Forrester Releases Report on Impact of Snowden Revelations
One of the biggest fears of US based cloud providers is that they would see a dramatic drop off in…
Salesforce Acquires Toopher for Mobile Authentication Capabilities
Toopher is a startup company based in Texas that provides mobile authentication services. Toopher offers a two factor authentication service…
Buying Email Lists vs. Using Data-as-a-Service (DaaS)
As marketers, buying lists of emails is commonplace. Perhaps it is for customer acquisition or to append missing information to…
Securing Against Domain Hijacking with Strong Access Controls
Hosting registrars for regional Lenovo and Google domains were hijacked last month, prompting a focus on the security of hosting…
Nexidia Brings Compliance and Process Management to Interaction Analytics
Nexidia is a leading vendor of speech analytics vendor. I recently wrote about how it has enhanced its architecture to include…
3 Things You Really Should Know About Other People’s Cloud VMs
The joys of using a virtual machine in the cloud are similar to those of living in an apartment. A…
3 Customer Acquisition Strategies to Ensure Your Brand Is Not a “One Night Brand”
We all need to focus on retaining new customers to grow our business. So how do you go about acquiring…
IT Security Lessons from the World’s Biggest Data Breaches
Historically, the data breaches to make news headlines are the ones that occur at enterprise organizations. Specifically, eBay, Home Depot,…
“I Need to Get All This Data Together!”
Is your marketing data all over the place? Does the idea of sending a targeted multi-channel marketing campaign make you…
5 Challenges Facing the Internet of Things
Our constant need to be connected has expanded beyond smartphones and tablets into a wider network of interconnected objects. These…