Electronic Commerce Reports

Computer Weekly – 6 September 2022: Out with the old at Asda
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Asda's CIO Carl Dawson about the supermarket's cloud-oriented renovation of its technology stack. We narrate the security woes at Twitter. And we examine best practices for data backup. Read the issue now.
Posted: 02 Sep 2022 | Published: 06 Sep 2022

TechTarget ComputerWeekly.com

Computer Weekly – 19 December 2023: The ransomware threat to UK critical infrastructure
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, a parliamentary report warns that a lack of ransomware preparedness at the highest levels of government is leaving UK critical national infrastructure dangerously exposed – we analyse the risks. We also examine how AI tools are helping to enhance cloud security. Read the issue now.
Posted: 18 Dec 2023 | Published: 19 Dec 2023

TechTarget ComputerWeekly.com

Look out, Big Data: In-memory data grids start to go mainstream
sponsored by IBM
EGUIDE: In this expert e-guide, learn about the prime drivers and challenges of adopting in-memory data grids (IMDGs). Find out what to look for in an IMDG vendor, and learn what middleware vendors are offering data grid-enabled software.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

IBM

Whitepaper: Meet the Real Lean Portal
sponsored by Backbase
WHITE PAPER: This in-depth resource explores how a lean portal can help your organization trim the operational fat and deliver the kinds of experiences that customers crave. Read on to learn key differences between lean portals and suites, and uncover the benefits of "going lean."
Posted: 25 Sep 2013 | Published: 30 Jun 2013

Backbase

One Click Away: Where Does the Data Come From?
sponsored by LANSA
WHITE PAPER: Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

LANSA

Computer Weekly – 24 June 2014: Betting on World Cup success
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to gambling site Betfair about the IT challenges of preparing for the football World Cup. We examine the strategy of cloud software pioneer Salesforce.com as it grows its role in the IT department. And we explain erasure coding – an emerging method for protecting storage hardware. Read the issue now.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

TechTarget ComputerWeekly.com

Computer Weekly – 2 August 2022: How to create a datacentre capacity plan
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, planning datacentre capacity is a growing challenge – we ask the experts for the latest best practice. Victims of the Post Office IT scandal explain why they think they were targeted for speaking out. And we look at the digital skills gap in retail and find out how employers can source talent. Read the issue now.
Posted: 29 Jul 2022 | Published: 02 Aug 2022

TechTarget ComputerWeekly.com

Empowered Customers Drive Collaborative Business Evolution
sponsored by IBM
WHITE PAPER: Read this groundbreaking new study, conducted by Forrester Consulting on behalf of IBM, to understand how empowered customers are changing the way business is doing business—today and in the future.
Posted: 13 Aug 2012 | Published: 31 May 2012

IBM

Addressing changing customer behavior
sponsored by IBM
WHITE PAPER: This resource offers valuable insight to help you better understand customer behaviors and improve online customer experiences.
Posted: 13 Nov 2013 | Published: 31 May 2013

IBM

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor