Special Report: Effective e-strategy in a colder climate

The fall-out from the dotcom love-in exploded the myth of "first-mover advantage" as the old bricks-and-mortar companies hung...

The fall-out from the dotcom love-in exploded the myth of "first-mover advantage" as the old bricks-and-mortar companies hung back and learnt from the mistakes of the pure-play dotcom companies.

The "quiet revolution" which followed the dotcom massacre has demonstrated the need for an effective e-strategy to make it in the new climate. Businesses and IT decision makers alike must be clear about which projects to go with and with what intensity.

The articles below show how to learn from previous mistakes and take new routes to future success:

Fixing the dotcom engine
Forget the grandiose plans which laid so many dotcoms low. Many on-the-ropes outfits are sitting on state-of-the-art technology and perhaps a recognised brand and customer base. These and other benefits could be yours if you buy a used dotcom
Read Article >>

What's in a name?
Don't worry if some huckster has snapped up your intended domain name - a completely new branding for Web operations can pay big dividends for a little extra effort
Read Article >>

How the "e" got into enterprise
This review of the last 18 months in e-commerce shows how many businesses went wrong while some found the right strategy. There's certainly never been a dull moment, and the whole experience can be used to form the base of an effective-e-strategy for today's business climate
Read Article >>
This was last published in August 2001



Enjoy the benefits of CW+ membership, learn more and join.

Read more on E-commerce technology

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...