Pet Stores Reports

The pandemic's  e-commerce boom
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The pandemic appears to have solidified e-commerce's ascendancy against the highstreet. Coronavirus has accelerated technology adoption in many sectors, and people have been forced to stay at home, increasing their online shopping habits in a bid to avoid visiting shops.
Posted: 08 Feb 2021 | Published: 18 Jan 2021

TechTarget ComputerWeekly.com

Computer Weekly - 8 May 2012: The changing face of retail IT
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week’s Computer Weekly, we look at the IT challenges facing retailers, as consumers turn increasingly to web and mobile shopping channels. Oracle president Mark Hurd talks about how the supplier intends to simplify IT infrastructures. And new government CIO Andy Nelson discusses how he plans to transform Whitehall IT. Read the issue now.
Posted: 07 May 2012 | Published: 08 May 2012

TechTarget ComputerWeekly.com

Linking the Global Supply Chain
sponsored by AT&T Corp
WHITE PAPER: IP networks and applications help with all-around responsiveness and removing uncertainty from the supply chain. Read this white paper to find out how your organization can benefit from this type of technology
Posted: 10 Sep 2007 | Published: 10 Sep 2007

AT&T Corp

HP - rp5700 Point of Sale System
sponsored by Hewlett Packard Enterprise
DATA SHEET: The HP rp5700 Point of Sale System gives you a flexible point-of-sale platform that can go from the front of the store to the back office.
Posted: 18 Mar 2008 | Published: 01 Aug 2008

Hewlett Packard Enterprise

Item-level RFID Tagging and the Intelligent Apparel Supply Chain
sponsored by Motorola Solutions
WHITE PAPER: This paper provides an overview of item-level radio frequency identification (RFID) tagging in the apparel supply chain. It explains the evolution of RFID technology and details key benefits when utilized by retailers, distribution and logistics providers, and manufacturers.
Posted: 16 Feb 2011 | Published: 16 Feb 2011

Motorola Solutions

Best practices for analytics in retail
sponsored by IBM
EGUIDE: In this e-guide, you'll receive advice for developing a customer analytics strategies and tips to use BI to optimize your investments.
Posted: 29 Sep 2011 | Published: 29 Sep 2011

IBM

Computer Weekly – 6 August 2013: Tech startups inspiring retail IT innovations
sponsored by TechTarget ComputerWeekly.com
EVENT: In this week's Computer Weekly, we talk to department store John Lewis about working with tech startups to improve its multichannel retail strategy. As PC sales slump, we hear from companies moving to non-Windows devices. And the final part of our buyer's guide to data management looks at the benefits of predictive analytics.
Posted: 02 Aug 2013 | Published: 06 Aug 2013

TechTarget ComputerWeekly.com

Taming Transactional Email: Tips to Gain Control and Determine If Outsourcing Makes Sense
sponsored by Silverpop Systems Inc. an IBM Company
WHITE PAPER: This white paper reviews the key steps necessary to implement a transactional email marketing campaign. It also recommends methods to ease the pain of implementation while improving the results.
Posted: 08 Aug 2008 | Published: 01 Jan 2007

Silverpop Systems Inc. an IBM Company

RFID in Apparel and Footwear: Store-Level Success Sets the Stage for Bigger Benefits
sponsored by Motorola RFID Solutions
WHITE PAPER: It's long been expected that the use of radio frequency identification (RFID) technology would have beneficial effects. RFID is indeed having a positive impact - but it's the retail store, rather than the supply chain, that is seeing the biggest benefits. Read this white paper to learn more about the benefits retailers are seeing from RFID.
Posted: 23 Feb 2010 | Published: 21 Sep 2009

Motorola RFID Solutions

An Expert Guide to the PCI DSS 3.0
sponsored by TechTarget Security
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

TechTarget Security