SlideShare a Scribd company logo
1 of 13
Eliminating Website
Performance Theft
Joe Loveless, Market Management
Neustar
The World is Online
2 Billion Users
Marketers followed
Brand and revenue at stake
Performance is differentiator AND mandate
Overwhelming majority agree: Revenue at stake
N=117 Neustar/InfoWorld Market Pulse Research Study: Website Performance/Monitoring and the User Experience, April 2013
Poor online
experience = lost
revenue
Reach potential
customers
Communicate with
existing customers
A growing dependency
N=117 Neustar/InfoWorld Market Pulse Research Study: Website Performance/Monitoring and the User Experience, April 2013
3232%% - Across a dozen industries
- eCommerce % much higher
- Biggest growth source
The revenue risk is real
N=376 Neustar Web Performance Research Study, May 2013
$1k-$10k
per hour
More than $10,000
per hour
Don’t Know
Up to $1 Million per
hour
What robs a website of performance,
steals from the bottom line.
Neustar combats performance theft
 Find and fix website performance problems
- Real user measurements to spot real problems
- Instinctive diagnostics
- Correlation of all data
 Helps avoid performance problems
- Cloud-based testing
- Total perspectives – inside and out
- Problem validation
 Intelligent alerting and remediation
- Watches performance states
- Notifies appropriate personnel
- Automated actions to specific errors
USE CASE
Finding and fixing an eCommerce problem
HTTP 901 Error - DNS
1
2
3
Understanding the context
4
5
Business continuity – staying online
1
3
2
Done and done.
✓✓
Web Performance Management from Neustar
Eliminating Website Performance Theft.™

More Related Content

Viewers also liked

Viewers also liked (8)

Sitios web
Sitios webSitios web
Sitios web
 
Catalogo 2013 aplic_por_correias_poly_v
Catalogo 2013 aplic_por_correias_poly_vCatalogo 2013 aplic_por_correias_poly_v
Catalogo 2013 aplic_por_correias_poly_v
 
Onlinechat
OnlinechatOnlinechat
Onlinechat
 
Tabela de-parafusos1
Tabela de-parafusos1Tabela de-parafusos1
Tabela de-parafusos1
 
The Seven Kinds of Security
The Seven Kinds of SecurityThe Seven Kinds of Security
The Seven Kinds of Security
 
PLANTAS VASCULARES SIN SEMILLA
PLANTAS VASCULARES SIN SEMILLAPLANTAS VASCULARES SIN SEMILLA
PLANTAS VASCULARES SIN SEMILLA
 
Gabaritos para Imprimir - Tamanho Real de Parafusos, Porcas e Arruelas
Gabaritos para Imprimir - Tamanho Real de Parafusos, Porcas e ArruelasGabaritos para Imprimir - Tamanho Real de Parafusos, Porcas e Arruelas
Gabaritos para Imprimir - Tamanho Real de Parafusos, Porcas e Arruelas
 
Back-to-School market trends + recommendations
Back-to-School market trends + recommendations Back-to-School market trends + recommendations
Back-to-School market trends + recommendations
 

More from Neustar, Inc.

Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014
Neustar, Inc.
 
Neustar Cassandra Experience
Neustar Cassandra ExperienceNeustar Cassandra Experience
Neustar Cassandra Experience
Neustar, Inc.
 

More from Neustar, Inc. (12)

Vacation Traveler Insights
Vacation Traveler InsightsVacation Traveler Insights
Vacation Traveler Insights
 
Game of Screens: Tech kingdoms creating the omni-channel experience
Game of Screens: Tech kingdoms creating the omni-channel experienceGame of Screens: Tech kingdoms creating the omni-channel experience
Game of Screens: Tech kingdoms creating the omni-channel experience
 
The Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & MillennialsThe Truth About Cross-Device Marketing & Millennials
The Truth About Cross-Device Marketing & Millennials
 
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the SmokeA Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
A Responder's Guide to DDoS Attacks: Seeing Clearly Through the Smoke
 
Hi-Def Marketing
Hi-Def MarketingHi-Def Marketing
Hi-Def Marketing
 
Adweek and Neustar
Adweek and NeustarAdweek and Neustar
Adweek and Neustar
 
Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014Trends Shaping Local Search in 2014
Trends Shaping Local Search in 2014
 
Neustar Cassandra Experience
Neustar Cassandra ExperienceNeustar Cassandra Experience
Neustar Cassandra Experience
 
What We are Learning About DNS Security: DNSSEC and Much More..
What We are Learning About DNS Security:  DNSSEC and Much More..What We are Learning About DNS Security:  DNSSEC and Much More..
What We are Learning About DNS Security: DNSSEC and Much More..
 
FOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons LearnedFOSE 2011: DNSSEC and the Government, Lessons Learned
FOSE 2011: DNSSEC and the Government, Lessons Learned
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The Cloud
 
The Future of the Internet: Open Research Topics
The Future of the Internet: Open Research TopicsThe Future of the Internet: Open Research Topics
The Future of the Internet: Open Research Topics
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 

Find & Fix Web Performance Problems

  • 1. Eliminating Website Performance Theft Joe Loveless, Market Management Neustar
  • 2. The World is Online 2 Billion Users Marketers followed Brand and revenue at stake Performance is differentiator AND mandate
  • 3. Overwhelming majority agree: Revenue at stake N=117 Neustar/InfoWorld Market Pulse Research Study: Website Performance/Monitoring and the User Experience, April 2013 Poor online experience = lost revenue Reach potential customers Communicate with existing customers
  • 4. A growing dependency N=117 Neustar/InfoWorld Market Pulse Research Study: Website Performance/Monitoring and the User Experience, April 2013 3232%% - Across a dozen industries - eCommerce % much higher - Biggest growth source
  • 5. The revenue risk is real N=376 Neustar Web Performance Research Study, May 2013 $1k-$10k per hour More than $10,000 per hour Don’t Know Up to $1 Million per hour
  • 6. What robs a website of performance, steals from the bottom line.
  • 7. Neustar combats performance theft  Find and fix website performance problems - Real user measurements to spot real problems - Instinctive diagnostics - Correlation of all data  Helps avoid performance problems - Cloud-based testing - Total perspectives – inside and out - Problem validation  Intelligent alerting and remediation - Watches performance states - Notifies appropriate personnel - Automated actions to specific errors
  • 8. USE CASE Finding and fixing an eCommerce problem
  • 9. HTTP 901 Error - DNS 1 2 3
  • 11. Business continuity – staying online 1 3 2
  • 13. Web Performance Management from Neustar Eliminating Website Performance Theft.™

Editor's Notes

  1. [CONTEXT: The consumer has gone online, business followed and is increasingly relying upon the user experience for growth] Frankly, Consumers are now empowered with more choices and Competition is everywhere. We need to institute best practices for Web Performance as a differentiator and mandate which all ties back to dollars/revenue – and your business operations.
  2. [CONTEXT: Organizations are getting it, not only is revenue at stake and websites are growing as critical user exchange points]
  3. [CONTEXT: The numbers become more real. Neustar research shows substantial reliance upon websites for revenue – they MUST perform] In the same market study, on average, respondents (companies) attribute about 1/3 of total annual revenue to website transactions. This study is across a dozen industries and within specialized industries, such as eCommerce, that rev % increases to average more that 80%.
  4. [CONTEXT: Organizations are recognizing the hard costs and revenue loss, but many are still not making the connection putting those organizations at risk]
  5. Let’s now see how Neustar Web Performance Management can help stop website performance theft.