Explore Newsletters from ECT News Network » View Samples | Subscribe
Welcome Guest | Sign In
ECommerceTimes.com
Salesforce Industries Summit
The 2020 Holiday Shopping Season Will Set Long-Term Precedents
October 6, 2020
The restrictions forcing people to work and shop from the confines of their homes accelerated an already advancing e-commerce market that was years in development. As a result, the pandemic has created a case study for e-commerce and retail of the 21st century. Moving forward, this holiday shopping season will likely witness one of the next major shifts toward a different future in retail.
Cybersecurity Assessment and the Zero Trust Model
October 1, 2020
Instead of legacy security models that differentiate a "trusted" interior from an untrusted external one, zero trust instead assumes that all networks and hosts are equally untrustworthy. Once this fundamental shift in assumptions is made, you start to make different decisions about what, who, and when to trust, and acceptable validation methods to confirm a request or transaction is allowed.
What's Old Is New Again
September 24, 2020
A raft of new technologies that impact CRM are about to be announced, but even without the latest announcements due now through October, there's a realization that we're coming full circle. Oracle is making hardware sexy again, using it to drive new business models and to push its CX version of CRM; and Salesforce is tackling a kind of mass customization of its CRM product line.
Do's and Don'ts for SMB Cybersecurity Safety
September 17, 2020
The stampede from offices to working from home has strained IT security teams to their limits. As a result, SMBs find they need to get more bang for fewer bucks to fight off cybersecurity threats. However, even IT departments with limited resources can implement foundational strategies to address network security issues, and lay the groundwork for future investments.
A Unique Moment in Time for E-Commerce
September 14, 2020
E-commerce is experiencing rapid growth with no sign of slowing down. Retailers and brands are finding that the new normal in retail and e-tail marketing is much like trying to hit a moving target. They have to take a refined aim and build in some lead time. This marketing strategy requires businesses to adjust their digital infrastructure and tactics. Otherwise, they will miss the target as consumers prepare for their holiday marketing and ad campaigns.
The Perils of IT Security Hubris
September 10, 2020
Corporate cybersecurity has been increasingly compromised since organizations began implementing work-from-home policies in March as the pandemic continued its spread. In addition to the risks created by increased stress on personnel and depleted staff, IT leaders might be overconfident about the cybersecurity protocols and procedures they have in place.
Best Practices to Improve the E-Commerce Checkout Process
August 28, 2020
To deliver exceptional customer experiences at-scale, retailers need to have their finger on the pulse of changing consumer expectations. Modern consumers expect checkout to be seamless and safe, no matter the digital channel or their geographic location. Let's look at best practices that retailers are using to revamp their checkout experience.
5 Cloud Computing Trends in 2020 and Beyond
August 25, 2020
Cloud technology has matured substantially during the past 15 years, and now a paradigm shift is taking place, away from legacy in-house IT business services, to a cloud-first technology-driven agile workplace. Here are five trends in cloud computing for organizations to consider when plotting an IT infrastructure strategy.
How to Protect Data From Natural Disasters
August 19, 2020
With hurricane season in full bloom and the additional prospect of natural disasters, the importance for companies to have disaster data plans in place is paramount. TechNewsWorld discussed disaster preparedness with a panel of IT experts. Check out their recommendations -- and make sure that you have not forgotten that one key thing that many companies forget to protect but regret afterward.
Return of Remote Workers Brings New Challenges to IT Heads
August 18, 2020
For those business that got it right reopening their workplaces the first time around, they should be in pretty good shape for round two. But others that struggled to get a handle on operations will likely find themselves again in chaos -- especially where IT is concerned for the transplanted work-from-home employees.
5G Rollout Includes Challenges to Supply Chain, WFH Value
August 13, 2020
The growing work-from-home movement amid the coronavirus and its likely continuing challenges has created the need for additional broadband capacity in more places. Mobile telco and other service providers are rallying around 5G wireless as the most promising solution for reliably faster Internet connectivity. But the path to rolling out 5G has been rocky and spotty.
New Security Hole Puts Windows and Linux Users at Risk
July 29, 2020
If you are a Windows or Linux user, brace yourself for a long siege of vulnerability nightmares. The fix will be long and treacherous and could brick your computers. Eclypsium researchers have detailed a set of newly discovered vulnerabilities dubbed "BootHole" that opens up billions of Windows and Linux devices to attacks.
Beware of Counterfeit Network Equipment
July 24, 2020
Counterfeit hardware, especially in corporate settings, is a recurring problem that often goes unnoticed. Having such gear online poses serious financial, operational, and security risks. Cybersecurity company F-Secure has released an investigative report detailing counterfeit Cisco Catalyst 2960-X series switches. The report highlights challenges facing organizations that discover counterfeit devices in their IT infrastructure.
The Past, Present and Future of Attribute-Based Encryption
July 21, 2020
Encryption is an obscure but critical part of everyday life. That padlock in the address bar of the website you're visiting represents the 's' after 'http' -- which stands for the latest version of Transport Layer Security. Together with Secure Sockets Layer, which TLS replaced, these digital security technologies allow encrypted communication between two parties, such as web sites or servers, and web browsers.
Salesforce Ups Its Marketing Game
July 21, 2020
Recent research shows that employees are well aligned with the directions and goals of their companies, and that they are competently led and respect their bosses; but the technologies they use leave a lot to be desired. This includes CRM, and too often the functionality that their currently installed CRM doesn't offer. Consequently, the changes Salesforce just introduced in its Marketing Cloud could not have been more timely.
Improving Company Performance
July 13, 2020
A recent study found that businesses across North America are led well and staffed with people who are engaged in what they're doing. But technology is barely adequate -- and because of this, managers should devote their attention to improving systems whenever they think about how to improve overall company performance.
More Autonomous Cloud From Oracle
July 9, 2020
Oracle's new offerings, really packaging of existing recent high-performance products for the enterprise market, enable companies to continue running their data and datacenters on premise while still benefitting from gains made by its autonomous database like eliminating most forms of routine maintenance and operations activities.
Building Supply Chain Resilience During a Global Disruption
July 8, 2020
As a result of the severe business disruptions brought about in recent months by the pandemic, many businesses have been reconsidering how to retool their supply chain to build in more resiliency. From digitizing the supply chain to developing more local and regional components, businesses are finding new and innovative ways to strengthen their capacity to keep moving forward during crisis.
New DoD Security Regulations Have Ramifications for IT Contractors
July 7, 2020
With billions of dollars of federal contracts at stake, information technology providers are being swept up in the tide of a new U.S. Department of Defense information security requirement that will become mandatory for IT providers and other companies doing business with DoD. While IT companies already incorporate data protection elements in the products and services they provide to DoD, the department is raising the bar on the way vendors should handle information security.
The Trail to the Platform
July 1, 2020
Some years ago, Marc Benioff told me he was not interested in developing back office apps that would compete with SAP and Oracle in the ERP and finance market. Many people, myself included, looked askance at that idea and wondered out loud how the company would continue to grow because, hey, there's front office and back office and nothing else right? Nope.
E-Commerce Dominates 'New Normal' Retail
June 30, 2020
Shoppers are starting to come back to their favorite brick and mortar storefronts as the pandemic restrictions allow consumers to exit from lockdown. But the impact of COVID-19 has etched some far-reaching changes in the retail industry that will not set back the strides online shopping has gained since March. That is a conclusion clearly visible in research published last week by TrustRadius.
Cybersecurity and Your New Remote Workforce
June 30, 2020
For most organizations, COVID-19 has been a literal transformative agent. Our organizations have almost overnight gone from environments where teleworking was an exception, to where it's the norm. As any student of human nature will tell you, people tend to view "the new" with reservation. There's a temptation when things are new to assume the worst about them. For security pros, this means we often view new things as riskier than things we're familiar with.
Open Source Security Issues Exist: Deal With Them, Report Urges
June 25, 2020
Open Source Software is becoming much more commonplace within organizations, bringing a different set of risks and perceived challenges compared to closed source or proprietary software. The Information Security Forum has released a report to help security professionals recognize the benefits and perceived challenges of using Open Source Software.
Cisco and the Importance of Empathy in a Technology Vendor
June 22, 2020
Cisco Live was last week, and this was their first large scale virtual event. What made this event very different from the other games was the amount of effort they put into socially responsible projects. Many of the customer projects they highlighted are dealing with a variety of world problems, be they related to the pandemic or not.
Microsoft Reimagines Azure
May 20, 2020
Developers are the driver of innovation in the world we live in today, said Scott Guthrie, EVP of the Microsoft Cloud+AI Group, in his presentation during the company's virtual Build 2020 conference. "With Azure we built an end-to-end cloud that enables developers to focus on building applications and not have to worry about the underlying infrastructure the applications run on."
The Tech Industry's Tectonic Shift
March 27, 2020
As COVID-19 continues to spread, states and cities across the U.S. have imposed restrictions -- from banning large gatherings to lockdowns, with citizens ordered to stay home except for essential jobs and errands, or get outdoor exercise. These steps came as infection numbers mounted, and the World Health Organization stated that COVID-19 was in fact a global pandemic.
Concerns Grow That COVID-19 Could Take Down the Internet
March 24, 2020
It may not be a question of if but when the Internet will reach the breaking point under the strain of the COVID-19 pandemic. The Internet is fast becoming a potential victim of the coronavirus assault. With an estimated billion people staying home, remote working, or just watching shows online all day, concerns are mounting that the Internet will break under the strain.
Loss Prevention 101: Future-Proofing Your Network Begins With Resilience
March 20, 2020
Critical server outages cost businesses an average of $300,000 hourly, with many cases exceeding $5 million. As network demands increase and maximum uptime becomes a necessity, it is crucial to implement the proper processes and systems to ensure organizations constantly are able to mitigate the threat of outages. A host of factors can cause network or system downtime.
Unsigned Firmware Puts Windows, Linux Peripherals at Risk
February 19, 2020
Eclypsium has released research that identifies and confirms unsigned firmware in WiFi adapters, USB hubs, trackpads and cameras used in Windows and Linux computer and server products from Lenovo, Dell, HP and other major manufacturers. Eclypsium also demonstrated a successful attack on a server via a network interface card with unsigned firmware used by each of the big three server manufacturers.
The Two Faces of Open Source: ECT News Roundtable, Episode 5
February 6, 2020
The open source software movement has evolved dramatically over the past two decades. Many businesses that once considered open source a threat now recognize its value. In spite of increased enthusiasm among enterprises, consumer interest by and large has not materialized. With large companies increasingly embracing open source, what does it mean to be a part of the FOSS "community"?
See More Articles in Infrastructure Section >>
Digital River - Sell Like a Local
How will the pandemic influence your holiday shopping habits this year?
I will shop online exclusively, for my own safety and to help limit the spread of the coronavirus.
I will do some shopping online, and some in-person because I want to support merchants in my area.
I will shop online definitely, and I will consider local retailers -- but only if they provide curbside service.
I will only shop in-person because the risks associated with e-commerce outweigh my chance of catching COVID-19.
I will not do any holiday shopping this year due to circumstances related to the pandemic.
Forrester names NICE inContact CXone a leader in cloud contact center software