1526:, which is actually a part of cryptography, involves transforming texts or messages into a code that is unreadable. These messages have to be decrypted in order to be understandable or usable for someone. There is a key that identifies the data to a certain person or company. With public-key encryption, there are actually two keys used. One is public and one is private. The public one is used for encryption and the private one for decryption. The level of the actual encryption can be adjusted and should be based on the information. The key can be just a simple slide of letters or a completely random mix-up of letters. This is relatively easy to implement because there is software that a company can purchase. A company needs to be sure that its keys are registered with a certificate authority.
1515:
firewall also has the ability to log attempts into the network and provide warnings as it is happening. They are very beneficial to keep third parties out of the network. Businesses that use Wi-Fi need to consider different forms of protection because these networks are easier for someone to access. They should look into protected access, virtual private networks, or internet protocol security. Another option they have is an intrusion detection system. This system alerts when there are possible intrusions. Some companies set up traps or "hot spots" to attract people and are then able to know when someone is trying to hack into that area.
1485:
software companies, social networks, etc. For those, the most significant operational cost is the maintenance of the platform. Those costs are almost unrelated to every additional customer the business acquires, making the marginal cost almost equal to zero. This is one of the major advantages of that kind of business. The second group are businesses that provide services or products outside of the digital world, like online shops, for those costs are much harder to determine. Some common advantages over traditional businesses are lower marketing cost, lower inventory cost, lower payroll, lower rent, etc.
1539:
from wherever they are. These certificates also use encryption. They are a little more complicated than normal encryption, however. They actually used important information within the code. They do this in order to assure the authenticity of the documents as well as confidentiality and data integrity which always accompany encryption. Digital certificates are not commonly used because they are confusing for people to implement. There can be complications when using different browsers, which means they need to use multiple certificates. The process is being adjusted so that it is easier to use.
3232:
1501:. Numerous things can be done in order to protect our E-Business. Starting off with basic things like switch to HTTPS from old outdated HTTP protocol which is more vulnerable to attacks. Furthermore, the other things that require full attention are securing servers and admin panels, payment gateway security, antivirus and anti-malware software, using firewalls is also a must, regular updates, and back up our data.
3212:
1551:. If a document has a digital signature on it, no one else is able to edit the information without being detected. That way if it is edited, it may be adjusted for reliability after the fact. In order to use a digital signature, one must use a combination of cryptography and a message digest. A message digest is used to give the document a unique value. That value is then encrypted with the sender's private key.
1051:. Electronic business differs from electronic commerce as it does not only deal with online transactions of selling and buying of a product and/or service but also enables to conduct of business processes (inbound/outbound logistics, manufacturing & operations, marketing and sales, customer service) within the value chain through internal or external networks. The term "e-business" was coined by
1069:
1472:
all e-business websites, steps must be taken to prevent disruption of service by events such as power outages and damage to physical infrastructure. Examples to address this include data backup, fire-suppression systems, Uninterrupted Power Supply (UPS) systems, virus protection, as well as making sure that there is sufficient capacity to handle the demands posed by heavy network traffic.
982:
3222:
2124:
1377:
numerous other people use any particular e-business system daily and expect their confidential information to stay secure. Hackers are one of the great threats to the security of e-businesses. Some common security concerns for e-Businesses include keeping business and customer information private and confidential, the authenticity of data, and
1324:, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection. Modern electronic commerce typically uses the World Wide Web for at least one part of the transaction's life cycle, although it may also use other technologies such as e-mail.
1538:
is to identify the owner of a document. This way the receiver knows that it is an authentic document. Companies can use these certificates in several different ways. They can be used as a replacement for user names and passwords. Each employee can be given these to access the documents that they need
1514:
should use this because they can then be sure that the information sent and received to their system is clean. A second way to protect the data is to use firewalls and network protection. A firewall is used to restrict access to private networks, as well as public networks that a company may use. The
1471:
This concern is specifically pertinent to a business's customers as certain information must be available when customers need it. Messages must be delivered in a reliable and timely fashion, and information must be stored and retrieved as required. Because the availability of service is important for
1435:
Data integrity answers the question "Can the information be changed or corrupted in any way?" This leads to the assurance that the message received is identical to the message sent. A business needs to be confident that data is not changed in transit, whether deliberately or by accident. To help with
1304:
Without a well-defined revenue model, that is, a clear plan of how to generate revenues, new businesses will more likely struggle due to costs that they will not be able to sustain. By having a revenue model, a business can focus on a target audience, fund development plans for a product or service,
1243:
to trademark the term "e-business" in the hopes that other companies would use the term and create an entirely new industry. However, this proved to be too successful and by 2000, to differentiate itself, IBM launched a $ 300 million campaign about its "e-business infrastructure" capabilities. Since
1613:
Delivery time: Traditional business enables instant satisfaction as you obtain the product the moment you purchase it, while in electronic business that is not possible. There will always be a waiting period before you receive the product. For example, Amazon assures one-day delivery. This does not
1376:
risks than traditional business systems, therefore it is important for e-business systems to be fully protected against these risks. A far greater number of people have access to e-businesses through the internet than would have access to a traditional business. Customers, suppliers, employees, and
1480:
The business internet which supports e-business has a cost to maintain of about $ 2 trillion in outsourced IT dollars just in the United States alone. With each website custom crafted and maintained in code, the maintenance burden is enormous. In the twenty-first century, look for new businesses
1209:
is considered the developer of the predecessor to online shopping. In 1979, the entrepreneur connected a television set to a transaction processing computer with a telephone line and called it "teleshopping", meaning shopping at distance. From the mid-nineties, major advancements were made in the
1413:
E-business transactions pose greater challenges for establishing authenticity due to the ease with which electronic information may be altered and copied. Both parties in an e-business transaction want to have the assurance that the other party is who they claim to be, especially when a customer
1300:
A key component of the business model is the revenue model or profit model, which is a framework for generating revenues. It identifies which revenue source to pursue, what value to offer, how to price the value, and who pays for the value. It is a key component of a company's business model. It
1609:
Lack of personal touch: The products cannot be examined or felt before the final purchase. In the traditional model, we have a more personal customer experience, while in the electronic business that is mostly not the case. Another missing factor of personal touch could also be in online
1484:
The cost structure for e-businesses varies a lot from the industry they operate in. There are two major categories that have commune characteristics. The first group is fully digital businesses that do not provide any products or services outside of the digital world. This includes for example
1458:
When certain electronic resources and information is limited to only a few authorized individuals, a business and its customers must have the assurance that no one else can access the systems or information. There are a variety of techniques to address this concern including firewalls, access
1404:
is the extent to which businesses makes personal information available to other businesses and individuals. With any business, confidential information must remain secure and only be accessible to the intended recipient. However, this becomes even more difficult when dealing with e-businesses
1449:
is using digital signatures. A digital signature not only ensures that a message or document has been electronically signed by the person, but since a digital signature can only be created by one person, it also ensures that this person cannot later deny that they provided their signature.
1617:
Security issues: Scams could be mentioned as a factor for people's distrust in electronic business. Hackers can easily get customers' financial and personal details. Some customer still finds it hard to trust electronic businesses because of the lack of security, reliability and integrity
1405:
specifically. To keep such information secure means protecting any electronic records and files from unauthorized access, as well as ensuring safe transmission and data storage of such information. Tools such as encryption and firewalls manage this specific concern within e-business.
1192:
All of them can be either buyers or service providers within the market. There are nine possible combinations for electronic business relationships. B2C and B2B belong to E-commerce, while A2B and A2A belong to the E-government sector which is also a part of the electronic business.
1444:
This concern deals with the existence of proof in a transaction. A business must have the assurance that the receiving party or purchaser cannot deny that a transaction has occurred, and this means having sufficient evidence to prove the transaction. One way to address
1418:(VPN) technology. The establishment of authenticity is even greater when a combination of techniques are used, and such techniques involve checking "something you know" (i.e. password or PIN), "something you need" (i.e. credit card), or "something you are" (i.e.
1564:
When looking at e-business we have many advantages, which are mostly connected to making doing business easier. The benefits of implementing e-business tools are in the streamlining of business processes and not so much in the use of technology. Here are some:
1319:
E-commerce (short for "electronic commerce") is trading in products or services using computer networks, such as the
Internet. Electronic commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain management,
1261:
The transformation toward e-business is complex and in order for it to succeed, there is a need to balance between strategy, an adapted business model (e-intermediary, marketplaces), right processes (sales, marketing) and technology
1214:, which launched in 1995, started as an online bookstore and grew to become nowadays the largest online retailer worldwide, selling food, toys, electronics, apparel and more. Other successful stories of online marketplaces include
1572:
Flexible business hours: There are no time barriers that a location-based business can encounter since the internet is available to everyone all the time. Your products and services can be accessed by everyone with an internet
1509:
There are several different ways to prevent access to the data that is kept online. One way is to use anti-virus software. This is something that most people use to protect their networks regardless of the data they have.
1173:
Electronic business can take place between a very large number of market participants; it can be between business and consumer, private individuals, public administrations, or any other organizations such as
1595:
Lower costs of marketing and sales: E-commerce allows the actors of the industry to advertise for their product/service offer (i.e.: house rental) at generally lower costs than by promoting physically their
1426:
methods). Many times in e-business, however, "something you are" is pretty strongly verified by checking the purchaser's "something you have" (i.e. credit card) and "something you know" (i.e. card number).
2066:
1247:
According to the U.S. Department Of
Commerce, the estimated retail e-commerce sales in Q1 2020 were representing almost 12% of total U.S. retail sales, against 4% for Q1 2010.
1576:
Cheaper than traditional business: Electronic business is less costly than a traditional business, but it is more expensive to set up. Transactions cost are also cheaper.
1047:
to enable the external activities and relationships of the business with individuals, groups, and other businesses, while e-business refers to business with help of the
1012:
1226:, began to use its foundation in IT solutions and expertise to market itself as a leader of conducting business on the Internet through the term "e-business." Then CEO
2397:
1381:. Some of the methods of protecting e-business security and keeping information secure include physical security measures as well as data storage, data transmission,
1205:. This system replaced traditional mailing and faxing of documents with a digital transfer of data from one computer to another, without any human intervention.
1040:
constitutes the exchange of products and services between businesses, groups, and individuals and can be seen as one of the essential activities of any business.
1579:
No geographical boundaries: The greatest benefit is the possibility of geographical dispersion. Anyone can order anything from anywhere at any time.
1436:
data integrity, firewalls protect stored data against unauthorized access, while simply backing up data allows recovery should the data or equipment be damaged.
3176:
1905:
2201:
2422:
2074:
1481:
that will help standardize the look and feel of the internet presence of a business to be more uniform in nature to help reduce the cost of maintenance.
1414:
places an order and then submits a payment electronically. One common way to ensure this is to limit access to a network or trusted parties by using a
2554:
2532:
1301:
primarily identifies what product or service will be created in order to generate revenues and the ways in which the product or service will be sold.
1044:
1985:
2196:
1569:
Easy to set up: electronic business is easy to set up even from home, the only requirements are software, a device and an internet connection.
2668:
1633:
1005:
81:
2038:
1605:
Despite all the limits, there are also some disadvantages that we need to address. The most common limitations of electronic business are:
1090:
1867:
2412:
1906:"'Free Shipping Day' Promotion Spurs Late-Season Online Spending Surge, Improving Season-to-Date Growth Rate to 16 Percent vs. Year Ago"
1588:
Lower levels of inventory: Electronic business enables companies to lower their level of inventory by digitalizing their assets. (i.e.:
1244:
that time, the terms, "e-business" and "e-commerce" have been loosely interchangeable and have become a part of the common vernacular.
3275:
3165:
1794:
709:
2899:
2474:
1854:
1756:
1726:
1697:
1677:
1160:
566:
2813:
1585:
Newmarket entry: It has a great potential to enable an entry to a previously unknown market that a traditional business could not.
1141:
2745:
1638:
1267:
998:
615:
1113:
3255:
3245:
3235:
2772:
1920:
3250:
2945:
2935:
2833:
1094:
1890:
1120:
3138:
2904:
2166:
1175:
986:
731:
641:
292:
3265:
3260:
2869:
849:
635:
463:
1849:
Paul Marson, (2000), Electronic
Commerce - strategies & models for B2B trading, pp.31, John Wiley & Sons, Ltd,
3298:
2762:
2654:
1202:
839:
726:
676:
1127:
1079:
3133:
3117:
2659:
2614:
2542:
869:
1098:
1083:
3313:
2247:
1582:
Government subsidies: Digitalisation is very encouraged by the government and they provide the necessary support.
874:
653:
595:
297:
129:
1201:
One of the founding pillars of electronic business was the development of the
Electronic Data Interchange (EDI)
1109:
3308:
3270:
3051:
2859:
2714:
1349:
889:
864:
600:
310:
244:
214:
2692:
2012:
1239:
that would introduce the concept of "e-business" and advertise IBM's expertise in the new field. IBM decided
3303:
3112:
2818:
2095:
1460:
1459:
privileges, user identification and authentication techniques (such as passwords and digital certificates),
1415:
1263:
1235:
879:
859:
844:
799:
625:
370:
350:
301:
287:
282:
278:
239:
33:
1036:) is any kind of business or commercial transaction that includes sharing information across the internet.
3143:
2914:
2730:
2432:
1935:
University of
Pittsburgh, comp. e-Business Resource Group Security Guidelines. Publication. 5 August 2003.
1653:
1493:
When it comes to security solutions, sustainable electronic business requires support for data integrity,
1227:
939:
924:
854:
716:
620:
269:
169:
149:
139:
104:
1989:
1748:
Learning From
Winners: How the ARF Ogilvy Award Winners Use Market Research to Create Advertising Success
3159:
3124:
2750:
2709:
2340:
1494:
821:
703:
691:
583:
576:
551:
513:
488:
438:
345:
306:
54:
1270:). When organizations go online, they have to decide which e-business models best suit their goals. A
2979:
2889:
2843:
2838:
2644:
2442:
2387:
2370:
2213:
1386:
884:
809:
794:
681:
671:
648:
588:
556:
458:
400:
162:
59:
1786:
The Fast Path to
Corporate Growth: Leveraging Knowledge and Technologies to New Market Applimcations
3318:
3153:
3015:
2755:
2698:
2664:
1648:
1628:
1535:
1423:
1382:
1341:
1333:
1275:
966:
949:
934:
784:
761:
746:
666:
605:
561:
433:
423:
405:
273:
229:
144:
124:
1233:
After conducting worldwide market research in
October 1997, IBM began with an eight-page piece in
3128:
3103:
3003:
2985:
2649:
1825:
1337:
1321:
1134:
929:
804:
789:
756:
751:
741:
736:
686:
610:
518:
483:
174:
1223:
3240:
3187:
3081:
3076:
2940:
2864:
2459:
2427:
2335:
2267:
2252:
2159:
1850:
1790:
1752:
1722:
1693:
1673:
1548:
1419:
1361:
909:
816:
772:
698:
571:
478:
448:
385:
179:
1784:
1746:
3170:
2973:
2965:
2894:
2796:
2724:
2325:
2282:
2277:
1373:
1357:
961:
779:
721:
546:
541:
503:
340:
335:
94:
3148:
3061:
2884:
2823:
2469:
2392:
2262:
1643:
1446:
1401:
1206:
914:
766:
659:
523:
453:
443:
360:
257:
224:
189:
109:
89:
3197:
3071:
3066:
3027:
2955:
2909:
2828:
2537:
2417:
2191:
2183:
1711:
1378:
1345:
1271:
1256:
944:
473:
468:
395:
390:
380:
234:
209:
184:
3292:
3046:
3021:
2991:
2777:
2498:
2437:
2345:
2320:
2235:
2096:"Advantages Of E-Business in Today's World | Sri Lanka Tourism Development Authority"
1718:
1295:
919:
355:
202:
2039:"Comparison Between Retail and E-commerce Cost Structures for a $ 150 Apparel Piece"
3215:
3009:
2997:
2602:
2597:
2576:
2152:
1592:
does not sell anymore physical DVDs but proposes online streaming content instead).
498:
375:
365:
77:
1178:(NGOs). These various market participants can be divided into three main groups:
3086:
3056:
2879:
2767:
2491:
2486:
2257:
2067:"Benefits and Limitations of e-Business : Dis-advantages, Solved Questions"
1353:
1068:
954:
493:
134:
119:
114:
1971:
1286:. The concept of the e-business model is the same but used in online presence.
2808:
2801:
2735:
2481:
2302:
2292:
1523:
1390:
1314:
1211:
47:
2566:
2559:
2375:
2297:
2287:
1988:. Santa Clara University. Markkula Center for Applied Ethics. Archived from
1336:, there is also evidence that some aspects of the internet such as maps and
1283:
1279:
428:
330:
323:
981:
17:
3225:
3182:
2930:
2874:
2639:
2624:
2607:
2452:
2380:
2350:
1048:
1037:
264:
219:
3192:
2634:
2629:
2571:
2402:
2330:
1589:
1498:
99:
2619:
2592:
2549:
2527:
2447:
1305:
establish marketing plans, begin a line of credit and raise capital.
1278:
and information flows, and the source of revenues and benefits for
2240:
2103:
1810:
Lowry, Paul
Benjamin; Cherrington, J. Owen; Watson, R. J. (2001).
902:
64:
1690:
Who says
Elephants Can't Dance? Inside IBM's Historic Turnaround.
2464:
2407:
1219:
1215:
2148:
2175:
1062:
1052:
508:
1230:
was prepared to invest $ 1 billion to market this new brand.
1672:
Beynon-Davies P. (2004). E-Business. Palgrave, Basingstoke.
1891:"E-commerce will make the shopping mall a retail wasteland"
1547:
A final way to secure information online would be to use a
1868:"How the Internet Reinforces Inequality in the Real World"
1332:
While much has been written of the economic advantages of
1614:
resolve the issue completely, but it is an improvement.
2144:
1986:"Privacy: Electronic Information and the Individual"
1826:"Quarterly Retail E-Commerce Sales 1st Quarter 2022"
3095:
3037:
2964:
2923:
2852:
2786:
2682:
2585:
2520:
2511:
2363:
2313:
2228:
2221:
2212:
2182:
1710:
2398:Criminal Reduction Utilising Statistical History
1831:(Press release). US Census Bureau. 19 May 2022
2160:
1348:. Electronic commerce may be responsible for
1006:
8:
1274:is defined as the organization of product,
1097:. Unsourced material may be challenged and
27:Business that takes place over the internet
2517:
2225:
2218:
2167:
2153:
2145:
1967:
1965:
1963:
1961:
1372:E-business systems naturally have greater
1059:Market participants in electronic business
1043:Electronic commerce focuses on the use of
1013:
999:
29:
1959:
1957:
1955:
1953:
1951:
1949:
1947:
1945:
1943:
1941:
1921:"The Death of the American Shopping Mall"
1161:Learn how and when to remove this message
1751:. Taylor & Francis. pp. 32–33.
1740:
1738:
1055:'s marketing and Internet team in 1996.
1045:information and communication technology
1789:. Oxford University Press. p. 30.
1778:
1776:
1774:
1665:
32:
2013:"What Is Nonrepudiation? - Definition"
2533:Center for The Business of Government
2061:
2059:
1634:Electronic Commerce Modeling Language
1360:businesses resulting in increases in
7:
3221:
1095:adding citations to reliable sources
2037:Rodrigue, J-P. (28 November 2017).
2043:The Geography of Transport Systems
25:
2202:PC business acquisition by Lenovo
1866:Badger, Emily (6 February 2013).
1222:. In 1994, IBM, with its agency
987:Business and economics portal
3231:
3230:
3220:
3211:
3210:
2900:Sabre airline reservation system
2746:Thomas J. Watson Research Center
1639:Very Large Business Applications
1268:Customer Relationship Management
1210:commercial use of the Internet.
1067:
980:
2413:Information Management Software
3166:International chess tournament
2946:Globally integrated enterprise
2936:Commercial Processing Workload
1176:non-governmental organizations
1:
2905:Scanning tunneling microscope
642:management information system
293:Chief human resources officer
2073:. 2018-03-10. Archived from
1814:. Boca Raton, FL: CRC Press.
1555:Advantages and disadvantages
636:Enterprise resource planning
464:Financial statement analysis
2773:Canada Head Office Building
2763:Cambridge Scientific Center
2655:Science Research Associates
2423:Mainframe operating systems
1713:The e-business (r)evolution
1397:Privacy and confidentiality
1203:electronic data interchange
3335:
2834:Virtual Universe Community
2555:International subsidiaries
2475:Service Automation Manager
1312:
1293:
1254:
3206:
1984:Westfall, Joseph (2010).
1505:Access and data integrity
1334:Internet-enabled commerce
298:Chief information officer
130:Limited liability company
2860:Automated teller machine
2814:The Great Mind Challenge
2197:Mergers and acquisitions
1745:Pettit, Raymond (2012).
1461:Virtual Private Networks
311:Chief technology officer
245:Mergers and acquisitions
215:Constitutional documents
40:Management of a business
2819:Linux Technology Center
1783:Meyer, Marc H. (2007).
1416:virtual private network
1340:may serve to reinforce
1338:location-aware services
1264:Supply Chain Management
1236:The Wall Street Journal
371:Environmental economics
351:International economics
302:Chief marketing officer
288:Chief financial officer
283:Chief operating officer
279:Chief executive officer
240:International trade law
34:Business administration
3144:Dynamic infrastructure
3109:Big Blue sports teams
2915:Universal Product Code
1717:. Upper Saddle River:
1654:Shopping cart software
1463:(VPN), and much more.
1228:Louis V. Gerstner, Jr.
940:International business
925:Business judgment rule
270:Chief business officer
170:Annual general meeting
150:State-owned enterprise
140:Privately held company
3276:Vacuum tube computers
3160:IBM and the Holocaust
3125:Common Public License
3010:Louis V. Gerstner Jr.
2793:Academy of Technology
2248:Power microprocessors
1924:The Atlantic — Cities
1688:Gerstner, L. (2002).
1495:strong authentication
1110:"Electronic business"
616:Customer relationship
552:Business intelligence
514:Financial institution
489:International finance
439:Cash conversion cycle
346:Development economics
307:Chief product officer
55:Management accounting
2890:Magnetic stripe card
2839:World Community Grid
2715:Toronto Software Lab
2371:Carbon Design System
2326:Cell microprocessors
1530:Digital certificates
1091:improve this section
557:Business development
401:Economic development
163:Corporate governance
60:Financial accounting
3154:GUIDE International
3016:Samuel J. Palmisano
2875:Electronic keypunch
2699:One Atlantic Center
2669:Weather Underground
2665:The Weather Company
1926:, December 26, 2012
1911:, December 23, 2012
1812:E-Business Handbook
1649:Types of E-commerce
1629:Electronic commerce
1536:digital certificate
1383:anti-virus software
1352:and the decline of
1342:economic inequality
1224:Ogilvy & Mather
1026:Electronic business
967:Business statistics
950:International trade
935:Business operations
631:Electronic business
536:Types of management
424:Financial statement
406:Economic statistics
274:Chief brand officer
230:Corporate liability
145:Sole proprietorship
125:Joint-stock company
3299:Business computing
3256:Personal computers
3246:Midrange computers
3236:Navigational boxes
3129:IBM Public License
3104:A Boy and His Atom
3062:Michelle J. Howard
3004:John Fellows Akers
2986:T. Vincent Learson
2693:1250 René-Lévesque
2433:Planning Analytics
2125:"Leaving Facebook"
1896:, January 17, 2013
1543:Digital signatures
1489:Security solutions
1420:digital signatures
1322:Internet marketing
1188:Administration (A)
930:Consumer behaviour
732:Product life-cycle
519:Capital management
484:Managerial finance
175:Board of directors
3286:
3285:
3251:Operating systems
3113:American football
3082:Joseph R. Swedish
3077:Martha E. Pollack
2980:Thomas Watson Jr.
2941:Customer engineer
2865:Cynefin framework
2751:Hakozaki Facility
2710:Rome Software Lab
2678:
2677:
2507:
2506:
2460:Rational Software
2359:
2358:
2341:Personal Computer
2336:Midrange computer
1709:Amor, D. (1999).
1549:digital signature
1424:voice recognition
1362:income inequality
1171:
1170:
1163:
1145:
1023:
1022:
910:Business analysis
479:Corporate finance
449:Capital budgeting
386:Knowledge economy
180:Supervisory board
16:(Redirected from
3326:
3314:Web applications
3234:
3233:
3224:
3223:
3214:
3213:
2974:Thomas J. Watson
2895:Relational model
2844:Think conference
2725:330 North Wabash
2645:Microelectronics
2518:
2443:Quantum Platform
2388:Cognos Analytics
2226:
2219:
2169:
2162:
2155:
2146:
2139:
2138:
2136:
2135:
2129:www.facebook.com
2121:
2115:
2114:
2112:
2111:
2102:. Archived from
2092:
2086:
2085:
2083:
2082:
2063:
2054:
2053:
2051:
2049:
2034:
2028:
2027:
2025:
2023:
2008:
2002:
2001:
1999:
1997:
1981:
1975:
1969:
1936:
1933:
1927:
1918:
1912:
1903:
1897:
1888:
1882:
1881:
1879:
1878:
1863:
1857:
1847:
1841:
1840:
1838:
1836:
1830:
1822:
1816:
1815:
1807:
1801:
1800:
1780:
1769:
1768:
1766:
1765:
1742:
1733:
1732:
1716:
1706:
1700:
1686:
1680:
1670:
1358:brick and mortar
1166:
1159:
1155:
1152:
1146:
1144:
1103:
1071:
1063:
1015:
1008:
1001:
985:
984:
962:Business process
504:Financial market
341:Labour economics
336:Public economics
95:Corporation sole
30:
21:
3334:
3333:
3329:
3328:
3327:
3325:
3324:
3323:
3309:Web development
3289:
3288:
3287:
3282:
3202:
3188:SHARE computing
3149:GlobalFoundries
3091:
3039:
3033:
2960:
2919:
2910:Financial swaps
2885:Hard disk drive
2848:
2782:
2756:Yamato Facility
2674:
2581:
2513:
2503:
2470:Tivoli Software
2355:
2309:
2208:
2178:
2173:
2143:
2142:
2133:
2131:
2123:
2122:
2118:
2109:
2107:
2094:
2093:
2089:
2080:
2078:
2065:
2064:
2057:
2047:
2045:
2036:
2035:
2031:
2021:
2019:
2010:
2009:
2005:
1995:
1993:
1983:
1982:
1978:
1972:eCommerce theme
1970:
1939:
1934:
1930:
1919:
1915:
1904:
1900:
1889:
1885:
1876:
1874:
1865:
1864:
1860:
1848:
1844:
1834:
1832:
1828:
1824:
1823:
1819:
1809:
1808:
1804:
1797:
1782:
1781:
1772:
1763:
1761:
1759:
1744:
1743:
1736:
1729:
1708:
1707:
1703:
1687:
1683:
1671:
1667:
1662:
1644:Digital economy
1625:
1603:
1562:
1557:
1545:
1534:The point of a
1532:
1521:
1507:
1491:
1478:
1469:
1456:
1447:non-repudiation
1442:
1440:Non-repudiation
1433:
1411:
1402:Confidentiality
1399:
1393:to list a few.
1370:
1330:
1317:
1311:
1298:
1292:
1259:
1253:
1207:Michael Aldrich
1199:
1167:
1156:
1150:
1147:
1104:
1102:
1088:
1072:
1061:
1030:online business
1028:(also known as
1019:
979:
972:
971:
915:Business ethics
905:
895:
894:
835:
827:
826:
537:
529:
528:
524:Venture capital
454:Commercial bank
444:Insider dealing
419:
411:
410:
361:Planned economy
326:
316:
315:
260:
258:Corporate title
250:
249:
225:Corporate crime
205:
195:
194:
190:Audit committee
165:
155:
154:
110:Holding company
90:Corporate group
85:
78:Business entity
70:
69:
50:
28:
23:
22:
15:
12:
11:
5:
3332:
3330:
3322:
3321:
3316:
3311:
3306:
3304:Business terms
3301:
3291:
3290:
3284:
3283:
3281:
3280:
3279:
3278:
3273:
3268:
3263:
3258:
3253:
3248:
3243:
3228:
3218:
3207:
3204:
3203:
3201:
3200:
3195:
3190:
3185:
3180:
3173:
3171:Lucifer cipher
3168:
3163:
3156:
3151:
3146:
3141:
3136:
3131:
3122:
3121:
3120:
3115:
3107:
3099:
3097:
3093:
3092:
3090:
3089:
3087:Peter R. Voser
3084:
3079:
3074:
3072:Andrew Liveris
3069:
3067:Arvind Krishna
3064:
3059:
3054:
3049:
3043:
3041:
3035:
3034:
3032:
3031:
3028:Arvind Krishna
3025:
3019:
3013:
3007:
3001:
2995:
2989:
2983:
2977:
2970:
2968:
2962:
2961:
2959:
2958:
2953:
2948:
2943:
2938:
2933:
2927:
2925:
2921:
2920:
2918:
2917:
2912:
2907:
2902:
2897:
2892:
2887:
2882:
2877:
2872:
2867:
2862:
2856:
2854:
2850:
2849:
2847:
2846:
2841:
2836:
2831:
2829:Smarter Planet
2826:
2821:
2816:
2811:
2806:
2805:
2804:
2794:
2790:
2788:
2784:
2783:
2781:
2780:
2775:
2770:
2765:
2760:
2759:
2758:
2753:
2748:
2740:
2739:
2738:
2733:
2728:
2721:IBM Buildings
2719:
2718:
2717:
2712:
2706:Software Labs
2704:
2703:
2702:
2696:
2695:, Montreal, QC
2686:
2684:
2680:
2679:
2676:
2675:
2673:
2672:
2662:
2660:Service Bureau
2657:
2652:
2650:Product Center
2647:
2642:
2637:
2632:
2627:
2622:
2617:
2615:Ambra Computer
2612:
2611:
2610:
2605:
2595:
2589:
2587:
2583:
2582:
2580:
2579:
2574:
2569:
2564:
2563:
2562:
2552:
2547:
2546:
2545:
2535:
2530:
2524:
2522:
2515:
2509:
2508:
2505:
2504:
2502:
2501:
2496:
2495:
2494:
2484:
2479:
2478:
2477:
2467:
2462:
2457:
2456:
2455:
2450:
2440:
2435:
2430:
2425:
2420:
2418:Lotus Software
2415:
2410:
2405:
2400:
2395:
2390:
2385:
2384:
2383:
2373:
2367:
2365:
2361:
2360:
2357:
2356:
2354:
2353:
2348:
2343:
2338:
2333:
2328:
2323:
2317:
2315:
2311:
2310:
2308:
2307:
2306:
2305:
2300:
2295:
2290:
2285:
2280:
2272:
2271:
2270:
2265:
2255:
2250:
2245:
2244:
2243:
2232:
2230:
2223:
2216:
2210:
2209:
2207:
2206:
2205:
2204:
2194:
2188:
2186:
2180:
2179:
2174:
2172:
2171:
2164:
2157:
2149:
2141:
2140:
2116:
2087:
2055:
2029:
2011:Awati, Rahul.
2003:
1976:
1937:
1928:
1913:
1898:
1883:
1858:
1842:
1817:
1802:
1796:978-0195180862
1795:
1770:
1757:
1734:
1727:
1701:
1681:
1664:
1663:
1661:
1658:
1657:
1656:
1651:
1646:
1641:
1636:
1631:
1624:
1621:
1620:
1619:
1615:
1611:
1602:
1599:
1598:
1597:
1593:
1586:
1583:
1580:
1577:
1574:
1570:
1561:
1558:
1556:
1553:
1544:
1541:
1531:
1528:
1520:
1517:
1506:
1503:
1490:
1487:
1477:
1476:Cost structure
1474:
1468:
1465:
1455:
1454:Access control
1452:
1441:
1438:
1432:
1431:Data integrity
1429:
1410:
1407:
1398:
1395:
1379:data integrity
1369:
1366:
1346:digital divide
1329:
1326:
1313:Main article:
1310:
1307:
1294:Main article:
1291:
1288:
1272:business model
1257:Business model
1255:Main article:
1252:
1251:Business model
1249:
1198:
1195:
1190:
1189:
1186:
1183:
1169:
1168:
1075:
1073:
1066:
1060:
1057:
1021:
1020:
1018:
1017:
1010:
1003:
995:
992:
991:
990:
989:
974:
973:
970:
969:
964:
959:
958:
957:
947:
945:Business model
942:
937:
932:
927:
922:
917:
912:
906:
901:
900:
897:
896:
893:
892:
887:
882:
877:
872:
867:
862:
857:
852:
847:
842:
836:
833:
832:
829:
828:
825:
824:
819:
814:
813:
812:
802:
797:
792:
787:
782:
777:
776:
775:
764:
759:
754:
749:
744:
739:
734:
729:
724:
719:
714:
713:
712:
701:
696:
695:
694:
684:
679:
674:
669:
664:
663:
662:
654:Human resource
651:
646:
645:
644:
633:
628:
623:
618:
613:
608:
603:
598:
596:Communications
593:
592:
591:
581:
580:
579:
569:
564:
559:
554:
549:
544:
538:
535:
534:
531:
530:
527:
526:
521:
516:
511:
506:
501:
496:
491:
486:
481:
476:
474:Public finance
471:
469:Financial risk
466:
461:
456:
451:
446:
441:
436:
431:
426:
420:
417:
416:
413:
412:
409:
408:
403:
398:
396:Macroeconomics
393:
391:Microeconomics
388:
383:
381:Market economy
378:
373:
368:
363:
358:
353:
348:
343:
338:
333:
327:
322:
321:
318:
317:
314:
313:
304:
295:
290:
285:
276:
267:
261:
256:
255:
252:
251:
248:
247:
242:
237:
235:Insolvency law
232:
227:
222:
217:
212:
210:Commercial law
206:
201:
200:
197:
196:
193:
192:
187:
185:Advisory board
182:
177:
172:
166:
161:
160:
157:
156:
153:
152:
147:
142:
137:
132:
127:
122:
117:
112:
107:
102:
97:
92:
86:
76:
75:
72:
71:
68:
67:
62:
57:
51:
46:
45:
42:
41:
37:
36:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
3331:
3320:
3317:
3315:
3312:
3310:
3307:
3305:
3302:
3300:
3297:
3296:
3294:
3277:
3274:
3272:
3269:
3267:
3264:
3262:
3259:
3257:
3254:
3252:
3249:
3247:
3244:
3242:
3239:
3238:
3237:
3229:
3227:
3219:
3217:
3209:
3208:
3205:
3199:
3196:
3194:
3191:
3189:
3186:
3184:
3181:
3179:
3178:
3174:
3172:
3169:
3167:
3164:
3162:
3161:
3157:
3155:
3152:
3150:
3147:
3145:
3142:
3140:
3137:
3135:
3132:
3130:
3126:
3123:
3119:
3116:
3114:
3111:
3110:
3108:
3106:
3105:
3101:
3100:
3098:
3094:
3088:
3085:
3083:
3080:
3078:
3075:
3073:
3070:
3068:
3065:
3063:
3060:
3058:
3055:
3053:
3050:
3048:
3047:Thomas Buberl
3045:
3044:
3042:
3036:
3029:
3026:
3023:
3022:Ginni Rometty
3020:
3017:
3014:
3011:
3008:
3005:
3002:
2999:
2996:
2993:
2992:Frank T. Cary
2990:
2987:
2984:
2981:
2978:
2975:
2972:
2971:
2969:
2967:
2963:
2957:
2954:
2952:
2949:
2947:
2944:
2942:
2939:
2937:
2934:
2932:
2929:
2928:
2926:
2922:
2916:
2913:
2911:
2908:
2906:
2903:
2901:
2898:
2896:
2893:
2891:
2888:
2886:
2883:
2881:
2878:
2876:
2873:
2871:
2868:
2866:
2863:
2861:
2858:
2857:
2855:
2851:
2845:
2842:
2840:
2837:
2835:
2832:
2830:
2827:
2825:
2822:
2820:
2817:
2815:
2812:
2810:
2807:
2803:
2800:
2799:
2798:
2795:
2792:
2791:
2789:
2785:
2779:
2778:IBM Rochester
2776:
2774:
2771:
2769:
2766:
2764:
2761:
2757:
2754:
2752:
2749:
2747:
2744:
2743:
2741:
2737:
2734:
2732:
2729:
2727:, Chicago, IL
2726:
2723:
2722:
2720:
2716:
2713:
2711:
2708:
2707:
2705:
2701:, Atlanta, GA
2700:
2697:
2694:
2691:
2690:
2688:
2687:
2685:
2681:
2670:
2666:
2663:
2661:
2658:
2656:
2653:
2651:
2648:
2646:
2643:
2641:
2638:
2636:
2633:
2631:
2628:
2626:
2623:
2621:
2618:
2616:
2613:
2609:
2606:
2604:
2601:
2600:
2599:
2596:
2594:
2591:
2590:
2588:
2584:
2578:
2575:
2573:
2570:
2568:
2565:
2561:
2558:
2557:
2556:
2553:
2551:
2548:
2544:
2541:
2540:
2539:
2536:
2534:
2531:
2529:
2526:
2525:
2523:
2519:
2516:
2510:
2500:
2497:
2493:
2490:
2489:
2488:
2485:
2483:
2480:
2476:
2473:
2472:
2471:
2468:
2466:
2463:
2461:
2458:
2454:
2451:
2449:
2446:
2445:
2444:
2441:
2439:
2436:
2434:
2431:
2429:
2428:Mashup Center
2426:
2424:
2421:
2419:
2416:
2414:
2411:
2409:
2406:
2404:
2401:
2399:
2396:
2394:
2391:
2389:
2386:
2382:
2379:
2378:
2377:
2374:
2372:
2369:
2368:
2366:
2362:
2352:
2349:
2347:
2344:
2342:
2339:
2337:
2334:
2332:
2329:
2327:
2324:
2322:
2319:
2318:
2316:
2312:
2304:
2301:
2299:
2296:
2294:
2291:
2289:
2286:
2284:
2281:
2279:
2276:
2275:
2273:
2269:
2266:
2264:
2261:
2260:
2259:
2256:
2254:
2253:Power Systems
2251:
2249:
2246:
2242:
2239:
2238:
2237:
2234:
2233:
2231:
2227:
2224:
2220:
2217:
2215:
2211:
2203:
2200:
2199:
2198:
2195:
2193:
2190:
2189:
2187:
2185:
2181:
2177:
2170:
2165:
2163:
2158:
2156:
2151:
2150:
2147:
2130:
2126:
2120:
2117:
2106:on 2020-02-20
2105:
2101:
2097:
2091:
2088:
2077:on 2020-07-30
2076:
2072:
2068:
2062:
2060:
2056:
2044:
2040:
2033:
2030:
2018:
2014:
2007:
2004:
1992:on 2010-07-11
1991:
1987:
1980:
1977:
1973:
1968:
1966:
1964:
1962:
1960:
1958:
1956:
1954:
1952:
1950:
1948:
1946:
1944:
1942:
1938:
1932:
1929:
1925:
1922:
1917:
1914:
1910:
1907:
1902:
1899:
1895:
1892:
1887:
1884:
1873:
1869:
1862:
1859:
1856:
1855:0-471-72029-1
1852:
1846:
1843:
1827:
1821:
1818:
1813:
1806:
1803:
1798:
1792:
1788:
1787:
1779:
1777:
1775:
1771:
1760:
1758:9781136676765
1754:
1750:
1749:
1741:
1739:
1735:
1730:
1728:9780130851239
1724:
1720:
1719:Prentice Hall
1715:
1714:
1705:
1702:
1699:
1698:0-06-052379-4
1695:
1691:
1685:
1682:
1679:
1678:1-4039-1348-X
1675:
1669:
1666:
1659:
1655:
1652:
1650:
1647:
1645:
1642:
1640:
1637:
1635:
1632:
1630:
1627:
1626:
1622:
1616:
1612:
1610:transactions.
1608:
1607:
1606:
1601:Disadvantages
1600:
1594:
1591:
1587:
1584:
1581:
1578:
1575:
1571:
1568:
1567:
1566:
1559:
1554:
1552:
1550:
1542:
1540:
1537:
1529:
1527:
1525:
1518:
1516:
1513:
1504:
1502:
1500:
1496:
1488:
1486:
1482:
1475:
1473:
1466:
1464:
1462:
1453:
1451:
1448:
1439:
1437:
1430:
1428:
1425:
1421:
1417:
1408:
1406:
1403:
1396:
1394:
1392:
1388:
1384:
1380:
1375:
1367:
1365:
1363:
1359:
1355:
1351:
1350:consolidation
1347:
1343:
1339:
1335:
1327:
1325:
1323:
1316:
1308:
1306:
1302:
1297:
1296:Revenue model
1290:Revenue model
1289:
1287:
1285:
1281:
1277:
1273:
1269:
1265:
1258:
1250:
1248:
1245:
1242:
1238:
1237:
1231:
1229:
1225:
1221:
1217:
1213:
1208:
1204:
1196:
1194:
1187:
1184:
1181:
1180:
1179:
1177:
1165:
1162:
1154:
1143:
1140:
1136:
1133:
1129:
1126:
1122:
1119:
1115:
1112: –
1111:
1107:
1106:Find sources:
1100:
1096:
1092:
1086:
1085:
1081:
1076:This section
1074:
1070:
1065:
1064:
1058:
1056:
1054:
1050:
1046:
1041:
1039:
1035:
1031:
1027:
1016:
1011:
1009:
1004:
1002:
997:
996:
994:
993:
988:
983:
978:
977:
976:
975:
968:
965:
963:
960:
956:
953:
952:
951:
948:
946:
943:
941:
938:
936:
933:
931:
928:
926:
923:
921:
920:Business plan
918:
916:
913:
911:
908:
907:
904:
899:
898:
891:
888:
886:
883:
881:
878:
876:
873:
871:
868:
866:
863:
861:
858:
856:
853:
851:
850:Communication
848:
846:
843:
841:
838:
837:
831:
830:
823:
820:
818:
815:
811:
810:administrator
808:
807:
806:
803:
801:
798:
796:
793:
791:
788:
786:
783:
781:
778:
774:
771:
770:
768:
765:
763:
760:
758:
755:
753:
750:
748:
745:
743:
740:
738:
735:
733:
730:
728:
725:
723:
720:
718:
715:
711:
708:
707:
705:
702:
700:
697:
693:
692:administrator
690:
689:
688:
685:
683:
680:
678:
675:
673:
670:
668:
665:
661:
658:
657:
655:
652:
650:
647:
643:
640:
639:
637:
634:
632:
629:
627:
624:
622:
619:
617:
614:
612:
609:
607:
604:
602:
601:Configuration
599:
597:
594:
590:
587:
586:
585:
582:
578:
575:
574:
573:
570:
568:
565:
563:
560:
558:
555:
553:
550:
548:
545:
543:
540:
539:
533:
532:
525:
522:
520:
517:
515:
512:
510:
507:
505:
502:
500:
497:
495:
492:
490:
487:
485:
482:
480:
477:
475:
472:
470:
467:
465:
462:
460:
457:
455:
452:
450:
447:
445:
442:
440:
437:
435:
432:
430:
427:
425:
422:
421:
415:
414:
407:
404:
402:
399:
397:
394:
392:
389:
387:
384:
382:
379:
377:
374:
372:
369:
367:
364:
362:
359:
357:
356:Mixed economy
354:
352:
349:
347:
344:
342:
339:
337:
334:
332:
329:
328:
325:
320:
319:
312:
308:
305:
303:
299:
296:
294:
291:
289:
286:
284:
280:
277:
275:
271:
268:
266:
263:
262:
259:
254:
253:
246:
243:
241:
238:
236:
233:
231:
228:
226:
223:
221:
218:
216:
213:
211:
208:
207:
204:
203:Corporate law
199:
198:
191:
188:
186:
183:
181:
178:
176:
173:
171:
168:
167:
164:
159:
158:
151:
148:
146:
143:
141:
138:
136:
133:
131:
128:
126:
123:
121:
118:
116:
113:
111:
108:
106:
103:
101:
98:
96:
93:
91:
88:
87:
83:
79:
74:
73:
66:
63:
61:
58:
56:
53:
52:
49:
44:
43:
39:
38:
35:
31:
19:
3175:
3158:
3139:Deep Thought
3102:
3030:(since 2020)
2998:John R. Opel
2956:Think slogan
2950:
2797:Deep Thunder
2603:Kaleida Labs
2598:AIM alliance
2283:Q System Two
2278:Q System One
2132:. Retrieved
2128:
2119:
2108:. Retrieved
2104:the original
2100:www.sltda.lk
2099:
2090:
2079:. Retrieved
2075:the original
2071:Toppr-guides
2070:
2046:. Retrieved
2042:
2032:
2020:. Retrieved
2016:
2006:
1994:. Retrieved
1990:the original
1979:
1931:
1923:
1916:
1908:
1901:
1893:
1886:
1875:. Retrieved
1872:The Atlantic
1871:
1861:
1845:
1833:. Retrieved
1820:
1811:
1805:
1785:
1762:. Retrieved
1747:
1712:
1704:
1689:
1684:
1668:
1604:
1563:
1546:
1533:
1522:
1512:E-businesses
1511:
1508:
1492:
1483:
1479:
1470:
1467:Availability
1457:
1443:
1434:
1412:
1409:Authenticity
1400:
1371:
1331:
1318:
1303:
1299:
1260:
1246:
1240:
1234:
1232:
1200:
1191:
1185:Consumer (C)
1182:Business (B)
1172:
1157:
1148:
1138:
1131:
1124:
1117:
1105:
1089:Please help
1077:
1042:
1033:
1029:
1025:
1024:
840:Architecture
834:Organization
800:Supply chain
630:
626:Earned value
499:Stock market
376:Open economy
366:Econometrics
105:Conglomerate
3271:Typewriters
3177:Mathematica
3118:Rugby union
3057:Alex Gorsky
3024:(2012–2020)
3018:(2002–2011)
3012:(1993–2002)
3006:(1985–1993)
3000:(1981–1985)
2994:(1973–1981)
2988:(1971–1973)
2982:(1956–1971)
2976:(1914–1956)
2924:Terminology
2880:Floppy disk
2824:SkillsBuild
2787:Initiatives
2768:IBM Hursley
2742:Facilities
2393:Connections
2263:FlashSystem
1996:30 November
1573:connection.
1354:mom-and-pop
1151:August 2024
955:Trade route
870:Engineering
865:Development
717:Performance
660:development
621:Distributed
494:Liquidation
135:Partnership
120:Corporation
115:Cooperative
3319:E-commerce
3293:Categories
3266:System/370
3261:System/360
3052:David Farr
2951:e-business
2853:Inventions
2802:Develothon
2683:Facilities
2543:Promontory
2538:Consulting
2134:2020-05-29
2110:2020-05-29
2081:2020-05-29
2017:TechTarget
1974:by Potenza
1877:2013-02-13
1764:2014-05-31
1660:References
1560:Advantages
1524:Encryption
1519:Encryption
1391:encryption
1315:E-commerce
1309:E-commerce
1121:newspapers
1034:e-business
822:Technology
704:Operations
584:Commercial
577:innovation
567:Capability
459:Derivative
48:Accounting
18:E-business
3134:Deep Blue
3040:directors
2499:WebSphere
2438:PureQuery
2346:Selectric
2321:Blue Gene
2236:Mainframe
2022:12 August
1835:12 August
1596:business.
1387:firewalls
1284:customers
1280:suppliers
1078:does not
890:Structure
875:Hierarchy
795:Strategic
682:Materials
672:Knowledge
649:Financial
589:Marketing
434:Factoring
429:Insurance
331:Commodity
324:Economics
3216:Category
3183:IBM Plex
3038:Board of
2931:Big Blue
2731:Honolulu
2640:Merative
2625:EduQuest
2608:Taligent
2577:Research
2514:entities
2512:Business
2453:OpenQASM
2381:Cloudant
2351:ThinkPad
2274:Quantum
2222:Hardware
2214:Products
1909:Comscore
1692:pg 172.
1623:See also
1374:security
1368:Security
1344:and the
1328:Concerns
1049:internet
1038:Commerce
880:Patterns
860:Conflict
845:Behavior
785:Security
762:Resource
747:Property
710:services
667:Incident
606:Conflict
562:Capacity
265:Chairman
220:Contract
3226:Commons
3193:ScicomP
2736:Seattle
2689:Towers
2635:Lexmark
2630:Kyndryl
2572:Red Hat
2521:Current
2492:Granite
2487:Watsonx
2403:Fortran
2331:PowerPC
2258:Storage
2229:Current
2192:History
2184:History
1618:issues.
1590:Netflix
1499:privacy
1276:service
1197:History
1135:scholar
1099:removed
1084:sources
855:Culture
805:Systems
790:Service
769:
757:Records
752:Quality
742:Project
737:Product
727:Process
706:
687:Network
656:
638:
611:Content
418:Finance
100:Company
3198:Unions
2809:Fellow
2620:Cognos
2593:AdStar
2586:Former
2550:Kenexa
2528:Apptio
2482:Watson
2448:Qiskit
2314:Former
2303:Condor
2293:Osprey
2268:DS8000
2048:5 June
1853:
1793:
1755:
1725:
1696:
1676:
1497:, and
1389:, and
1212:Amazon
1137:
1130:
1123:
1116:
1108:
817:Talent
773:crisis
699:Office
572:Change
3096:Other
2567:Press
2560:India
2376:Cloud
2364:Other
2298:Heron
2288:Eagle
2241:IBM Z
1894:ZDNet
1829:(PDF)
1142:JSTOR
1128:books
903:Trade
885:Space
780:Sales
722:Power
677:Legal
547:Brand
542:Asset
65:Audit
3241:FOSS
2966:CEOs
2870:DRAM
2465:SPSS
2408:ILOG
2050:2021
2024:2022
1998:2010
1851:ISBN
1837:2022
1791:ISBN
1753:ISBN
1723:ISBN
1694:ISBN
1674:ISBN
1282:and
1220:Etsy
1216:eBay
1114:news
1082:any
1080:cite
767:Risk
82:list
2176:IBM
1422:or
1364:.
1241:not
1218:or
1093:by
1053:IBM
1032:or
509:Tax
3295::
2127:.
2098:.
2069:.
2058:^
2041:.
2015:.
1940:^
1870:.
1773:^
1737:^
1721:.
1385:,
1356:,
1266:,
3127:/
2671:)
2667:(
2168:e
2161:t
2154:v
2137:.
2113:.
2084:.
2052:.
2026:.
2000:.
1880:.
1839:.
1799:.
1767:.
1731:.
1262:(
1164:)
1158:(
1153:)
1149:(
1139:·
1132:·
1125:·
1118:·
1101:.
1087:.
1014:e
1007:t
1000:v
309:/
300:/
281:/
272:/
84:)
80:(
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.