Business of Information Technology  >   Business Processes  >   eCommerce  >  

eCatalogs

RSS Feed   
eCatalogs Reports
 
Records Management’s Breaking Point: Managing Electronic Records in High Volume Environments
sponsored by ASG Software Solutions
WHITE PAPER: This white paper outlines some of the issues that make electronic records management so challenging, highlights why organizations need to tame the high-volume transactional records beast, and lastly, describes what to look for in a transactional records management solution.
Posted: 20 Dec 2010 | Published: 20 Dec 2010

ASG Software Solutions

Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER: This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008

Enigma, Inc.

5 Principles for Enterprise Architects
sponsored by Mendix
WHITE PAPER: The emergence of wide-ranging tools like cloud, mobile IoT, and analytics has put organizations in a place where they need personnel to effectively lead the implementation. Download the 5 principles of a strong enterprise architect in order to understand digital priorities and how to support them.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Mendix

Digital secure remote payment: How Apple Pay can change the future of remote payments
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
Posted: 27 Mar 2018 | Published: 27 Mar 2018

ComputerWeekly.com

Building upon Lotus Notes with Business Process Automation
sponsored by K2
WEBCAST: Find out how to reduce your reliance on manual business processes, and discover how to easily connect workflows – regardless of whether they stem from CRM, ERP, Salesforce, SharePoint, HR, or even legacy systems.
Posted: 12 Mar 2018 | Premiered: Mar 12, 2018

K2

Closing the Website Security Gap: Why a WAF Is Not Enough
sponsored by Tala Security
WHITE PAPER: Although web application firewalls (WAFs) have a come a long way in recent years, they remain ineffective as a standalone security solution against web-based cyberattacks. This white paper underlines the shortcomings of WAFs and highlights the importance of protecting the browser-side and the client-side from threats.
Posted: 15 Jan 2020 | Published: 15 Jan 2020

Tala Security

The 5 Most Important Factors of an Order Management System
sponsored by SFG
WHITE PAPER: In this white paper, explore how an order management system (OMS) can help your organization improve its entire order fulfillment process. Discover the 5 most important features of a successful OMS for ecommerce organizations, and uncover why an OMS is crucial for web-based businesses looking to succeed.
Posted: 15 Aug 2019 | Published: 15 Aug 2019

SFG

Computer Weekly – 11 December 2018: Manchester's evolution from rag trade to digital hub
sponsored by ComputerWeekly.com
EZINE: This issue of Computer Weekly explores innovation in the digital era – from the role of software-defined networking in the datacentre, to quantum computing, and much more.
Posted: 07 Dec 2018 | Published: 07 Dec 2018

ComputerWeekly.com

SFG Success Spotlight: Consolidating Multiple Systems and Data Sources into FlexOMS
sponsored by SFG
CASE STUDY: With this case study, learn how your organization can improve its customer experiences with a unified database from SFG. Explore how SFG's SaaS software helped their multi-brand client achieve a 360-degree view of their customer without compromising the flexibility and strength of their software, and decide if SFG is right for your organization.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

SFG

The Hidden Obstacle in the Consumer Purchase Path: 3PC Cookies and Domain Calls
sponsored by The Media Trust
RESOURCE: When it comes to digital retail, revenue growth is heavily tied to customer experience. And while third-party capabilities enable a personalized experience, they can also expose vulnerabilities. In this article, go in-depth into the risks of third-party capabilities and discover how to identify and remediate risks.
Posted: 13 Jan 2020 | Published: 13 Jan 2020

The Media Trust
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info