- Welcome Guest
- Sign In
The holiday season presents a significant opportunity for sellers to capture unprecedented sales on Amazon. Cyber Week alone, the seven-day period beginning the Tuesday prior to Thanksgiving and running through Cyber Monday, is expected to account for 40 percent of all e-commerce sales during the ho...
Over the past 10 years, I've been a part of at least that many startups. The tools of the trade have changed rapidly, but the core elements of successful entrepreneurship remain relatively unchanged. When I first started out, "social media marketing" was a brand new concept and existed almost entire...
Among the myriad of tactics that e-commerce businesses can use to pump up sales, preorders might be the most overlooked strategy. Yet preorder sales are a highly effective way to generate early buzz to gin up demand for new products. A "preorder" is the sale of a product that is not immediately ava...
Generation Z is getting a lot of attention these days, as the cohort is expected to outpace millennials, and comprise 32 percent of the world's 7.7 billion population. This powerful group of consumers was born into a digital world. A much-reported claim is that Generation Z has an attention span of...
The healthcare cloud has been growing incredibly, becoming an ever-more-important element of health information technology, or HIT. There are many reasons why the HIT cloud has been becoming more prominent, such as research and development and collaboration. Since the cloud has been expanding so rap...
It's a truism that just like organizations adapt, so too do criminals. For example, anyone who has ever seen a Wells Fargo commercial knows that there was a time when stagecoaches were a normative method for transporting cash and valuables. But what modern criminals in their right mind would attem...
Salesforce VP Lynne Zaledonis drives product marketing and sales enablement for Sales Cloud. In order to succeed in the age of the customer, companies need to understand that the new cloud, mobile and social world we find ourselves in "has produced trillions of pieces of customer data, and it's tota...
Traditional attack methods, like those used with the recent mobile online banking Trojan Svpeng, involve the installation of malware on the device to steal information and commit fraud. However, new techniques are emerging that would enable an attacker to compromise a device and steal private inform...
Current approaches to Java application protection place security at the application or the network layer, both of which are problematic. The first approach has proven to be too complex, too time consuming and too risky -- in other words, "too hot." Meanwhile, network level security that consists o...
When I was 10 years old, I took my first trip to Disney World. The futuristic rides in Tomorrow Land were my favorites. In particular, I loved "The Carousel of Progress," which, at the time, was an attraction designed by General Electric to showcase its new technologies at the 1964 New York World's ...
The combination of the polymorphic nature of malware, failure of signature-based security tools, and massive amounts of data and traffic flowing in and out of enterprise networks is making threat management using traditional approaches virtually impossible. Until now, security has been based largely...
This past week, a lesson about enterprise information security found its way to me via a somewhat unorthodox channel: specifically, an episode of Gordon Ramsay's Kitchen Nightmares. In this particular episode, the upshot was that Ramsay wasn't able to help. Why not? The owners weren't able to take c...
Sometimes it's a mistake to assume something -- or someone -- has outlived its usefulness just because it's already done one thing successfully. For example, many of us have a wealth of decommissioned corporate-provisioned mobile devices: We've bought them, handed them out, and seen them used succes...
One of the most dreaded words for any computer user is "malware." Rogue software and infected files can implant bits of code that log keystrokes, spy on activities, slow down searches and snatch financial information. Users can help protect their PC by installing antivirus software, but even this c...