Business of Information Technology  >   Business Processes  >  

e Commerce

RSS Feed    Add to Google    Add to My Yahoo!
e Commerce Reports
 
Gartner: CIO checklist for next-generation mobile strategies
sponsored by ComputerWeekly.com
ANALYST BRIEF: This article by Gartner analysts provides CIOs with a checklist of guidelines and questions to help businesses make the most out of the next generation mobile technology.
Posted: 31 Jul 2012 | Published: 31 Jul 2012

ComputerWeekly.com

Valentino: It's all about customer satisfaction
sponsored by Hewlett-Packard Limited
WEBCAST: This brief video explores how high fashion brand Valentino improved its customer relations by developing and implementing a set of fully-integrated mobile apps. Watch now to discover the new technologies that supported Valentino's CRM initiatives.
Posted: 20 May 2013 | Premiered: May 20, 2013

Hewlett-Packard Limited

Evaluating Netsuit Suitecommerce
sponsored by ComputerWeekly.com
ANALYST REPORT: NetSuite recently announced SuiteCommerce, a unified platform that enables businesses to centrally manage all aspects of their e-commerce and optimize interactions regardless of device or location, Nucleus Research reports.
Posted: 26 Jul 2012 | Published: 05 Jun 2012

ComputerWeekly.com

Innovative business technologies in a converging world
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This independently researched report investigates converging business technologies, including cloud computing, big data analytics and business intelligence.  
Posted: 18 Feb 2013 | Published: 18 Feb 2013

ComputerWeekly.com

Increase E-commerce Conversion Rates with Extended Validation SSl Certificates
sponsored by GeoTrust, Inc.
WHITE PAPER: Learn how deploying an EV certificate on your eCommerce website can protect against threats, while showing your customers that they can transact with confidence, helping increase your sites conversion rates.
Posted: 17 Jul 2015 | Published: 11 Nov 2014

GeoTrust, Inc.

Benefits Management: How to increase the business value of your IT projects
sponsored by ComputerWeekly.com
BOOK: This book extract explains how organisation can uses benefits management techniques to increase the value of IT projects to the business.
Posted: 15 Feb 2013 | Published: 15 Feb 2013

ComputerWeekly.com

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper to learn about another perspective in POS system security. Read on for an overview of payment card systems and attack methods, as well as how to leverage the Council on CyberSecurity's 20 critical controls to your system's advantage.
Posted: 13 Apr 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

Computer Weekly 1 November 2011: Read this week's issue of the UK's leading technology publication, with the latest news, analysis and opinion for IT managers
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the IT challenges facing retailers in a world of multi-channel shopping; our latest Buyer's Guide looks at upgrading from Windows XP to Windows 7 as XP approaches the time Microsoft ceases support; and we kick-off this year's search for the most influential people in UK IT. Download the new issue now.
Posted: 31 Oct 2011 | Published: 28 Oct 2011

ComputerWeekly.com

Commerce Anywhere: A Business and Technology Strategy to Maximize Cross-Channel Commerce Growth
sponsored by Oracle Corporation
WHITE PAPER: E-commerce has gone from fringe to foundation. Now, businesses must tailor their customer serivce approach to the more complex "anytime, anywhere" customer with mobile device in hand. This white paper from Oracle details the "commerce anywhere" approach.
Posted: 26 Apr 2011 | Published: 26 Apr 2011

Oracle Corporation

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement