Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

transactions

Results 251 - 275 of 344Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 26, 2016
Read this in-depth ebook to learn what industry standards look like, how they work, and the ways they enable automated exchanges of business transactions and information.
Tags : 
ibm, b2b, integration, industry, standards, processing, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 11, 2016
Your organization lives and breathes data, but that data needs to be transformed between different formats as you do business, share files, transmit data and make transactions. Watch this video for a short introduction on how IBM Transformation Extender can help.
Tags : 
ibm, commerce, b2b integration, ibm transformation extender, transformation solution, software development, enterprise applications
    
IBM
Published By: IBM     Published Date: Dec 15, 2016
Register today to learn more about this exciting release, its new features, and how you can drive new value for your organization: - Improve customer centricity by engaging individuals at the right time with the right offers - Cut operating costs and reduce fraud by gaining real-time visibility and insights into transactions and business operations - Empower knowledge workers and leverage mobile technologies to create more engaging experiences
Tags : 
ibm, middleware, operational decisions, odm advanced, enterprise applications
    
IBM
Published By: Cisco     Published Date: Jul 11, 2016
Companies rely on an expanding set of applications to compete in today's rapidly evolving business environment: - They rely on a fast-growing array of applications and devices (email, collaboration tools, and smartphones/tablets) to communicate and conduct business with customers and business partners. - They are creating, collecting, and repurposing large, unstructured data sets in life sciences, geophysics, media, and manufacturing. - They are collecting, storing, and analyzing more social and sensor-generated data about environments, products, customers, and transactions. The promise of better and faster data-driven decision making based on all this information is pushing big data and analytics (BDA) technology to the top of executive agendas. To succeed, CIOs must place a laserlike investment focus on datacenter solutions that allow them to deliver scalable, reliable, and flexible infrastructure for fast-growing BDA environments. Read more to learn how!
Tags : 
    
Cisco
Published By: Utimaco     Published Date: Aug 18, 2008
Most of today’s standards and compliance regulations are concerned largely with the protection of private data at rest, during transactions, and while it traverses network connections. Some of these regulations make specific recommendations or require particular technologies for compliance. For all of them, however, encryption can be employed to satisfy the protection requirements.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security, data encryption, encryption, security
    
Utimaco
Published By: thawte     Published Date: Nov 06, 2006
A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.
Tags : 
ssl, encryption, security, application security, online data transfer, data security, secure socket layer, ssl certificate, security certificate, internet security, web services security, web security, thawte, digital certificate
    
thawte
Published By: IGLOO Software     Published Date: Jan 07, 2010
This case study describes how the MIN facilitates local and international transactions, establishes vital business connections and provides a knowledge exchange for sharing information, ideas and expertise.
Tags : 
igloo software, manufacturing innovation network, knowledge sharing, content management, online manufacturing, supplier networking, social networking, e-commerce, website development
    
IGLOO Software
Published By: SAS     Published Date: Oct 03, 2018
Risks have intensified as retailers and financial organizations embrace new technologies to meet customer demands for convenience. The rise of mobile and online transactions introduces new risks – and with that, new requirements for fraud mitigation. This paper discusses key steps for fighting back against fraud risk by establishing appropriate and accurate data, analytics and alert management.
Tags : 
    
SAS
Published By: Esker     Published Date: Jul 17, 2018
No matter what future you see ahead for your accounts payable (AP) organization, one thing is sure: If your organization is going to succeed in the emerging digital trade and commerce environment, it will need to process transactions more efficiently than ever, have faster access to AP information, and be able to act upon information and identify opportunities more quickly. This will require AP organizations to transform their processes with digital technologies. Accounts payable departments that delay their digital transformation initiatives risk falling behind their peers and putting their business at a competitive disadvantage in the global business landscape. This white paper details the growth of digital technologies, the dangers of relying on manual and semi-automated AP payable processes, the benefits of using digital technologies in AP, and how effective change management ensures the success of digital transformation efforts.
Tags : 
    
Esker
Published By: Cisco     Published Date: Dec 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video. Cloud solutions allow contact centers to gain access to new technology capabilities and channels on demand with the ability to scale up quickly. They offer the best technology innovation as well as the ability to scale agents up and down as business needs change. This whitepaper provides background on cloud contact cen
Tags : 
    
Cisco
Published By: Cisco     Published Date: Aug 24, 2015
Download this white paper to see why securing the data center requires a solution that can: -Provide visibility and control over custom data center applications -Handle asymmetric traffic flows and application transactions between devices and data centers -Adapt as data centers evolve: to virtualization, software-defined networking (SDN), network functions virtualization (NFV), Cisco -Application-Centric Infrastructures (ACIs) and beyond -Address the entire attack continuum: before, during, and after an attack -Integrate with security deployed across the entire network -Support geograpically dispersed inter-DC traffic and deployments, including private, public and cloud environments
Tags : 
data center security, traditional security, functionality, virtualization, visibility, sdn, nfv, acis, networking, security, it management
    
Cisco
Published By: CrowdTwist     Published Date: Jan 19, 2016
Three out of four consumers belong to up to 10 loyalty programs, so it’s more important than ever to stand out. To capture interest and drive repeat purchases, brands must interact with consumers beyond transactions and reward them for their behaviors across channels.
Tags : 
crowdtwist, marketing loyalty programs, acquisition rates, consumer interactions, content marketing, consumer data
    
CrowdTwist
Published By: CrowdTwist     Published Date: Sep 07, 2016
Explore 45 loyalty marketing ideas that will keep customers connected to and engaged with your brand beyond transactions.
Tags : 
crowdtwist, loyalty, loyalty marketing, marketing, customer engagement, loyalty programs
    
CrowdTwist
Published By: Recurly     Published Date: Mar 07, 2016
Subscription businesses have often been referred to as the holy grail of business because of the recurring revenue generated from customers. However managing day-to-day billing transactions can be daunting for business owners who typically resort to building their own billing solution. The better approach is to choose a recurring billing management service. Here are 6 reasons why outsourcing your recurring billing management might be a better solution.
Tags : 
recurly, outsourcing, outsourcing recurring billing, best practices, subscription businesses, billing transactions, billing solutions, billing management service, networking, it management, wireless
    
Recurly
Published By: DocuSign     Published Date: Aug 09, 2016
This white paper highlights securing business-critical transactions with digital transaction management.
Tags : 
docusign, digital, digital transaction management, papeless, paper cost
    
DocuSign
Published By: DocuSign     Published Date: Apr 24, 2018
"In April 2016, the Department of Labor (DOL) released its final rule regarding financial and fiduciary disclosures. Many firms are in the early stages of assessing the rule’s impact, sorting through legal interpretations, and preparing for regulatory compliance. To understand who’s affected, what’s changed, and the impact to your business, read the white paper to learn how DocuSign can help you digitize your document agreements and: • Satisfy compliance requirements by enabling you to automate disclosures with a tamper-proof audit trail. • Delight your customers by providing a greatly improved user experience compared to paper-based document transactions. • Meet critical deadlines with rapid implementation using DocuSign’s SaaS-based solution."
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Jul 12, 2019
Industry experts predict that successful businesses will soon become 100% digital for all transactions. Sales organizations that leverage digital technology close more deals faster, improve the customer experience, and gain clear competitive advantages. Sales professionals are most effective when they’re equipped with the best tools. A mobile-enabled electronic workflow is becoming essential to optimize efficiency and provide teams with true flexibility. This best practices paper outlines eight important ways that sales teams can make meaningful progress in their digital transformations.
Tags : 
    
DocuSign
Published By: Telerik     Published Date: May 31, 2016
Digital Business Transformation (DBT) is a focus of organizations ranging from small, non-profit associations to multi-billion dollar healthcare systems. The primary areas of DBT include moving from brick and mortar to online transactions, automation over human interactions and gaining immediate insight into activities to drive instant and constant improvement. At the forefront of DBT is Digital Marketing. Marketing’s primary job of gaining mindshare and communicating the right messages along each customer’s individual journey— from prospect to repeat buyer and brand advocate— lends itself to the digital medium. Marketing’s mission of continuous customer engagement depends on the ability to change strategies and tactics as needed.
Tags : 
telerik, marketing, digital marketing, technology platform
    
Telerik
Published By: Symantec     Published Date: Apr 09, 2012
Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign
    
Symantec
Published By: IBM     Published Date: Mar 18, 2015
View this ebook to learn about the five key recommendations Corporate banks should consider in order to be successful in this customer-centric banking environment.
Tags : 
customer service, productivity solutions, customer-centric banking environment, automated financial transactions, ibm
    
IBM
Published By: IBM     Published Date: Mar 18, 2015
More and more companies are moving to the cloud for B2B services, and for good reason. There’s a huge potential for increased visibility and analytics-driven insights to be gained from B2B transactions that can give businesses unprecedented levels of information. But many organizations continue to struggle when it comes to going beyond basic transactional data and historical performance metrics. What does it take to not only report on past activity, but to get real-time alerts, predict future events, manage exceptions, and proactively leverage this wealth of data in order to put it to work? Read this IBM white paper to find out how B2B Services Reporting and Analytics provide new insights into your trading partner relationships and to drive better, more profitable business decisions.
Tags : 
b2b services, ibm, b2b analytics, b2b reporting, transactional data, trading partner relationships, it management, enterprise applications
    
IBM
Published By: IBM     Published Date: Mar 18, 2015
Top performing organizations search for a single solution that enables them to process, monitor, and report their customers' financial transactions. The results are improved profit margins, compliance, and satisfied customers. This Aberdeen report identifies the problems facing financial institutions today, the technology they adopt, as well as the benefits of a single, central solution.
Tags : 
ibm, customer service, automated financial transactions, financial institution solutions, customer's financial transactions
    
IBM
Published By: Rapid7     Published Date: Jul 24, 2013
The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.
Tags : 
rapid7, pci compliance, dss compliance, pci dss compliance, secure transactions, online payment security, security, payment processing, atm
    
Rapid7
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 12, 2011
With the threat of identity theft and other types of fraud rampant on the internet, many consumers are reluctant to release their details, even if that means abandoning a sale.
Tags : 
verisign, extended validation ssl, verisign, papercheck.com, carinsurance.com, flagstarbank.com, creditkarma.comphishing, identity theft, fraud, ssl certificate, online retailers, insurance brokers, online pharmacy, financial services, travel, education, banking, verisign ev ssl certificates, www.verisign.c
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Riverbed     Published Date: Jan 28, 2014
Forrester benchmark data on current state of application availability and performance within the enterprise. In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services. Read the report to learn the key findings of this study.
Tags : 
riverbed, forrester consulting, application performance management, application availability, enterprise, it transactions, business services, business-critical applications, proactive performance management, lowering operational costs, it efficiency, meaningful alerts, proactive alerting, root-cause identification, end user experience monitoring, wan optimization technologies, networking, it management, enterprise applications
    
Riverbed
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.