Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

wal mart

Results 1 - 24 of 24Sort Results By: Published Date | Title | Company Name
Published By: Salsify     Published Date: Mar 15, 2019
Read this case study to learn how the makers of Duck® Tape leverage product experience management to increase efficiency and grow market share. “You need to both be able to create, generate, and optimize great content, and then deliver it to your customers in an efficient and effective way. And that's what I feel like Salsify has done for us - it’s given us that simple point of truth, the ability to manage and measure it, optimize it, and iterate.” - Scott Sommers, Director of Ecommerce Strategy With a wide range of globally recognized brands like Duck®, FrogTape® and Shurtape® brands, ShurTech needed to develop a more streamlined approach to the ecommerce presence that empowered his team to continually optimize and deliver impactful content to key retail channels like Amazon, Walmart and Essendant. Learn more about the step-by-step approach the ShurTech team took to: Build and maintain a centralized, consistent and accessible source of production information to arm all divisions
Tags : 
    
Salsify
Published By: Salsify     Published Date: Mar 15, 2019
Enhanced content, or the below-the-fold rich media on retailer product pages, is the best way to tell your brand's story and differentiate from your competition. It also happens to be one of the best ways to improve conversion rates (by an average of 25%). Get a comprehensive guide on how to select the best performing content for your brand and deliver it across your sales channels for the broadest impact. This new ebook created in collaboration with Hinge Consulting will arm you with the data and guidelines you need to tell your brand story across the digital shelf. You will learn: How to think creatively about the most relevant enhanced content to include in your story How to scale your brand content across your most important retailer sites, including Amazon and Walmart How to measure the most important KPIs to communicate the impact of rich media Salsify is the product experience management platform for thousands of brands and retailers worldwide.
Tags : 
    
Salsify
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
    
Fortinet EMEA
Published By: IBM     Published Date: Apr 13, 2018
You can’t walk out the door without being inundated with messages on cloud. Get educated and help your organization make smarter choices.
Tags : 
cloud, governance, trusted data
    
IBM
Published By: Oracle OMC     Published Date: Nov 30, 2017
The headwinds facing traditional and online retailers in 2017 are numerous and well documented. Chief among the challenges: a sustained assault on established business models driven by changing consumer behavior and the competitive might of e-commerce giant Amazon. Large big-box players, such as Walmart and Target, are responding to the threat - and embracing the opportunity of e-commerce - by boosting online spending by hundreds of millions or even billions of dollars annually. Yet even the largest and most well-resourced players can’t simply spend their way to success. Competing with Amazon and adjusting to the changing demands of consumers means taking a hard look at the engines driving e-commerce and digital marketing operations, scouring for missed opportunities, and investing in the technologies that will fuel the innovations of tomorrow.
Tags : 
    
Oracle OMC
Published By: Oracle OMC     Published Date: Nov 30, 2017
The headwinds facing traditional and online retailers in 2017 are numerous and well documented. Chief among the challenges: a sustained assault on established business models driven by changing consumer behavior and the competitive might of e-commerce giant Amazon. Large big-box players, such as Walmart and Target, are responding to the threat - and embracing the opportunity of e-commerce - by boosting online spending by hundreds of millions or even billions of dollars annually. Yet even the largest and most well-resourced players can’t simply spend their way to success. Competing with Amazon and adjusting to the changing demands of consumers means taking a hard look at the engines driving e-commerce and digital marketing operations, scouring for missed opportunities, and investing in the technologies that will fuel the innovations of tomorrow.
Tags : 
    
Oracle OMC
Published By: Juniper Networks     Published Date: Jun 22, 2017
Juniper’s security solutions seamlessly extend across private and public cloud architectures without compromising security, flexibility, and manageability. With midrange, high-performance, space-efficient, next-generation firewalls, smarter and faster centralized management, and highly evolved security intelligence and automation tools, Juniper Networks allows you to secure your network, keep operational costs down, and easily migrate to a hybrid cloud architecture. For more information about Juniper’s security solutions, please visit us at www.juniper.net/us/en/products-services/security and contact your Juniper Networks representative.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Juniper Networks
Published By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: Aria Systems     Published Date: Jun 15, 2016
"Smart Campus: Break down classroom walls with a smart technology strategy 70% of K-12 and IT administrative decision-makers said preparing students for the future workforce was one of the main drivers for adopting classroom technology. Read how to prepare your network for a digital-first classroom experience in this report >"
Tags : 
    
Aria Systems
Published By: Avaya     Published Date: Jun 15, 2016
Smart Campus: Break down classroom walls with a smart technology strategy 70% of K-12 and IT administrative decision-makers said preparing students for the future workforce was one of the main drivers for adopting classroom technology. Read how to prepare your network for a digital-first classroom experience in this report.
Tags : 
technology, workforce, digital, smart campus
    
Avaya
Published By: Puppet     Published Date: May 20, 2016
At Puppet, we've been looking at the state of DevOps practices for several years and helping organizations achieve higher levels of efficiency. We’ve learned a lot about the impact of DevOps at varying stages of IT automation maturity. As DevOps has moved from theory to implementation for more organizations, a host of DevOps myths have blocked adoption in many organizations. This publication debunks these myths so your organization can automate, innovate, and get ahead. Download this publication, featuring research from Gartner, to discover: - Why DevOps is applicable to legacy environments, traditional enterprises and hierarchical organizations. - Practices that underpin DevOps, from version control to automated testing to infrastructure as code. - How companies like Walmart, Staples, Ambit Energy and Infusionsoft have embraced DevOps and IT automation.
Tags : 
    
Puppet
Published By: MobileIron     Published Date: Apr 28, 2016
Ein vereinheitlichter Satz MDM-APIs erlaubt es der IT, die Geräteverwaltung und Gerätesicherheit auf einer EMM-Konsole für Tablets, Desktops, Smartphones und integrierte Geräte zu zentralisieren.
Tags : 
    
MobileIron
Published By: YLD     Published Date: Apr 27, 2016
IT departments are faced with new challenges, with increased competition, lower customer loyalty and globalisation. It all requires faster development while dealing with shadow IT, legacy systems and requirements for highly skilled teams, with expertise in new, disruptive technologies.
Tags : 
it department, customer loyalty, technology, it support, becoming a disruptive cio, it management
    
YLD
Published By: CDW     Published Date: Mar 27, 2015
Mobile devices are ubiquitous. The wide variety of functions they provide on the go — everything from making phone calls to checking email to literally millions of applications — has created widespread demand around the globe for this technology. With the right tools, an organization can extend the workplace far beyond its own physical walls. And employees can be active at any time within the 24-hour cycle; whenever inspiration strikes, a smartphone or tablet can quickly harness their productivity.
Tags : 
mobile, help desk, phone call, productivity, smartphone, tablet, email, applications, wireless, enterprise applications
    
CDW
Published By: Brandwatch     Published Date: Feb 25, 2015
This guide is an introductory overview of best practices for crisis and issues communications in the social media age, focusing on: • What reputation monitoring actually means • How to identify a crisis & assess the damage • Real-world examples from Marriott, United Airlines and Walmart/Asda
Tags : 
social media, social analytics, social media monitoring, crisis management, reputation management, social listening, social business intelligence, brand monitoring, social media management
    
Brandwatch
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Memorial Hermann     Published Date: Sep 19, 2014
Houston businesses are as unique as Houston itself. But not every business looks at healthcare the same. See what other Houston businesses are choosing to offer their employees, how satisfied they are with their choices, and what other cost-reducing options are available. • Learn what % of employees live in Houston, and how that impacts health care costs • See how happy businesses are with current carriers and what that means at renewal time • Find out what alternative options smart businesses are looking at
Tags : 
healthcare costs, approach, carrier, choice, location, impact, educated, reliable, providers, solution, business, manager, organization, employees, negotiations
    
Memorial Hermann
Published By: e-SignLive     Published Date: Oct 11, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile tablets and smartphones as productivity tools for agents, representatives and personnel, and developing enterprise apps for these devices.
Tags : 
ipad, mobility, apple, e-signatures, esign
    
e-SignLive
Published By: Cymfony     Published Date: Jul 11, 2007
The Internet has become a hospitable environment for people looking to advance aggressive forms of criticism against corporations. The same social media technologies that strengthen your company’s relationship with consumers also make is easy for a single critic to mount an aggressive campaign against you. This whitepaper will present new research that reveals what drives this type of aggressive behavior.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction, branding, wal-mart, mcdonalds, evil empire, cymfony
    
Cymfony
Published By: Cymfony     Published Date: Jul 11, 2007
This new study by Harvard's Berkman Center for Internet & Society analyzed corporate attacks against leading companies like Wal-Mart, McDonald’s, AOL, Genzyme and Lufthansa. This study establishes three profiles of corporate attacks and examines the unique behavior patterns and personal motivations behind each.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction, branding, wal-mart, mcdonalds, evil empire, cymfony
    
Cymfony
Published By: Cymfony     Published Date: Jul 11, 2007
The Internet has become a hospitable environment for people looking to advance aggressive forms of criticism against corporations. The same social media technologies that strengthen your company’s relationship with consumers also make is easy for a single critic to mount an aggressive campaign against you. This whitepaper will present new research that reveals what drives this type of aggressive behavior.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction, branding, wal-mart, mcdonalds, evil empire, cymfony
    
Cymfony
Published By: Cymfony     Published Date: Jul 11, 2007
This new study by Harvard's Berkman Center for Internet & Society analyzed corporate attacks against leading companies like Wal-Mart, McDonald’s, AOL, Genzyme and Lufthansa. This study establishes three profiles of corporate attacks and examines the unique behavior patterns and personal motivations behind each.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction, branding, wal-mart, mcdonalds, evil empire, cymfony
    
Cymfony
Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
The CPG manufacturing industry is large and thriving; however, margins are slim and competition is furious. There are hundreds of product categories, and to compete, firms must constantly innovate. How can the small-to-medium CPG manufacturer survive in the face of the same external pressures and fewer resources?
Tags : 
retailer, consumer goods, manufacturing, manufacturer, scm, supply chain, supply chain management, microsoft, microsoft dynamics, productivity, plm, product lifecycle management, radio frequency, rfid, wal-mart, procurement, fulfillment, distribution, cpg, globalization
    
Microsoft Dynamics
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.