Home Improvement Industry Reports

Top 10 retail technology stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Computer Weekly looks at what 2019 had in store for the retail industry – what technologies were retailers rushing to adopt and how is customer behaviour changing?
Posted: 08 Feb 2021 | Published: 24 Dec 2019

TechTarget ComputerWeekly.com

Best practices for analytics in retail
sponsored by IBM
EGUIDE: In this e-guide, you'll receive advice for developing a customer analytics strategies and tips to use BI to optimize your investments.
Posted: 29 Sep 2011 | Published: 29 Sep 2011

IBM

Case Study: KFC POS System Serves Great Service
sponsored by Toshiba
CASE STUDY: KFC, the global fast food chain, was upgrading to a new software platform, and they needed to upgrade its existing point-of-sale (POS) equipment that would support the new software regulations. In this brief case study, find out which POS system KFC ultimately chose, and discover the benefits they experienced from the hardware upgrade.
Posted: 09 May 2014 | Published: 31 Dec 2013

Toshiba

Computer Weekly – 27 May 2014: Targeting the digital customer
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes of John Lewis's £40m e-commerce transformation plan to find out how to target the digital customer. Starbucks' European CIO talks about the coffee chain's IT strategy. And we evaluate three big suppliers' plans for virtualised networking. Read the issue now.
Posted: 27 May 2014 | Published: 27 May 2014

TechTarget ComputerWeekly.com

A Computer Weekly buyer’s guide to next-generation retail technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Customers' shopping habits were changing long before the coronavirus pandemic accelerated the e-commerce boom. In this 18-page buyer's guide, Computer Weekly looks at the tech innovations retailers are using to adapt and better serve customers.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

TechTarget ComputerWeekly.com

Manufacturing Technology Trends in 2013
sponsored by Sage Software
EGUIDE: How are macro technology trends such as mobile and cloud affecting the manufacturing sector? What implications does the Dodd-Frank Act and an increasing numbers of Millennials in the global workforce have on supply chains? This E-Guide exposes trends to watch out for in 2013 and beyond
Posted: 24 Jul 2013 | Published: 24 Jul 2013

Sage Software

Computer Weekly – 20 November 2012: Inside the £65m datacentre supporting Tesco's online strategy
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit the £65m datacentre that sits at the heart of Tesco's ambitious online strategy. Government has approved the iPhone for use by Whitehall officials – we assess the risks. And the CIO at British Gas talks about how IT transformed the firm's customer service. Read the issue now.
Posted: 19 Nov 2012 | Published: 20 Nov 2012

TechTarget ComputerWeekly.com

Meeting the Demands of the Smarter Consumer
sponsored by IBM
WHITE PAPER: IBM surveyed more than 30,000 consumers in the United States, Canada, United Kingdom, Brazil, India and China for this report on shopping preferences. Read this report to learn why technology makes consumers smarter, more connected and more certain about what they want.
Posted: 25 Aug 2010 | Published: 25 Aug 2010

IBM

The pandemic’s e-commerce boom
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The pandemic appears to have solidified e-commerce's ascendancy against the highstreet. Coronavirus has accelerated technology adoption in many sectors, and people have been forced to stay at home, increasing their online shopping habits in a bid to avoid visiting shops.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

TechTarget ComputerWeekly.com

An Expert Guide to the PCI DSS 3.0
sponsored by TechTarget Security
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

TechTarget Security