EZINE:
In this week's Computer Weekly, high street retailers are fighting back against online rivals by using IT to support multi-channel customers – and Tesco's marketing chief explains how it works at the UK's biggest supermarket. Also, we ask how revelations about internet surveillance affect the protection of corporate information. Read the issue now.
WHITE PAPER:
This paper provides an overview of item-level radio frequency identification (RFID) tagging in the apparel supply chain. It explains the evolution of RFID technology and details key benefits when utilized by retailers, distribution and logistics providers, and manufacturers.
WHITE PAPER:
Access this white paper to discover answers to all of your tablet-related questions, in specific relation to tablet usage in the retail arena.
CASE STUDY:
BGMX's primary challenge is having the proper bandwidth to adhere to all VLAN specifications in PCI compliance standards. Desko also must meet even tighter SAS-70 regulations, as well as his bank's internal security guidelines.
EGUIDE:
How are macro technology trends such as mobile and cloud affecting the manufacturing sector? What implications does the Dodd-Frank Act and an increasing numbers of Millennials in the global workforce have on supply chains? This E-Guide exposes trends to watch out for in 2013 and beyond
WHITE PAPER:
IP networks and applications help with all-around responsiveness and removing uncertainty from the supply chain. Read this white paper to find out how your organization can benefit from this type of technology
EGUIDE:
Customers' shopping habits were changing long before the coronavirus pandemic accelerated the e-commerce boom. In this 18-page buyer's guide, Computer Weekly looks at the tech innovations retailers are using to adapt and better serve customers.
EGUIDE:
This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities.