Search

Results 401-420 of 453 for Jack M. Germain.

Online Billing, Part 1: Leaving the Paper Trail Behind

Weeks before hearing that Apple had cut the price of its iPhone, the gadget's first buyers were met with a different surprise: an AT&T phone bill that in some cases was almost the size of a Stephen King novel. The wireless carrier meticulously detailed every connection and every data exchange. S...

EXCLUSIVE INTERVIEW

iPerceptions VP Duff Anderson: Marketing the Voice of the Customer

Duff Anderson, vice president of research, development and knowledge delivery at iPerceptions, is a pioneer in the attitudinal Web analytics field, endeavoring since 1996 to forge standards for online research methodologies and analysis. iPerceptions, with offices in New York, Montreal and Toronto, ...

EXCLUSIVE INTERVIEW

Postini CEO Quentin Gallivan, Part 2: Strategies and Services

E-mail and other forms of electronic communications have become pervasive and essential to business growth and operational productivity. This new dependency on messaging has created a whole new spectrum of major risks, vulnerabilities and requirements for companies of all sizes. "Postini customers t...

EXCLUSIVE INTERVIEW

Postini CEO Quentin Gallivan, Part 1: The Challenges of Compliance

E-mail and other forms of electronic communications have become pervasive and essential to business growth and operational productivity. Today, with more than 170 billion e-mails and 580 billion IMs exchanged daily, companies have seen a 334 percent annual increase in bandwidth, processing and stora...

Web Shoppers and Info Security: A Question of Credibility

Today's online shoppers may be more cautious than they were two years ago. Some are waiting up to 35 hours before completing a shopping cart transaction. A study of consumers' Internet buying habits suggests that online merchants face stiffer competition and new hurdles in closing sales over the Web...

IM at Work, Part 2: Tools for Locking Down

Letting employees have unbridled access to free, consumer-level instant messaging applications running on their workplace computers is a security disaster waiting to happen. Instant messaging applications are easy targets for hackers taking advantage of vulnerabilities. It is critical for businesses...

BEST OF ECT NEWS

Is Internet Franchising a Sure Thing?

Looking for a franchise opportunity? The World Wide Web is overflowing with Internet-based businesses for sale. Searching for "Internet Franchising" in your favorite search engine will reveal dozens of Web sites promising both online business and franchise opportunities in a variety of Internet-base...

IM at Work, Part 1: Idle Chatter, Serious Risk

Consumer-grade instant messaging applications such as Yahoo Messenger, AOL Instant Messenger and Windows Live Messenger can become significant security holes when used by workers on corporate networks. Instant messaging applications are easy targets for hackers taking advantage of vulnerabilities. I...

Kace Extends App Management Tools for Computer Administrators

Systems management appliances provider Kace announced on Monday the integration of the recently acquired AppDeploy Live service with its Kbox Systems Management Appliances. The launch provides system administrators with access to two global communities of information to speed day-to-day maintenance ...

Disasters and SMBs: Plan to Survive, Don’t Fail to Plan

Small businesses, beware. Can your business survive a natural disaster? Chances are against your survival if you do not have a recovery and continuity plan in place. A national survey conducted by custom market information company TNSInfo reveals that many small businesses would not survive a natura...

The Image Spammer’s New Bag of Tricks

Senders of unsolicited electronic messages, also known as spammers, are deploying a new generation of image spam to outsmart e-mail filters and other technologies designed to thwart them. They're cutting corners by linking their spam message to a photo from a popular image-hosting site, instead of s...

EXCLUSIVE INTERVIEW

TraceSecurity CTO Jim Stickley: Robbing Banks With Impunity

Jim Stickley, CTO of TraceSecurity makes his living sneaking into other peoples' businesses and leaving with their data. Stickley robs banks, but unlike conventional thieves, he is not after what is locked inside the vault. Instead, he steals personally identifiable information such as names, addres...

EXCLUSIVE INTERVIEW

Imprivata CEO Omar Hussain: Getting Physical With Security

Recent high-profile data breach incidents have placed in the spotlight for many IT departments and corporate executives the importance of innovative solutions for effective identity and access management solutions. Imprivata, which specializes in identification and access management appliance soluti...

Click Fraud: A Growing Nuisance for Web Advertisers, Part 2

Last year, the average click fraud rate of pay-per-click advertisements appearing on search engine content networks rose to 19.2 percent for the last quarter of 2006, the highest yet, according to Tom Cuthbert, CEO of Click Forensics. Click fraud occurs when online advertisers pay search engine comp...

Click Fraud: A Growing Nuisance for Web Advertisers, Part 1

Click fraud is a growing problem for online advertisers who rely on paid search services. Marketing experts are urging e-commerce vendors have to take proactive steps to combat it. Online advertisers pay the search engine company hosting their ad a set amount of money each time a computer user click...

Internet Franchising: Sure Bet or Risky Business?

Looking for a franchise opportunity? The World Wide Web is overflowing with Internet-based businesses for sale. Searching for "Internet Franchising" in your favorite search engine will reveal dozens of Web sites promising both online business and franchise opportunities in a variety of Internet-base...

Encrypted Virus Code: New Spin on Old Trick?

Some Internet security companies are warning about the dangers they say exist from a new level of cyber attacks based on dynamic code obfuscation. However, makers of top-rated antivirus protection software claim such warnings only amount to a new spin on an old hacker tactic. Dynamic code obfuscatio...

The Risky Business of Online Stock Trading

Online securities trading was a big fad a few years ago, but some of the major players disappeared from the scene after the dot-com fallout. However, many do-it-from-home traders cannot resist the Internet's speed and convenience, and there are still plenty of firms to accommodate them. Although som...

EXCLUSIVE INTERVIEW

In Touch CEO Laura Betterly on the Art of Online Advertising

Online advertising, like many novelties that play on the Internet, at first grabbed a great deal of attention from businesses. Online advertising was the new fad, and many people predicted it would overtake traditional advertising forms. Now that the newness of Internet advertising is wearing off, s...

Security Firms Unveil On-Demand Biometric Authentication System

Biometric security provider UPEK announced on Monday a partnership with Internet security firm Pay By Touch to bring an integrated biometric security service called "TrueMe" to online transactions. UPEK makes a fingerprint reader that is preinstalled in some laptops and is also available on separate...

E-Commerce Times Channels