Business of Information Technology  >   Business Processes  >  

iCommerce

RSS Feed   
iCommerce Reports
 
CW ANZ September 2016
sponsored by TechTarget ANZ
EZINE: Few organisations invest heavily in IT to make sure their clients use less of their product, but that's the battle Australia's National Blood Authority (NBA) is fighting – and winning.
Posted: 29 Aug 2016 | Published: 29 Aug 2016


ColorTokens Video 2
sponsored by ColorTokens
VIDEO: PCI-DSS v4.0 is expected to arrive in late 2020/early 2021 – and organizations are beginning to prepare. This webinar provides an overview of PCI-DSS 4.0, including the expected changes, what will (likely) remain unchanged, how zero-trust fits in, and more – watch now to get started.
Posted: 07 Oct 2020 | Premiered: 12 Jun 2020

ColorTokens

Computer Weekly - 5 May 2020: The role of AI in the war against pandemics
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how AI and data science are supporting the global push to deal with the coronavirus pandemic. We reveal, and talk to, the man behind the world's first computer virus pandemic, the Love Bug. And we examine how the IT services market will change as a result of the current crisis. Read the issue now.
Posted: 04 May 2020 | Published: 05 May 2020

ComputerWeekly.com

Computer Weekly – 29 November 2016: Machine learning keeps customers happy at Ocado
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how data scientists at online grocer Ocado are using machine learning technology to deliver better customer service. Manufacturing giant GE is making a play to become a top 10 software supplier. And we examine the future of server operating systems as workloads move to the cloud. Read the issue now.
Posted: 28 Nov 2016 | Published: 29 Nov 2016

ComputerWeekly.com

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

Presentation Transcript: MS SQL Server 2008
sponsored by Fusion-IO
PRESENTATION TRANSCRIPT: Check out this transcript of a presentation given by Sumeet Bansal, Fusion-io Principal Solutions Architect, to learn how Fusion-io solutions enhance SQL server performance, improve customer experience, and optimize storage management systems.
Posted: 12 Oct 2009 | Published: 30 Sep 2009

Fusion-IO

MOBILE OPTIMIZATION: How Testing on Smartphones and Tablets Lifts Conversion
sponsored by WebTrends
WHITE PAPER: In this white paper, discover a new set of best practices for optimizing and monetizing mobile development, focusing on CRM, layout, and usability. Read on for more information and best practices on testing and optimization, segmentation and targeting, case studies of successful mobile migrations, and more.
Posted: 16 Apr 2013 | Published: 16 Apr 2013

WebTrends

Online Training Case Study
sponsored by SyberWorks, Inc.
CASE STUDY: The operations division in a large multibillion-dollar service company had significant challenges training its franchisees to overcome these challenges the company purchased and installed the SyberWorks Training Center with a 250-seat license.
Posted: 08 Dec 2008 | Published: 08 Dec 2008

SyberWorks, Inc.

Modernize CRM and ecommerce: 4 steps
sponsored by IBM.
PODCAST: Tune in to this exclusive podcast with Martin Gill from Forrester Research to get a four-step guide to developing an agile commerce strategy that will enable your company to swiftly adapt to changing customer demands and new technology.
Posted: 27 Dec 2013 | Premiered: Dec 9, 2013

IBM.

Giving Customers Better Protection While Reducing Costs
sponsored by ThreatMetrix
CASE STUDY: This case study outlines a top e-commerce business and their strategy for preventing fraud, lowering costs and ensuring consumer trust.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences