Business of Information Technology  >   Business Processes  >   eCommerce  >  

Electronic Auctions

RSS Feed    Add to Google    Add to My Yahoo!
Electronic Auctions White Papers (View All Report Types)
 
Reverse Auction Best Practices
sponsored by SAP America, Inc.
WHITE PAPER: Reverse auctions are a key tool that sourcing organizations can use to bring about huge success if executed along with a well-defined sourcing process. Careful thought and planning must precede an auction event in order to achieve double-digit price compression.
Posted: 26 Apr 2012 | Published: 28 Feb 2011

SAP America, Inc.

Understanding the Business Benefits of Leveraging S/4 HANA
sponsored by SAP
WHITE PAPER: To thrive and stay relevant, it's time to rethink business models, processes, and how people work. In this S/4HANA roadmap, discover in-memory business strategies that bridge the gap between transactional and decision-making systems by better understanding workforce engagement, the IoT and big data, customer experience, and suppliers and networks.
Posted: 08 Sep 2016 | Published: 08 Sep 2016

SAP

Big Data in Big Companies
sponsored by Red Hat
WHITE PAPER: Explore the following white paper to join analytics pioneer, Tom Davenport, as he reveals the findings of how big data fits into the data and analytics infrastructure of 20 large organizations. Find out how these companies are handling big data, the tools and skill sets used to maximize ROI, and what the future holds with analytics 3.0.
Posted: 17 Apr 2014 | Published: 21 Apr 2014

Red Hat

FuturEdge - Reshape your Application Portfolio
sponsored by CSC
WHITE PAPER: Aging, complex systems can inhibit business processes, hinder productivity, and result in high maintenance costs. Access this resource to learn about a comprehensive set of business-led services that can help you modernize your application portfolio in three phases - shape, transform, and manage.
Posted: 19 Sep 2013 | Published: 31 Dec 2012

CSC

Achieve Effective BPM with Cloud Provisioning
sponsored by OpenText
WHITE PAPER: In this white paper, learn about a cloud provisioning technology with a workflow-enabled framework, allowing you to create, provision, and orchestrate virtual "bundles" of on-premise and cloud capabilities that make up a new product, service, or application.
Posted: 14 Feb 2014 | Published: 31 Dec 2013

OpenText

Delivering a Seamless Experience Across Every Channel
sponsored by IBM
WHITE PAPER: This white paper reveals the results of a survey of over 500 e-commerce and e-business professionals, and provides key insights and best practices for improving customer experiences across all channels.
Posted: 15 Nov 2013 | Published: 31 May 2013

IBM

Behavior- Driven Development and BRMS
sponsored by Red Hat
WHITE PAPER: Inside this white paper, learn how to deliver the right product to the market faster with business rules management and behavior-driven development (BDD).
Posted: 02 Oct 2014 | Published: 31 Jul 2013

Red Hat

Red Hat JBoss BPM Suite 6 Compared to Pegasystems Pega 7 BPM
sponsored by Red Hat
WHITE PAPER: Performing comparisons between leading BPM systems could take ages to perform on your own -- fortunately, this competitive brief does some of the work for you. Take a look at how Red Hat JBoss BPM suite compares to Pegasystems, Inc.'s Pega 7 BPM in terms of the five essential criteria for choosing a BPM system
Posted: 15 May 2014 | Published: 30 Apr 2014

Red Hat

Why You Should Automate Processing of Vendor Invoices
sponsored by Esker Inc.
WHITE PAPER: In this paper, discover the results that Esker research found indicating that accounts payable automation can typically save organizations 40 to 60 percent of operational and administrative AP costs. Also explore the abundant benefits that automated processing of vendor invoices can help business like yours achieve.
Posted: 10 Jul 2013 | Published: 10 Jul 2013

Esker Inc.

Server-Gated Cryptography: Providing Better Security for More Users
sponsored by Thawte Inc.
WHITE PAPER: Discover how Server-Gated Cryptography (SGC)-enabled SSL certificates are crucial to protecting your organization and your end-users in the threat-filled vastness of cyberspace.
Posted: 10 May 2013 | Published: 10 May 2013

Thawte Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement