Back in May of 2014, 30 months ago, I penned the piece What Happens if
Twitter Goes Away? It was a provocative look at the decline of one of Social
Media’s darlings and suggesting potential value between free and paid
services. Has the Social Media industry reached an inflection point where
“free” services need to… Continue reading A Proposal to Save Social
Media and Twitter
Are you looking to engage folks beyond the major analyst firms? Over the past
few years, companies are engaging influencers and independence analysts more
and more. However, there are some bad practices that have developed and ways
you can overcome those. Before you think about engaging influencers and
independent analysts, read this first to avoid… Continue reading 7 Ways Not
to Engage Influencers and Independent Analysts
Over the years, IT has had the ability to customize the heck out of
applications. Even the industry enabled this addiction to feature creep.
Vendors asked what new button, bell, and whistle customers wanted and then
delivered what they could. Customization became a hallmark of IT trying to
ultimately please the customer and meet their ever-changing requirements.
Custom configurations lead to the ability to do more and increase the value
of the application/ service to the user. As the number of customizations
increased, so did the level of complexity. Eventually, that very flexibil... (more)
Ok, so you’re selling technology products, solutions or services. You’re
looking for the largest buyers and typically look to the enterprise market.
You develop the strategy and start going to work. You setup a sales team,
check. You setup a channel and partner program, check. Then you start
leveraging the relationships, check. But how do you cover the consumer angle?
Huh? Yes. Using consumers as a sort of ‘Trojan Horse’ into the enterprise
In just the past few years, we’ve seen an uptick in the impact of
Consumerization of IT (CoIT) in the enterprise space. The movement ... (more)
I had the opportunity to write a post for SecureWorld Post’s site.
The role Information Security (InfoSec) is nothing new to many organizations.
InfoSec’s methods and best practices are well understood. Note I am
distinguishing between being understood and well implemented. As technology
and methods make incremental changes, InfoSec processes evolved accordingly.
And best practices become more widely understood. That is all well and good.
Then Cloud Computing comes along. Without getting into the nuances what it is
and how long it has been around, it is significantly changing the I... (more)