David Jones overhauls online shopping infrastructure
- 13 February, 2012 15:22
After resurrecting its online shopping website in 2010, Australian retailer David Jones has responded to customer demand for improved e-commerce with a new website to be unveiled in September this year.
Its current system dates back more than a decade ago — 1999 was when the retailer acquired a company called The Spot. However, its e-commerce facility shut down in 2003 and reopened seven years later.
David Jones group executive of retail services, Tony Karp, said its current system was “clunky with limited capacity”. He admitted that the company was slow off the mark to embrace online, but said it had learnt from the mistakes of other retailers.
It has partnered with IBM for the new website and Karp said customers will be able to browse and buy using their smartphone, tablet or PC. If they use a credit card from partner American Express, deliveries will be free.
In addition, there are plans to integrate social media, promotions and analytics features to give the customer the ability to view items online and post items to wish lists.
Known as the Smarter Commerce portfolio, IBM will integrate the offering into David Jones’ corporate systems to provide order and inventory management that support both the online and store channels.
“Customers are shopping online with our competitors and shopping overseas. Our research suggests that they are not shopping with us because we don’t have a product that meets their expectations,” Karp said. “All I can say is the two offerings in terms of online presence will not be comparable.”
In addition to the IBM project, the retailer is replacing its NCR point of sale systems and will start rolling these out later this year.
Follow Hamish Barwick on Twitter: @HamishBarwick
Follow Techworld Australia on Twitter: @Techworld_AU
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Endpoint Security and Virtualisation
- Cloud Computing for Midsize Businesses: Delivering Innovation and Efficiency
- Integrated Computing Platforms: Infrastructure Builds for Tomorrow’s Data Centre
- Getting Real About Security Management and Big Data – A Roadmap for Big Data in Security Analytics
- Securing the Promise of Virtualisation
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
In Control at Layer 2: A Tectonic Shift in Network Security
Network hacking and corporate espionage are on the rise and set to intensify. Information security risks remain commonplace, and most organisations need to increase vigilance. This paper has analyses the realistic threats to fibre optic Ethernet networks – both at the LAN and WAN level. Read now.
Implementing A Security Analytics Architecture
According to the 2012 Verizon Data Breach Investigations report, 99% of breaches led to data compromise within “days” or less, whereas 85% of breaches took “weeks” or more to discover. This presents a significant challenge to security teams as it grants attackers extended periods of time within a victim’s environment. More “free time” leads to more stolen data and more digital damage. Principally, this is because today’s security measures aren’t designed to counter today’s more advanced threats. Read on.
Endpoint Protection Overview
With the exponential growth and sophistication of malware today, the security industry can no longer afford to ‘bury its head in the sand’. The bottom line is that traditional endpoint security protection is now ineffective due to the sheer volume, quality, and complexity of malware. This paper looks at this problem and how Webroot, by going back to the drawing board on countering malware threats, is revolutionising endpoint protection and solving the issues that hinder existing endpoint security solutions. Download now.