Menu Shape 3 copy 2Created with Avocode.
webinara overview
IT and Technology

Webinar: New Procurement Toys for the New Year

webinar description

Many business “toys” that are on the Chief Procurement Officer’s (“CPO’s”) holiday wish list, like advanced analytics, cloud-based, mobile-first/mobile-ready solutions, and seamless solution suites, have been on the shelves for some time and are ready for procurement teams to open. Other business tools, like connected devices and the Internet of Things (“IoT”), and solutions enabled with natural language processing (“NLP”), personal assistants (chat bots), and robotic process automation (“RPA”), are more recent and emerging as the season’s best new gifts. They can improve the user experience while driving visibility into both internal processes and external supply chains. Together, these recent and emerging technologies are low-hanging holiday fruit that are ripe for picking. This webinar will discuss how innovative technologies can add value to procurement and supply management operations in the New Year.

Reasons to attend the webinar
  • Hear how innovative technologies can add value to procurement and supply management operations in the New Year

  • Learn about recent and emerging technologies

  • Refine your 'wish list' for the season's best new gifts

Speakers:
Ardent Partners
Andrew Bartolini, Chief Research Officer
19

Dec

2017

2:00 - 3:00 PM
(GMT -4)

(Duration - 60 minutes)

ATTENDANCE FEE - FREE

WEBINAR HAS ENDED

Kelly Barner owns, manages, and edits Buyers Meeting Point. She has a unique perspective on procurement from the numerous roles she has held during her 15 years in procurement. Kelly worked for Ahold USA (parent company of grocery chains Stop & Shop, Hannaford, Giant Landover, and more) on their not ... Read More

Other webinars you may like
FREE
Aug 21, 10.00 AM (GMT -07:00)
Transform Your Approach To Customer Experience
Your customers' expectations are changing dramatically due to the adoption of AI, predictive analytics, digital business and IoT. Managing the customer experience (CX) during marketing, transactions and customer service is good…but not good enough. Your most important customers and partners
Aragon Research
Speaker - Betsy Burton
More info
FREE
Aug 22, 12.00 PM (GMT -04:00)
Warehouse Management Systems for the Mid-Market: Value Drivers
A successful warehouse management system (WMS) implementation in an un-automated facility can provide a rapid return on investment. But is the investment right for the small to medium sized business? A WMS can serve as a foundation for instituting a continuous improvement culture and facilitates on-going
APICS Atlanta
Speaker - Chris Barnes
More info
FREE
Aug 27, 10.00 AM (GMT -07:00)
How We Bypassed All NTLM Relay Mitigations
Active Directory has always been a popular target for attackers — and one of the weakest spots in Active Directory environments lies in the design of one of the oldest authentication protocols, NTLM. From CVE-2015-0005 to the recent LDAPS Relay vulnerability, it is clear why this protocol is one
Preempt
Speaker - Yaron Zinar
More info
Other webinars you may like
FREE
Aug 21, 10.00 AM (GMT -07:00)
Transform Your Approach To Customer Experience
Your customers' expectations are changing dramatically due to the adoption of AI, predictive analytics, digital business and IoT. Managing the customer experience (CX) during marketing, transactions and customer service is good…but not good enough. Your most important customers and partners
Aragon Research
Speaker - Betsy Burton
More info
FREE
Aug 22, 12.00 PM (GMT -04:00)
Warehouse Management Systems for the Mid-Market: Value Drivers
A successful warehouse management system (WMS) implementation in an un-automated facility can provide a rapid return on investment. But is the investment right for the small to medium sized business? A WMS can serve as a foundation for instituting a continuous improvement culture and facilitates on-going
APICS Atlanta
Speaker - Chris Barnes
More info
FREE
Aug 27, 10.00 AM (GMT -07:00)
How We Bypassed All NTLM Relay Mitigations
Active Directory has always been a popular target for attackers — and one of the weakest spots in Active Directory environments lies in the design of one of the oldest authentication protocols, NTLM. From CVE-2015-0005 to the recent LDAPS Relay vulnerability, it is clear why this protocol is one
Preempt
Speaker - Yaron Zinar
More info
Other webinars you may like
FREE
Duration: 60 Min
20th Century Leadership Skills in the 21st Century
How do the leaders that were taught in the 20th century lead groups and companies in the 21st century? Is there any difference in leadership skills from 30 or 40 years ago to the present day with Millennials? And how do the leaders of the last century get ready to guide those upcoming individuals to
Michelin
Speaker - Chuck Baker
More info
FREE
Duration: 30 Min
Business Data Onboarding Better By 10X With Large File Data Ingestion
Large volume of data is an old adversary of data integration and onboarding solutions. Enterprises relying on sub-par data exchange technology can barely handle files more than 1 GB, which is abominably low per today’s standards. Moreover, they consume a fair amount of money, time, and effort
Adeptia Inc.
Speaker - Raman Singh
More info
FREE
Duration: 60 Min
The Resilient Supply Chain
Amazon has turned the business landscape on its head. Netflix has transformed the entertainment industry. Uber has revolutionized the transportation industry. Aerospace firms are feeling the squeeze. Are you ready for what’s next? According to LMA Consulting Group’s research study, The
LMA Consulting Group Inc
Speaker - Lisa Anderson
More info
SHOW ALL WEBINARS
ARE YOU 100% SURE YOU WANT TO YOU WANT TO DISCONNECT ?

Yes No
ARE YOU 100% SURE YOU WANT TO REMOVE THIS SPEAKER ?

Yes No
THIS SPEAKER CANNOT BE REMOVED. YOU HAVE ALREADY SELECTED THIS SPEAKER ABOVE. SELECT ANOTHER SPEAKER ABOVE TO REMOVE IT.

OK
PLEASE TYPE A VALID KEYWORD IN THE SEARCH FIELD