Internet Selling Reports

Computer Weekly – 7 June 2022: Using technology to reinvent shopping
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after the pandemic led to a boom in e-commerce, we look at how retailers are turning to tech to revitalise their stores. We examine the issues around using algorithmic automation to manage employees. And we find out how data science is supporting drug discovery at Novartis. Read the issue now.
Posted: 01 Jun 2022 | Published: 07 Jun 2022

TechTarget ComputerWeekly.com

Computer Weekly – 29 November 2016: Machine learning keeps customers happy at Ocado
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how data scientists at online grocer Ocado are using machine learning technology to deliver better customer service. Manufacturing giant GE is making a play to become a top 10 software supplier. And we examine the future of server operating systems as workloads move to the cloud. Read the issue now.
Posted: 08 Feb 2021 | Published: 29 Nov 2016

TechTarget ComputerWeekly.com

Discount Tire Accelerates Its E-Commerce Business With Red Hat Satellite And IBM
sponsored by Red Hat and JBoss
CASE STUDY: In 2000, Discount Tire Company decided to bring management of its e-commerce infrastructure in-house after having outsourced it for several years. Learn how they turned to the rock-solid reliability of Red Hat's Enterprise Linux platform to handle the task of supporting their new e-commerce environment.
Posted: 28 Jul 2009 | Published: 28 Jul 2009

Red Hat and JBoss

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
sponsored by VeriSign Australia
WHITE PAPER: This paper explores new developments in website security that online businesses should be implementing to build confidence in their sites, protect valuable brands and safeguard customers’ sensitive information, not to mention improving their bottom line.
Posted: 06 Aug 2010 | Published: 06 Aug 2010

VeriSign Australia

How SSL and TLS Secure Network Transactions
sponsored by GeoTrust, Inc.
EGUIDE: This E-Guide from SearchEnterpriseWAN.com aims to provide introductory knowledge of the ins and outs of SSL VPN and TLS and how they protect network transactions. View now to learn more!
Posted: 27 Dec 2012 | Published: 20 Dec 2012

GeoTrust, Inc.

5 Mistakes Auditing Virtual Environments (You Don't Want to Make)
sponsored by HyTrust
WHITE PAPER: Read this expert guide to ensure your virtual environment is in compliance with PCI DSS 2.0 and avoid common errors made in the auditing process.
Posted: 21 Jul 2011 | Published: 21 Jul 2011

HyTrust

Cross-Channel Commerce: A Consumer Research Study
sponsored by Oracle Corporation
WHITE PAPER: The number of channels which consumers use to research and purchase products or services is growing. This white paper takes a look at a recent survey of consumer buying habits in regards to the number of channels they use when shopping and how businesses can provide a better experience across these channels for their customers.
Posted: 25 Apr 2011 | Published: 25 Apr 2011

Oracle Corporation

Digital CRM and the Customer Experience
sponsored by IBM
EGUIDE: This expert  e-guide describes why digital technologies are proving to be the "next big thing" in the world of CRM, and explores the strategies that small businesses are using to stay competitive in e-commerce.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

IBM

Streamlining WebLogic Server Domain Implementation
sponsored by Oracle Corporation
SOFTWARE DEMO: What options exist to help simplify WebLogic server domain setup, and the ensuing traffic? This video product demonstration dives into one platform that promises to streamline the WebLogic server domain setup. Handle your cloud e-commerce setup with minimal cost and effort.
Posted: 11 Nov 2015 | Premiered: 11 Nov 2015

Oracle Corporation

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor