scholarly journals EFFECTS OF LOADING SPEED ON THE SITE TRAFFIC CONVERSION

Author(s):  
M. Yakovliev ◽  
K. Filonenko

The subject of this article is the impact of site loading speed to increase user conversions. The goal is to determine what is the optimal site loading speed for users and further site optimization. Tasks: identify and optimize the components that take the longest load time. The methods used are: optimization of the server part of the site; Configuring Apache and Ngix Server Using server side gzip compression Using CDNs to download popular JavaScript libraries server-side caching settings; database optimization; optimization of TCP, TLS, HTTP / 2; client side optimization. The following results are obtained. Using the methods described above, on the example of a working draft, it was possible to optimize the site loading speed by 40%. Taking statistics for the period of 7 days, with the same amount of traffic, the conversion of users to customers increased from 7% to 15%. The number of failures on the first visit to the site decreased by 30%. Conclusions. In the course of work, the correlation between the speed of loading the site and the conversion of users to customers was confirmed. By optimizing the speed of loading the site, it was possible to increase the conversion of users by 2 times and reduce the percentage of failure on the first visit to the site.

2009 ◽  
pp. 1204-1225
Author(s):  
Wen-Chen Hu ◽  
Chyuan-Huei Thomas Yang ◽  
Jyh-haw Yeh ◽  
Weihong Hu

The emergence of wireless and mobile networks has made possible the introduction of electronic commerce to a new application and research subject: mobile commerce. Understanding or constructing a mobile or an electronic commerce system is an arduous task because the system involves a wide variety of disciplines and technologies and the technologies are constantly changing. To facilitate understanding and constructing such a system, this article divides the system into six components: (i) applications, (ii) client computers or devices, (iii) mobile middleware, (iv) wireless networks, (v) wired networks, and (vi) host computers. Elements in these components specifi- cally related to the subject are described in detail and lists of current technologies for component construction are discussed. Another important and complicated issue related to the subject is the mobile or electronic commerce application programming. It includes two types of programming: client-side and server-side programming, which will be introduced too.


2014 ◽  
Vol 556-562 ◽  
pp. 5906-5909
Author(s):  
Wei Dong

In this paper, we conduct research on the impact of multi-threading strategy on performance of end-to-end file transmission. As we all know, adopting multi-threading strategy in file transmission can greatly improve performance. However, the degree of such performance gains is not well documented. We first analyze the merits of file transmission utilizing multi-threaded transmission method. Then, to demonstrate the performance gains of multi-threaded transmission, an architecture which supports multi-threading transmission both in client side and server side is designed. We utilize the architecture in a real network and compare transmission performance by utilizing different parameters. Test results shows that multi-threading transmission achieves a better performance when compared to single-thread transmission. However, the performance gains are not proportional to the number of threads. Since file transmission is very normal in our daily life, it is expected the results in this paper will provide a guide for software vendor when multi-threading tools are developed.


2016 ◽  
Vol 6 (3) ◽  
pp. 43-52
Author(s):  
Lanier Watkins ◽  
John S. Hurley

One of the major challenges to an organization achieving a certain level of preparedness to “effectively” combat existing and future cyber threats and vulnerabilities is its ability to ensure the security and reliability of its networks. Most of the existing efforts are quantitative, by nature, and limited solely to the networks and systems of the organization. It would be unfair to not acknowledge that for sure some progress has been achieved in the way that organizations, as a whole, are now positioning themselves to address the threats (GAO 2012). Unfortunately, so have the skill sets and resource levels improved for attackers--they are increasingly getting better at achieving the unwanted access to organizations' information assets. In large part the authors believe that some of this is due to the failure by methods to assess the overall vulnerability of the networks. In addition, significant levels of threats and vulnerabilities beyond organizations' networks and systems are not being given the level of attention that is warranted. In this paper, the authors propose a more comprehensive approach that enables an organization to more realistically assess its “cyber maturity” level in hope of better positioning itself to address existing and new cyber threats. The authors also propose the need to better understand another missing critical piece to the puzzle--the reliability and security of networks in terms of scientific risk-based metrics (e.g., the severity of individual vulnerabilities and overall vulnerability of the network). Their risk-based metrics focus on the probability of compromise due to a given vulnerability; employee non-adherence to company cyber-based policies; insider threats. They are: (1) built on the CVSS Base Score which is modified by developing weights derived from the Analytic Hierarchy Process (AHP) to make the overall score more representative of the impact the vulnerability has on the global infrastructure, and (2) rooted in repeatable quantitative characteristics (i.e., vulnerabilities) such as the sum of the probabilities that devices will be compromised via client-side or server-side attacks stemming from software or hardware vulnerabilities. The authors will demonstrate the feasibility of their method by applying their approach to a case study and highlighting the benefits and impediments which result.


2020 ◽  
pp. 1687-1697
Author(s):  
Lanier Watkins ◽  
John S. Hurley

One of the major challenges to an organization achieving a certain level of preparedness to “effectively” combat existing and future cyber threats and vulnerabilities is its ability to ensure the security and reliability of its networks. Most of the existing efforts are quantitative, by nature, and limited solely to the networks and systems of the organization. It would be unfair to not acknowledge that for sure some progress has been achieved in the way that organizations, as a whole, are now positioning themselves to address the threats (GAO 2012). Unfortunately, so have the skill sets and resource levels improved for attackers--they are increasingly getting better at achieving the unwanted access to organizations' information assets. In large part the authors believe that some of this is due to the failure by methods to assess the overall vulnerability of the networks. In addition, significant levels of threats and vulnerabilities beyond organizations' networks and systems are not being given the level of attention that is warranted. In this paper, the authors propose a more comprehensive approach that enables an organization to more realistically assess its “cyber maturity” level in hope of better positioning itself to address existing and new cyber threats. The authors also propose the need to better understand another missing critical piece to the puzzle--the reliability and security of networks in terms of scientific risk-based metrics (e.g., the severity of individual vulnerabilities and overall vulnerability of the network). Their risk-based metrics focus on the probability of compromise due to a given vulnerability; employee non-adherence to company cyber-based policies; insider threats. They are: (1) built on the CVSS Base Score which is modified by developing weights derived from the Analytic Hierarchy Process (AHP) to make the overall score more representative of the impact the vulnerability has on the global infrastructure, and (2) rooted in repeatable quantitative characteristics (i.e., vulnerabilities) such as the sum of the probabilities that devices will be compromised via client-side or server-side attacks stemming from software or hardware vulnerabilities. The authors will demonstrate the feasibility of their method by applying their approach to a case study and highlighting the benefits and impediments which result.


2020 ◽  
Vol 2 (1) ◽  
pp. 1-5
Author(s):  
Ammar Ahmed ◽  
Rafat Naseer ◽  
Muhammad Asadullah ◽  
Hadia Khan

In this competitive environment, organizations strive to satisfy their customer by providing best quality service at affordable and fair prices with a view to enhance their revenues. To achieve the objective of revenue maximization, organizations strive to identify the factors that help them in retaining their customers. Drawing from the signalling theory of marketing, the current study proposes a novel conceptual model representing the impact of service quality with food quality and price fairness on customer retention in restaurant sector of Pakistan. The paper underlines an important arena of knowledge for academicians as well as organizational scientists on the subject. On the basis of literature available on the variables understudy, the present study forwards eight research propositions worthy of urgent scholarly attention. The conceptualized model of the present article can also be viewed significant in unleashing further avenues for the restaurant management entities, policy makers and future researchers in the domain of managing in the service sector businesses.


Author(s):  
Oleksandr Synenko ◽  
Kateryna Yarema ◽  
Yuliia Bezsmertna

The subject of the research is the approach to the possibility of using the Solow model to perform the regression analysis on the example of the Ukrainian economy model. The purpose of writing this article is to investigate the notion of regres- sion analysis, Solow’s economy model, algorithm for performing regression analy- sis on the example of Ukraine’s economy model. This model can be adapted for the economy of enterprises. Methodology. The research methodology is system-struc- tural and comparative analyzes (to study the structure of GDP); monograph (when studying methods of regression analysis on the example of the Ukrainian economy); economic analysis (when assessing the impact of factors on Ukraine’s GDP). The scientific novelty consists the features of the use of the Solow model on the ex- ample of Ukrainian economy are determined. An algorithm for calculating the basic parameters of a model using the Excel application package is disclosed. The main recommendations on the development of the national economy and economic growth through the use of macroeconomic instruments are given. Conclusions. The use of the Solow model enables forecasting and analysis. The results obtained re- vealed the problem of low resource return of capital as a resource, along with the means of macroeconomic regulation of the investment process, using which can improve the situation. A special place in these funds belongs to the accelerated depreciation and interest rate policies.


Author(s):  
Igor Ponomarenko ◽  
Kateryna Volovnenko

The subject of the research is a set of approaches to the statistical analysis ofthe activities of small business entities in Ukraine, including micro-enterprises. The purpose of writing this article is to study of the features of functioningof small business entities in Ukraine. Methodology. The research methodology isto use a system-structural and comparative analysis (to study the change in thenumber of small enterprises by major components); monographic (when studyingmethods of statistical analysis of small businesses); economic analysis (when assessing the impact of small business entities on socio-economic phenomena andprocesses in Ukraine). The scientific novelty consists to determine the features ofthe functioning of small businesses in Ukraine in modern conditions. The influenceof the activities of the main socio-economic and political indicators on the activities of small enterprises in recent periods of time has been identified. It has beenestablished that there is flexibility in the development of strategies by small businesses in conditions of significant competition, which makes it possible to quicklyrespond to changing situations in specific markets. Conclusions. The use of acomprehensive statistical analysis of small businesses functioning in Ukraine willallow government agencies to develop a set of measures to optimize the activitiesof these enterprises, which ultimately will positively affect the strengthening oftheir competitiveness and will contribute to the growth of the national economicsystem.


e-Finanse ◽  
2018 ◽  
Vol 14 (4) ◽  
pp. 67-76
Author(s):  
Piotr Bartkiewicz

AbstractThe article presents the results of the review of the empirical literature regarding the impact of quantitative easing (QE) on emerging markets (EMs). The subject is of interest to policymakers and researchers due to the increasingly larger role of EMs in the world economy and the large-scale capital flows occurring after 2009. The review is conducted in a systematic manner and takes into consideration different methodological choices, samples and measurement issues. The paper puts the summarized results in the context of transmission channels identified in the literature. There are few distinct methodological approaches present in the literature. While there is a consensus regarding the direction of the impact of QE on EMs, its size and durability have not yet been assessed with sufficient precision. In addition, there are clear gaps in the empirical findings, not least related to relative underrepresentation of the CEE region (in particular, Poland).


Author(s):  
Evgeniya Mikhailovna Popova ◽  
Guzel Mukhtarovna Guseinova ◽  
Sergei Borisovich Milov

The deficit of subnational budgets and deceleration capital investments in multiple Russian regions increase the relevance of research aimed at improvement of tax incentivizing practice of the regional investment process. The studies focused on determination of the impact of socioeconomic and institutional factors upon the efficiency of investment tax expenses obtained wide circulation within the foreign scientific literature. The subject of this article is the assessment of sensitivity of the efficiency of regional tax expanses towards investment attractiveness of the types of economic activity carried out by the residents of territories of advanced socioeconomic development, created in the subjects of Far Easter Federal District. The scientific novelty and practical values of this research consists in substantiation of the reasonableness of assessment of investment attractiveness of the types of economic activity that are stimulated by tax incentives. Methodology for assessing investment attractiveness is proposed and tested. The conclusion is made that in case of low investment attractiveness of the type of economic activity, which was planned to support by tax incentives, it is required to conduct and additional analysis to avoid unjustified tax expanses.


1991 ◽  
Vol 30 (2) ◽  
pp. 213-217
Author(s):  
Mir Annice Mahmood

Foreign aid has been the subject of much examination and research ever since it entered the economic armamentarium approximately 45 years ago. This was the time when the Second World War had successfully ended for the Allies in the defeat of Germany and Japan. However, a new enemy, the Soviet Union, had materialized at the end of the conflict. To counter the threat from the East, the United States undertook the implementation of the Marshal Plan, which was extremely successful in rebuilding and revitalizing a shattered Western Europe. Aid had made its impact. The book under review is by three well-known economists and is the outcome of a study sponsored by the Department of State and the United States Agency for International Development. The major objective of this study was to evaluate the impact of assistance, i.e., aid, on economic development. This evaluation however, was to be based on the existing literature on the subject. The book has five major parts: Part One deals with development thought and development assistance; Part Two looks at the relationship between donors and recipients; Part Three evaluates the use of aid by sector; Part Four presents country case-studies; and Part Five synthesizes the lessons from development assistance. Part One of the book is very informative in that it summarises very concisely the theoretical underpinnings of the aid process. In the beginning, aid was thought to be the answer to underdevelopment which could be achieved by a transfer of capital from the rich to the poor. This approach, however, did not succeed as it was simplistic. Capital transfers were not sufficient in themselves to bring about development, as research in this area came to reveal. The development process is a complicated one, with inputs from all sectors of the economy. Thus, it came to be recognized that factors such as low literacy rates, poor health facilities, and lack of social infrastructure are also responsible for economic backwardness. Part One of the book, therefore, sums up appropriately the various trends in development thought. This is important because the book deals primarily with the issue of the effectiveness of aid as a catalyst to further economic development.


Sign in / Sign up

Export Citation Format

Share Document