Feeds

Survey: online sales top $4.5 billion

Don't you believe it

  • alert
  • submit to reddit

High performance access to file storage

Computer hardware and software, travel, and books account for more than three-quarters of all online sales notching up more than $3.5 billion in sales out of a total global spend of $4.5 billion in 1998. But the dominance of computer-related sales online -- which accounts for $1.65 billion or nearly 40 per cent of Net sales this year -- is set to decline in the next couple of years as it's overtaken by more mainstream consumer items, according to industry watcher eMarketer. By 2002, travel -- which includes airfares, accommodation, car rental and tourism services -- and food will topple the computer sector from its current number one slot and relegate it to third place. eMarketer predicts that the travel sector will generate more than $8.14 billion in retail sales by 2002. Food and drink, led primarily by the greater acceptance of online shopping for groceries, will jump from lowly seventh place today to second place in three years with sales topping $7 billion. "Most people think of computers, travel and books as being popular online," said eMarketer statsmaster Geoffrey Ramsey. "But our revenue figures reveal just how powerful these categories actually are in today's online marketplace." Which is great news for e-commerce enthusiasts -- if only it can be believed. For eMarketer has broken ranks and questioned the accuracy of a number of e-commerce statistics currently doing the rounds. Depending who you believe, anything from $1.3 billion to $4.4 billion is going to be spent online during the fourth quarter this year as more and more people turn to the Net to buy their Christmas presents. eMarketer blames these variations on academic differences. But when pressed on the issue and asked to give any lead to confused readers, they simply shrug their shoulders and say, "You decide." Very helpful. Is The Register alone in thinking that the only people making any real money out of e-commerce are the pseudo-academic researchers plucking fictitious numbers out of the air? Surely not. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.