More Bots and Aggressive API Abuse

In my last article about Bots and Scrapers for abuse, we explored some of the issues surrounding scripts and bots for abusing retailers. Recently, more light has been shed upon even more abuse coming to the Web in the form of aggressive API’s and bots to automate Web processes. Beyond competitors and price index advantages, people are using bots for profits and personal advantages. 

read more

Case Study: Understanding the Impact of Slow Load Times on Shopping Cart Abandonment

Every year, the shopping cart abandonment rate climbs during the holiday season, with analysts expecting to see a peak of 88% in 2013. An estimated one out of five of those carts are abandoned due to slow performance.

This post outlines how much retailers lose due to slow checkout pages, four common performance culprits, and what site owners can do to speed up the transaction process for their customers.

read more

Mass Market Tipping Point for SDN, NFV and Orchestration

It has been just more than six months since we finished our first commercial Software defined networking (SDN) product launch.  Prior, we had completed several commercial, what might be considered today as Network Functions Virtualization (NFV), deliveries based upon virtualized platforms and embedded system designs.  And throughout the same period, we concluded numerous cloud orchestration integrations.  There are similarities among all of the designs, including software based solution delivery, automated provisioning and application centric workflows resulting in better network services. 

read more

REPORT: State of the Union for Ecommerce Web Performance [Fall 2013]

Since we began tracking the performance of the top 500 retail websites back in 2010, web page speed has migrated from the technology fringe to center stage, due in part to the numerous case studies from large and small companies demonstrating the relationship between site speed and business KPIs like revenue and conversion rate.

Yet despite all this attention, the question remains: has there been a positive impact on the websites we use every day? Our latest ecommerce performance study suggests not.

read more

Virtualization and network programmability, according to SDN and NFV

Vendor-driven network overlay techniques, programmability via proprietary APIs for existing switches, and manual reprogramming to route traffic are some of the options available today for traditional network devices to deliver a dynamic network.

read more

See What Your Users See, Now: How to Harness the Power of Real User Monitoring

Over the past few years, real user monitoring (RUM) has evolved from an arcane topic discussed only by the geekiest of geeks to a subject that’s on almost every site owner’s lips. Yet despite its buzzword status, the RUM adoption rate remains low — as low as 20%, according to one survey — and operationalizing all this great user data remains virtually nonexistent.

Here’s how your company can learn to embrace this extraordinarily powerful tool.

read more

IMO: Selection Criteria for SDN Controllers

As the Software Defined Networking (SDN) hype dust settles, more vendors are offering SDN products that represent their take on the “how the world will be a better place with SDN” strategy. I figured that we should really get a better sense of what matters and what doesn’t when it comes to SDN controllers, as well as recognize the best ways to determine which controllers are a good choice.

read more

Moving to Mobile – The Changing Face of DDoS

Like any data communication network, mobile networks contain a range of security threats. Though some threats are easy to identify and mitigate, the unique structure and complexity of mobile networks makes security threats elusive. In the past, mobile networks enjoyed the privileges of a “Walled Garden” – a closed, isolated ecosystem – under the full control of mobile carriers that used proprietary protocols and had minimal security risks due to restricted user access. They developed their own technologies, standards and interface systems, and were rewarded with security through carefully constructed obscurity. With the introduction of 4G, Long Term Evolution (LTE) and the IEEE standardization of mobile networks, the secure “Walled Garden” days are over.

read more