Business of Information Technology  >   Business Processes  >  

iCommerce

RSS Feed    Add to Google    Add to My Yahoo!
iCommerce Reports
 
How to consolidate & simplify order management systems
sponsored by SearchFinancialApplications
EBOOK: In e-commerce, many organizations are investing in order management technology to streamline and consolidate their ERP systems.
Posted: 28 Aug 2013 | Published: 28 Aug 2013

SearchFinancialApplications

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.
Posted: 27 Dec 2012 | Published: 19 Dec 2012

SearchSecurity.com

Managing Content for Global Brands: Considering e-Spirit
sponsored by e-Spirit AG
ANALYST REPORT: This analyst report details what you should look for in a Web content management system, and evaluates one vendor's WCM offering.
Posted: 10 Feb 2014 | Published: 30 Jun 2010

e-Spirit AG

Gartner: CIO checklist for next-generation mobile strategies
sponsored by ComputerWeekly.com
ANALYST BRIEF: This article by Gartner analysts provides CIOs with a checklist of guidelines and questions to help businesses make the most out of the next generation mobile technology.
Posted: 31 Jul 2012 | Published: 31 Jul 2012

ComputerWeekly.com

Monetising the Mobile Content Plan
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This exclusive report for Computer Weekly readers by Juniper Research, offers a comprehensive briefing on the routes Mobile Network Operators (MNOs) taking to develop new business models.
Posted: 22 Mar 2013 | Published: 22 Mar 2013

ComputerWeekly.com

E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime
sponsored by SearchSecurity.com
EBOOK: As our economy struggles to regain its footing, online fraud is more prevalent than ever. In this E-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more.
Posted: 01 Oct 2009 | Published: 31 Aug 2009

SearchSecurity.com

Giving Customers Better Protection While Reducing Costs
sponsored by ThreatMetrix
CASE STUDY: This case study outlines a top e-commerce business and their strategy for preventing fraud, lowering costs and ensuring consumer trust.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

How to retain customer loyalty in the competitive retail market
sponsored by Infor CRM
WHITE PAPER: Read this now to learn how single-view software could enhance your customer relationship interactions with more insightful data.
Posted: 16 Jan 2012 | Published: 16 Jan 2012

Infor CRM

The Total Economic Impact of IBM® Exceptional Web Experience
sponsored by IBM
WHITE PAPER: Delivering an optimal web experience not only helps you engage with your customers, partners, and employees but also improves relationships and increases your competitive advantage. This resource explores why investing in web experience solutions can help you achieve this.
Posted: 09 Aug 2012 | Published: 30 Mar 2012

IBM

Empowered Customers Drive Collaborative Business Evolution
sponsored by IBM
WHITE PAPER: Read this groundbreaking new study, conducted by Forrester Consulting on behalf of IBM, to understand how empowered customers are changing the way business is doing business—today and in the future.
Posted: 13 Aug 2012 | Published: 31 May 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement