iCommerce Reports

Computer Weekly – 11 December 2018: Manchester's evolution from rag trade to digital hub
sponsored by TechTarget ComputerWeekly.com
EZINE: This issue of Computer Weekly explores innovation in the digital era – from the role of software-defined networking in the datacentre, to quantum computing, and much more.
Posted: 08 Feb 2021 | Published: 07 Dec 2018

TechTarget ComputerWeekly.com

Computer Weekly – 7 June 2022: Using technology to reinvent shopping
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after the pandemic led to a boom in e-commerce, we look at how retailers are turning to tech to revitalise their stores. We examine the issues around using algorithmic automation to manage employees. And we find out how data science is supporting drug discovery at Novartis. Read the issue now.
Posted: 01 Jun 2022 | Published: 07 Jun 2022

TechTarget ComputerWeekly.com

Computer Weekly - 11 January 2022: How Pepsi is taking digital to the max
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to PepsiCo's digital director about delivering innovation in customer experience. Our first buyer's guide of 2022 examines hybrid cloud storage. And we find out how Arkwright and Granville from the BBC sitcom Open All Hours are inspiring retailers 40 years on. Read the issue now.
Posted: 10 Jan 2022 | Published: 11 Jan 2022

TechTarget ComputerWeekly.com

Computer Weekly - 5 May 2020: The role of AI in the war against pandemics
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how AI and data science are supporting the global push to deal with the coronavirus pandemic. We reveal, and talk to, the man behind the world's first computer virus pandemic, the Love Bug. And we examine how the IT services market will change as a result of the current crisis. Read the issue now.
Posted: 08 Feb 2021 | Published: 05 May 2020

TechTarget ComputerWeekly.com

Digital secure remote payment: How Apple Pay can change the future of remote payments
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
Posted: 08 Feb 2021 | Published: 27 Mar 2018

TechTarget ComputerWeekly.com

Giving Customers Better Protection While Reducing Costs
sponsored by ThreatMetrix
CASE STUDY: This case study outlines a top e-commerce business and their strategy for preventing fraud, lowering costs and ensuring consumer trust.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

A Computer Weekly buyer’s guide to next-generation retail technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Customers' shopping habits were changing long before the coronavirus pandemic accelerated the e-commerce boom. In this 18-page buyer's guide, Computer Weekly looks at the tech innovations retailers are using to adapt and better serve customers.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

TechTarget ComputerWeekly.com

Case Study: Create a Private Market for eProcurement
sponsored by elcom inc.
CASE STUDY: This case study discusses how Tennessee Valley Authority created their eProcurement marketplace, and the benefits they have gained from this.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

All resources sponsored by elcom inc.

Self-Service That Really Serves
sponsored by Oracle Corporation
WHITE PAPER: To truly meet the demands of the informed consumer, self-service solutions must have fully integrated e-commerce and e-billing systems that accommodate every aspect of the online customer experience. Read this free white paper to learn about all-in-one systems that build your brand and keep customers coming back.
Posted: 10 Jun 2009 | Published: 10 Jun 2009

Oracle Corporation

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor