In my last article about Bots and Scrapers for abuse, we explored some of the issues surrounding scripts and bots for abusing retailers. Recently, more light has been shed upon even more abuse coming to the Web in the form of aggressive API’s and bots to automate Web processes. Beyond competitors and price index advantages, people are using bots for profits and personal advantages.read more
Every year, the shopping cart abandonment rate climbs during the holiday season, with analysts expecting to see a peak of 88% in 2013. An estimated one out of five of those carts are abandoned due to slow performance.
This post outlines how much retailers lose due to slow checkout pages, four common performance culprits, and what site owners can do to speed up the transaction process for their customers.read more
It has been just more than six months since we finished our first commercial Software defined networking (SDN) product launch. Prior, we had completed several commercial, what might be considered today as Network Functions Virtualization (NFV), deliveries based upon virtualized platforms and embedded system designs. And throughout the same period, we concluded numerous cloud orchestration integrations. There are similarities among all of the designs, including software based solution delivery, automated provisioning and application centric workflows resulting in better network services.read more
Since we began tracking the performance of the top 500 retail websites back in 2010, web page speed has migrated from the technology fringe to center stage, due in part to the numerous case studies from large and small companies demonstrating the relationship between site speed and business KPIs like revenue and conversion rate.
Yet despite all this attention, the question remains: has there been a positive impact on the websites we use every day? Our latest ecommerce performance study suggests not.read more
Vendor-driven network overlay techniques, programmability via proprietary APIs for existing switches, and manual reprogramming to route traffic are some of the options available today for traditional network devices to deliver a dynamic network.read more
Over the past few years, real user monitoring (RUM) has evolved from an arcane topic discussed only by the geekiest of geeks to a subject that’s on almost every site owner’s lips. Yet despite its buzzword status, the RUM adoption rate remains low — as low as 20%, according to one survey — and operationalizing all this great user data remains virtually nonexistent.
Here’s how your company can learn to embrace this extraordinarily powerful tool.read more
As the Software Defined Networking (SDN) hype dust settles, more vendors are offering SDN products that represent their take on the “how the world will be a better place with SDN” strategy. I figured that we should really get a better sense of what matters and what doesn’t when it comes to SDN controllers, as well as recognize the best ways to determine which controllers are a good choice.read more
Like any data communication network, mobile networks contain a range of security threats. Though some threats are easy to identify and mitigate, the unique structure and complexity of mobile networks makes security threats elusive. In the past, mobile networks enjoyed the privileges of a “Walled Garden” – a closed, isolated ecosystem – under the full control of mobile carriers that used proprietary protocols and had minimal security risks due to restricted user access. They developed their own technologies, standards and interface systems, and were rewarded with security through carefully constructed obscurity. With the introduction of 4G, Long Term Evolution (LTE) and the IEEE standardization of mobile networks, the secure “Walled Garden” days are over.read more