Is Microsoft the Caped Crusader of Email Privacy?

September 2, 2014 – 7:00 pm

2014-2-September-batman.jpg

Jumpin’ Jehoshaphat, Batman! Looks like Microsoft is defending email privacy. This, after it confirmed over the weekend that it would not be handing over email data to US federal regulators.

The decision follows a ruling on Friday by a US judge, which instructed the company to turn over email stored in Ireland to US prosecutors. But Microsoft does not plan to turn over the emails, and plans to appeal, a company spokesperson said.

Read full story…


Follow us on Twitter

Join free newsletter

View upcoming events

Find a new job

See the rest here:
Is Microsoft the Caped Crusader of Email Privacy?


Tags: , , , , , , , , , , , , , , , ,

iPipeline’s New Platform Powered by Salesforce1

September 2, 2014 – 6:45 pm

Digital marketing and sales provider iPipeline has announced an alliance with Salesforce.com that will provide sales agents across the enterprise with one-stop access to iPipeline’s integrated solutions.

The alliance means iPipeline’s new AgentOne Desktop Solution will be delivered with the Salesforce1 platform. 

The Exton, Pa.-based provider plans to arm insurance-selling agents with integrations between the Salesforce Platform, iPipeline’s marketing, selling and processing solutions and other proprietary applications. The platform will debut for enterprise-wide deployment in the late fall/early winter. 

Read full story…


Follow us on Twitter

Join free newsletter

View upcoming events

Find a new job

More here:
iPipeline’s New Platform Powered by Salesforce1


Tags: , , , , , , , , , , , , , , , ,

How Not to Build a Digital Business

September 2, 2014 – 6:14 pm

2014-02-September-Beatles-Bus.jpgHow do you become a digital business? You may discover many different paths to success on your digital journey, and even more opportunities to take a wrong turn along the way. Here are three traps to avoid, inspired by some classic Beatles songs plus a turn of phrase from Taylor Swift. Be sure you never ever get caught in these mistakes as you build your digital business.

Read full story…


Follow us on Twitter

Join free newsletter

View upcoming events

Find a new job

Read more:
How Not to Build a Digital Business


Tags: , , , , , , , , , , , , , , , ,

See the Whole Customer to Guide the Decision Journey

September 2, 2014 – 5:29 pm

2014-02-September-Watermelons.jpgThe basis of the customer decision journey is that the customer follows a decision path that leads to a purchase. Vendors provide small pokes, prods and nudges along the way, often in the form of engaging content that keeps the customer moving toward buying something. The content needs to be highly personalized and based on demographics, individual buying patterns and other aspects of the buying experience.

While “the journey” is a better metaphor than many previous ones used by marketers, especially the militaristic “campaign” or industrial “funnel,” it tends to belie the complexity of the process of turning interest into purchase.

Read full story…


Follow us on Twitter

Join free newsletter

View upcoming events

Find a new job

Originally posted here:
See the Whole Customer to Guide the Decision Journey


Tags: , , , , , , , , , , , , , , , , ,

Risk Analysis: The Missing Piece in Authentication

September 2, 2014 – 4:44 pm

Traditional identity and access management strategies aren’t enough anymore. As modern threats continue to emerge and evolve, organizations need a multitude of authentication technologies to control and grant access to their resources, including multi-factor authentication. 

Multi-factor authentication has long been a staple for “secure” access to resources. It is usually a combination of at least two of the following:

  • Something you know (e.g. password, PIN, or pattern)
  • Something you have (e.g. smart card, mobile phone, X.509 certificate, hard token)
  • Something you are (e.g. biometrics)

That makes means it is much stronger authentication than username and password alone. 

Read full story…


Follow us on Twitter

Join free newsletter

View upcoming events

Find a new job

See the original post:
Risk Analysis: The Missing Piece in Authentication


Tags: , , , , , , , , , , , , , , , ,