Business of Information Technology  >   Business Processes  >  

eSales

RSS Feed    Add to Google    Add to My Yahoo!
eSales Reports
 
The next wave of digitisation: setting your direction, building your capabilities
sponsored by ComputerWeekly.com
IT BRIEFING: Companies need to make significant investments in digital skills and technologies if they are to meet the needs of their customers, Booz&Co argues in this report.
Posted: 27 Mar 2012 | Published: 05 Sep 2011

ComputerWeekly.com

RSA's Digital Journey
sponsored by ComputerWeekly.com
PRESENTATION: Ian Hood, Group Digital Director of RSA, tells the story of one of the UK's largest insurers journey to digital technology in this presentation.
Posted: 22 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

The Secrets of Seamless Retailing Success
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Thisresearch from Accenture suggests that consumers may be having second thoughts about the benefits of online shopping and that no one should write off stores just yet.
Posted: 19 May 2014 | Published: 19 May 2014

ComputerWeekly.com

Bon-Ton Stores: Maximizing Peak Capacity; Minimizing Stack Costs
sponsored by IBM
CASE STUDY: This case study outlines how one leading retailer needed to update its servers to support its expanding e-commerce sites by migrating Linux servers. Find out the performance and capabilities that resulted from this migration of systems and how it affected data center costs and application availability.
Posted: 28 Oct 2014 | Published: 30 Apr 2014

IBM

Revamp Retail Transactions with Omni-Channel Technology
sponsored by Toshiba
WHITE PAPER: Read this exclusive white paper now to find out the differences between omni-channel and multi-channel technologies, as well as which more is more highly recommended.
Posted: 05 May 2014 | Published: 31 Jan 2014

Toshiba

The Future of Authentication for Online Services
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, we take a look at how strong authentication can benefit eCommerce and online services. We will evaluate the risks that identity fraud, phishing and cybercrime pose for online service providers and discuss how strong user authentication can alleviate these risks.
Posted: 02 Nov 2009 | Published: 02 Nov 2009

SafeNet, Inc.

Advanced Load Balancing: 8 Must-have Features for Today's Network Demands
sponsored by Citrix
WHITE PAPER: Today’s web applications require more than simple load balancing. This white paper describes the 8 must-have features of a more comprehensive application delivery solution.
Posted: 19 Sep 2008 | Published: 07 Jun 2010

Citrix

VeriSign® Identity Protection Fraud Detection Service
sponsored by VeriSign EMEA
WHITE PAPER: This white paper explores how the VeriSign® Identity Protection (VIP) Fraud Detection Service helps organizations mitigate issues related to identity theft and insider threats.
Posted: 04 Dec 2008 | Published: 13 Nov 2008

VeriSign EMEA

Giving Customers Better Protection While Reducing Costs
sponsored by ThreatMetrix
CASE STUDY: This case study outlines a top e-commerce business and their strategy for preventing fraud, lowering costs and ensuring consumer trust.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

Controlling High Fraud Risk of International Transactions iovation Reputation Services
sponsored by iovation, Inc.
WHITE PAPER: Iovation has pioneered a technology for online fraud screening. This white paper examines how e-Commerce businesses can fight online fraud without turning away business based on the geographic locations of customers.
Posted: 13 Oct 2008 | Published: 01 May 2007

iovation, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement