Feeds

Ron Paul’s web campaign mired in pokey pages

Bettered by Romney (again), POTUS not much better

High performance access to file storage

An analysis of the web-page performance of candidates in the 2012 US presidential elections shows disappointing results for Ron Paul, supposedly one of the more internet-savvy candidates in the race.

Web-optimization specialists Yottaa studied the composition, load speeds, and overall time before a candidate’s web site could be used, and ranked the results for the last few weeks. Ron Paul, who has one of the largest online support networks in US, came in at the bottom of the ranks for most of the last week, swapping last place occasionally with President Obama – who, to be fair, has little reason to optimize until he has a real contest on his hands.

2012 presidential campaign web sites

Spot the surge of Santorum (click to enlarge)

Paul’s web site is larger at around 3MB, needs 175 data round trips from 20 different domains, and required the browser to create 1351 DOM (document object model) elements for proper rendering. By contrast, Mitt Romney’s 558KB site needs just 41 DOM elements and 41 round trips to 15 domains, and scores nearly twice as well. President Obama’s site is very work-intensive, needing 125 round trips from 32 different domains and 834 DOM elements.

In business, it has long been recognized that a slow web site is a key part of failing in ecommerce. Internet users have ADD-like attention spans, and a delay of ten seconds in loading a page to a useful state can cost a significant slice of potential customers. But in this instance poor performance could be seen as sign of the success of a social media campaign, at the cost of mainstream-web page performance.

“Politicians are trying to make their websites a lot more social - they’re got to share more and more information,” Coach Wei, CEO of Yottaa told The Register. “This does mean a higher dependency on third-party websites, and can make web pages unbelievably slow.”

The data also shows a surge in the web site performance of the family-values Republican candidate Rick Santorum after his near-victory in the Iowa caucuses. It’s possible the site was given a spruce up in anticipation of a flood of Santorum supporters, but that speed boost has trickled away in recent days. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Microsoft: Windows version you probably haven't upgraded to yet is ALREADY OBSOLETE
Pre-Update versions of Windows 8.1 will no longer support patches
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.