Not to stereotype, at least not too much, most gay couples are relatively affluent, well educated, white and willing to spend their money on discretionary items such as eating out. That makes this a desirable demographic to welcome and, to be bolder …
Since CEO Mike Ullman retook the top job in April after having occupied it from 2004 to 2011, he has been bringing back coupons, frequent sales events and basic merchandise like khakis and jeans that Johnson eliminated in a failed attempt to attract …
You would think that beer and cigarettes would be discretionary, but he said that many studies indicate a strange thing about those two items, that are items people use as part of their life coping skills. “You'd think,” he said, “that in bad economic …
The Ferretti Group, producer of luxury yachts, controls eight other brands: Ferretti Yachts, Pershing, Itama, Bertram Yacht, Inc., Riva S.p.A., Mochi Craft, CRN, and Custom Line. In January 2012, Ferretti was bought by Chinese state-owned Weichai …
So big that few berths can accommodate it, Azzam epitomises the competition among the world's super-rich to own the largest luxury yacht. Azzam's ownership was a mystery when it was sold this year, but the magazine named Sheikh Khalifa bin Zayed …
… 'clienteling' apps can help provide a personalized shopping experience for every shopper. Today, it's reserved for the heavy spender 'whales' at high-end luxury stores, where associates still use their secret 'Black Book' to strengthen customer …
It can be difficult to show the human side of technology, to go beyond the Nasdaq and the cold, hard metal and glass of today's gadgets. But Fincher's The Social Network accomplishes exactly that. The movie deftly … The last emperor of China, Puyi …
The living room of the future is a place of push-button luxury and a mid-century modern aesthetic. The sunken living room may feature inflatable furniture and disposable paper kids' chairs, but Cronkite … One of the more interesting gadgets in the …
"However, when a victim downloads and runs the app, attackers can remotely exploit the planted vulnerabilities and in turn assemble the gadgets to accomplish various malicious tasks." It showed that once an app is approved for sale in the app store, …