with any organization is complete alignment among all teams. A lot of this breakdown is due to outdated methods of sharing important documents and information. Teams function best when they are able to access and collaborate on critical documents, presentations and files. Download this whitepaper to learn the top five ways any business can benefit from Box and see how it will allow your organization to operate faster across all departments to ensure everyone is aligned while driving growth to maintain security of your files to keep your projects running smoothly.
Tags : 
sharing documents, driving growth, maintain security, sharing files
    
Box
Published By: HP Inc.     Published Date: Feb 03, 2016
IT decision-makers weigh in Securing computers and their data against cyber-attacks and malicious applications is imperative in today’s business environments. IT professionals know this. But which methods are they using to secure laptops and desktops, and just how effective are these methods? See what 650 IT decision-makers had to say.
Tags : 
    
HP Inc.
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Pega     Published Date: May 24, 2016
Organizations operating in the retail financial services sector – banks and insurers – need to work smart and fast to keep pace with the increasing demands of their customers. We may have a 24/7 love affair with our smartphones but it is clear that in the future we will be sharing information and making payments via fitbands, cars, TVs and white goods, as the Internet of Things fuses the physical and digital worlds. For incumbent banks and insurers, the challenge will be to leverage the possibilities of this new hyper-connected world to embed themselves in their customers’ daily lives. They need to change the way operate, which includes how they market, engage and communicate with their customer base. This will be a key defense against the growing ranks of digital newcomers seeking to disrupt and dislodge incumbents through an array of innovative and smart new offers. However, too many are moving too slowly, either from an excess of caution or complacency. This report should serve as a
Tags : 
    
Pega
Published By: RSM US     Published Date: Apr 01, 2019
Middle market companies face a host of warehousing challenges that can limit growth and potentially hamper sustainability. Your organization must work to understand these issues and develop solutions to store, manage and move goods more effectively and therefore increase efficiency and productivity. With competition growing and new enhancements reaching the market on a regular basis, your company must be proactive to build and retain a competitive advantage. While each company is different, with unique issues and goals, the following four struggles are common across companies and their warehouses.
Tags : 
    
RSM US
Published By: Adobe     Published Date: Aug 04, 2015
This report introduces Forrester's vision of mobile marketing for marketing leaders and provides specific strategic recommendations for brands dealing with demanding mobile customers.
Tags : 
brand tactics, branding, consumer mobility, customer experience management, digital marketing, emerging methods, marketing methods, mobile apps, mobile marketing, mobile web, omnichannel customer experience, mobility
    
Adobe
Published By: Prophix     Published Date: Jun 03, 2016
Prophix and IMA hosted a webcast, titled “Overcoming Barriers to Implement CPM Methods”, featuring subject matter expert Gary Cokins, the CEO, at Analytics-Based Performance Management. The adoption rate of business analytics and corporate performance management (CPM) methods has been slowed by various barriers. Gary Cokins outlines the causes of this lag, as well as lessons learned about how to overcome obstacles, and obtain buy-in to manage and improve performance. He describes techniques such as strategy maps, balanced scorecards with key performance indicators (KPIs), channel and customer profitability reporting, and driver-based budgeting that can prevent failure when implementing CPM methods.
Tags : 
prophix, best practices, performance management, business analytics, productivity
    
Prophix
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.