Our Full-Service B2B Marketing Program Delivers Sales-Ready E-Commerce Leads » Learn More
Welcome Guest | Sign In
ECommerceTimes.com
DNS Flaws Expose Millions of IoT Devices to Hacker Threats
April 14, 2021
A set of flaws in a widely used network communication protocol that could affect millions of devices has been revealed by Forescout Research Labs and JSOF Research. The nine vulnerabilities discovered by security researchers dramatically increase the attack surface of at least 100 million Internet of Things devices, exposing them to potential attacks that could take the devices offline or to be hijacked by threat actors.
Disaster Recovery and Business Continuity Planning? Ask These Questions
April 2, 2021
Engaging in disaster recovery requires a company to think about many things, but despite the long checklists that are created to accomplish DR, there are some areas that frequently get overlooked in business continuity and disaster recovery planning. With this in mind, it is imperative to address all areas of concern before a disaster strikes, not during or after the event.
Tech Think Tank Calls for $40B Reverse Auction to Boost Rural Broadband
March 23, 2021
Nearly one-in-five rural Americans don't have broadband Internet access, but that could change with the use of carefully targeted subsidies through a process known as a reverse auction. A big, one-time capital expenditure administered through a reverse-auction program would attract larger, more efficient firms to the problem, noted ITIF Director of Broadband and Spectrum Policy Doug Brake.
Implementing Iterative ROI
March 22, 2021
In the old days you could identify weak spots in your business and purchase software systems designed to eliminate or at least to significantly reduce those liabilities. Performing an ROI analysis usually consisted of two parts: a before study to determine the business' steady state; and a post implementation analysis to determine improvement. Good as that sounds, such studies left out a lot.
Advance Strategies to Eliminate E-Commerce Chargebacks
March 19, 2021
Half of consumers who originally planned to return to their pre-pandemic in-store shopping routines once coronavirus is under control now plan to stick with online shopping. That shift in preferences means that e-commerce merchants must keep up with trending ways to market, sell, and prevent fraud. Let's look at a few of the most important developments and see where they're going.
The Rise of Open Source: Pandemic, Economy, Efficiency, Trust
March 17, 2021
Those familiar with open source know that it works and comes with many benefits. A testament to the rising adoption of open source is the recent moves by software giants such as Microsoft, IBM, and Oracle into the open-source community. This corporate migration to open source is continuing as many organizations, both large and small, turn to open source in tough economic times.
New Threat Report Finds Email Prime Vehicle for Malware
March 16, 2021
Malicious online actors used email as their prime vehicle for delivering malware to their victims in the last quarter of 2020. The HP-Bromium Threat Insights Report found that 88 percent of malware was delivered by email into its targets' inboxes, many times evading measures at email gateways to filter out the infected correspondence.
The CRM Systems Training Issue
March 15, 2021
As the CRM solution set continues to grow, it's likely that training systems will be increasingly important. That growth has the effect of converging vendor functionality at roughly the same place, making tertiary product attributes like training systems important differentiators. Taking this into account, the next big thing in CRM might not be a new customer-facing app -- but one that faces employees.
The EU's Cure for the E-Waste Epidemic
March 15, 2021
Globally, we throw out 50 million tons of electronics waste every year, which is the equivalent of 1,000 laptops every second. This month the EU addressed this problem with a comprehensive "right to repair" law to dramatically reduce this waste. Let's explore electrical hardware sustainability issues this week, and look at a laptop that seems to anticipate these new e-waste regulations.
What IT Leaders Would Do Differently if Faced With Another Crisis
January 22, 2021
In the early part of 2020, the pandemic forced companies around the world to rethink their practices and determine how to accelerate the adoption of technologies that would enable remote work. After closing out on a tumultuous year, many business leaders admit where they may have gone wrong. Here are some ways they would approach a shift to remote work, if faced with the crisis all over again.
The Costly Consequences of Crashes in the Clouds
December 8, 2020
Downtime can cost enterprises that depend solely on a data center's ability to deliver IT and networking services to customers -- such as e-commerce companies -- up to $11,000 a minute. The cost to businesses, entrepreneurs and individuals who use subscription services in their work has yet to be calculated.
Federal Spurt in Cloud Spending Will Extend Well Into the Future
November 23, 2020
The rapid expansion in the use of cloud technologies to support remote working during the COVID-19 pandemic has underscored that the U.S. government's increasingly high rate of cloud adoption will likely be sustained for the next several years. In fact, 2020 was a "historic year" for federal cloud migration, according to Alex Rossino, senior principal research analyst at Deltek.
The Pros and Cons of Dedicated Internet Access
November 5, 2020
Although DIA can have a steep price tag and some installation complexity, most companies will opt for a dedicated connection at offices or data centers with mission-critical operations. Let's explore the benefits of a DIA circuit, as well as some potential considerations and drawbacks, to help determine if dedicated Internet is something your business should consider.
Skills Shortage Rains on Cloud Advances
November 3, 2020
More than 90 percent of IT leaders surveyed for a recent report expect to expand their cloud services in the next one to three years. Despite this testament to the benefits of cloud adoption, enterprises may find a lack of qualified IT workers to fill those positions. A majority of cloud team leaders identified a lack of internal skills and knowledge as a top barrier to cloud success.
AI's Potential to Manage the Supply Chain
October 30, 2020
Artificial intelligence has made noticeable changes to technologies around the world. Perhaps AI's most notable potential, however, is its role in the supply chain industry. The value of shrinking and localizing the supply chain process through the use of AI is more apparent than ever, and positions the technology as a vital tool.
The 2020 Holiday Shopping Season Will Set Long-Term Precedents
October 6, 2020
The restrictions forcing people to work and shop from the confines of their homes accelerated an already advancing e-commerce market that was years in development. As a result, the pandemic has created a case study for e-commerce and retail of the 21st century. Moving forward, this holiday shopping season will likely witness one of the next major shifts toward a different future in retail.
Cybersecurity Assessment and the Zero Trust Model
October 1, 2020
Instead of legacy security models that differentiate a "trusted" interior from an untrusted external one, zero trust instead assumes that all networks and hosts are equally untrustworthy. Once this fundamental shift in assumptions is made, you start to make different decisions about what, who, and when to trust, and acceptable validation methods to confirm a request or transaction is allowed.
What's Old Is New Again
September 24, 2020
A raft of new technologies that impact CRM are about to be announced, but even without the latest announcements due now through October, there's a realization that we're coming full circle. Oracle is making hardware sexy again, using it to drive new business models and to push its CX version of CRM; and Salesforce is tackling a kind of mass customization of its CRM product line.
Do's and Don'ts for SMB Cybersecurity Safety
September 17, 2020
The stampede from offices to working from home has strained IT security teams to their limits. As a result, SMBs find they need to get more bang for fewer bucks to fight off cybersecurity threats. However, even IT departments with limited resources can implement foundational strategies to address network security issues, and lay the groundwork for future investments.
A Unique Moment in Time for E-Commerce
September 14, 2020
E-commerce is experiencing rapid growth with no sign of slowing down. Retailers and brands are finding that the new normal in retail and e-tail marketing is much like trying to hit a moving target. They have to take a refined aim and build in some lead time. This marketing strategy requires businesses to adjust their digital infrastructure and tactics. Otherwise, they will miss the target as consumers prepare for their holiday marketing and ad campaigns.
The Perils of IT Security Hubris
September 10, 2020
Corporate cybersecurity has been increasingly compromised since organizations began implementing work-from-home policies in March as the pandemic continued its spread. In addition to the risks created by increased stress on personnel and depleted staff, IT leaders might be overconfident about the cybersecurity protocols and procedures they have in place.
Best Practices to Improve the E-Commerce Checkout Process
August 28, 2020
To deliver exceptional customer experiences at-scale, retailers need to have their finger on the pulse of changing consumer expectations. Modern consumers expect checkout to be seamless and safe, no matter the digital channel or their geographic location. Let's look at best practices that retailers are using to revamp their checkout experience.
5 Cloud Computing Trends in 2020 and Beyond
August 25, 2020
Cloud technology has matured substantially during the past 15 years, and now a paradigm shift is taking place, away from legacy in-house IT business services, to a cloud-first technology-driven agile workplace. Here are five trends in cloud computing for organizations to consider when plotting an IT infrastructure strategy.
How to Protect Data From Natural Disasters
August 19, 2020
With hurricane season in full bloom and the additional prospect of natural disasters, the importance for companies to have disaster data plans in place is paramount. TechNewsWorld discussed disaster preparedness with a panel of IT experts. Check out their recommendations -- and make sure that you have not forgotten that one key thing that many companies forget to protect but regret afterward.
Return of Remote Workers Brings New Challenges to IT Heads
August 18, 2020
For those business that got it right reopening their workplaces the first time around, they should be in pretty good shape for round two. But others that struggled to get a handle on operations will likely find themselves again in chaos -- especially where IT is concerned for the transplanted work-from-home employees.
5G Rollout Includes Challenges to Supply Chain, WFH Value
August 13, 2020
The growing work-from-home movement amid the coronavirus and its likely continuing challenges has created the need for additional broadband capacity in more places. Mobile telco and other service providers are rallying around 5G wireless as the most promising solution for reliably faster Internet connectivity. But the path to rolling out 5G has been rocky and spotty.
New Security Hole Puts Windows and Linux Users at Risk
July 29, 2020
If you are a Windows or Linux user, brace yourself for a long siege of vulnerability nightmares. The fix will be long and treacherous and could brick your computers. Eclypsium researchers have detailed a set of newly discovered vulnerabilities dubbed "BootHole" that opens up billions of Windows and Linux devices to attacks.
Beware of Counterfeit Network Equipment
July 24, 2020
Counterfeit hardware, especially in corporate settings, is a recurring problem that often goes unnoticed. Having such gear online poses serious financial, operational, and security risks. Cybersecurity company F-Secure has released an investigative report detailing counterfeit Cisco Catalyst 2960-X series switches. The report highlights challenges facing organizations that discover counterfeit devices in their IT infrastructure.
The Past, Present and Future of Attribute-Based Encryption
July 21, 2020
Encryption is an obscure but critical part of everyday life. That padlock in the address bar of the website you're visiting represents the 's' after 'http' -- which stands for the latest version of Transport Layer Security. Together with Secure Sockets Layer, which TLS replaced, these digital security technologies allow encrypted communication between two parties, such as web sites or servers, and web browsers.
Salesforce Ups Its Marketing Game
July 21, 2020
Recent research shows that employees are well aligned with the directions and goals of their companies, and that they are competently led and respect their bosses; but the technologies they use leave a lot to be desired. This includes CRM, and too often the functionality that their currently installed CRM doesn't offer. Consequently, the changes Salesforce just introduced in its Marketing Cloud could not have been more timely.
See More Articles in Infrastructure Section >>
Digital River - Talk to the Experts
If my employer requires me to return to the company's office full-time to perform my job, I will...
Agree, because I like my job regardless of where I perform my duties.
Comply, because I can't afford to lose my current job.
Go with the flow, but start looking for different employment.
Resign immediately, so I can dedicate all of my time to find a job that better suits my needs.
Try to negotiate a hybrid work from home / work in office arrangement with my employer.
Waylay IO
Contact Center AI Explained by Pop Culture