eSales Reports

Computer Weekly – 14 November 2017: How fashion is turning to tech to get closer to customers
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine how the fashion world and clothing retailers are using technology to better understand customers. Brexit continues to dominate conversation in the UK tech sector – we find out the hopes and fears of the industry. And we look at how to use OpenStack in a hyper-converged infrastructure. Read the issue now.
Posted: 08 Feb 2021 | Published: 10 Nov 2017

TechTarget ComputerWeekly.com

Empowered Customers Drive Collaborative Business Evolution
sponsored by IBM
WHITE PAPER: Read this groundbreaking new study, conducted by Forrester Consulting on behalf of IBM, to understand how empowered customers are changing the way business is doing business—today and in the future.
Posted: 13 Aug 2012 | Published: 31 May 2012

IBM

Create a Strong, Dynamic Customer Experience
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This resource explores the changing e-commerce landscape, and investigates how developing an omni-channel environment can help you create a strong, dynamic customer experience.
Posted: 19 Dec 2013 | Published: 30 Nov 2012

Hewlett-Packard Enterprise

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by TechTarget Security
EGUIDE: This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.
Posted: 27 Dec 2012 | Published: 19 Dec 2012

TechTarget Security

Forging a CEM Strategy
sponsored by TechTarget Customer Experience
EGUIDE: Shoppers are looking for more personalized, responsive, relevant experiences, and in order to provide that, your business needs an effective customer experience management (CEM) strategy. Learn how when you access this expert three-part e-guide and discover six top concepts that make up a successful CEM strategy.
Posted: 28 Aug 2013 | Published: 28 Aug 2013

TechTarget Customer Experience

Benefits Management: How to increase the business value of your IT projects
sponsored by TechTarget ComputerWeekly.com
BOOK: This book extract explains how organisation can uses benefits management techniques to increase the value of IT projects to the business.
Posted: 15 Feb 2013 | Published: 15 Feb 2013

TechTarget ComputerWeekly.com

Personalized Marketing and Web Analytics
sponsored by IBM
WHITE PAPER: In this white paper, uncover the gold mine that lies within behavioral data, identify the specific nuggets to mine, and learn how to leverage behavior data to increase marketing returns at every stage of the customer life cycle, both online and offline.
Posted: 01 Mar 2014 | Published: 28 Feb 2013

IBM

Computer Weekly – 2 August 2022: How to create a datacentre capacity plan
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, planning datacentre capacity is a growing challenge – we ask the experts for the latest best practice. Victims of the Post Office IT scandal explain why they think they were targeted for speaking out. And we look at the digital skills gap in retail and find out how employers can source talent. Read the issue now.
Posted: 29 Jul 2022 | Published: 02 Aug 2022

TechTarget ComputerWeekly.com

Giving Customers Better Protection While Reducing Costs
sponsored by ThreatMetrix
CASE STUDY: This case study outlines a top e-commerce business and their strategy for preventing fraud, lowering costs and ensuring consumer trust.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime
sponsored by TechTarget Security
EBOOK: As our economy struggles to regain its footing, online fraud is more prevalent than ever. In this E-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more.
Posted: 01 Oct 2009 | Published: 31 Aug 2009

TechTarget Security