Business of Information Technology  >   Business Processes  >   eCommerce  >  

Voice Commerce

RSS Feed   
Voice Commerce Reports
 
Understanding Your Needs for BPM and aPaaS
sponsored by Mendix
WHITE PAPER: Download this BPM guide which outlines both primary use case integrations and possible barriers that could be resolved with an aPaaS tool.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Mendix

5 Signs It's Time to Partner with a Retail Technology Provider
sponsored by SFG
WHITE PAPER: In this white paper, explore 5 signs it's time to partner with a retail technology provider. Review how ecommerce businesses can benefit from retail technology partners, and discover if SFG is right for your organization.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

SFG

IoT Solution Architecture: Essentials Guide
sponsored by Mendix
WHITE PAPER: When approaching IoT, you need to turn data into insights and understand three solution types: endpoints, software, and applications. Download this IoT implementation guide for an understand of the IoT solution anatomy and takeaway 7 recommendations you can use for your own projects.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Mendix

5 Principles for Enterprise Architects
sponsored by Mendix
WHITE PAPER: The emergence of wide-ranging tools like cloud, mobile IoT, and analytics has put organizations in a place where they need personnel to effectively lead the implementation. Download the 5 principles of a strong enterprise architect in order to understand digital priorities and how to support them.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Mendix

The Silent E-Commerce Sales Killer: Customer Journey Hijacking
sponsored by The Media Trust
RESOURCE: One of the most critical aspects of digital retail is ensuring a seamless, tailored shopper experience. While e-commerce leaders invest resources into ensuring this, the conversion rate from site visit to sale is just 2.86%. In this article, explore how customer journey hijacking is redirecting your customers and how to protect against this.
Posted: 13 Jan 2020 | Published: 13 Jan 2020

The Media Trust

Computer Weekly – 14 June 2016: The password's the problem – lessons from the LinkedIn breach
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after millions of LinkedIn users had their data compromised, we look at the lesson to be learned from this latest data breach incident. Our buyer's guide looks at NoSQL technologies and compares Microsoft's and Oracle's offerings. And we examine the benefits of cloud-based data analytics. Read the issue now.
Posted: 10 Jun 2016 | Published: 14 Jun 2016

ComputerWeekly.com

Automating the Financial Close in SAP
sponsored by BlackLine
WHITE PAPER: Find out how you can achieve a highly secure and intelligent financial close automation in conjunction with SAP technology.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

BlackLine

Computer Weekly – 27 May 2014: Targeting the digital customer
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes of John Lewis's £40m e-commerce transformation plan to find out how to target the digital customer. Starbucks' European CIO talks about the coffee chain's IT strategy. And we evaluate three big suppliers' plans for virtualised networking. Read the issue now.
Posted: 27 May 2014 | Published: 27 May 2014

ComputerWeekly.com

Improve Business Agility by Adopting These 10 Attributes
sponsored by IBM
EGUIDE: In this expert e-guide, you'll discover the 10 attributes of a successful business agility strategy, as well as how business executives (not just CIOs) are using Agile-based stand-up meetings to foster a productive and collaborative business culture.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

IBM

ROI analysis: JBoss Enterprise BRMS Compared to Drools, the JBoss Community Project
sponsored by Red Hat
WHITE PAPER: Drools, a business rules management system (BRMS) created by members of the JBoss developer community, offers the innovation you need for early stage projects or proof-of-concepts. But when it comes to mission-critical applications, don't you want the assurance of SLA-based support, patches, and updates?
Posted: 12 May 2014 | Published: 31 Dec 2012

Red Hat
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info