Friday, March 29, 2019
Content Curation Roundup Posts: How To Get Awesome Results
Want to create content curation roundup posts to get maximum results? Then let these 20+ tactics guide you to develop the best possible crowd pleaser content.
The post Content Curation Roundup Posts: How To Get Awesome Results appeared first on Heidi Cohen.
from
http://feedproxy.google.com/~r/HeidiCohen/~3/q5_a2wDkCH8/
5 ways to improve enterprise security
At the heart of Internet connectivity is the Internet of Things (IoT). Every enterprise today that utilizes digital technology in its core processes or organizational infrastructure adopts some form of IoT.
While these connections can give businesses the dynamic they need to compete in an increasingly competitive market, they can also add to a company’s online vulnerability. The countless devices, applications, cloud platforms, sensors, systems, and modems that are connected all present a threat to an enterprise’s most core secure data and personnel profiles.
If at any given time any of these devices become vulnerable, the entire network — and all devices and platforms within it — becomes exposed. For this reason, companies must take multi-layered approaches to secure the devices and the data that travels between each device throughout every second of every day.
Here are five ways companies can improve enterprise security, both internally and externally throughout an IoT-driven network.
1. Assume that everything presents risks
The first rule of thumb in business security is to question the security of every current device and any additional device within the business network. Every device and component within a network is vulnerable in one way or another. Therefore, IT administrators must understand the risks involved with adding a device and then apply security protocols appropriate to the level of risk.
A simple example of this would be the addition of a router to the network. Since the router links other devices together to the outside world, it is highly exploitable. Rather than settling for the router default configurations, administrators can tighten security by adjusting the setting in the following ways:
- Avoid routers supplied by ISPs.
- Change the default admin password. Choose a complex Wi-Fi password
- Restrict which ISP addresses can manage the router.
- Turn on HTTPS access to the router interface.
- Change the router’s LAN IP address if possible.
- Update the router’s firmware as often as the updates are available.
2. Assess all IoT device security characteristics
IoT security methods vary depending on a wide range of variable both within the device and within the network. Unfortunately, most IoT manufacturers do not place a high priority on securing these devices. As a result, IT techs and administrators must do it upon installation. Similar to the above point, all IoT devices must be assessed for security characteristics.
What characteristics in each device do IT administrators look for?
- Security weaknesses in the device’s design
- Public key infrastructure (PKI) and digital certificates
- Application performance indicator (API) security
- Hardware security and tamper-proof construction
- Readily available device and software updates
3. Look to a Virtual Private Network (VPN)
A VPN gives a company privacy and anonymity by creating a private network from a public internet connection. A VPN masks an internet protocol (IP) address so that no other entity can trace any online actions. By combining a VPN with the best browser for privacy, a company has a greater chance of optimizing security.
Regardless of how many IoT devices you have connected to your network or the activity that transpires between the devices, the VPN shields all activity from those trying to access or hack the data.
While you may consider other types of security to add to your network, a VPN is your greatest line of defence against business-related online criminal activity. A virtual private network can conceal enterprise activity such as:
- Browsing History
- The IP address and location
- Audio or video streaming location
- Data in transit from one IoT device to another
- All other web or network activity within a company
4. Expand existing security solutions
Every IoT device adds another connection endpoint. Eventually, enough devices can exhaust the security of an existing system. Therefore, users may need to expand the existing security solutions to mitigate IoT risks.
Here are some ways to achieve this:
Start with the End User in Mind
Breaches occur when a company employee (end-user) doesn’t understand the security protocols, or they access a part of the network that they were not supposed to. Therefore, companies need to regulate and control which devices end-users connect to the network.
Shield the Network Perimeter
Design and implement a security policy for an IoT based network, paying special attention to items such as device authentication to the network, device network communication controls, and device logging. These devices lack hardened operating systems. They are vulnerable to hacks.
Multi-Layer Endpoint Protection
Hackers are always testing systems for weaknesses. The slightest opening in a network will allow a hacker to wreak havoc on a company. Companies can block criminals at every point through risk-based authentication. Another possible solution is utilizing encryption keys to hide the identity of an IoT device.
5. Be prepared for worst case scenarios
We’ve all seen the headlines over the past decade of what can happen when a seemingly impenetrable mega corporation experiences a security breach. In most cases, the breaches occurred because the company did not take the security of its data seriously enough.
Cybersecurity must be the top priority for today’s companies. Every new development ushers in countless hackers who are already ahead of the curve and waiting for companies to display some type of vulnerability with their network.
How can companies prepare for worst case scenarios?
- Develop an IoT Readiness Plan that includes a comprehensive risk assessment and discovery of all IoT devices that might present a catastrophe. An IoT risk assessment should include an audit of the network, the applications, and security protocols.
- Identify, catalog, and categorize all IoT devices. Make sure that IT has a comprehensive understanding and knowledge of each device. Replace or upgrade devices as necessary without fail.
- Optimize and upgrade all VPN services and providers. Have a complete understanding of what a VPN provider can offer and invest time and money in ensuring that the company has the absolute best VPN products on the market today.
- Backup all data in a secure cloud or on-site platform. While cloud platforms are convenient, they’re not always safe. Make sure that the company is utilizing a highly secure cloud platform that is managed by a reputable, experienced, and certified IT company.
By utilizing these five strategies, small, medium, and large companies can ensure that the devices and platforms within their network system are safe from hackers and criminal activity. The simple fact is, companies can no longer access the web and neglect enterprise security.
The post 5 ways to improve enterprise security appeared first on Get Elastic Ecommerce Blog.
from
https://www.getelastic.com/5-ways-to-improve-enterprise-security
Thursday, March 28, 2019
Google Search Algorithm Updates: 2018 [Infographic]
from
https://www.marketingprofs.com/chirp/2019/40841/google-search-algorithm-updates-2018-infographic
Blockchain Potential for Ecommerce
Blockchain distributed ledger technology, the tech behind Bitcoin, has the potential to improve ecommerce. These are early days, however. So early that many people don’t understand what a blockchain is and what it means for business. Let’s start with the basics, then look at some of the potential use-cases for ecommerce.
What is a blockchain?
A blockchain is a database “ledger” that cryptographically seals records of digital data or events in an immutable time-stamped chain. There are decentralized forms and centralized forms of blockchains.
Decentralized blockchains work best when there are many copies of the chain. Keepers of the chain (the network of computers that holds copies) must agree that a transaction has taken place before the transaction is committed to a block of transactions, stored on the chain. Decentralized forms of blockchain tend to be permission-less, meaning anyone can participate anonymously. Bitcoin is the most recognized application of a decentralized blockchain.
Centralized forms require knowledge of participants identity and a central organization stores the data. Ripple is an application of centralized blockchain technology. There are advantages and disadvantages to both systems.
In either form, participants can access and inspect the data store on a blockchain. However, no one can alter or delete information sealed in blocks on the chain. The ability for all parties to “see” into all transactions transparently makes blockchains ideal for areas of business in which third-party trust systems operate today.
Fundamentally, blockchains have the potential to make it easier and safer for enterprises to conduct business over the Internet. The inherent transparency that blockchains introduce can lead to:
- Cost reductions in payments
- Improved trust between customers and companies
- Supply chain efficiencies
- Fraud reduction
- Inverted advertising models
Thousands of companies, organizations and consulting firms around the globe are working to leverage blockchains to make industries work more efficiently and effectively.
Here are the top five areas to watch:
Frictionless payments
Traditional financial settlement systems that ensure the release of payments after goods or services delivery depend on time-consuming, expensive, manual processes prone to inaccuracy. While for consumers it appears that a credit card transaction is completed at the time of a sale, back office financial employees know that it can take weeks for final settlement before a merchant receives the money.
Blockchain-based currencies like Bitcoin, do not require third-party validation to make a transaction. A customer can send bitcoin or other accepted crypto coin to a merchant directly. After receiving confirmation from the blockchain’s network nodes, the transaction is complete, and the merchant receives the payment. The time it takes to complete a transaction is in the minutes, not weeks because verification is automated and secured through multiple confirmations.
Companies looking to reduce costs for back-end settlements and purchases using credit cards, PayPal or other third-parties can accept blockchain-based currency or credit.
Automating contract enforcement
Blockchains can also create “programmable” money, using a smart contract. A smart contract can be a simple agreement to pay for a good or service once certain conditions are met. They can facilitate the exchange of money, property, shares, or anything of value in a transparent, conflict-free way that circumvents the services of a middleman.
Smart contracts not only define the rules and penalties around an agreement in the same way that a traditional contract does, but they can also automatically enforce those obligations.
For example, suppose you buy a car direct from a manufacturer and that you can do this by paying a deposit through a blockchain based currency. You get a receipt from the manufacturer held in a virtual contract. The manufacturer sends you the car and a digital entry key by a specified date. If neither the key nor the car arrives by a specified time, then the blockchain releases a refund of the deposit you paid. If you do receive the car and unlock it by the specified time, then the blockchain releases full payment to the manufacturer.
The system works on if-then-else statements observable by hundreds of observers so you can expect a faultless delivery. If the manufacturer gives you the key, they are sure to be paid. Both conditions must be met for the contract to go through. If you send a certain amount in bitcoins, you receive the key. The contract automatically cancels after its expiration date and the code in the chain cannot be interfered with by you or the manufacturer without the other knowing since all participants are simultaneously alerted.
Fraud reduction
According to the October 2017 Global Fraud Index, account takeover replaced stolen financials as the fastest growing fraud threat for ecommerce websites in 2017. Companies in just eight industries lost more than $57.8 B through fraud. Fraudsters impersonate legitimate account holders, take over their accounts, and use them to make purchases because usernames and passwords are notoriously easy to obtain.
To combat fraud, blockchain companies are using the idea of the distributed ledger to create trusted identities. In this system, multiple trusted parties must be able to verify another party. On an ecommerce site, verification could take place when a customer wants to use their account to purchase. Other start-ups are leveraging the cryptographic capabilities of blockchains to protect biometrics used for account access, making it extremely difficult for external parties to gain access to another’s account. Identity systems based on a blockchain would extend to all parties in an ecommerce ecosystem: suppliers, partners, distributors and any other players. Similarly, legitimate merchants will use blockchain technology to assure the authenticity of goods and guarantee their quality.
Supply chain gains
Tracking, reconciling and verifying inventory, purchases, invoices, bills of lading, shipments and receipts is a big problem in larger enterprises with sophisticated supply chains. Companies can eliminate all the paperwork (even if the paper is now all digital) using blockchain to create tamper-proof master ledgers between trading parties.
Blockchain solutions offer a single system of record for all parties to all transactions related to products. In this scenario, there is single entry, no duplication and transparency along the entire chain. Every time a product changes hands, the transaction is documented in the blockchain, creating a complete and permanent history from manufacture to sale.
Assuming companies are honest about their goods in the beginning, or there is some way to verify provenance as products enter the supply chain, then blockchains have the potential to reduce inaccuracy.
Using smart contracts, blockchain can facilitate neutral supply chain contract enforcement as well.
Disrupting advertising models and protecting personal information
Traditional media aggregates people with like interests and companies pay the media outlets to target audiences with advertising. Even the newer social media platforms do the same thing. Companies spend vast amounts of money on Facebook, Google and YouTube ads. The model whereby a third-party aggregates targets and sells their attention to advertisers is set to change using blockchain technology.
Imagine if an individual were paid to receive ads, but that they could not just sign up for any old ad? Companies exploring how to use blockchain technology have come up with some new strategies to do just that.
One uses a new decentralized search engine. Consumers earn ad dollars by adding their personal data to a blockchain. When they perform searches through the search engine, businesses that want to reach them can pay directly for access to advertise to them. The record of the transaction is observable by all players, increasing transparency for advertisers and allowing them to understand better where to allocate their budgets.
Another is using blockchain in conjunction with a browser that masks personal information from both advertisers and publishers, allowing consumers to remain anonymous. Consumers can opt-in to receive ads from specific sources. Publishers are rewarded with digital tokens from advertisers for attracting consumers with content. Consumers receive ads that are more relevant to them. The system increases transparency and efficiency in the digital advertising market. Publishers receive more revenue because middlemen and fraud are reduced. Users, who opt-in, receive fewer but more relevant ads. Advertisers earn higher ROI.
Just a fad?
Blockchain technology is not likely a passing fad.
Serious players like IBM, Accenture, Amazon, Microsoft, central and private banks, as well as large corporations are investing time and money exploring hundreds of different blockchain-based use cases. Many of these result in API-based systems that can plug and play with other systems. Looking forward, we expect open, API-based ecommerce systems to more easily incorporate blockchain-based identity verification, payments, smart contracts and new forms of loyalty and advertising than closed commerce systems.
The post Blockchain Potential for Ecommerce appeared first on Get Elastic Ecommerce Blog.
from
https://www.getelastic.com/blockchain-potential-for-ecommerce
Wednesday, March 27, 2019
How To Get Useful Conference Results On The Cheap Without Being Physically There
Marketers use this Definitive Guide To Get Conference Results Without Being Physically There. Has tactics and examples to help you succeed.
The post How To Get Useful Conference Results On The Cheap Without Being Physically There appeared first on Heidi Cohen.
from
http://feedproxy.google.com/~r/HeidiCohen/~3/Qt1hiE99NtI/
7 ways to combat chargebacks from “friendly” fraud
In recent months, we have seen “friendly” fraud take center stage as Facebook and Fortnite became victims to rampant friendly fraud. In fact, friendly fraud continues to be a problem for ecommerce merchants, not just the high-profile companies. A recent report from Juniper showed that 34 percent of merchants had experienced friendly fraud.
“Friendly fraud” refers to chargebacks that arise out of legitimate transactions. When a customer doesn’t recognize the charge on their bank statement, or when they later come to regret the transaction, they may contact their bank to have the charge reversed without going through the merchant first to inquire about the charge or ask for a refund. The “fraud” part may or may not be intentional, but the chargeback process is being misused by the consumer.
Chargebacks from friendly fraud is on the rise, and they present a growing problem that ecommerce merchants cannot ignore. Merchants and banks lost a combined total of $31 billion dollars due to chargebacks in 2017, and that only represents the actual transaction amounts. When factoring in the time, labor, and money spent in dealing with chargebacks, their actual cost is much higher. Some chargebacks have a legitimate basis and can’t be avoided, but friendly fraud chargebacks can—and should—be vigorously disputed.
Banks must shoulder some of the responsibility for friendly fraud growing to become such a problem over the last few years. In trying to keep their customers happy, they have eliminated fees and minimum required payments associated with chargeback requests, and do not critically investigate the reasons customers request them. By making it so easy to ask for a chargeback, banks have encouraged customers to use it as their go-to response to an unfamiliar or regretted purchase.
How to Prevent Friendly Fraud
Friendly fraud can be difficult to prevent because any valid transaction can potentially lead to it. Typical security measures, like AVS and CVV matching, won’t prevent it at all. Even a longtime, faithful customer can perpetrate friendly fraud.
However, there are concrete steps to reduce the likelihood of it occurring. Here are seven tips found to be effective at combatting friendly fraud.
- Make sure descriptors are easy for customers to identify. Many chargebacks occur because customers don’t recognize the charge on their bank statement. Make sure the business or store name is part of the descriptor so that customers can easily identify the origin of the charge.
- Set realistic expectations about products and/or services. A deeply dissatisfied customer who feels misled or deceived may feel like it’s pointless to go back to the merchant to resolve their issue. Don’t make promises that products can’t keep.
- Maintain honest and ethical business practices. Fraud is a two-way street—businesses can’t expect customers to treat them ethically if they’re trying to take advantage of them.
- Offer friendly, 24/7 customer service. A customer who can’t get ahold of a merchant to deal with a problem they’re having is likely to lose patience and turn to their bank instead. If customer service staff is easy to reach and trained to provide comprehensive, friendly assistance in resolving customer complaints, these problems are less likely to turn into chargebacks.
- Blacklist customers who file chargebacks. It is estimated that customers who file a dispute are known to take advantage of the merchant again at least 2 – 3 times if merchants do not take any preventive measures. Blacklisting the negative customers will prohibit the abusers from taking advantage of the business again. Merchants have to weigh the cost of losing future sales from customers like these against the risk of getting more chargebacks from them.
- Fulfill orders on time and track return shipments. Shipping delays happen, but customers who think their order is never going to arrive have a high likelihood of requesting a chargeback. Ship promptly, track all packages coming and going, and issue refunds immediately upon receipt of a return.
- Notify customers when their order is processed, and before and after processing recurring payments. Any time there’s a delay between an order being placed and a card being charged, it’s a good idea to send reminders to the customer about what they’re being charged for. This is especially true with recurring payments for subscriptions and the like—customers have a tendency to develop amnesia about signing up for these billings.
When Outsourcing Makes Sense
When friendly fraud chargebacks make it through the best prevention efforts, businesses should fight them through the chargeback re-presentment process.
Outsourcing the chargeback management to a company that specializes in such things can be a worthwhile, cost-effective approach for many businesses. These companies can not only help optimize the tools and practices that will prevent friendly fraud, they can also provide immediate responses to incoming chargebacks, write compelling rebuttal letters, and compile the right kind of evidence that will increase the odds of successfully disputing fraudulent chargebacks.
Friendly fraud is not going away, so it is imperative that merchants use the best methods at their disposal to stop these chargebacks from costing them their hard-earned revenue.
The post 7 ways to combat chargebacks from “friendly” fraud appeared first on Get Elastic Ecommerce Blog.
from
https://www.getelastic.com/7-ways-to-combat-chargebacks-from-friendly-fraud
Tuesday, March 26, 2019
Friday, March 22, 2019
Transactions to interactions: how Carnival is disrupting the travel industry [video]
The Get Elastic team was recently down in Miami at The Carnival Experience Center and caught up with John Padgett, Chief Experience and Innovation Officer of Carnival Corporation and Sal Visca, Chief Technology Officer of Elastic Path.
During the visit, we were able to capture a captivating conversation with Padgett and Visca where they discussed how Carnival is transforming cruise vacationing into seamless interactions to create an experience unlike any other. Rivaling the checkout experiences of Amazon Go, Carnival guests no longer need to wait in lines – as a typical commerce transaction has now become a memorable interaction onboard. They also discussed the role API-first commerce is having in this digital transformation at sea.
Ultimately, Carnival has created a smart city – “it just so happens to be floating.”
The post Transactions to interactions: how Carnival is disrupting the travel industry [video] appeared first on Get Elastic Ecommerce Blog.
from
https://www.getelastic.com/transactions-to-interactions-how-carnival-is-disrupting-the-travel-industry-video
Thursday, March 21, 2019
Marketing Career Advice: Women Tell You How To Triumph
Considering a job in marketing? Get marketing career advice from 20+ women. Includes charts.
The post Marketing Career Advice: Women Tell You How To Triumph appeared first on Heidi Cohen.
from
https://heidicohen.com/marketing-career-advice-women/
Wednesday, March 20, 2019
IRCE @ RetailX – are you going?
The well-known ecommerce event, Internet Retailer Conference & Exhibition (IRCE), returns to Chicago’s McCormick Place on June 25th – along with two other shows in the mix, GlobalShop and RFID Journal LIVE! Retail, this trifecta creates RetailX.
For three days in June, IRCE @ RetailX will give attendees compelling programming, business solution offerings and most importantly networking.
The keynote line-up for this year’s IRCE @ RetailX is looking to be promising, as it was announced that author and internationally renowned consumer futurist Doug Stephens will be delivering his session on the future of retail in a post-digital world. We all know shopping is being redefined, but what does that look like for retailers in the (near) future? Stephens and his futuristic lens will highlight the future of shopping in terms of virtual technology, 3D printing and the Internet of Things (IoT).
Another exciting session on the docket is with Andy Dunn, Senior Vice President of Digital Consumer Brands at Walmart. Walmart is already a main player in the world of retail and has one of the better advantages to take on Amazon in terms of ecommerce and even grocery. Dunn, former CEO of Bonobos, will address why digital brands are growing 3x the rate of ecommerce overall; and the way to unlock digital brands’ full potential requires physical stores. Alas, brick-and-mortar isn’t dead!
Lastly, what is peeking interest here at Get Elastic is the B2B focus being woven into the lineup. Mark Brohan, B2BecNews Research Director covering B2B ecommerce trends will lead a session on how to merge CRM and personalization to boost B2B ecommerce sales. This session will give attendees a better understanding of how to leverage their CRM to give B2B buyers an online experience geared to their unique requirements and therefore increasing sales.
If you’re interested in providing recaps of IRCE @RetailX 2019, Get Elastic would love to hear from you. Please email editor@elasticpath.com.
The post IRCE @ RetailX – are you going? appeared first on Get Elastic Ecommerce Blog.
from
https://www.getelastic.com/irce-retailx-are-you-going
Tuesday, March 19, 2019
Social Media Definition: The Ultimate Guide That Will Make You Smarter
What is social media and how does it relate to marketing? 60+ marketing experts give their social media definition. Also includes data.
The post Social Media Definition: The Ultimate Guide That Will Make You Smarter appeared first on Heidi Cohen.
from
https://heidicohen.com/social-media-definition/
Ignore Blogging Blarney: How To Get Awesome Blog Results
Want awesome blog results despite content saturation? But you keep finding blogging blarney? We smash 17 pieces of blogging blarney and replace them with solid marketing tactics for success.
The post Ignore Blogging Blarney: How To Get Awesome Blog Results appeared first on Heidi Cohen.
from
https://heidicohen.com/17-pieces-of-blogging-blarney-how-to-fix-them/
Marketing Circle of Trust: How to Improve Relationships for Social Good [Research]
To succeed enter marketing circle of trust. Includes trust definitions, research, data and tips to increase customer trust and support social good.
The post Marketing Circle of Trust: How to Improve Relationships for Social Good [Research] appeared first on Heidi Cohen.
from
https://heidicohen.com/marketing-circle-of-trust/
What specifies a web application as a Progressive Web App (PWA)
Progressive Web Apps’ (PWAs) biggest draw is in their ability to adapt and provide the best overall mobile web experience regardless of what screen they’re being viewed on or what browser they’re being run on. PWAs drive performance and load similar to a regular web page, but offer additional native device functionality such as working offline, serving notifications, launching a camera, etc. For more background and further explanation on what PWAs truly are, check out the previously published article, What’s all the hype with Progressive Web Apps (PWAs).
This second installment in the PWA series will explore the browser technologies that make PWAs possible, including what specifies a web application as a PWA.
PWA Capabilities and Specifications
PWAs themselves have various capabilities. This includes (but is not limited to) geolocation, sensor access (magnetometer, accelerometers, gyroscope), camera access, audio output, on-device payment, web-based notifications, background synchronization, and more. These APIsand services are exposed through the particular browser that are supported (more on that later).
It’s important to note that making use of the previously mentioned capabilities in a web app doesn’t immediately make it a PWA. Various automation tools will provide auditing capabilities for PWAs, which provides somewhat of a standardized expectation for what rules/practices PWAs should really adhere to. The metrics evaluated by these tools are set by a baseline of influencers in these technologies. Google’s development documentation describes the various technologies sought after in the industry to declare a web application as a PWA.
For PWA classification, a web application must:
- Originate from a Secure Origin. Served over TLS and green padlock displays (no active mixed content).
- Load while offline (even if only a custom offline page). By implication, this means that PWAs require Service Workers.Service Workers being the current technology of implementation as there is no current alternative to the approach.
- Reference a Web Application Manifest with at least the following properties: name short_name start_url display with a value of standalone or fullscreen An icon at least 144×144 large in png format.
In addition to the feature set PWA’s possess, there is also far greater simplicity in their distribution/consumption model. As PWAs are distributed as static files, they are easy to serve by means of a light-weight webserver which clients can download the necessary assets for through their browser. Another means of distribution is through a standard CMS/CDN- simply to host the built static assets required for the PWA. Therefore, having a PWA doesn’t necessarily mean the CMS you’re using is now obsolete, but it opens up opportunities to new capabilities that a CDN may provide such as content caching, security features, and more.
When thinking about the means of distribution for PWAs, its ease doesn’t come to surface until the actual use cases are applied. From the ecommerce perspective, how many times have you ventured into a store outside your home country to be presented with an appealing banner to download an app to aid you with all your enhanced in-store shopping experience? You happily search for this app in your phone’s App Store, only to find out that it’s not available for download because you have an account dedicated to a country which doesn’t distribute this app. You’re left displeased, and you get the feeling that you’re now left out of this opportunity to try out a wonderful shopping experience simply because the content you want to download has been region locked by your platform.
Now imagine if this application was available as a PWA. You’ll simply be able to open up your web browser on your mobile device, navigate to the store’s website, and be presented with the same rich experience that you would expect from the native application. You’re now able to continue that incredible shopping experience that you were hoping for from the start.
Browser FeaturesCertain browsers offer more support and capabilities for PWAs compared to others. This is most evident in the current mobile web application world between iOS Safari and Android Chrome mobile browsers. iOS does not possess the richer capabilities of PWAs such as web-based push notifications, bluetooth access, background synchronization, geofencing, and more.
However, as of the time of writing this article, Apple has released iOS 12.2 beta, which adds additional capabilities such as native support for gesture navigation, state management between apps, level 1 web share features, external link handling (useful for OAuth flows), and plenty more. This doesn’t put iOS on par with Android yet in term’s of PWA support. However, it does bring truth to the fact that PWAs are becoming the way of the future for web applications and are continuing further adoption to platforms.
As continued adoption of PWAs increase, we should see more native features of platform operating systems become exposed through web browser APIs.
If curious on what capabilities a browser may have, it’s encouraged to visit https://whatwebcando.today/, and run a scan on a current browser in use. It may be surprising to see some features limited to native applications have made their way to the web.
These modern practices encourage growth in the mobile industry and demonstrate how both consumer and developer requirements have shaped mobile application development practices into adoptable front-end models.
The post What specifies a web application as a Progressive Web App (PWA) appeared first on Get Elastic Ecommerce Blog.
from
https://www.getelastic.com/what-specifies-a-web-application-as-a-progressive-web-app-pwa
Monday, March 18, 2019
Wednesday, March 13, 2019
Closing the mobile conversion gap with PWAs
According to Mobify’s 2018 Q4 Mobile Commerce Insights Report, mobile overall, showed continued growth with purchases made between Black Friday and Christmas. Somewhat surprising from Mobify’s findings was that the most frequent traffic source for mobile was email. According to Forbes, “retailers sent 3.5 billion emails on Black Friday, and another 4.1 billion on Cyber Monday – significant increases over the 3 billion and 3.3 billion, respectively, sent in 2017.”
Closing the gap
Although mobile is edging out other devices in terms of traffic and use, it is still possessing a challenge for retailers in terms of lower conversion rates when compared to desktop. As Mobify reports, before an ecommerce retailer can fully close the conversion rate gap, businesses need to investigate this compound metric further by looking at traffic AND transactions.
Even though transactions are increasing, if they are not increasing as quickly as traffic, the conversion rate goes down. [Transactions / Traffic = Conversion] This can be a bit misleading in terms of mobile commerce success. For this reason, Mobify notes that “the conversion rate on its own is not a good metric to evaluate your overall performance. Because it’s a compound metric, interpreting conversion rate requires taking the extra step of understanding the movement of the variables (traffic and transactions) that comprise it.”
A step towards fully closing this gap means looking at the customer-facing experience offered and the potential to improve. With the adoption of Progressive Web Apps (PWA), retailers can offer better, if not the best way to deliver improved, faster customer experiences. PWAs load similar to a regular web page, but offer additional native device functionality such as working offline, serving notifications, launching a camera, etc. The number one benefit of PWAs vs. non-PWA sites (like on desktop), is speed – as they significantly reduce the time it takes for a consumer to complete crucial tasks such as finding an item or completing the path to purchase. The faster a shopper is able to complete a purchase, the more likely they are to buy. Google research found that as page load time increases from one second to ten, the probability of bouncing increases 123%. PWAs offer an expedited experience over native apps, while offering all the same features.
Debenhams, a British department store ventured into the world of PWAs and saw double-digit percentage point growth in mobile conversions. And, their “commuter browsing” turned into “commuter shopping.”
Mobify notes the three approaches to delivering commerce PWAs: commerce-led, experience-led and API-led. However, when looking to implement a customer-first strategy, an API-led approach is really the way to go.
The API-driven approach to PWAs
To define the API-driven approach to delivering commerce PWAs, these are in fact when ecommerce features/services are exposed through APIs and consumed through a front-end which has the ability to invoke those APIs to retrieve and interact with whatever data is required for the ecommerce flows exposed by that API.
There are many benefits to implementing this methodology. Control of the ecommerce back-end through an API creates a number of services that are no longer limited by the front-end consuming them. The same API which drives a front-end touchpoint for a PWA storefront can be used for additional touchpoints such as IoT touchpoints, POS machines and customer interactive chatbots. This additionally becomes a great benefit to the PWA storefront as this PWA may live independently of the ecommerce back-end services and be built around consuming these back-end services without any concerns of impacting behavior as additional APIs are exposed. It becomes the sole decision of the front-end PWA implementation to consume additional services which have been exposed by the API in the future case, and thus simplifies adoption of those services.
Best practices to accomplishing this may vary by organization and business case. Some general cases include usages of REST or Graph QL APIs to expose ecommerce business logic in a meaningful representation, while some continue to make use of legacy technologies such as SOAP.
The post Closing the mobile conversion gap with PWAs appeared first on Get Elastic Ecommerce Blog.
from
https://www.getelastic.com/closing-the-mobile-conversion-gap-with-progressive-web-apps
Tuesday, March 12, 2019
Is Artificial Intelligence (AI) enough for ecommerce fraud management?
Fighting fraud isn’t easy. It’s time-consuming, it’s challenging, and it’s expensive. Taking an artificial intelligence (AI) approach seems like a better strategy.
After all, AI can quickly analyze extensive amounts of customer data to identify emerging fraud patterns. By incorporating this insight into fraud risk scoring algorithms in near real-time, businesses can lower their risk of falling victim to fraud.
AI Advantages
Where AI excels is its ability to quickly review incoming transactions. The algorithms can calculate fraud risk scores far faster than manual reviewers ever could, which means for businesses that must deal with a high volume of incoming orders, AI can be the difference between speedy approvals and disgruntled customers.
There’s a cost aspect to this as well. Because this initial review of incoming orders can be automated, businesses don’t need to spend valuable (read: expensive) man-hours reviewing each individual order. This can tremendously cut down operating costs, and it enables organizations to focus their analysts’ attention only on those specific orders that require further investigation.
And finally, AI can be very helpful at spotting obscure patterns in fraud that might not be readily apparent to the average reviewer. This is particularly true if businesses have a good amount of high-quality, validated information on past orders.
However, for all the benefits AI-based fraud solutions can offer, the technology does have some limitations when it comes to evaluating credit card transactions.
AI-Based Shortcomings
That said, there are several circumstances where AI alone will not be sufficient to manage ecommerce fraud and may even prevent businesses from maximizing sales.
1. Auto-Declining Orders
AI does a great job of auto-approving good orders and flagging potentially fraudulent orders. But AI should never be trusted on its own to auto-decline orders. Statistics show false declines – that is, accidentally declining orders that are actually legitimate – is a very high, very real risk for ecommerce merchants.
By all means, AI should be used to flag orders that might be fraudulent; but they always need an additional review before declining them. False declines cost businesses 13 times more than credit card fraud. Organziaitons need to validate every decline decision, to be confident they’re not inadvertently ruining a relationship with a perfectly good customer simply because they’re trying to ship a gift to a different address (which is a common reason for false declines).
2. Lack of High-Quality Data
AI is only as good as the data it receives. If product is brand new or highly unique, AI-based fraud solution may not have the data it needs to make accurate approval decisions. In these cases, an AI solution may end up declining orders that are good – and the AI algorithm may inadvertently become more conservative as time goes one and decline more and more future orders.
For these types of products, flexibility will be key to ensuring merchants are maximizing sales without also increasing chargebacks. This may require turning off (or loosening the standards) for the AI solution while they closely monitor actual sales and fraud trends. Businesses should study their potential risk, and modify their fraud strategy based on their learnings.
3. Troubles with Fraud Filters
At the core of many AI solutions lies the ubiquitous fraud filter. Fraud filters use rules to evaluate incoming transactions; if a transaction meets certain criteria, the transaction will be either flagged for review or auto-declined.
The problem, therefore, is whether the fraud filters are set up properly. It’s tempting to think that if one fraud filter catches some fraud, more fraud filters will catch even more fraud. Unfortunately, this isn’t always the case. Layering filters incorrectly can result in some rules canceling others out, leaving you as vulnerable as if you had no fraud protection.
Moreover, smart fraudsters know how to “play” the fraud filter game. For example, it’s not terribly difficult for a fraudster to test a system with a series of orders and eventually learn that orders under $1,000 are typically approved, whereas orders over $1,000 are typically reviewed. Once they learn this, they’ll flood the system with batches of orders of $999 that enable them to fly under the fraud filters’ radar, completely undetected.
A Winning Approach = AI + Human
Perhaps the smartest approach is to combine the best of both worlds: Businesses should implement a comprehensive fraud management solution that combines AI technology with expert fraud analysis.
This multilayered approach enables organziations to harness all the efficiency benefits of AI, so they don’t have to slow down the order approval process – and it also safeguards businesses against the risk of accidentally auto-declining orders from their best customers. In this type of approach, AI might be used to auto-approve good orders and flag orders that are suspicious, while a human analyst that understands the nuances of fraud can manually review and either validate the order or confirm the decline decision.
The post Is Artificial Intelligence (AI) enough for ecommerce fraud management? appeared first on Get Elastic Ecommerce Blog.
from
https://www.getelastic.com/is-artificial-intelligence-ai-enough-for-ecommerce-fraud-management
Monday, March 11, 2019
Wednesday, March 6, 2019
Tuesday, March 5, 2019
Monday, March 4, 2019
Digital commerce in the 5G world
5G is the next generation of mobile networks that will drastically increase performance and enable new use-cases across three dimensions:
- Massive machine-to-machine (M2M) communications will accelerate the adoption of M2M/IoT leading to emergence of many new use-cases including remote control, infrastructure monitoring, health, connected cars and many others.
- Ultra-reliable low latency communications will allow to achieve latencies as low as 1ms which enable delivery of new services such as near-real time data processing, remote control and augmented/virtual reality (AR/VR).
- Enhanced mobile broadband will enable 10x to 100x faster networks comparing to 4G allowing fixed-like services to be delivered to business and consumers through mobile connections.
Although still in its infancy, 5G is growing rapidly with the number of 5G connections expected to reach almost 1.5 billion by 2024. New use-cases and capabilities enabled by 5G will accelerate enterprise digital transformation across verticals, such as:
- NEW TOUCHPOINTS. In the world where people, devices, equipment and cars are connected wirelessly at any time, increasing the number of interactions will happen through emerging touchpoints. Consumers and enterprises will interact with businesses to experience and order new products in near-real time with AR/VR, chat bots and a multitude of connected devices. For example, new pay-per-view content can be ordered directly from a connected car through an entertainment system. Enterprises will be able to order new stock based on data from sensors in the equipment and applications connected to the network.
- NEW PRODUCTS and SERVICES. Increased speeds, low latency and the adoption of M2M/IoT use-cases will enable new B2C and B2B business models based around on-demand services delivered anywhere in the world at any time. Manufacturers will be able to sell hardware products in on-demand fashion with new value-added services. Financial services will be equipped to charge customers depending on their level of activity, including usage-based car and equipment insurance. Telecom service providers will be able to allow subscribers to granularly configure their service based on various parameters including speed, bandwidth and quality of service.
- NEW EXPERIENCES. Enormous amount of data generated in the connected world will provide enterprises with valuable information on how their B2C and B2B customers use their products and services. This will allow enterprises to build an understanding of customer usage patterns, locations and profiles to design personalized offerings. Combined with the on-demand business models it will enable real-time hyper-personalization of products and services.
Commerce Requirements
In order to drive the sustainable business growth in the 5G world, enterprises will need to employ a commerce solution that enables the delivery of new hyper-personalized offerings across traditional and new touchpoints:
- Diverse new business models will require commerce solutions to have comprehensive product management capabilities. It will need to support products and services with different payment methods including one-time, flat-rate, subscription-based, usage-based. On top of that it will need to support partner-enabled offerings as enterprises will extensively bundle their own and third-party offerings.
- Emerging touchpoints will require service providers to have comprehensive APIs on top of their commerce platform. The APIs will provide quotation and ordering through any channel, be it a vending machine or a connected car. Many of the touchpoints in the 5G ecosystem will be owned by third parties, which means that the APIs have to be well-documented, so that the third parties’ developers will be able to develop applications on top of them.
- To deliver hyper-personalized experiences commerce platform will need to provide comprehensive capabilities for promotion management and offering personalization. It will have to leverage data from diverse sources including billing, interactions, account profile to deliver personalized offerings with custom prices in real-time. Promotions will have to be defined both for large customer segments, as well as, microsegments and individual customers.
The post Digital commerce in the 5G world appeared first on Get Elastic Ecommerce Blog.
from
https://www.getelastic.com/digital-commerce-in-the-5g-world