eCommerceNews Asia - Technology news for digital commerce decision-makers

Opinion stories - Page 178

Thinkstockphotos 700469756

Finding your bot's voice in a world of conversational interfaces

Tue, 6th Mar 2018
#
uc
#
martech
#
ai
Bots must be helpful and speak naturally if brands are to limit consumer frustrations and generally succeed in their conversational strategies.
Thinkstockphotos 906875386

Keeping data in the cloud will prevent breaches from raining down

Tue, 6th Mar 2018
#
semiconductors
#
cloud security
#
iot
With competition aplenty, it is important to understand what makes the cloud secure, what are the security risks and how it fits with transformation.
Big data7

Secondary data – the paradigm-shifting resource overlooked by businesses

Tue, 6th Mar 2018
#
data analytics
#
martech
#
planning
Secondary data has become elevated within the business as its value is uncovered across a number of key areas.
Customer service

How speech analytics can improve outcomes in the contact centre

Mon, 5th Mar 2018
#
crm
#
uc
#
martech
Taking a look at how speech analytics technologies can be used in the contact centre to improve customer service and B2C interactions.
Thinkstockphotos 590608096

Achieving better security for BYOD workplaces

Fri, 2nd Mar 2018
#
casb
#
dlp
#
byod
The rise of BYOD lets employees work from anywhere on personal devices but challenges IT to secure diverse endpoints, pushing for data-centric solutions.
Thinkstockphotos 901677582

We need to stop thinking about security and networks as separate

Fri, 2nd Mar 2018
#
network infrastructure
#
sd-wan
#
sdn
We can no longer treat network security like a house onto which we keep tacking on additions and performing makeshift patch jobs.
Thinkstockphotos 522152569

Why banks need to show more initiative in tackling cyber fraud

Thu, 1st Mar 2018
#
malware
#
ddos
#
cybersecurity
Why financial institutions need to combat the increasingly complex and intelligent threat landscape with a holistic security approach.
Thinkstockphotos 601398828 1

Assessing why the ANZ cloud market is still 'cloudy'

Wed, 28th Feb 2018
#
crm
#
martech
#
erp
Despite the optimism demonstrated by many CIOs, the actual process of cloud adoption among large organisations is slow.
Thinkstockphotos 610749178

Making mobile and IoT projects work harder through integration

Tue, 27th Feb 2018
#
iot
#
partner programmes
#
edr
SOTI explores how bringing disparate IoT projects together can drive value and how the channel can help to push that message.
Thinkstockphotos 105764342

Protection against malware with a cloud-based sandbox

Tue, 27th Feb 2018
#
malware
#
cybersecurity
#
cloud services
Cloud-based sandboxing arises as the new defence against sophisticated malware, promising lower false-positives.
Thinkstockphotos 578307972

Email: The often ignored factor in strong cybersecurity

Tue, 27th Feb 2018
#
uc
#
phishing
#
email security
A customer-facing organisation will receive hundreds, if not thousands of emails every day, each one containing personal identifiers.
Pexels photo 380769

OVUM: Where are enterprises looking to really use AI?

Tue, 27th Feb 2018
#
uc
#
martech
#
supply chain
Artificial intelligence (AI) remains highly in vogue as a technology topic across the media and within the IT supplier landscape.
Thinkstockphotos 529747065

Insights on industrial vulnerability: How secure is your OT infrastructure?

Mon, 26th Feb 2018
#
firewalls
#
network infrastructure
#
encryption
Addressing the requirements of an OT network is now more important than ever and requires an integrated approach.
Thinkstockphotos 666678912

How GDPR changes the game for cloud service providers

Fri, 23rd Feb 2018
#
data analytics
#
martech
#
planning
While GDPR has been a hot topic of conversation recently, but what impact will the laws have on cloud platforms and environments?.
Thinkstockphotos 920998918

Fighting back against cyber attacks with big data analytics

Thu, 22nd Feb 2018
#
data analytics
#
martech
#
planning
The more log data businesses amass, the greater opportunity they'll have to detect, diagnose and protect themselves from cyber-attacks.
Thinkstockphotos 533557042

Assessing the rising threat of encrypted tunnels

Wed, 21st Feb 2018
#
endpoint protection
#
encryption
#
edr
Venafi senior technical manager Nick Hunter takes a look at five key threats posed by encrypted tunnel attacks.
Iot3

How CIOs can implement a successful IoT strategy

Wed, 21st Feb 2018
#
digital transformation
#
iot
#
software ag
Before jumping on the IoT bandwagon, CIOs need to take a step back and carefully create a viable IoT strategy.
Quantum computing

IBM vs Google vs Intel - The race to quantum computing

Wed, 21st Feb 2018
#
semiconductors
#
quantum computing
#
google
While a 300-bit quantum chip is theoretically feasible, it is not, at this time, practically possible, nor is it commercially viable.
Thinkstockphotos 802320836

Building for exascale - lessons learnt from the data centre

Wed, 21st Feb 2018
#
storage
#
hyperscale
#
dc
DDN Storage's James Coomer says from a storage architecture point of view we are well beyond supporting petascale (current generation) systems.
Screen shot 2018 02 19 at 11

Five questions to ask when evaluating a DCIM vendor

Tue, 20th Feb 2018
#
dcim
#
nlyte software
#
opinion
Mark Gaydos delves into the importance of not only adopting DCIM solutions, but also choosing the right vendor - here's his advice.