v-Commerce Reports

Computer Weekly - 11 January 2022: How Pepsi is taking digital to the max
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to PepsiCo's digital director about delivering innovation in customer experience. Our first buyer's guide of 2022 examines hybrid cloud storage. And we find out how Arkwright and Granville from the BBC sitcom Open All Hours are inspiring retailers 40 years on. Read the issue now.
Posted: 10 Jan 2022 | Published: 11 Jan 2022

TechTarget ComputerWeekly.com

MicroScope – September 2019: Helping digital transformation
sponsored by MicroScope
EZINE: The channel is helping customers to digitally transform their businesses to keep up with trends and plan for the future
Posted: 08 Feb 2021 | Published: 06 Sep 2019

MicroScope

Infographic: Business Process Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: An infographic highlighting what buyers are telling us about their next business process management buy. Including top purchase drivers, top features and the top vendors being considered for purchase.
Posted: 08 Feb 2021 | Published: 02 Nov 2017

TechTarget ComputerWeekly.com

The pandemic's  e-commerce boom
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The pandemic appears to have solidified e-commerce's ascendancy against the highstreet. Coronavirus has accelerated technology adoption in many sectors, and people have been forced to stay at home, increasing their online shopping habits in a bid to avoid visiting shops.
Posted: 08 Feb 2021 | Published: 18 Jan 2021

TechTarget ComputerWeekly.com

The Information Paradigm Shift: Redefine Your Competitive Advantage
sponsored by Hewlett-Packard Enterprise
NEWSLETTER: This newsletter focuses on how speed can truly transform business processes and enable companies to realize value from in-memory technology. Inside, learn how SAP HANA puts a whole new horse power behind process re-engineering.
Posted: 12 May 2014 | Published: 12 May 2014

Hewlett-Packard Enterprise

The Great Resignation: Everything you need to know
sponsored by Netrix
EGUIDE: Learn about the Great Resignation, what’s driving it, and how to retain employees amid this phenomenon, in this eGuide.
Posted: 28 Dec 2021 | Published: 29 Dec 2021

Netrix

Computer Weekly – 14 June 2016: The password's the problem – lessons from the LinkedIn breach
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after millions of LinkedIn users had their data compromised, we look at the lesson to be learned from this latest data breach incident. Our buyer's guide looks at NoSQL technologies and compares Microsoft's and Oracle's offerings. And we examine the benefits of cloud-based data analytics. Read the issue now.
Posted: 10 Jun 2016 | Published: 14 Jun 2016

TechTarget ComputerWeekly.com

Data Monetization Strategies: Make and Save Money With Data and Analytics
sponsored by Information Builders
WHITE PAPER: Are you sitting on your data with no plan? Do you know how to capitalize on information you already have? This whitepaper dives into the world of profiting from data. Access now to discover 4 essential steps to getting started, as well as challenges to overcome and a discussion on the importance of data integrity.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Information Builders

When Network Monitoring Tools Improve Business Intelligence
sponsored by Gigamon
EGUIDE: This expert e-guide highlights new emerging monitoring strategies that tie together cloud provisioning and service and application delivery. Discover how creating a clearer view of application performance can help you improve business processes, and explore the various tools that are part of modern networking strategies.
Posted: 07 May 2014 | Published: 07 May 2014

Gigamon

Giving Customers Better Protection While Reducing Costs
sponsored by ThreatMetrix
CASE STUDY: This case study outlines a top e-commerce business and their strategy for preventing fraud, lowering costs and ensuring consumer trust.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix