pos

Results 1 - 25 of 3624Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 08, 2019
Découvrez ce à quoi ressemblent les aujour cybermenaces aJectant les PME d'hui aKn d'aider votre entreprise à survivre, à réduire ses dé coûts d'exploitation et à se velopper en limitant l'exposition aux risques.Faites de la sécurité une priorité pour tous et protégez votre entreprise grâce à Cisco.
Tags : 
    
Cisco EMEA
Published By: Global Payments     Published Date: May 02, 2019
In just a few decades we've gone from face-to-face, catalog and phone omnichannel: endless retail/multiple ways to buy and receive goods. That change has expolded sales.  Download this interesting Infographic to see more.
Tags : 
ecommerce, secure buying, global payments, automatic payments, online shopping, luxury goods, retail, wechat pay, alipay, chinese wallets, global commerce, mobile payments, unified commerce, payment convenience, global payments technology, e-retail, pos technology
    
Global Payments
Published By: LogMeIn     Published Date: Apr 23, 2019
By leveraging the power of AI, companies gain the ability to consolidate and refine answers to questions in one central repository.
Tags : 
    
LogMeIn
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Education BUSINESS CHALLENGE Protect student data from threats posed by malware on teachers’ MacBook laptops IT ENVIRONMENT Avast antivirus, enterprise network security layers SOLUTION Malwarebytes Incident Response RESULTS Removed PUPs and malware from hundreds of Mac systems in just minutes Delivered instant visibility into connected systems and quarantined malware Reduced risk with ability to proactively detect and remediate threats
Tags : 
    
MalwareBytes EMEA
Published By: Akamai Technologies     Published Date: May 06, 2019
Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks. The people behind these attacks realize the value of an account, whether it’s to a streaming site, a game, or someone’s social media account. And, they’re willing to do whatever it takes to steal them. This report provides an overview of the recent credential stuffing attacks against these sectors and the risks these attacks pose. We’ll also explore some of the ways adversaries conduct these attacks.
Tags : 
    
Akamai Technologies
Published By: Schneider Electric     Published Date: Apr 23, 2019
Energy costs have become an increasing contributor to pumping systems Total Cost of Ownership (TCO). In fact, energy cost represents 40% of the TCO of a typical pump. It is possible to reduce the electrical consumption by at least 30% utilizing Variable Speed Drives while decreasing maintenance costs associated with the mechanical driven system. This paper explains how to reduce TCO with a limited investment focused on three key areas: energy efficiency management, asset management, and energy cost management.
Tags : 
pump, hvac, total cost of ownership
    
Schneider Electric
Published By: Bluecore     Published Date: May 07, 2019
If the very purpose of technology is to make our lives easier and allow us to work smarter, why do most retail marketers use email technologies that do the exact opposite? It’s time to break out of the Email Death Spiral and advance your retail marketing program with the next generation of email marketing technology. This guide explores how to identify when it's time for a change, exactly what your team needs to know to prepare for a successful change and how to best evaluate modern email marketing technology for retail.
Tags : 
    
Bluecore
Published By: Gigamon EMEA     Published Date: Apr 10, 2019
Download ESG’s Economic Validation Report, “Analyzing the Economic Benefits of Gigamon,” to see how Gigamon reduces false positives by 70%, decreases the cost of security personnel by 50%, eliminates redundant systems and tools and aligns SecOps and NetOps for better collaboration. Learn how a network visibility infrastructure can secure business, enable new ideas and facilitate growth. And, see why ESG believes the Gigamon Visibility Platform is a critical tool for success in today’s digital age.
Tags : 
    
Gigamon EMEA
Published By: Rackspace     Published Date: May 15, 2019
The guide to how SQL Server 2008 end-of-service can drive IT modernization. End-of-service presents serious risks to your organisation if you don’t deal with it correctly—or worse—if you don’t deal with it at all, including the loss of access to critical security updates and Microsoft hotfixes. Also, if you don’t take action, your organisation will be exposed to potential disruption from hackers and malware. That means valuable customer data could be exposed to attack, risking monetary and reputational damage. And from a regulatory standpoint, there could be compliance issues with rules such as HIPAA, PCI, and GDPR. On the other hand, if you take well-considered action that aligns with your long-term strategy, end-of-service is also an opportunity for data estate modernisation. In this e-book, we’ll discuss how migration to Azure as part of your fix for SQL Server 2008 end-of-service solves for all these, and opens doors for the future of your data-driven business.
Tags : 
    
Rackspace
Published By: Equinix EMEA     Published Date: May 17, 2019
A nivel mundial, los pagos se están volviendo digitales, ya sea en su conversión de dinero en efectivo a tarjetas, códigos QR en el punto de venta (POS), compras desde tiendas físicas a tiendas on line con formas de pago electrónicas o pagos realizados a través de una aplicación. Este fenómeno no es nuevo, y parece estar acelerándose. Esta velocidad de adopción se debe a múltiples factores, incluida una gran cantidad de nuevos métodos de pago electrónicos, muchos de los cuales se superponen a los métodos de pago existentes, enfocados en la conveniencia, la velocidad y la experiencia general del consumidor.
Tags : 
    
Equinix EMEA
Published By: Here Technologies     Published Date: Mar 29, 2019
Discover the four big trends in fleet management being powered by location services. Trends to help you differentiate your solutions and enable transportation companies to overcome their logistical challenges and increase asset utilization. Discover what’s making the biggest impact, together with how, by integrating some of these trends into your solutions, you can position yourself as the service provider of choice in fleet and transportation management solutions. And find out how HERE is delivering features, from comprehensive mapping capabilities and real-time location data, to truck-specific attributes, to help you do just that. Download the eBook now
Tags : 
here technologies, transport and logistics
    
Here Technologies
Published By: Zscaler     Published Date: May 15, 2019
Is it possible to implement an Office 365-ready network, at scale, without a proof-of-concept (PoC)? Your CIO has tapped you to lead the effort to move to Office 365. Realizing it’s a great opportunity and distinction in your career, you reply with, “Sure, I’ll make sure it is a total success!” and then note that a PoC will not be needed.
Tags : 
    
Zscaler
Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
As the information age matures, data has become the most powerful resource enterprises have at their disposal. Businesses have embraced digital transformation, often staking their reputations on insights extracted from collected data. While decision-makers hone in on hot topics like AI and the potential of data to drive businesses into the future, many underestimate the pitfalls of poor data governance. If business decision-makers can’t trust the data within their organization, how can stakeholders and customers know they are in good hands? Information that is not correctly distributed, or abandoned within an IT silo, can prove harmful to the integrity of business decisions.
Tags : 
    
Group M_IBM Q2'19
Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
Published By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
There can be no doubt that the architecture for analytics has evolved over its 25-30 year history. Many recent innovations have had significant impacts on this architecture since the simple concept of a single repository of data called a data warehouse. First, the data warehouse appliance (DWA), along with the advent of the NoSQL revolution, selfservice analytics, and other trends, has had a dramatic impact on the traditional architecture. Second, the emergence of data science, realtime operational analytics, and self-service demands has certainly had a substantial effect on the analytical architecture.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
IBM provides a security incident response (IR) solution called Resilient that helps its customers address security incidents quickly in an automated and orchestrated manner. IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Resilient. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the Resilient platform on their organizations.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 22, 2019
"Improving Cyber Resilience in the Insurance Industry Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient’s latest report, “The Ponemon Institute Study on the Cyber Resilient Organization.” Download this latest report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture."
Tags : 
    
Group M_IBM Q2'19
Published By: Workday     Published Date: Mar 26, 2019
When it comes to leading higher education into the future, Arizona State University (ASU) is at the top of the class. ASU President Michael Crow shares how his institution is reimagining the possibilities of higher education to help students succeed.
Tags : 
    
Workday
Published By: Workday     Published Date: Mar 26, 2019
Changing student demographics can pose big challenges to higher education institutions. The ability to adapt is key to creating a place where everyone can succeed. This report from Inside Higher Ed dives deep into what these changes mean for your campus and how technology can help you meet the needs of a new generation of students.
Tags : 
    
Workday
Published By: Bluecore     Published Date: Oct 23, 2018
If you’re not one of those retailers, you’re likely busy playing catch-up to them – and that’s not a position in which anyone wants to be. Since eCommerce began, a small handful of leaders have set the pace. They’ve innovated quickly and delivered incredibly valuable and convenient shopping experiences. And in doing so, they shaped consumer expectations. Take Amazon. Over a decade ago, the online giant seemingly rewrote the natural laws of retail by managing to deliver more, better, faster – all with unmatched accuracy and ease. Now, consumers expect an Amazon-like experience everywhere they shop, and anything else feels subpar.
Tags : 
email marketing, personalized email, retail marketing
    
Bluecore
Published By: Bluecore     Published Date: Apr 03, 2019
If the very purpose of technology is to make our lives easier and allow us to work smarter, why do most email marketers use technologies that do the exact opposite? It’s time to break out of the Email Death Spiral and advance your marketing program with the next generation of email marketing technology. This guide explores exactly what your team needs to know to prepare for a successful change and how to best evaluate this next generation of email marketing technology, including: Understanding the next generation of email marketing technology Determining when it’s time for a change Prioritizing value with a proof of concept Approaching the ESP selection process Securing buy-in for the change Building a successful retail marketing program around your new ESP Creating a foundation for long term success
Tags : 
retail marketing, esp, email marketing, marketing technology
    
Bluecore
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for today’s modern threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, an industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee