Social proof is an individual influencer or group clout that gives "proof" to a product. It is based on the principle that people tend to follow and conform to an influential person or a majority. They do this to be validated -- a result of a need for safety. Here are 10 kinds of social proof strategies -- and how and why they work...
The next generation of Intel mobile processors will include malware protection built into the chip. The protection, provided by Intel's Control-Flow Enforcement Technology, will first be available in the company's "Tiger Lake" mobile processors. CET is designed to protect against the misuse of legit...
Amazon has announced Project Zero, a program that empowers vendors to help drive counterfeits down. The anti-counterfeit campaign will employ Amazon's advanced technology, machine learning and innovation. Amazon will partner with Project Zero's participating vendors to protect their intellectual pro...
Google this week debuted a slew of new capabilities for Google Assistant at CES in Las Vegas. The new Connect platform lets device manufacturers incorporate Assistant into their products easily and cost-effectively. Connect uses Google's existing smart home platform to expand to new device types, wh...
We rely on our phones to process and store reams of personal digital data. Our digital activities -- from checking bank balances to paying for a product with a tap of the screen, to sending friends and family messages over social media, to accessing work emails remotely -- have turned our phones int...
McAfee has introduced its Cloud Workload Security v5.1, which represents the first solution for open source containers. McAfee CWS v5.1 secures Docker workload and servers in public and private cloud environments by quarantining infected workloads and containers in a single click. "McAfee Cloud Work...
Andrew McAfee and Erik Brynjolfesson, who teach at MIT's Sloan School of Management, started writing about the impact of artificial intelligence and machine learning almost a decade ago. Their early books -- The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies a...
SentinelOne this week announced a partnership with Microsoft to bolster threat protection for mixed platform users, making computing safer for Linux machines in a multiplatform workplace. SentinelOne will integrate its Endpoint Protection Platform with Microsoft's Windows Defender Advanced Threat Pr...
Salesforce earlier this year introduced its Einstein Vision capability, an idea with a lot of promise but not a great deal of precedent. Who had applications that could see, and how would this be used? For decades, we've been content with scanning documents and analyzing them with optical character ...
How many times have we been lulled into complacency over getting a project or a product done but not necessarily well received, because it was someone else's gig? This is a great reminder that the job isn't done simply because we produce something and shove it out the door. It's also a cue to pay cl...
Lenovo's recently unveiled 2-in-1, the Yoga Book, is available in Android Marshmallow and Windows 10 Home versions. Reviews have been mixed, with some praising its look and feel, but some considering its capabilities not up to scratch. Its Intel Atom processor doesn't provide enough power for a work...
Medical device manufacturer Animas on Tuesday warned that its OneTouch Ping insulin pump system was susceptible to hacking. "We have been notified of a cybersecurity issue with the OneTouch Ping, specifically that a person could potentially gain unauthorized access to the pump through its unencrypte...
Starboard Value last week launched a proxy fight to replace the board at Yahoo, blasting the company's management and nominating its own slate of board members. One of Yahoo's largest investors, Starboard has a 1.7 percent stake worth about $570 million. It has been "extremely disappointed with Yaho...
This year we traded in terminologies going from big data and analytics to digital disruption as the market-moving meme. I am not sure either one hits the spot, but they give me something to write about. Other things happened in 2015 too, but I'm just going to focus here. It seems to me we focus on t...
What a difference a decade makes. Ten years ago, the booths on the Dreamforce show floor were little more than outposts for widget-makers. Fast-forward to Dreamforce 2015, and one is struck by the number, variety, and size of the partner community.That's only part of the story, though. Often out of ...
Important to me so I can accept, deny, or customize my preferences before entering a website.
Inconvenient, but a fair exchange for knowing the website operator is likely serious about privacy and compliance.
An endless, unnecessary burden with a minimal effect that I wish was gone.
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/02/windows-365.jpg
https://www.ecommercetimes.com/story/windows-365-and-the-coming-abyss-in-the-pc-market-177839.html
Windows 365 and the Coming Abyss in the PC Market
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/06/password-hacker.jpg
https://www.ecommercetimes.com/story/avoid-being-the-next-victim-of-account-takeover-fraud-177014.html
Avoid Being the Next Victim of Account Takeover Fraud
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/03/sad-teen-smartphone.jpg
https://www.ecommercetimes.com/story/waging-war-on-the-sextortion-epidemic-177981.html
Waging War on the Sextortion Epidemic
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/11/web-team.jpg
https://www.ecommercetimes.com/story/digital-marketers-take-fragmented-tactics-to-new-targets-177076.html
Digital Marketers Take Fragmented Tactics to New Targets
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2021/01/teamwork.jpg
https://www.ecommercetimes.com/story/marketing-and-security-must-ally-to-eradicate-brand-impersonation-fraud-177292.html
Marketing and Security Must Ally To Eradicate Brand Impersonation Fraud
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/01/google-search.jpg
https://www.ecommercetimes.com/story/gmail-creator-predicts-ai-will-totally-disrupt-google-search-in-1-to-2-years-177745.html
Gmail Creator Predicts AI Will Totally Disrupt Google Search in 1 to 2 Years
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2021/08/tiktok.jpg
https://www.ecommercetimes.com/story/tiktok-opens-back-door-to-integrated-platform-stores-amazon-competition-177213.html
TikTok Opens Back Door to Integrated Platform Stores, Amazon Competition
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/01/tiktok-iphone-app-store.jpg
https://www.ecommercetimes.com/story/despite-popularity-will-let-me-tiktok-that-become-a-fading-phrase-177303.html
Despite Popularity, Will ‘Let Me TikTok That’ Become a Fading Phrase?
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/02/internet-user.jpg
https://www.ecommercetimes.com/story/tips-to-help-mask-your-identity-online-177846.html
Tips To Help Mask Your Identity Online
Enter your Username and Password to sign in.
Social Media
See all Social Media