Electronic Retail Reports

Paramount Foods Upgrades Store Technology
sponsored by Hewlett Packard Enterprise
CASE STUDY: Read how the owner of a North Carolina based food company found a way to keep up with major supermarket chains with HP POS hardware and servers.
Posted: 18 Mar 2008 | Published: 01 Oct 2006

Hewlett Packard Enterprise

A Computer Weekly buyer's guide to next-generation retail technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Customers' shopping habits were changing long before the coronavirus pandemic accelerated the e-commerce boom. In this 18-page buyer's guide, Computer Weekly looks at the tech innovations retailers are using to adapt and better serve customers.
Posted: 08 Feb 2021 | Published: 04 Jan 2021

TechTarget ComputerWeekly.com

10 common uses for machine learning applications in business
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Machine learning (ML) enables businesses to perform tasks on a scale previously thought impossible. As a result, many organizations are finding ways to harness ML to not just drive efficiencies but to fuel new business opportunities. Here are 10 applications of ML that are being used to solve problems & deliver tangible business benefits:
Posted: 09 Feb 2023 | Published: 09 Feb 2023

TechTarget ComputerWeekly.com

Getting the best out of robotic process automation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: IT leaders are used to doing more with less, but the pandemic has forced many organisations to reassess whether the way processes have always been run, is optimal. With people having to work from home, many organisations have needed to automate previous manual tasks, in order to remain operational.
Posted: 15 Mar 2021 | Published: 19 Feb 2021

TechTarget ComputerWeekly.com

RPA vs. BPM: How are they different?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Robotic process automation and business process management are complementary partners in driving digital transformation initiatives. RPA has received a lot more publicity in recent years, but BPM is an essential discipline and a key enabler in scaling RPA projects. Here are the main differences between these process-oriented initiatives.
Posted: 19 May 2022 | Published: 19 May 2022

TechTarget ComputerWeekly.com

Computer Weekly - 1 December 2020: How retailers are using technology to survive
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with high-street retailers struggling to survive, we look at how technology can keep stores relevant. Everyone is focusing on flash storage, but hard disk drives are still an essential part of the IT toolkit. And we examine the latest developments in the ongoing Post Office Horizon IT scandal. Read the issue now.
Posted: 08 Feb 2021 | Published: 01 Dec 2020

TechTarget ComputerWeekly.com

Achieve Eco-sustainable Innovation While Driving Profitable Growth
sponsored by Alcatel-Lucent
WHITE PAPER: Alcatel-Lucent's innovation engine explores new ideas and opportunities to address environmental concerns while solving business problems.
Posted: 02 Oct 2008 | Published: 02 Oct 2008

Alcatel-Lucent

The Enterprise of the Future: Implications for the CIO
sponsored by IBM
WHITE PAPER: The purpose of this paper is to highlight the key insights from the IBM Global CEO Study and relate them to the new CIO challenge: driving transformation as "change leaders" and implementing transformation as "change agents".
Posted: 11 Feb 2009 | Published: 10 Feb 2009

IBM

IBM Smart SOA Global Virtual Forum: How to Get Smarter Business Outcomes
sponsored by IBM
WEBCAST: Adapting to change is hard for today's professional architectures, but with the dynamics of the industry, change is a must. This webcast will show how to gain successful agility and maximize business IT value with the Smart SOA approach. Watch now!
Posted: 13 Oct 2008 | Premiered: Nov 5, 2008, 10:30 EST (15:30 GMT)

IBM

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor