nDash.co is a content creation platform that provides brands and agencies with access to the world's top freelance writers.

nDash Writer Profile for Joe Michalowski

Joe Michalowski

Headline

Copywriter for the IT and tech industry

About Me

Joe Michalowski is a content writer focused on helping B2B tech companies tell their unique stories. Not just selling their products, but engaging their audience by delivering content that really solves problems.

With experience writing for audiences such as cyber security professionals, network engineers, CIOs/CISOs/CTOs, VPs of product development, and more, Joe helps companies address prospects and customers for a new generation of marketing.

Every company has a story to tell and the key to success is to tell it well. Joe can help make sure your content is getting the message across.

Industries I Write About

Computer & Network Security

Find writers and ideas in this industry

Information Technology & Services

Find writers and ideas in this industry

Telecommunications

Find writers and ideas in this industry

My Writing Samples

Blog: What Does Die Hard Have in Common with Defending the Industrial Ethernet?

A blog post discussing the shift from closed networks to Ethernet connectivity in critical infrastructure—and the effect it has on security.

http://blog.illusivenetworks.com/defending-industrial-ethernet-from-cyber-threats

Blog: Network Engineer's Guide to Reducing Mean Time to Resolution

Downtime is costly and network engineers must be able to keep MTTR to a minimum. This post tells them how they can make that happen.

https://www.garlandtechnology.com/blog/network-engineers-guide-to-reducing-mean-time-to-resolution

Blog: Service Providers: Here's How to Handle Your Problem Children

Quality of service is essential to VoIP customer satisfaction. However, every service provider has that one area of the customer environment that is constantly having problems. This post explains what you can do to handle these problem children.

https://www.edgewaternetworks.com/blog/2015/11/service-providers-heres-how-to-handle-your-problem-children/

Blog: How to Rethink the "I" in ROI—Hit the Lottery on Innovation Projects

Digital transformation is forcing companies to rethink everything they know about product development. Specifically, executives must rethink what "investment" really means in ROI.

http://by.dialexa.com/how-to-rethink-the-i-in-roi-hit-the-lottery-on-innovation-projects

White Paper: Maintaining Visibility While Implementing Port Channel Architecture

Bandwidth demands are growing out of control and enterprises can’t always migrate their infrastructures accordingly. This white paper helps companies navigate the complexities of port channel architecture to ease migration challenges.

https://www.garlandtechnology.com/maintaining-architecture-network-visibility-while-implementing-port-channel-lp

Experience

Brand Journalist - Cyber Security and B2B Technology

I write engaging content for B2B tech companies. The types of products vary, but I cover topics such as cyber security, network visibility, product development, and telecom. Whether it's short-form blog posts, long-form blog posts, byline articles, white papers, solution briefs, or ebooks, I ghost write thought leadership pieces to meet any content needs. Being able to quickly turn assignments around without sacrificing quality has helped me maintain a high level of customer satisfaction. Research has proven to be one of my greatest strengths in this position. I interview subject matter experts from various companies to truly understand their perspective on issues and frame that perspective based on well-rounded research into the industry conversation.

Company: nDash Marketing

I worked there from 8/2015 until now

Content Writer

Working as a content writer for the All Things Disc Golf website was a bit of a passion project. I was able to pitch content ideas for tournament coverage, disc reviews, and featured articles. During my time at ATDG, we were able to increase our unique visitors from under 50,000 in early 2013 to over 100,000 in just the first half of 2015. One key to this success was my ability to create engaging content for a sport that had previously received very little attention from a media perspective.

Company: All Things Disc Golf

I worked there from 1/2014 until 12/2015

Email Copywriter

Writing hundreds of emails to promote white papers and ebooks for companies such as IBM, Cisco, and Dell gave me experience in a variety of different B2B tech spaces. The email copy I wrote covered a number of different technologies, including storage virtualization, cloud computing, business applications, networking and security, and data center infrastructure.

Company: TechTarget

I worked there from 3/2015 until 8/2015

Content I Write

Ideas and Pitches I Wrote

How DevOps Has Forced Monitoring to Evolve

Increasingly demanding DevOps delivery pipelines are changing the way companies monitor their systems. Infrastructure and service monitoring have always been necessary, but DevOps has introduced new monitoring needs. In this post, we’ll cover Software Engineering Institute’s categories for monitoring targets and conclude with Datadog’s ability to take care of them all in one place.

Content type: Blog Post

Links:

Changing the Narrative Around DevOps Dashboards

Dashboards have become a necessary part of any DevOps monitoring strategy. However, it’s difficult to satisfy the needs of every stakeholder with one dashboard solution. In this post, we’ll discuss dashboard challenges from different stakeholder perspectives.

Content type: Blog Post

Links:

Are Your Engineers Satisfied with Your DevOps Monitoring Solution?

Recent research found that 70% of engineers are unhappy with their current DevOps monitoring solution. As application, infrastructure and service monitoring become increasingly complex, having unsatisfactory solutions in place won’t be acceptable. This post will cover some of the findings from the report and discuss the important factors of a DevOps monitoring solution that keeps engineers happy.

Content type: Blog Post

Links:

Which DevOps Monitoring Dashboard Is Right for You?

There’s a lot of competition in the DevOps dashboard space and it can be difficult to decide which one is right for your own needs. This post will cover 5 of the most popular solutions and compare/contrast their features. Tentatively, the dashboards discussed could be ELK stack, Graphite, Keen IO, Librato, and Datadog. We could also sub Datadog out for a different answer, giving readers greater value without making them feel they’re being “sold.”

Content type: Blog Post

Links:

Critical Metrics to Alert on for MongoDB

The in-depth monitoring articles on the Datadog blog are great for readers looking for deep technical information. We can take the article on MongoDB and break it down into the top 5 or more critical metrics to alert on for this database. This will make the information more digestible for readers looking to scan a blog post.

Content type: Blog Post

Links:

AWS ElastiCache Dashboard

It's another dashboard article, this one about AWS ElastiCache. Detailed metric breakdown and dashboard screenshot below. For this one, please make it specific to the Redis caching engine (there are two ​choices for caching engines).

Content type: Article

Links:

The Changing Face of Application Performance Management

The rise of cloud services and web applications have changed the way we think about application performance management. Performance management is about more than just uptime and root-cause diagnostics. In this post, we’ll discuss how slow is the new down and how APM has evolved to address the change.

Content type: Blog Post

Links:

Top KPIs that Every IT Manager Needs to Know to Track Cloud Service Performance

You’ve signed an SLA and you should get what you’re paying for. Don’t leave it up to the service provider to decide if your SLA is met. Track these top KPIs and get the full picture of SLA delivery.

Content type: Blog Post

Links:

The Biggest Mistakes You’re Making as a Java Developer

Java is the most popular application development language. You’re following all of the best practices, but performance isn’t cutting it. In this post, we’ll cover the common Java pitfalls that are causing application performance issues.

Content type: Blog Post

Links:

What Goes into a Cloud Services SLA?

We’ve discussed the importance of holding service providers accountable for the performance of their SaaS applications. But before all of that, you must create an SLA that benefits you as the buyer. In this post, we’ll take a look at the keys to creating an SLA that will help you keep providers accountable should issues come up down the road.

Content type: Blog Post

Links:

Your Business Apps Are Slow—What’s the Worst That Can Happen?

One second is a lifetime when it comes to application performance. But what’s the worst that can happen if you don’t have the fastest business apps? In this post, we’ll highlight the key consequences of slow apps.

Content type: Blog Post

Links:

The 3 Consumer Needs Your Digital Health Wearable Must Address

Discuss the problems with today’s digital health wearables and explain the 3 unmet consumer needs that new products must address to capture the market—durability, long-term user engagement, and value for money. As part of the value for money piece, we can talk about wireless connection, mobile phone integration, and long battery life.

Content type: Blog Post

Links:

How to Win the Digital Health Wearables Space for the Long-Term

Durability, long battery life, affordable prices—these are things consumers expect from their wearables today. In the future, it will take much more to differentiate yourself in the digital health wearables industry. In this post, we’ll talk about how gamification, cloud synchronization, and predictive analytics are essential to future success with digital health wearables.

Content type: Blog Post

Links:

How Can You Make Your Digital Health Wearable More Engaging?

Here, we’ll dive deeper in to the user engagement challenge that companies like Fitbit are facing with their users. As people abandon their wearables, companies must find new ways to create sustained interest and value. In this post, we’ll take the Technology Trends stats from the “What’s Next for Wearables?” section of the report and explain how EEG, EMG, stress, etc. are the keys to more engaging and prescriptive wearables.

Content type: Blog Post

Links:

Why Digital Transformation and Decision Management Go Hand-in-Hand

Transformation projects with decision management only start because of a business need. With the current state of digital transformation, companies in all industries are being disrupted and forced to find new ways to meet customer demands. In this post, we'll talk about the era of digital transformation and why decision management is essential to avoid disruption.

Content type: Blog Post

Links:

Transformation Projects--What Are They and How Does Decision Management Apply?

The call we had with Janet and Gil made it clear that the term "transformation project" does not have a clear, concrete definition. In this post, we can discuss the Sapiens definition of transformation projects and explain how decision management applies.

Content type: Blog Post

Links:

As Commoditization Takes Hold, Tech Marketers Must Differentiate Experiences

We’ve reached a point where product features can be replicated faster than ever. This leaves customers with a wide range of competitive products to choose from and companies can’t rely on features alone to differentiate their offerings. This blog will discuss the importance of marketing product experiences, not just features.

Content type: Blog Post

Links:

What’s Your Why? Getting to the Heart of Marketing Content

Back in January, you wrote about 3 questions marketing content should answer in 2016. The first is “why change?” Let’s follow up on that post and talk about how to actually answer this question. In this post, we can discuss how to determine the “why” of your products, drawing from Simon Sinek’s “Start with Why” lessons.

Content type: Blog Post

Links:

Bermad Launches with New Blog and New Website

The blog should contain: a brief description of Bermad, alongside what it manufactures , to serve as an introduction to new readers. An emphasis on the new site's features, such as its responsive design. Commentary on the wealth and accessibility of information for new readers on the site, with a CTA pointing at the Bermad Irrigation World.

Content type: Blog Post

Links:

Intro to Bermad Irrigation World

Introduction to Bermad Irrigation World. How to use the application, who it's targeted at, and why someone would want to use it. Major highlight: the tool highlights, in a single screen, most of the potential applications for Bermad products.

Content type: Blog Post

Links:

Technology of Dialexa

Blog post covering content from Brain Dump on 8/2

Content type: Blog Post

Links:

Hazeva Flow Limitation Case Study

Promo blog for the Hazeva case study provided by Bermad

Content type: Blog Post

Links:

Agro-Olmos Sugar Cane Case Study

Promo blog for the Agro-Olmos Sugar Cane case study provided by Bermad​

Content type: Blog Post

Links:

India Lift Irrigation Systems Case Study

Promo bl​og for the India Life Irrigation Systems case study provided by Bermad

Content type: Blog Post

Links:

China CYND Corn Systems Case Study

Promo blog for the China CYND Corn Systems case study provided by Bermad

Content type: Blog Post

Links:

X Things to Consider when Designing an Irrigation System

Based on the "What is an irrigation project" PowerPoint in Google Drive

Content type: Whitepaper

Links:

Cyber Insurance—Do You Meet the Minimum Requirements?

Despite increased spending on cybersecurity, companies of all sizes are still experiencing data breaches and security incidents in alarming volumes. As a result, cyber insurance is becoming increasingly important—but the immature market leaves insurers to customize a policy for your business. To assess risk, they’re going to look at your current cybersecurity strategy and infrastructure. This post will discuss the requirements companies must meet to become insured.

Content type: Blog Post

Links:

The Root Cause of Most Cyber Attacks? Hint: It’s Not Technology

While we might be quick to blame ineffective security appliances and applications as the reason for today’s high-profile cyber attacks, the reality is that human error is cited as the leading cause of security incidents. If we want to defend ourselves against growing threats, it’s not just about spending more money on security solutions—we have to prepare our employees. This post will discuss how attackers target employees and why you need IAM to avoid points of failure.

Content type: Blog Post

Links:

Cyber Threat Survival Guide—How to Assess Your Own Risk

Risk assessment is an essential part of any business, especially in the wake of today’s high-profile cyber attacks. However, many companies don’t know how to go about assessing their own cyber risk. In this post, we’ll discuss the need for a solid cyber risk assessment process and the essential pieces of risk assessment.

Content type: Blog Post

Links:

Do Your Employees Have too Much Access?

We know human error is a major contributor to cyber attacks. However, this idea usually refers to employees falling victim to phishing attacks on company machines. What about the AuthZ mistakes made on the IT end? In this post, we’ll cover the highlights of a Ponemon Institute report that found most employees have far more access than they should.

Content type: Blog Post

Links:

What's Next for Ransomware

Blog based on 8/17 brain dump with Shlomo.

Content type: Blog Post

Links:

Drones Follow-Up: A Closer Look at Part 107

Blog based on brain dump from 8/16

Content type: Blog Post

Links:

Personalization in the Aging Population

Content covers personalization across multiple industries--healthcare, retail/online shopping, CPG and luxury goods, and food/beverage. The focus will be specifically on personalization in the aging population.

Content type: Whitepaper

Links:

CIO's Guide to Consumerism of IT

Blog based on call from 8/23

Content type: Blog Post

Links:

Surprise—Copper Cables Still Dominate Industrial Networks

Despite the increasing popularity of fiber cables, a recent Technavio study found that the market for industrial Ethernet cables is dominated by copper (77% market share). In this post, we’ll explain why copper is so dominant in industrial deployments. We can wrap up by explaining that network designs must be able to support both types of cables simultaneously to ensure visibility.

Content type: Blog Post

Links:

Ransomware Could Get a Lot Worse—Is Your Network Ready?

We’ve talked about ransomware in the context of healthcare, but if we take a step back we can look at the higher level trends. What was once a mass-market attack vector is becoming increasingly targeted and increasingly focused on businesses. In this post, we’ll talk about the rise of ransomware and how hackers could start making data breaches more efficient by including it in advanced attacks.

Content type: Blog Post

Links:

2016 Hacks in Review--And What to Expect in 2017

This post will discuss some of 2016's most high-profile cyber attacks and cover the stats/information from IRTC's recent Data Breach Report (8/25/16). We'll also provide a forecast for 2017, specifically covering why education could be the next big ransomware target.

Content type: Blog Post

Links:

Machine Learning 101—The Technical Details eCommerce Companies Should Understand

While tech companies might have a strong handle on the inner workings of machine learning, eCommerce companies look to use machine learning solutions rather than building them. However, without an understanding of how machine learning works, it’s hard to implement it efficiently in an organization. This post will talk about structured/unstructured data and the new world of algorithms, giving retailers an overview of what they need to know before diving into machine learning.

Content type: Blog Post

Links:

2017 Digital Transformation Budget Planning

Blog based on our call on 8/30

Content type: Blog Post

Links:

Top Ransomware Families Explained

Blog post discussing the top ransomware families that illusive can protect against: CryptXXX, Cerber, TeslaCrypt, Maktub, Chimera, CryptMic, CryptFile2

Content type: Blog Post

Links:

Reverse Logistics Optimization

Blog based on 8/31 brain dump with Mike Leach

Content type: Blog Post

Links:

Minimum Viable Bureaucracy

Blog based on the brain dump with Adam on 9/1

Content type: Blog Post

Links:

The SDN Story Arc--Hype Is Becoming Reality

We've discussed the future of SDN in recent blog posts, but what about its past? For years, SDN has failed to live up to its promises, leaving many networking professionals with a sour taste regarding its practical use. This post will discuss how SDN went from serious hype to disappointment and has now started to live up to expectations.

Content type: Blog Post

Links:

Want to Take Advantage of IoT? Software-Defined Networking Might be Necessary

Digital transformation is leading companies across all industries to change their networks to support disruptors like the Internet of Things. However, traditional network architectures won't hold up as potentially millions of IoT-enabled devices are connected. In this post, we'll talk about how SDN will enable the IoT future.

Content type: Blog Post

Links:

How SDN Will Impact the Future of Network Security?

SDN is touted as a means to help networks keep up with modern, dynamic demands. However, the network management benefits come with implications on the cybersecurity side of things. In this post, we'll discuss the advantages and disadvantages of SDN on network security.

Content type: Blog Post

Links:

Are You an Empathetic CIO?

Based on 9/6 brain dump

Content type: Blog Post

Links:

Personalization for Aging Population [OUTLINE]

This pitch is for the completed outline for the Personalization for Aging Population white paper that has changed.

Content type: Whitepaper

Links:

Personalization for Aging Population In-Home Care [Content Upgrade]

This will be somewhat based on the outline we did for the Personalization for Aging Population white paper. Waiting on a call to finalize the shortened assignment.

Content type: Article

Links:

Project Management Dos and Don'ts

Blog to be revised and formatted based on Kelsey's notes.

Content type: Blog Post

Links:

SDN Is Coming: How to Maintain a Visibility Plane Through Implementation

Software-defined networking is a complicated topic; and for network architects and engineers who have been dealing with hardware-centric for decades, it could require a lot of retraining. This post can offer the SDN fundamentals these professionals should know, and explain the need to maintain a visibility plane to avoid potential disaster in the coming years.

Content type: Whitepaper

Links:

Digital Transformation at the Edge: How Telcos Can Stay Ahead of Disruption

Digital disruption will have a drastic effect on the telecom industry in the coming years. However, telcos have not been quick to embrace digital transformation as service providers try to find better ways of keeping up with digital natives. In this white paper, we'll discuss the effects of digital transformation on the telecom industry and explain how implementing intelligence at the edge can help service providers keep stay ahead of digital disruption.

Content type: Whitepaper

Links:

The Centaur--How Combined Human and Computer Intelligence Will Rule the Workplace

TechCrunch article based on our brain dump/notes from Brad.

Content type: Article

Links:

How IoT and VR/AR Collide

UploadVR article based on notes/call with Brad

Content type: Article

Links:

Cancer Immunotherapy

Blog based on 9/27 call: How do you come up with better clinical trial protocols for diagnostic tools?

Content type: Blog Post

Links:

Holiday Intro

From Idit: this blog is going to be a more general holiday blog discussing these main points on a very high level. It’s kind of introducing how these problems are magnified during the holiday season, how much revenue companies are losing and what you need to be aware of

Content type: Blog Post

Links:

How Will VR Change UX/Design? A Conversation Between Brad and Steve

Blog based on 9/29 brain dump

Content type: Blog Post

Links:

Did You Give Up on Content Marketing Too Soon?

From the ABM waste blog, we know that marketers are struggling to succeed with inbound or content marketing on their own. While we talked about the complex marketing stack as a cause for their struggles, another is a simple lack of patience. In this post, we'll offer a reality check on content marketing, ultimately concluding that a publisher/TechTarget partnership is the more effective approach for companies struggling to gain traction with their own content.

Content type: Blog Post

Links:

Marketing vs. Sales--How an Account-Based Approach Bring the Two Together

The typical gap between sales and marketing is well-documented. And yet, most companies still haven't found a solution to bring the two together. However, as account-based marketing increasingly becomes the biggest trend in marketing, sales departments are also undergoing a shift toward account-based strategies. In this post, we'll discuss how a like-minded approach to account-based marketing and selling can push the two departments to work together for more effective results.

Content type: Blog Post

Links:

The Oil and Gas Industry Is Under Attack: What Makes It So Vulnerable?

Studies show that successful cyber attacks are definitively on the rise in the oil and gas industry. We've talked about the problems with securing the industrial Ethernet, but what is causing this rise in attacks against the oil and gas industry? This post will cover the top vulnerabilities facing oil and gas companies.

Content type: Blog Post

Links:

Are Your Applications Performing As Well As They Could Be?

Cloud computing and virtualized environments have become the norm for businesses of all sizes. Despite the benefits of cloud computing, you have to be ready to change your network monitoring strategies to remain effective. Application performance monitoring with on-prem hardware just isn't the same as in virtualized environments. This post will discuss how the new cloud reality has changed APM requirements.

Content type: Blog Post

Links:

The Era of Digital Disruption: Why Now Is the Time to Master DevOps

Highly-regulated industries can't afford to lag behind the curve of digital disruption anymore. DevOps is known for collaboration and speed, but companies in insurance or finance (for example) have avoided wholesale adoption due to compliance concerns. In this post, we'll discuss how enterprises can master a DevOps balance between compliance and speed before it's too late to adapt to disruption.

Content type: Blog Post

Links:

Lifting-and-Shifting Applications to the Cloud? Don't Lose Sight of Security

Cloud migration isn't as simple as we might like. Lift-and-shift approaches to application migration can make things simpler, but if you're dealing with legacy applications there are many other things to consider if you want to maintain performance. In this post, we'll talk about the migration challenges to consider and explain why security can't fall off of your radar.

Content type: Blog Post

Links:

Data Scientist vs. Business Analyst--How the Two Work Together

For the layman, data scientists and business intelligence analysts might be one and the same. However, each position brings unique value to any organization. In this post, we'll talk about the differences between the two--and ultimately explain how automation can even the playing field for more effective collaboration.

Content type: Blog Post

Links:

The World Needs Data Scientists--Where Are They All?

The phrase is wildly overused at this point, but "data scientist is the sexiest job of the 21st century" still applies. The only problem is that we're facing a tough shortage of talent. In this post, we'll discuss the data scientists talent shortage and explain how technology is making the field more accessible than ever (link back to "Data Science May Never be the Same")

Content type: Blog Post

Links:

Infographic Text: Preparing for the Holiday Rush

Infographic based on the retail ebook, tailored to preparing for the holiday online shopping season.

Content type: Blog Post

Links:

Getting the Most Out of Your Hybrid Cloud Enterprise

Outline for ebook approved with comments. Call on Thursday 8/24 to clarify comments and then we can write based on the outline.

Content type: Whitepaper

Links:

[BROCHURE TEXT] Next Gen Endpoint Protection

Brochure text based on provided white papers and our call with Perrine on 1/26

Content type: Blog Post

Links:

[Web Copy] Finance Use Case Page

Based on reference materials in InVision and Ivy's mock up

Content type: Blog Post

Links:

The New Battlefield of SaaS

Blog based on 1/31 brain dump with Mickey

Content type: Blog Post

Links:

Planning to Cash in on an Old iPhone? Better Act Fast

This no longer has to respond to this article link provided, but should more of sharing their thoughts toward this and where they think the market is going. Also, some of the major retailers offering free iPhones for trading in their old iPhone 6 are ending very soon if they have not already. This piece should reflect more of where the market is with this now. They realize they had another piece around this, but this is taking a different angle approach to this and an update on the market.

Content type: Blog Post

Links:

Are We Back to Carrier Subsidy Models?

What does the latest VzW Promotion mean – review the past and future? This May needed to be included along with the topic above to create a fluid piece, but if it is able to stand alone that is also a good option, but would require more research.

Content type: Blog Post

Links:

New Company Positioning

Call based on the new positioning deck and conversation on 10/6

Content type: Blog Post

Links:

Regulatory White Paper (Part 2 after Transformative)

White paper based on the brain dump from 10/6

Content type: Whitepaper

Links:

Research and Designing for Business Outcomes

Blog based on 10/4 brain dump

Content type: Blog Post

Links:

Transition from Design to Build

Blog based on 10/4 brain dump

Content type: Blog Post

Links:

Dialexa Labs

Blog based on 10/11 brain dump

Content type: Blog Post

Links:

UK Insurance

Blog based on attached briefs/sources

Content type: Blog Post

Links:

Financial Services ebook Promo

Blog based on the new financial services ebook

Content type: Blog Post

Links:

Holiday Version of Retail eBook

Take the retail ebook and add a new introduction about the 2016 holiday shopping season. Then update text accordingly for holiday ecommerce tips.

Content type: Whitepaper

Links:

You're On Social, But Is It Driving Your Account-Based Marketing?

It's hard to believe there was a time that social media wasn't just a universal reality. For marketers, social channels are a requirement, not an option. However, not every marketer is using social to the best of its potential for account-based marketing. This post will explain how to optimize social efforts for ABM.

Content type: Blog Post

Links:

ABM Personalization--Are You Going Far Enough?

When we say personalization, it could be easy to get caught up in the idea of using names when addressing prospects. Account-based marketing personalization must go deeper than this. In this post, we can build off of last year's personalization blog post and put it in an ABM context.

Content type: Blog Post

Links:

There's Validation in Feeling Uncomfortable in Marketing

There's a real danger in growing complacent with your marketing efforts. Buyer attention is constantly evolving, so the product-focused advertising you ran 10 years ago won't necessarily deliver results today. Marketing strategies have to be flexible today--if you're uncomfortable, you're probably breaking the mold and getting ahead of the curve. This post will discuss the difference between comfort and discomfort in marketing strategy.

Content type: Blog Post

Links:

The Evolution of Marketing: A Difficult Relationship with History

Marketing has an interesting relationship with history. On the one hand, companies that rely too heavily on marketing strategies that used to work risk falling behind the pack. But on the other hand, today's marketing trends are often rooted in the same behavioral trends that have persisted for years. In this post, we'll talk about adapting to the evolution of marketing by balancing historical behavioral trends with the future's marketing channels.

Content type: Blog Post

Links:

Are Enough C-Level Executives Involved in Cybersecurity?

It's not too often that you can read up on technology news and not see a story about another data breach. Cyber attacks are occurring at an alarming rate, to the point that they're almost inevitable at the enterprise level. The problem is that, at many enterprises, cybersecurity hasn't reached the C-level in terms of conversation. This post will talk about the need to change that.

Content type: Blog Post

Links:

Hackers Aren't Even Trying Yet—What Happens When They Do?

With data breach and cyber attack volumes as high as they are, it's clear that hackers are having no problems compromising enterprise networks. However, one NSA official says that they aren't even trying yet—we're making it easy for them. This post will discuss the idea that hackers have much more dangerous tools at their disposal and the importance of proper data breach management in the wake of inevitable attacks.

Content type: Blog Post

Links:

Front Porch Conference Recap

Blog based on 10/25 brain dump about the Front Porch Conference.

Content type: Blog Post

Links:

Fileless Malware—Is It Any Worse Than Traditional Attack Vectors?

Companies have a hard enough time defending their networks already. Now, fileless malware is becoming mainstream to create a new wrinkle in cybersecurity. In this post, we'll discuss how fileless malware is different from standard attack vectors and why they pose a particularly big threat to businesses.

Content type: Blog Post

Links:

The Market for Mobile Exploits Is Heating Up

Remember the days when Apple products were "immune to viruses"? Those days are long gone, especially as mobile malware continues to emerge. In this post, we'll discuss the market for zero-day iOS exploits and the fact that higher prices point to the growing vulnerability of mobile.

Content type: Blog Post

Links:

Locky Ransomware Has Evolved: The Dangers of Powershell Scripting

It's no secret that ransomware is taking the cybersecurity community by storm. The real challenge is that the groups behind ransomware families are constantly updating their attack vectors. Specifically, Locky, the biggest ransomware family, has undergone a fundamental shift in its spamming to include Powershell scripting. This post will discuss the recent update to Locky.

Content type: Blog Post

Links:

Insider Threats: More Than Just Human Error

Over the last few years, human error has been cited as the leading cause of cyber attacks. But the term human error implies that these threats are always accidental. There's a malicious side to "human error" which manifests as insider threats. This post will discuss the rise of insider threats and what to do about them.

Content type: Blog Post

Links:

The Rise of Messaging in Unified Communications

It wasn't too long ago that AOL Instant Messenger was a universal phenomenon. However, text messaging and social media pushed traditional messaging by the wayside for a while. Now, messaging capabilities are a critical aspect of any unified communications solution. In this post, we'll talk about the rise of messaging and how it's becoming an essential way for businesses to communicate with customers.

Content type: Blog Post

Links:

Are You Ready for HD Voice?

HD voice isn't new. Even back in 2012, the industry was questioning whether or not communications networks were ready to deliver HD voice. Now in 2016, it's clear that HD voice has not reached mainstream adoption for business communications. In this post, we'll discuss what HD voice really is and how it can help businesses communicate better.

Content type: Blog Post

Links:

Eavesdropping Attacks Aren't Going Away

We've known that eavesdropping is a serious threat to VoIP security for years, but it's not very often that you hear about an actual attack. However, now is not the time to grow complacent with eavesdropping (or any VoIP threats). Researchers recently found a new wrinkle in eavesdropping attacks—the Skype and Type threat. In this post, we'll discuss the new iteration of eavesdropping and how to secure VoIP.

Content type: Blog Post

Links:

What's the 2020 on Procurement?

Cost reduction has traditionally been the main way procurement could bring value to an organization. While cost reduction will always be valuable, the future of procurement lies in deeper capabilities. In this post, we'll talk about the trends that will dictate procurement success in 2020.

Content type: Blog Post

Links:

Procurement Organizations Still Lagging Behind Digital Transformation

Recent research found that just 39% of enterprises have a procurement center of excellence in place. With digital transformation pushing the limits of traditional procurement, this is a problem. This post will discuss the need to embrace digital transformation.

Content type: Blog Post

Links:

Why Outsourcing Is Only a Temporary Solution to Tactical Challenges

Procurement outsourcing is a major supply chain trend as managers try to cut costs even further than they already have. The problem is that outsourcing is only a temporary answer to an ongoing need to cut costs. In this post, we'll talk about why streamlining internal procurement practices (with a solution like Vroozi) is a more effective means of meeting cost-savings goals.

Content type: Blog Post

Links:

Why Clean Data Is Everything in Analytics

You might know everything there is to know about Hadoop or have the latest data science tools at your disposal, but it's all for nought if you have bad data. Unfortunately, data scientists are spending a lot of time (and money) cleaning bad data before actually doing any analysis. This post will discuss the importance of data preparation and clean data.

Content type: Blog Post

Links:

Data Scientists vs. BI Analysts: How the Two Can Start Working Together

For the layman, data scientists and business intelligence analysts might be one and the same. However, each position brings unique value to any organization. In this post, we'll talk about the differences between the two--and ultimately explain how automation can even the playing field for more effective collaboration.

Content type: Blog Post

Links:

Thinking of Moving Your Data Warehouse to the Cloud? Read This First

This post can build off of the recent Dan Woods "What Should the Data Warehouse Become in the Cloud" article on the Attunity blog. While that post covers the ideal capabilities of a CDW, readers should also know about what Woods calls the "big decision" of moving to the cloud. This post will cover the roadblocks to building a CDW and how to overcome them.

Content type: Blog Post

Links:

5 Personal Branding Tips Courtesy of Dale Carnegie

I noticed two recent posts on the Drive Research: one covering a Dan Pink book and another talking about personal branding. In a new blog post, we can follow up on the personal branding blog by covering 5 (or more) tips from Dale Carnegie's "How to Win Friends and Influence People." I recently read the book and I think there are plenty of insights that can be put in the context of market research.

Content type: Blog Post

Links:

Ransomware and APTs: The Two Biggest Security Threats Coming Together

The recent, in-depth overview of ransomware shows just how big this security problem is for businesses. However, the problem is set to get worse as researchers are seeing ransomware become integrated into advanced persistent threats. In this post, we'll discuss the convergence of ransomware and APTs and what it means for cyber security.

Content type: Blog Post

Links:

Why Marketers Shouldn't Debate Between Inbound and Account-Based Marketing

Account-based marketing seems is the talk of the industry right now, leaving many to question whether they should be implementing ABM or inbound marketing. While the two have their differences, they have more in common than people think. In this post, we'll explain why marketers shouldn't spend valuable time debating between inbound and ABM.

Content type: Blog Post

Links:

How to (Finally) Unify Your Sales and Marketing Teams

It seems like the conversation surrounding sales/marketing alignment is in an endless loop. As more stories come out about the widening gap between the two, more stories are published about the need to bring them together—companies just haven't figured out how to solve the problem. In this post, we'll discuss the process of aligning sales and marketing once and for all.

Content type: Blog Post

Links:

Cart Abandonment Issues: Let Rudolph Guide You Through the eCommerce Storm

This is part 1 in the holiday blog series based on the infographic. Cart abandonment issues are magnified during the holiday season and companies need a more effective way to address them than offering discounts. This blog will walk through the cart abandonment issues eCommerce sites face and how to solve them.

Content type: Blog Post

Links:

Don't Let Hackers Crash Your Holiday Party

Part 2 in the holiday series based on the infographic. Cyber crime accelerates during the holiday season and can quickly dampen any holiday cheer for retailers. This post will discuss the problem with cyber crime during the holiday shopping season and how to fix it.

Content type: Blog Post

Links:

Make Your Form Fields Feel Like a Holiday Wish List This Year

Part 3 of the holiday blog series based on the infographic. Customers don't like filling out online forms—but they're a necessary evil for eCommerce sites. This post will discuss how to improve the CX surrounding online forms to make them feel less like a long day of gift wrapping and more like filling out a wish list.

Content type: Blog Post

Links:

Take the Pain Out of Holiday Shopping With Better Search Functions

Part 4 in the holiday blog series based on the infographic. Customers expect to be able to search eCommerce sites as if they're using Google. Unfortunately, many sites don't offer this level of customer experience. This blog will discuss the need for consistent search functionality and improved CX this holiday season.

Content type: Blog Post

Links:

Consistency Is the Key to eCommerce Holiday Cheer

Part 5 in the holiday blog series based on the infographic. This goes beyond search functionality—consistency is critical in all aspects of eCommerce. This blog will cover the CX issues that retailers face with consistency during the holiday season.

Content type: Blog Post

Links:

Overcoming Resistance to Managed IT Services

There's a prevailing idea that SMBs should outsource the things they aren't good at so they can focus on the things they are. This puts MSPs in a great position to succeed. However, what can you do about the SMBs that resist outsourcing? In this post, we'll discuss the reasons why SMBs resist managed IT services and how to overcome those concerns.

Content type: Blog Post

Links:

Security Holes Are Everywhere—Are You Patching Them All?

There's a reason why SMBs often turn to MSPs for IT management—they can't keep stay on top of the infrastructure and security holes that come along with its complexity. MSP or not, 44% of cyber attacks occur after a vulnerability has been identified, a symptom of improper patching. In this post, we'll talk about the dangers of improper patching and why automation can help you keep your customers protected.

Content type: Blog Post

Links:

Co-Packing Lessons Learned from Shark Tank

If you've ever watched ABC's Shark Tank, you know that there are a lot of food companies looking for funding. However, one of their greatest challenges (whether it's before or after making a deal) lies with a co-packer. In this post, we'll walk through some of the Shark Tank stories about co-packers and discuss how to overcome the common challenges.

Content type: Blog Post

Links:

4 Packaging Automation Expectations Vendors Must Meet (and Exceed)

There's a constant need for greater speed and efficiency in the packaging process. Automated packaging innovation is helping to meet these needs, but the expectations only continue to rise. In this post, we'll cover the 4 expectations for packaging automation that were uncovered at the 2016 PMMI Annual Meeting.

Content type: Blog Post

Links:

Email Dies All the Time—But It's Never Been More Important

It's tough to get through a year (sometimes even a month) without hearing that email is dead. While social media and messaging apps can take some focus away from email, the tried and true method of communication is far from dead. In fact, studies show that it's on the rise. In this post, we'll discuss why email is so important to your B2B marketing strategy.

Content type: Blog Post

Links:

Inbound vs. Content Marketing—Does It Really Matter?

You can trace the (sometimes heated) debate between inbound and content marketing back to around 2010. While those who coined the term vied for positioning amongst marketers, practitioners were left to wonder which approach was best. In this post, we'll discuss the subtle differences between the two and explain why, ultimately, the debate doesn't matter because the underlying motivation behind both methodologies is the same.

Content type: Blog Post

Links:

Alexa, Siri, and Google—Why These Voices Will Help Shape a Robotics Future

The smart home market is really starting to take shape as Alexa, Siri and Google are set to battle it out for consumer attention. For now, these assistants are really just smart voices. However, the competing voices today will shape the robotics future of tomorrow. In this post, we'll review the current state of the smart home and explain why the future is pointing towards robots.

Content type: Blog Post

Links:

CIO Leadership Challenges eBook

eBook based on the 10/25 brain dump with Russell

Content type: Whitepaper

Links:

VoIP 101: Getting Back to the Basics on Internet Telephony

One of the new keywords/phrases was "what is VoIP technology?". We have a lot of content about some technical details regarding VoIP quality and security, but nothing that specifically answers the basic question. This white paper can be a primer for VoIP technology at a time when it is finally becoming the mainstream option for companies.

Content type: Whitepaper

Links:

The Value of Softphones in Business

Research shows that desktop phones are still dominating the business world, but that will change as UC and increased collaboration become focal points of business communication. Softphone adoption is on the rise and are more in-line with modern communication demands of employees. In this white paper, we'll explore the benefits of softphones and why they will become the norm for businesses of all sizes.

Content type: Whitepaper

Links:

Hardware IoT eBook—Security

Blog based on IoT Security discussion from 11/2 brain dump

Content type: Blog Post

Links:

Hardware IoT eBook—Use Cases

Blog based on use cases for IoT from 11/2 brain dump

Content type: Blog Post

Links:

Black Friday Wishlist for Your IoT Kitchen

Blog based on Kelsey's notes on IoT kitchen appliances.

Content type: Blog Post

Links:

Think You Need a Chatbot? Try Walking Before You Run

Chatbots have been receiving a lot of media coverage as companies consider how artificial intelligence can help them improve customer engagement. However, so many companies that are looking at these chatbots haven't even embraced the value of messaging apps for their business. In this post, we'll talk about why companies need to implement a messaging strategy before diving straight into chatbots.

Content type: Blog Post

Links:

Conversational Commerce—The Next Frontier in Customer Engagement

Businesses have traditionally lagged behind consumer trends; but as tech innovation speeds up, companies have to move quicker to adapt. Messaging apps have quickly taken the place of traditional social media in terms of consumer attention and ecommerce companies, especially, must take notice. This post will talk about how messaging apps have given rise to conversational commerce.

Content type: Blog Post

Links:

Can Financial Services Companies Balance the Opportunity and Risk of Artificial Intelligence?

While machine learning and artificial intelligence are gaining traction as digital disruptors, the financial services must consider the security and compliance implications of deploying these technologies. In this post, we’ll refer to the regulation post we wrote and the potential security implications that accompany machine learning/AI in financial services.

Content type: Blog Post

Links:

Will an Online Sales Tax Ruin Your Competitive Advantage?

In the "Online Sales Tax Showdown" white paper, there are a few sections about the effects online sales taxes have had on Amazon. While some eCommerce companies might think they have a competitive advantage on price because they don't pay a sales tax, research shows price may not have that much of an impact. In this post, we'll talk about differentiating through customer experience rather than worrying about the online sales tax debate.

Content type: Blog Post

Links:

3 Ingredients for Creating Content with a Writer Community

This blog should discuss the 3 aspects of a content community: the freelance writers, the processes and the tools. The writers section should focus on hiring the best writers, the processes section should discuss who internally will manage freelancers and importance of a workflow for how content will be edited and published, the tools need are project management, communication, file sharing, meeting software like gotomeeting.

Content type: Blog Post

Links:

Freelance Writer Management Lessons from the Failure of the DeLorean Motor Company

John DeLorean left General Motors for the creative freedom of his own car company in 1975. He expected creativity to breed innovation; but his company lacked organization and structure which caused delays, disputes, and the company's eventual failure. Freelance writers offer content marketers a creative pool to draw from, but failing to put systems and guidelines in place to direct that creativity and organize content delivery will result in a similar failure for your content strategy.

Content type: Blog Post

Links:

Content Used to be King—Now Customer Experience Reigns Supreme

When marketers started to get on board with content marketing, content was king. Delivering valuable content to your target audience is still critical, but now companies are differentiating themselves through customer experience. The problem is that so many companies aren't leveraging voice of the customer (VoC) to understand the needs/wants of customers. This post will discuss the importance of VoC and proper implementation.

Content type: Blog Post

Links:

3 Ingredients for Creating Content with a Writer Community

This blog should discuss the 3 aspects of a content community: the freelance writers, the processes and the tools. The writers section should focus on hiring the best writers, the processes section should discuss who internally will manage freelancers and importance of a workflow for how content will be edited and published, the tools need are project management, communication, file sharing, meeting software like gotomeeting.

Content type: Blog Post

Links:

The Persistence of Messaging—How Chat Has Become the Universal Experience

There was a time when AOL Instant Messenger dominated consumer attention. As voice and video capabilities advanced alongside social media, instant messaging started to lose attention. However, now that mobile has essentially taken over the world, it's becoming clearer that messaging is the universal consumer experience. In this post, we'll discuss the persistence of messaging platforms and explore the context of consumer attention shifting from social media to direct messaging.

Content type: Blog Post

Links:

Trunk Club—How One Company Is Owning Its Customer Experience

In the content marketing world, there's a saying that you shouldn't build your house on rented land. That is, don't rely solely on a platform like Facebook or YouTube to build your audience—use them to draw an audience into your owned platform. This idea is permeating all industries as companies realize that surviving digital disruption means differentiating through customer experience. In this post, we'll talk about how Trunk Club is leading the charge in terms of owning customer experience.

Content type: Blog Post

Links:

Why Chatbots Aren't Enough for Your Messaging Strategy

During out discussion, we went through a few use cases for chatbots (just in time support, user acquisition, conversion). While chatbot functionality might be enough for small businesses, companies in the Fortune 1000 need to do more to own the customer experience. In this post, we'll discuss why it's important to make your messaging strategy more widespread than simply deploying a chatbot.

Content type: Blog Post

Links:

Reflections from India Live

Brain dump to be scheduled

Content type: Blog Post

Links:

Reflections from GSMA 360 North America

Brain dump to be scheduled

Content type: Blog Post

Links:

Can Society Dare to Live Without Smartphones Now?

Brain dump to be scheduled

Content type: Blog Post

Links:

Data Sanitization During Processing

Brain dump to be scheduled

Content type: Blog Post

Links:

Q3 Reflections

Brain dump to be scheduled

Content type: Blog Post

Links:

Pixl or iPhone?

Brain dump to be scheduled

Content type: Blog Post

Links:

The Great Online Sales Tax Debate—Where Do We Stand in 2016?

This post will offer an overview of the legal debate surrounding online sales tax. Information will be based on the white paper Ellen provided, "The Online Sales Tax Showdown"

Content type: Blog Post

Links:

4 Packaging Automation Expectations Vendors Must Meet (and Exceed)

There's a constant need for greater speed and efficiency in the packaging process. Automated packaging innovation is helping to meet these needs, but the expectations only continue to rise. In this post, we'll cover the 4 expectations for packaging automation that were uncovered at the 2016 PMMI Annual Meeting.

Content type: Blog Post

Links:

Co-Packing Lessons Learned from Shark Tank

If you've ever watched ABC's Shark Tank, you know that there are a lot of food companies looking for funding. However, one of their greatest challenges (whether it's before or after making a deal) lies with a co-packer. In this post, we'll walk through some of the Shark Tank stories about co-packers and discuss how to overcome the common challenges.

Content type: Blog Post

Links:

Online Sales Tax Is Coming—Are You Ready for Compliance?

The debates at all levels of government surrounding online sales tax as talks of discontinuing ecommerce exemptions heat up. Unfortunately, the challenges associated with online sales tax are far more complicated than with brick-and-mortar stores. In this post, we'll discuss some of the challenges retailers face when it comes to applying appropriate tax laws.

Content type: Blog Post

Links:

What Is Nexus? And What Does it Mean for eCommerce Retailers?

The legal concept of nexus—when it's necessary to apply tax regulations to remote customers—is an important piece of the online sales tax debate. In this post, we'll explain what nexus is and discuss how eCommerce companies must deal with evolving tax laws to remain compliant.

Content type: Blog Post

Links:

TechCrunch Byline: Innovation in the World of Design

This byline is based on the brain dump call with Steve from 11/14.

Content type: Blog Post

Links:

Blog Promoting Regulatory White Paper

Blog content based on the finished Regulatory WP

Content type: Blog Post

Links:

Blog Promoting Regulatory WP (2)

Second blog promoting the Regulatory WP

Content type: Blog Post

Links:

Manufacturing Is In a Slump—How to Reduce Opex and Stay Afloat

2015 was a down year for manufacturing and 2016 hasn't shaped up to be much better. It's not enough to watch the oil and gas industry and hope that things turn around—process manufacturers must do more to maintain their bottom lines. In this post, we'll talk about the current manufacturing slump and how process optimization can reduce Opex to help manufacturers see continued success.

Content type: Blog Post

Links:

Pharma Manufacturing Is Getting More Demanding—How to Stay Ahead

The pharma industry can't afford to be stagnant anymore. Consumer expectations are growing in terms of treatment effectiveness and affordability. Today's manufacturing processes won't be sufficient for tomorrow's treatments. In this post, we'll talk about the 2020 outlook of the pharma industry and why manufacturing processes must change.

Content type: Blog Post

Links:

Mainframe Offloading Web Page

Web page based on the completed solution sheet and discussion on 11/18

Content type: Blog Post

Links:

Challenges for CIOs as Company Grows/Changes Rapidly

Blog based on 11/18 brain dump

Content type: Blog Post

Links:

Does Your Tech Roadmap Have a Financial Roadmap?

Blog based on 11/18 brain dump

Content type: Blog Post

Links:

Multi-Factor Authentication Is the Norm—How Is It Affecting Digital Forensics?

Multi-factor authentication has been a significant advancement in terms of mobile security. However, as investigators adapt to increasing cloud usage, they face a number of challenges when trying to acquire information for a case. In this post, we'll discuss two-factor authentication as it applies to Android devices and how it affects the field of digital forensics.

Content type: Blog Post

Links:

SDN White Paper Update

Updating the existing Garland white paper on software defined networking. Call scheduling with Chris TBD

Content type: Whitepaper

Links:

Financial Services ebook Update

We need to go through the financial services ebook and update the text so it speaks more to the UK rather than the US.

Content type: Whitepaper

Links:

Broadsoft Recap

Blog based on Rosa's notes from her time at the Broadsoft event this year.

Content type: Blog Post

Links:

Trunk Club Story

Blog based on the conversations Ben and I have had regarding Trunk Club's relationship with Layer. The main idea here is that Trunk Club was able to cut out communication friction to create a better experience between the consumer and Trunk Club.

Content type: Blog Post

Links:

3 UK Financial Services Disruptors You Can Learn From

This blog will promote the UK version of the financial services ebook. In this post, we'll discuss three different disruptors in the industry—Metrobank, Atom Bank, and Guevera—and what traditional firms can learn from their digital successes.

Content type: Blog Post

Links:

Fake News Is More than Misinformation—What to Do If You're Infected by Malvertising

This blog will be based on Tim O'Neill's "New Types of Bait Attacks" notes. We'll talk about the growing problem of malvertising, especially in the context of emerging fake news sites and recent election targeting. Protecting yourself (and your employees) from malvertising is important, but we'll also offer advice on what to do if PCs are infected.

Content type: Blog Post

Links:

2016 Mobile Trade-In Trends

Blog based on the trade-in data that Hyla sent

Content type: Blog Post

Links:

Smartphones Are the New TV—What Gary Vee Taught Us at Inbound 2016

Gary Vaynerchuck's opening keynote at Inbound 2016 was all about the shift we're experiencing from TV attention to smartphone attention. In this post, we'll recap some of the lessons we learned about marketing in this new reality (even if you're in the B2B space).

Content type: Blog Post

Links:

Debating Between Inbound and ABM? There's a Bigger Picture

Every company wants the silver marketing bullet that will propel them to the forefront of their market. In 2009, Hubspot's inbound marketing methodology exploded in popularity and has become a mainstay for all kinds of industries. Today, ABM is the hot marketing trend and people are wondering whether they need an inbound strategy or should be doing AMB. In this post, we'll explain why this is the wrong question to be asking and discuss the bigger picture that requires a combined approach.

Content type: Blog Post

Links:

Can Influencer Marketing Work for Your Business?

Aside from maybe account-based marketing, influencer marketing is the biggest trend in the industry. The hype surrounding influencer marketing is tempting, but some marketers wonder if it will really work for their unique business. In this post, we'll discuss the benefits of influencer marketing for all companies, ultimately concluding that strategy is the key to success.

Content type: Blog Post

Links:

Office 365 Is Stressing Enterprise Networks: Are Your Employees Suffering?

Migrating to Office 365 isn't the same as when you used to upgrade to the latest version of Microsoft Office. Cloud-based Office 365 brings with it many new complexities for enterprise networks and the last thing you want to do is have those complexities impact end user experience. In this post, we'll discuss Office 365's impact on your network and how to make sure your employees are experiencing peak performance.

Content type: Blog Post

Links:

Office 365 Is Stressing Enterprise Networks: Are Your Employees Suffering?

Migrating to Office 365 isn't the same as when you used to upgrade to the latest version of Microsoft Office. Cloud-based Office 365 brings with it many new complexities for enterprise networks and the last thing you want to do is have those complexities impact end user experience. In this post, we'll discuss Office 365's impact on your network and how to make sure your employees are experiencing peak performance.

Content type: Blog Post

Links:

Why Remote Troubleshooting Is a Must-Have for Today's Packaging Machinery

In the perfect world, we'd never have to worry about the reliability of packaging machinery. Equipment would run smoothly at all times. But we all know reliability is a key concern for manufacturers looking for the right machines. Troubleshooting is a fact of life, but you want maintenance to happen as quickly as possible. In this post, we'll discuss the costs of machinery maintenance and explain why remote troubleshooting is important for minimizing costly truck rolls and gaining efficiency.

Content type: Blog Post

Links:

Deep Dive on Current State Analysis

Blog based on 12/2 brain dump with Russell

Content type: Blog Post

Links:

The Current State of Food Loss—And Where Packaging Comes into Play

Did you know that about one-third of food produced globally is wasted every year? This isn't just food that consumers throw away—it includes food that is lost along your supply chain. As food demands increase, we have to find ways to reduce food loss. In this post, we'll discuss the current state of food loss and explain how packaging innovation helps (specifically, linking back to the recent technical blog on MAP).

Content type: Blog Post

Links:

Still Relying on SPAN Ports? 3 Reasons to Stop

There was a time when SPAN ports offered a reliable means for connecting security appliances and monitoring solutions to your network. However, today's demands have outpaced the capabilities of SPAN ports—but so many IT leaders still rely on them. In this post, we'll cover 3 (maybe more) reasons why you have to move on from SPAN ports.

Content type: Blog Post

Links:

Top 5 Challenges when Deploying In-Line Security Appliances

To say that cybersecurity is a major enterprise concern would be an understatement. But this isn't a problem you can solve just by spending more money on security solutions. You have to implement them in a way that ensures total visibility. In this post, we'll explain the 5 biggest challenges for security professionals implementing new appliances on their networks.

Content type: Blog Post

Links:

Death by a Thousand Paper Cuts—The True Value of Conversion Rate Optimization

Ecommerce leaders understand the revenue implications of site downtime—every second of downtime is a second that could result in a sale. But what about the small problems that disrupt subsets of your customers and hurt your conversion rates? In this post, we'll discuss the value of even marginal improvements in conversion rate—and how to start eliminating those small problems.

Content type: Blog Post

Links:

AWS re:Invent Theme Recap

Blog based on 12/8 brain dump with Luke.

Content type: Blog Post

Links:

Russia's 2016 Election Hacks—Major Implications for an Age-Old Problem

The world is rightly concerned about the recent news about Russia's involvement in recent election hacks. The global implications are being explained by every major media outlet as the CIA and FBI search for answers. But underneath all of the news coverage lies an age-old cybersecurity problem—phishing and attacker persistence. In this post, we'll discuss the context of the election hacks and emphasize the need for network visibility.

Content type: Blog Post

Links:

Scott's End of Year Message

Blog based on notes from Scott's year in review

Content type: Blog Post

Links:

Why VoIP Hacking Is Still Relevant

With high profile data breaches at some of the world's largest companies grabbing headlines over the past few years, it's easy for telecom companies to lose sight of the dangers of VoIP hacking. Although VoIP hacking isn't the most popular type of attack, it is certainly an issue that service providers must tackle. This white paper will dive deeper into the blog topic we wrote about what hackers get from VoIP attacks.

Content type: Whitepaper

Links:

Russia Is Setting Its Sights on Germany's Election—Lessons Learned from America's Struggles

The world is abuzz with concerns about Russia's meddling in the recent US election. But America isn't the only country struggling with Russian interference. After the German Parliament in May 2015, the country now fears Russia is setting its sights on the 2017 German election. In this post, we'll discuss the lessons Germany can learn from the US situation and how to prepare from visibility and computer forensics standpoints.

Content type: Blog Post

Links:

2017 Predictions

Blog based on the video of Dialexa employees 2017 predictions.

Content type: Blog Post

Links:

Overcoming Performance Monitoring Fears when Adopting VoIP in Call Centers

As companies move more applications to the cloud, communications systems remain largely on prem. VoIP is gaining steam in the business world, but companies must be ready to adopt hosted services for their call centers moving forward. In this post, we'll discuss some of the fears that are holding people back from adopting VoIP, specifically touching on how more effective monitoring makes hosted services more approachable.

Content type: Blog Post

Links:

Growing Revenue with Accessories and Trade-Ins

Blog based on 12/19 brain dump with HYLA

Content type: Blog Post

Links:

Russia Settings Its Sights on Germany's Election—Lessons Learned from America's Struggles

The world is abuzz with concerns about Russia's meddling in the recent US election. But America isn't the only country struggling with Russian interference. After the German Parliament hack in May 2015, the country now fears Russia is setting its sights on the 2017 German election. In this post, we'll discuss the lessons Germany can learn from the US situation and how to prepare from visibility and computer forensics standpoints.

Content type: Blog Post

Links:

Don't Be Selfish When Thinking About Marketing Clouds

Marketing cloud technology is on the rise, but what are you focused on when choosing a solution? Marketing clouds are meant to solve the trickiest issues marketers face, but sometimes we might focus on our own issues instead of customer issues. In this post, we'll discuss the basics of marketing clouds and the core capabilities you should be looking for in a solution to ensure you're focusing on the customer experience, not your own.

Content type: Blog Post

Links:

Can Financial Services Benefit from Marketing Clouds?

While cloud technology and SaaS solutions are taking over every industry, financial services firms have been slower to adapt. While security, risk, regulation, and privacy are all significant concerns, a Royal Bank of Scotland case study proves that financial services firms are willing to implement SaaS for certain cases. In this post, we'll talk about how marketing clouds can help financial services firms.

Content type: Blog Post

Links:

Customer Journey Mapping vs. Customer Experience Analytics for Omnichannel Banking

Comparing customer journey mapping with CXA might seem like an apples-to-oranges situation, but when discussing omnichannel banking there's an important distinction to make. Understanding the customer journey is important for companies in any organization to understand their users. But in this post, we'll discuss why CXA is necessary to map these journies for omnichannel banking efforts to be flexible and responsive enough to succeed.

Content type: Blog Post

Links:

How Feasible Is SDN in 2017?

Since SDN reached peak hype in 2013, every year seems to bring a new delay in an SDN reality. While we've talked about the need for SDN by 2020, how feasible is SDN implementation moving into 2017? In this post, we'll stop looking ahead and assess the current state of SDN as data centers move to 40G and 100G speeds.

Content type: Blog Post

Links:

Network Functions Virtualization—What Is It and Why Should You Care?

For a couple of years, we've had blog posts covering software-defined networks and the future of SDN technology. But we haven't discussed its companion technology, NFV, at all. In this post, we'll introduce NFV to the Garland Technology readers and discuss how it affects network visibility as we move closer to an SDN world.

Content type: Blog Post

Links:

Network TAPs or Packet Brokers for Software-Defined Networks?

Network visibility for software-defined networks is an entirely new challenge for architects that are accustomed to traditional approaches to data center design. As 40G and 100G go mainstream and SDN becomes a reality, architects must know whether network TAPs or NPBs will serve them better. In this post, we'll discuss how TAPs and NPBs work together to ensure visibility in the SDN era.

Content type: Blog Post

Links:

ROBO Problems—Avoiding Truck Rolls to Your Remote Offices

Whether you're a large enterprise, a retailer with multiple brick and mortar stores, or any other multi-location company, you know cloud applications are both a blessing and a curse. They let your remote employees work efficiently, but any network or application failure can prove devastating. In this post, we'll talk about the inefficiency of traditional truck rolls and why remote end user experience management is a must-have for lowering costs and improving response times.

Content type: Blog Post

Links:

Are Your End Users Haunted By Ghosts?

Every IT team has experienced it—employees complain about performance issues, but you check things out and everything is running smoothly. It might seem easy to just dismiss these problems, but they might be having a major effect on productivity and, ultimately, your company's bottom line. In this post, we'll talk about the need for continuous monitoring to get rid of the ghosts in enterprise networks.

Content type: Blog Post

Links:

Pull Your Remote Offices Out of the Shadows

Shadow IT has been a problem for enterprises for years and it's only getting worse. As employees rely more on cloud services and applications, remote offices will become increasingly riddled with Shadow IT challenges. In this post, we'll talk about the need for integrated systems to combat the effects of Shadow IT.

Content type: Blog Post

Links:

Skype for Business Enablement—Can You Really Replace Traditional Telephony?

The promises of greater efficiency and lower costs are enough to entice any business to at least look at cloud-based Skype for Business as a communications solution. But for companies that rely on phone systems as mission critical pieces of the business, it might not seem reliable enough to move away from traditional telephony. In this post, we'll discuss the holes that exist with Skype for Business and how to fill them.

Content type: Blog Post

Links:

What's in Store for Tomorrow's Communications Service Providers?

It's no secret that the communications landscape is changing rapidly. With unified communications and collaboration apps and cloud-based services gaining traction, service providers need to find new revenue streams to avoid being displaced by new competitors. In this post, we'll review findings from a report about what tomorrow's communications service providers will look like.

Content type: Blog Post

Links:

Where Will Microsoft Teams Fit into the Unified Communications and Collaboration Landscape

We used to talk about whether or not companies would adopt VoIP. Now, we're at a point where VoIP is a foregone conclusion and unified communications and collaboration is the new frontier. While Slack has disrupted the industry, Microsoft Teams will be rolling out soon. This post will discuss where it fits into the UCC market.

Content type: Blog Post

Links:

SOCIAL: Messaging Best Practices Guide

Hourly project doing social for the Messaging Best Practices Guide. 6 hours at $50/hr. See source link for completed Google Sheet.

Content type: Blog Post

Links:

Top Software Tools at Dialexa

Blog based on 1/6 brain dump with Samer

Content type: Blog Post

Links:

January Fluff Piece

Based on Kelsey's notes

Content type: Blog Post

Links:

Walk Before You Run—Why Digital Transformation Starts with Backend Systems

Disrupt or be disrupted seem to be the two options for enterprises today as agile companies eat into longstanding market share. While it might seem important to jump right into the next big technology, early adoption won't help you much if your backend processes don't support greater agility. In this post, we'll talk about the need for better enterprise performance management (walking) before taking off with successful digital transformation (running).

Content type: Blog Post

Links:

Dialexa's Top Software Development Tools

Based on 1/5 brain dump with Samer

Content type: Blog Post

Links:

Web Copy Edits (1)

Spent 2.5 hours reviewing Layer slide decks and branding points to then go through copy on the new home page and retail vertical page. Pitch price at the $50/hr rate. See InVision for comments on copy.

Content type: Blog Post

Links:

Digital Intelligence Webinar Promo

Just getting the record in for the "Building a Customer Insights Driven Business through Digital Intelligence" webinar promo.

Content type: Blog Post

Links:

Minimum Testable Feature

Blog based on the 1/11 brain dump with Ben.

Content type: Blog Post

Links:

Q4 Mobile Trade-In Data Review

Blog based on the infographic with Q4 mobile trade-in data.

Content type: Blog Post

Links:

Why Businesses Hire Dialexa

Blog based on 1/17 brain dump

Content type: Blog Post

Links:

2017 CES/AT&T Dev Summit Review

Blog based on 1/20 brain dump

Content type: Blog Post

Links:

Get the Data You Want Part 1: HIPAA Compliance Challenges in the Face of Data Breaches

This blog will be based on our discussion with Darrick about HIPAA compliance as data breaches in the healthcare industry continue to challenge organizations moving to electronic health records. Reference Identity Theft Resource Center stats and Darrick's examples.

Content type: Blog Post

Links:

Get the Data You Want Part 2: Solving PCI and DSS Compliance Issues with an MSSP

This blog will be based on our discussion with Darrick about PCI and DSS compliance in the context of MSSPs. We know that the financial sector has always been a prime target for cyber attackers, which is why PCI and DSS compliance is so strict. Focus on Darrick's examples and comments as well as the existing Sedara blog.

Content type: Blog Post

Links:

Get the Data You Want Part 3: How the Education Industry Can Benefit from MSSPs

Education is the next soft target for hackers. However, government-funded 1G/10G networks don't have the necessary security tools to protect institutions. Use Darrick's comments and examples to explain where MSSPs can help with filtering, aggregating and load balancing.

Content type: Blog Post

Links:

The Rise of Digital Performance Management—Get Marketing and Technology on the Same Page

Although marketing and eCommerce technology are intertwined behind the scenes, they've never had a tool that brings them together. APM helps the technology functions and CEA helps marketers—but we need more. This post will discuss the rise of digital performance management (DPM) and how it differs from traditional APM and CEA.

Content type: Blog Post

Links:

The Current State of VR/AR Hardware: What to Expect in H2 2016

Current sales of the Rift vs Vive. When and how we see the Oculus Touch being released, and when will XBox first release a game with the VR hardware and who will they choose.

Content type: Blog Post

Links:

Machine Learning and Its Application to CX for Financial Services

Financial services companies are already lagging behind in terms of delivering exceptional digital customer experiences with mobile and online interfaces—but now machine learning is being used by industry players to improve customer experience. In this post, we’ll talk about why financial services companies should be paying attention to advancements in machine learning/AI as new opportunities to improve customer experiences emerge.

Content type: Blog Post

Links:

Can Google Become a True Force in Business Communications?

This blog will be based on the comments that came out of Edgewater's September blog on Google Allo/Duo/Hangouts. We'll focus on Gernot's comments on where Microsoft and Google differ in communications and the potential "in" Google has for competitive business communications.

Content type: Blog Post

Links:

Friction Between CMOs and CIOs—4 Scenarios that Digital Performance Management Can Solve

In Ellen's white paper, there are 4 scenarios that explain friction between CIOs and CMOs when web analytics and APM are in silos. In this post, we'll walk through those 4 scenarios, building on the first DPM post which focuses more on introducing the definition of DPM.

Content type: Blog Post

Links:

Customer Obsession—Using Digital Performance Management to Drive Your Business

In the Application Note about DPM, there's a section about linking performance to business/customer outcomes. Additionally, actionable insight is a key piece of DPM, which fits into UserReplay's messaging. In this post, we'll focus on the fact that companies need to become obsessed with their customers. Without DPM to help drive a differentiated customer experience, you risk falling behind the competition.

Content type: Blog Post

Links:

Removing Customer Experience Friction—The Top Banking Trend for 2017

This blog will be based on the article from The Financial Brand that covers top 10 banking trends for 2017. We'll focus on the fact that removing customer experience friction is the top priority for the industry—which is made especially clear as the remaining trends will help do so. If financial services firms want to keep up with competition, they have to take this trend seriously.

Content type: Blog Post

Links:

Why Account Origination Fraud Is Getting Worse

Account origination fraud is nothing new for the banking industry. However, instead of the situation getting better, it's only getting worse. Omnichannel efforts are making it harder to keep account origination fraud down and current defense measures aren't cutting it. In this post, we'll cover the neustar research that explains the account origination fraud problem and the typical strategies that aren't working.

Content type: Blog Post

Links:

Resolving the Account Origination Challenge in Online Banking

A follow-up post to the first covering neustar's research. This one will focus on the solution to the account origination problem mentioned in the first post. We can add to the report's findings by talking about the need for effective customer experience analytics as well as machine learning to counteract fraud.

Content type: Blog Post

Links:

Moving to the Cloud? Here are 3 Challenges You'll Face

The cloud is meant to simplify your business. Whether you're reducing operating costs or looking to cut down on the complexities of an on premises data center, public cloud providers and SaaS solutions can help. However, the cloud comes with its own complexities—and they'll be more visible to end users than traditional IT issues ever were. This post will discuss the 3 main challenges with cloud infrastructure.

Content type: Blog Post

Links:

5 Steps to Total Cloud App Control During Migration

Apps are moving to the cloud and IT is on the hook for any problems that may arise. During the migration process, it's easy to lose control of apps, which leaves end users to experience performance issues. In this post, we'll discuss the steps necessary to stay in control of app performance and the end user experience during migration.

Content type: Blog Post

Links:

9 Packaging Machinery Events You Don't Want to Miss in 2017

We're already a month into 2017 and many companies might be behind on their travel plans for events this year. In this post, we'll offer a list of 9 major packaging events that readers should keep an eye on this year. I'll include at least one that focuses on each industry listed on your home page.

Content type: Blog Post

Links:

Industrial Internet of Things—Theory Becomes Reality in 2017

The rise of automation has been clear in the machining world, but the Industrial Internet of Things (IIoT) has been a bit more theoretical to this point. We've seen innovation, but in 2017 practicality will be the focus. In this post, we'll discuss the rise of IIoT as a standard rather than a theory as we move forward into 2017 and beyond.

Content type: Blog Post

Links:

Advanced Persistent Threats—The Next Security Frontier for Service Providers

We've talked a lot about VoIP security in the past. But we're moving even further than VoIP toward unified communications and loading the data network with even more comms traffic. While spoofing and eavesdropping were once major concerns, there's a new frontier of cybersecurity challenges. In this post, we'll explain advanced persistent threats to service providers and stress the need for security

Content type: Blog Post

Links:

How Unified Communications Drive Business Value—If We Do It Right

Unified communications is far from perfect. But being patient with potential UC solutions will pay off in the end. As the way we communicate changes, UC has the potential to drive serious business value (rather than just being another application for a business). In this post, we'll talk about the value of UC if it is deployed and managed correctly (with NEO).

Content type: Blog Post

Links:

SIP Trunking or Hosted PBX? Can You Really Go Wrong?

As companies look to upgrade their communications systems for more modern features, hosted PBX and SIP trunking are two popular options. In this post, we'll discuss the pros and cons of each option and explain why the choice depends on your unique situation—but should always include an assessment of the vendor's deployment model.

Content type: Blog Post

Links:

Are Team Collaboration Apps Doomed from the Start?

Slack, HipChat, Microsoft Teams, Cisco Spark—the list goes on and on. These group collaboration apps have been heralded thus far for communications, but are they doomed to fall out of favor already? In this post, we'll talk about the growing skepticism surrounding these platforms and explain why a more holistic solution will win the market.

Content type: Blog Post

Links:

[Web Copy] WEF Case Study Page

Based on reference material Ivy sent

Content type: Blog Post

Links:

It's About More Than Pixels

Blog based on 1/31 brain dump and notes

Content type: Blog Post

Links:

[WEB COPY EDITS] Messaging Best Practices Pages

4 hours of work on the Messaging Best Practices Guide pages at $50/hr.

Content type: Blog Post

Links:

[WEB PAGE] Copy for Airline Page

Based on the information in the Layer decks and the outline Ivy sent

Content type: Blog Post

Links:

Managing 5 Types of Stakeholders in the Design Process

Based on brain dump with Sarah 2/2

Content type: Blog Post

Links:

SECCDC Event Sponsorship [Title TBD]

This blog will be the first in the SECCDC series announcing the upcoming event and Garland's sponsorship. The details will come from Herb's insight and we'll include a quote or two from our conversation. If there's anything you want to include that we didn't cover, just let me know!

Content type: Blog Post

Links:

The Current State of Smartphones—The Rise of Used Devices and Recycling

Blog based on all of the data HYLA sent on smartphones/used devices/recycling. Just a working title, but I'll go through all of the data and write up a post for them (no need for a call I don't think).

Content type: Blog Post

Links:

European VoIP Summit Promo

Blog based on the European VoIP Summit overview (UK spelling necessary).

Content type: Blog Post

Links:

Network Edge Orchestration (Frost & Sullivan Report)

In this post, we'll look at some of the highlights from the Frost & Sullivan report on network edge orchestration. CTA will be to download the full report.

Content type: Blog Post

Links:

SaaS, IaaS, or PaaS? Which Cloud Service Is Right for You?

It seems like everything is getting the "as a service" treatment these days. The question has gone from "should we move to the cloud" to "how should we move to the cloud?" In this post, we'll give an overview of your three main migration options—SaaS, IaaS, or PaaS. And stress that continuous monitoring is essential regardless

Content type: Blog Post

Links:

[WEB COPY] Web Summit Case Study Page

This page will be based on the Paddy recording as well as information from the company that will fit into our case study page guideline.

Content type: Blog Post

Links:

Day in the Life (Software Team)

Blog based on 2/10 brain dump

Content type: Blog Post

Links:

Smart Cities ebook

Based on brain dump calls and Kelsey's research

Content type: Whitepaper

Links:

3 Cloud Providers, One Monitoring Goal

Whether you're looking at AWS, Azure, or Google Cloud Platform for your cloud computing needs, successful migration will be determined by one main objective—continuous performance monitoring. In this post, we'll discuss the unique monitoring needs of each platform and why continuous monitoring has to be the universal goal.

Content type: Blog Post

Links:

What Are Containers and What Do They Mean for App Performance?

Containers have been one of the biggest trends in cloud computing for a few years now. In this post, we'll explain what exactly containers are. But more importantly, we'll explain how containers are affecting cloud application performance. In the end, improvements in performance don't mean you can neglect monitoring.

Content type: Blog Post

Links:

New Smartphone Plans Creating Billions in Risk for Carriers

Update to existing blog post

Content type: Blog Post

Links:

Stopping Fraud Before It Can Hurt Your Mobile Device Trade-in Program

Update to existing blog post

Content type: Blog Post

Links:

Espionage Barbie? Tech Toys Bring Whole New Meaning to Youth Privacy

Did you know there was a Cat Burglar Barbie in 2009? This may have raised theoretical security concerns 8 years ago, but a new crop of tech-enabled toys are bringing a whole new meaning to youth privacy conversations. In this follow-up to the VTech hacking blog, we'll discuss the current state of security concerns for connected toys. We'll use Tim's insight into just how scary IoT security can be—and why companies must be more vigilant with security visibility.

Content type: Blog Post

Links:

test

test

Content type: Blog Post

Links:

Hourly Work Invoice

4.5 hours of work at $50/hr: web copy edits, press release review/edits, minor assignments like working with Ivy to create new quote for Co-Founder of Cola

Content type: Blog Post

Links:

Why Application Performance Monitoring Is Quietly Failing You

For almost 20 years, application performance management tools have been saviors for IT departments. Without them, early waves of digital transformation would have been nearly impossible to stay on top of. But for the IO teams that rely on APM, minor improvements to solutions are no longer enough. If you haven't noticed, the Golden Age of APM is over—and we'll let you know why it's time to get on board with DPM.

Content type: Blog Post

Links:

Looking for 2017 Application Performance Management Trends? You're Not Thinking Big Enough

At the end of 2016, APM Digest released a 4-part series on 2017 application performance management trends. This is a great series complete with 40 predictions from IT leaders. However, we'll pick out a few and explain why "APM trends" is actually just a short-term way of thinking of the emerging DPM discipline.

Content type: Blog Post

Links:

Layer for Marketers Solutions Page

Web copy based on Ivy's PowerPoint slides and our Skype discussion

Content type: Blog Post

Links:

What Is a Cloud Broker?

I noticed the new set of resources on the AppNeta website about cloud brokerage. I thought it would be a good idea to spend this month talking about the topic to support these resources. This first blog will be a basic introduction to cloud brokerage and why it's important for enterprises.

Content type: Blog Post

Links:

What's Driving the Need for Cloud Services Brokerage?

Beyond just what the CSB model is, enterprises need to know why they should care. I liked the stats in the AppNeta infographic. We'll use these and some outside resources to discuss what's driving the need for cloud services brokerage.

Content type: Blog Post

Links:

Navigating the World of Outsourced Cloud Services

Shadow IT is a growing concern, but it will never be solved if 78% of business leaders continue to feel that IT teams lack the skill to help with cloud purchases. To change these feelings, you have to start small. In this post, we'll discuss some of the popular cloud services to outsource and which services you should prepare to outsource as technology advances.

Content type: Blog Post

Links:

[Web Copy] Layer for Support Page

Solutions page for customer support based on call with Ivy

Content type: Blog Post

Links:

How Marketing Automation Can Help Bridge the Sales/Marketing Divide

The gap between sales and marketing is well documented. And yet, that divide still exists in many organizations. While marketing automation has many benefits for marketing departments themselves, it's important to look at how adoption benefits sales as well. In this post, we'll discuss how marketing automation can help drive efficiency in the sales/marketing relationship.

Content type: Blog Post

Links:

Throwpoint Mini Case Study

Invoice for the completed Throwpoint case study

Content type: Blog Post

Links:

Jen Sanders on Smart Cities

Blog based on 3/9 brain dump

Content type: Blog Post

Links:

Webinar Recap Blog

Blog recapping some of the key points from the webinar, pointing to the on-demand version as a CTA.

Content type: Blog Post

Links:

Serverless Computing—The Next "as a Service" Offering

Serverless computing is being touted as the future of cloud computing. Also called Function as a Service (FaaS), this is yet another "as a Service" offering to add to your cloud computing arsenal. Much like containers, FaaS benefits are directly related to developers. But in this post, we'll paint the bigger picture for IT managers and explain why monitoring still isn't going anywhere.

Content type: Blog Post

Links:

How to Manage a Mix of Hybrid Cloud and Multi-Cloud Environments

When you look at the terms "hybrid cloud" and "multi-cloud" it's easy to believe they're the same thing. But thinking this way could lead to a management nightmare if there are problems in your architecture. In this post, we'll explain the difference between hybrid cloud and multi-cloud environments. And we'll discuss the need for cloud-to-cloud monitoring to avoid potential management disasters.

Content type: Blog Post

Links:

Market America Case Study

Case study based on the webinar recording between 35:00 and 45:00. Draft must be delivered by 3/13

Content type: Article

Links:

[WEB COPY] Hotels/Hospitality Page

Web page based on previous industry copy and the sources Ben sent via email

Content type: Blog Post

Links:

Beware Industrial Internet of Things Attacks—The Dark Side of Connectivity

Industrial Ethernet connectivity is more of an expectation today as companies aim for greater agility and efficiency. And now beyond Ethernet connectivity, network admins have to contend with the Industrial Internet of Things (IIoT). In this post, we'll cover survey results that show IT leaders expect a rise in IIoT attacks and discuss the danger in the context of October's big internet outage.

Content type: Blog Post

Links:

7 Challenges for Industrial Internet of Things Adopters

Everything is "smart" now. But as we've seen time and time again, increased network connectivity comes with an increased risk of cyber attack that many business leaders would prefer to forget. As the Industrial Internet of Things (IIoT) comes to fruition, network admins and security professionals should keep a few challenges in mind. In this post, we'll cover some of the key roadblocks to success with industrial connectivity.

Content type: Blog Post

Links:

Which Cable Is Right for Your Industrial Ethernet?

For companies just starting the Industrial Ethernet journey, choosing the right cables is a major step. In this post, we'll cover some old tips for selecting the right cables for your specific Industrial Ethernet needs and ultimately explain why networks TAPs are essential for a strong architecture.

Content type: Blog Post

Links:

It's Not Wiretapping—It's Network Tapping

This post will be based on our conversation with Randy (and will be in his voice). A bit more lighthearted than other posts with some tongue-in-cheek reference to the recent Tump wiretapping claims. The main point being that wiretapping is an outdated term at this point—network tapping is the modern reality.

Content type: Blog Post

Links:

A Primer on Customer Insights Driven Business

This white paper will tackle the information laid out in the recent digital intelligence/customer insights webinar. The main idea will be the importance of becoming a customer insights driven business. But the white paper will also go into the various components of a digital intelligence strategy (including an explanation of how digital performance management fits into the picture among other key pieces of technology).

Content type: Whitepaper

Links:

Webinar Recap Rewrite

Update based on client feedback

Content type: Blog Post

Links:

Used Mobile Device Market—iPhone 8 Release Impact Predictions

Blog to be written after call with Chintan

Content type: Blog Post

Links:

Cellular Pricing Just Got More Complicated for Consumers and Risky for Carriers

Update to existing blog post

Content type: Blog Post

Links:

Journey of a Used Smartphone

Blog to be written after call with Dave Ronis. "This is an idea I came up with for a long-form blog which we'll turn into an infographic or a Slideshare which discusses the journey of a used smartphone, starting from trade-in, processing, etc, all the way to 3rd world countries, enterprises using refurbished phones, etc. It needs to illustrate how a smartphone can start out in the US and end up in the hands of a farmer in South America or in multiple other places."

Content type: Blog Post

Links:

Mobile Device Insurance Market

WP to be written after call with Rebekah Griffiths and Karl Media

Content type: Whitepaper

Links:

Web Summit Blog

Blog based on our Web Summit case study

Content type: Blog Post

Links:

Messaging in Minutes [Amar Edits/Social]

Invoice for the work on Amar's Messaging in Minutes post

Content type: Blog Post

Links:

Channel Company: Ingram Solution Brief

Delivered on 4/26

Content type: Blog Post

Links:

Finovate Recap

Blog based on the notes and bullet points from Michael. Will be finished for 5/4 publishing

Content type: Blog Post

Links:

Low Code vs Custom

Based on 5/25 brain dump with Samer. Posting on 6/8

Content type: Blog Post

Links:

Rewrite: How Proper Mobile Device Disposal Leads to a Sustainable Future

Rewrite of old blog based on Rebekah's edits/comments.

Content type: Blog Post

Links:

Industry.co Customer Success Story

Customer success story based on Voxeet writing (see email)

Content type: Blog Post

Links:

Staples Case Study/Web Page

Following the Trunk Club customer page example, write up a case study for the Staples story based on the conversation with Alex and the existing success story.

Content type: Blog Post

Links:

Market Report: Looking at the North American UC Opportunity

White paper based on research and discussion from John.

Content type: Whitepaper

Links:

The Past and Future of Voice Interfaces

Blog based on discussion with Ben about how voice assistants are just a component of a larger messaging conversation. Due 8/2

Content type: Blog Post

Links:

Trusted Customer Story

Delivered 8/29

Content type: Blog Post

Links:

MWC Recap

Blog delivered 9/22

Content type: Blog Post

Links:

Invoice for Emails 1-4

4 emails @ $100 each. The first two were updated directly in Constant Contact. The third and fourth were sent via email in Word doc. Let me know if you need anything!

Content type: Blog Post

Links:

Content Update: Part 2: Transforming Mobile Trade-Ins for the Retail Market

Update to old blog

Content type: Blog Post

Links:

Content Update: Part 3: Transforming the Mobile Insurance Market with Mobile Buy Back Solutions

Update to old blog

Content type: Blog Post

Links:

Content Update: Part 4: Transforming Mobile Device Buyback with Mobile Technology: OEMs

Update to old blog

Content type: Blog Post

Links:

Welcome to the Smart Grid—Time to Set Up Your Security Devices

This blog will cover the real problem for utility companies looking to make headway in the smart grid. The question: "how do I connect my security devices?" Using Chris' insights, we'll talk about how network TAPs fit into the smart grid market.

Content type: Blog Post

Links:

[ebook] Bridging the Sales/Marketing Gap with Marketing Automation (Title TBD)

This ebook will build out on the blog pitch about the sales/ marketing gap. Once we've finished all brain dumps/interviews, I can put together an outline and start writing the larger piece. Targeted for mid-April

Content type: Whitepaper

Links:

Sorting Conversations [MBP 2]

Second blog based on the Messaging Best Practices Guide, this one focusing on sorting conversations.

Content type: Blog Post

Links:

Single vs. Multi-Threaded Conversations [MBP 1]

Blog based on the Messaging Best Practices Guide focusing on single vs. multi-threaded conversations.

Content type: Blog Post

Links:

Event Bios/Descriptions

Filling out the 4 questions for Finovate and EyeforTravel company bios/solution descriptions.

Content type: Blog Post

Links:

MBP 3: Conversation Details

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 4: Avatars

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 5: History Access

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 6: Search

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 7: Sending Messages

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 8: Background Receive

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 9: Delivery & Read Receipts

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 10: Typing and Activity Indicators

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 11: Present in Application

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 12: Last Seen

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 13: Present in Conversation

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 14: Poor Connectivity, Offline and Airplane Mode

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 15: Offline History

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 16: Push Notifications

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 17: Deep Linking into a Conversation

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 18: Badging

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 19: Notification Actions

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 20: Quick Reply

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 21: Wearable Quick Reply

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 21: Wearable Quick Reply

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 22: In-app Notifications

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 23: Missed Messages, Email and SMS Fallback

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 24: Text Messages and Emojis

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 25: A GIF Is Worth a Thousand Pictures (and Then Some)

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 26: Photos, Videos and Audio

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 27: Stickers

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 28: Location, Maps and Points of Interest

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

MBP 29: Mini Applications as Rich Media Cards

Next blog in the Messaging Best Practices series

Content type: Blog Post

Links:

Journey of a Used Smartphone

Blog based on call with Dave

Content type: Blog Post

Links:

CIO Superheroes—Driving Revenue in Digital Transformation

IT has always been seen as a cost center. You're upholding the infrastructure that drives business—it's important, but you don't exactly drive sales. But today's CIOs have an opportunity to be business heroes and be the difference between market disruption and successful digital transformation. In this post, we'll discuss the new link between the CIO position and the ability to drive revenue through customer experience.

Content type: Blog Post

Links:

How to Get Java and Mainframe Developers Speaking the Same Language

Old school vs. new school. It's not often they work seamlessly together. But when you're dealing with digital transformation in a legacy-laden enterprise, you have no choice but to make it work. It's time to get your java developers and mainframe developers speaking the same language. This post will reference the Dilbert Legacy Feature cartoon and discuss the need for a solid API strategy to bridge the gap in your organization.

Content type: Blog Post

Links:

Waterfall vs. Agile—We Have Bigger Problems Now

It wasn't long ago that a CIOs biggest problem seemed to be the decision between waterfall and agile development/organization. However, the challenge has elevated beyond that standard debate. You might think the answer is easy—waterfall is dead and agile is on the rise. In reality, you need both in your organization. In this post, we'll discuss the blend of legacy and modern infrastructure in the context of the waterfall/agile debate.

Content type: Blog Post

Links:

Speed Can't be the Enemy in Banking Anymore

Digital transformation is sweeping through every industry. Companies of all shapes and sizes have no choice but to keep up with modern consumer/customer demands. This means addressing needs before competitors. However, the banking industry has thrived on glacier-like movement—moving fast was just asking for compliance and security challenges. In this post, we'll explain why speed isn't an option anymore for legacy and compliance-heavy industries, but it doesn't have to be daunting.

Content type: Blog Post

Links:

The Slippery Slope of Innovation

We like to think that we've evolved from yesterday's legacy infrastructure. We've moved on from mainframes over the years to the point that microservices are the new trend. But we all know legacy systems don't evolve—they persist in the background even if you're adding more agile components to your infrastructure. In this post, we'll talk about the challenges of adding modern infrastructure on top of legacy systems and how to make legacy an advantage, not a liability.

Content type: Blog Post

Links:

[WEB COPY] Tree of Life Homepage

Copy invoice for the "Tree of Life" copy we discussed on the phone. Delivered via email on 4/5

Content type: Blog Post

Links:

Blending Synchronous/Asynchronous Communication [Ben]

Blog based on Ben's discussion points about messaging, voice, and video—going from asynchronous to synchronous and back again. To be published 4/14

Content type: Blog Post

Links:

It's Time to Make Cloud Management a Real Practice

The term "cloud management" sounds simple enough. After all, if you use the cloud you must do some sort of cloud management, right? Not exactly. There's more to cloud management than you might expect. In this post, we'll offer an intro to all things cloud management.

Content type: Blog Post

Links:

The Simple Checklist for Solving Ghost Issues at Remote Locations

Ghost issues are problematic enough when they're occurring on premises. But as we've talked about before, they're even worse when they're occurring at remote locations. In this post, we'll build off of the "Are Your End Users Haunted by Ghosts?" posts and offer a simple checklist for troubleshooting.

Content type: Blog Post

Links:

Is On-Premises Obsolete?

When people discuss legacy, on-premises applications today, it's often about how they're a liability. While some companies might be perfectly happy to move forward with just about every application in the cloud, enterprises may not be as lucky. As you try to support growing remote locations, the cloud often seems like the obvious choice—but sometimes on prem is necessary. In this post, we'll discuss compliance "showstoppers" that could derail migration and how to get past them.

Content type: Blog Post

Links:

Why IT Pros Need Map-making Skills

Digital transformation is the buzz term haunting every large enterprise's dreams. If you have a sprawling networking covering many remote locations, becoming more agile can seem like a daunting task. But it doesn't have to be if IT has the right skills. In this post, we'll define infrastructure mapping and discuss how the right solution can make IT look like map-making pros.

Content type: Blog Post

Links:

Q1 2017 Mobile Trade-in Data

Blog based on data that Sanida sent

Content type: Blog Post

Links:

Engineering Intro (Edits/Updates for Kevin)

Blog is delivered with social, just invoicing.

Content type: Blog Post

Links:

Earth Day Metrics

Blog based on Sanida's Earth Day notes

Content type: Blog Post

Links:

3 Reasons Personalization Isn't Boosting Engagement the Way You'd Hoped

We expect a lot out of personalization. We've been told that the more we can personalize the customer experience, the more engaged our customers will be. But that's only if we execute properly. In this post, we'll introduce the benefits of personalization and explain the 3 ways that businesses are missing the mark. The next post will follow up on this first one to explain the personalization toolkit and how to fix these 3 issues.

Content type: Blog Post

Links:

The Personalization Toolkit—Your Secret Customer Engagement Weapon

A follow up to the first blog on personalization pitfalls, this post will focus on building a person-first program with the right personalization toolkit. Specifically, we'll explain that UserReplay is a key piece of the toolkit and why strong customer engagement hinges on proper customer experience analytics.

Content type: Blog Post

Links:

The Buying Process Is Still Emotional—Should We Forget About Data?

Marketers spend so much time worrying about data. How much can we collect? What will it tell us about our customers? How can we use it to drive greater business results? And yet, the buying process is just as emotional as it always has been. In this post, we'll talk about the need to balance consumer emotion with our thirst for data if brands want to differentiate themselves.

Content type: Blog Post

Links:

Customer Experience Crossroads—Where Insights Meet Engagement

We've talked a bit about digital intelligence and how customer experience analytics fits into the conversation. But in this post, we'll take a slightly different approach to the topic. This blog will explain how systems of insight and systems of engagement come together to form effective digital intelligence that can drive business.

Content type: Blog Post

Links:

Why the General Data Protection Regulation Doesn't Have to Crush Customer Experience Analytics

You've spent so much time trying to collect as much customer data as possible. And now the GDPR is on its way and it seems like additional privacy regulations will hamper your insights-driven business. However, the GDPR doesn't have to ruin your customer experience analytics. In this post, we'll talk about what GDPR means for customer insights and why a solution with ISO 27001 support can help you handle both sides of the equation.

Content type: Blog Post

Links:

Concierge Commerce [Ben]

Invoice for the blog post out of Ben's notes on Concierge Commerce

Content type: Blog Post

Links:

Get More Out of Your Online Testing Techniques

Customers expect to have access to your brand through many different digital touchpoints. And because of this expectation, we work relentlessly to make sure we're offering the most frictionless digital experiences possible. While online testing techniques like A/B testing and MVT might be sufficient from a technical standpoint, you need more. In this post, we'll talk about how companies can strengthen online testing with customer insights.

Content type: Blog Post

Links:

EyeforTravel

Blog based on our discussion of the upcoming travel event

Content type: Blog Post

Links:

Finovate

Blog based on our discussion about the financial services event.

Content type: Blog Post

Links:

Rush Charge for GDPR Blog

Invoice for the remaining cost of the rushed GDPR blog for 4/24

Content type: Blog Post

Links:

Channel Company: Ingram Landing Page

Due 5/1

Content type: Blog Post

Links:

Channel Company: Ingram Infographic

Due 5/3

Content type: Blog Post

Links:

SD-WAN—Is It Really the Remote Location Saving Grace?

As digital transformation turns businesses upside down, legacy IT infrastructures are being pushed to their limits to support remote workers/locations. Cloud applications are making it easier to support these locations, but they come with their own challenges. While SD WAN technology is touted as the key to scaling remote location support, is it really a saving grace? This post will talk about the gaps IT needs to fill for SD WAN technology to reach its potential for remote location monitoring.

Content type: Blog Post

Links:

Don't Get Lost in the Hype—Cloud Isn't Always Cheaper

Don't get us wrong, the cloud is a great way to gain cost efficiency in business. But be careful—cloud computing isn't always cheaper. In this post, we'll cover some of the unexpected problems that might pop up and make the cloud more costly than you expect: migration costs, hidden usage fees if you're not paying close attention to billing/SLAs, etc.

Content type: Blog Post

Links:

How to Bring Your Call Center into the 21st Century

Call centers aren't excused from the wave of digital transformation that's overtaking businesses of all shapes and sizes. And yet, so many call centers are falling behind technology (and failing to meet customer expectations). In this post, we'll talk about some key technology that can bring your call center into the 21st century—voice, video, speech analytics, natural language search, smart agents (and anything else I can hunt down).

Content type: Blog Post

Links:

Do You Have Empathy for Remote Employees and Offices?

We talk a lot about how to make life easier for IT leaders. But when you're looking at remote location monitoring, the real challenge isn't just technical—it's maximizing end user experience. This means having empathy of your end users and the performance problems they face every day. In this post, we'll connect the role of IT to some of the typical remote employee challenges. I'll keep it focused on tech-related challenges!

Content type: Blog Post

Links:

Is Written Content Dead for Lead Generation?

As audio and video content continues to garner attention, it’s hard to avoid the question—is written content dead? This question needs to be put in perspective. Just because people are consuming more content on YouTube or listening to more podcasts doesn’t mean you have to derail your entire lead generation system. In this post, we’ll talk about the importance of written content for lead generation—and how audio/video can complement it for demand generation.

Content type: Blog Post

Links:

Demand Gen vs. Lead Gen—Why You Need Both for Account Based Marketing

If you take a look around the internet, you’ll find plenty of content that use demand generation and lead generation interchangeably. However, the two aren’t the same. In this post, we’ll lay out the differences between demand generation and lead generation and explain why both are necessary pieces of a solid account based marketing strategy.

Content type: Blog Post

Links:

What Tech Marketers Need to Know About Machine Learning and Artificial Intelligence

Just because marketers work for tech companies doesn’t mean they’re experts in machine learning and artificial intelligence. And yet, marketers are inundated with promises that machine learning and AI will take their efforts to the next level. There are posts about how predictive analytics will improve purchase intent data, but this post will take a step back and explain what marketers need to know about how ML and AI work.

Content type: Blog Post

Links:

Are We Becoming Numb to Cyber Attacks?

A story came out recently about a hack that resulted in leaked episodes of an upcoming Netflix release. A few years ago, this could have been a catastrophe—but Netflix is basically shrugging off the event and moving forward. What's changed? In this post, we'll consider whether or not companies are becoming numb to cyber attacks and why we can't be so nonchalant in the face of ransomware attacks.

Content type: Blog Post

Links:

Backup vs. Disaster Recovery—Complements Not Replacements

Backup and disaster recovery are critical components of a business continuity plan. But they can be expensive, which has led to business leaders trying to choose between one or the other. As companies rely more heavily on distributed and virtual technologies, the gaps between backup and disaster recovery are becoming clearer. In this post, we'll talk about how the two complement each other for modern business continuity and get people to stop thinking they can get by with just one.

Content type: Blog Post

Links:

Flexibility in the Cloud: The Benefits of Custom-fit Infratructure

For all of our strategizing and careful planning, business can be pretty unpredictable. But when you're investing thousands of dollars in on-premises infrastructure, you can't afford any unpredictability. In the age of digital transformation, on-prem restrictions can't be tolerated. In this post, we'll discuss the benefits of flexible cloud infrastructure for companies that are looking to remain agile in the face of rapid industry change.

Content type: Blog Post

Links:

Cyber Security Is a CEO Problem

CEOs can't keep their distance from cyber security challenges anymore. It would be nice to offload security measures to the IT department, but there's too much at stake. Today, the CEO who doesn't take cyber security seriously has everything to lose. In this post, we'll look at how CEOs are suffering the consequences of data breaches and explain why now is the time to take security seriously as a top level management concern.

Content type: Blog Post

Links:

EyeforTravel Recap

Blog based on Jamie's bullets from EyeforTravel event. Completed 5/3

Content type: Blog Post

Links:

Interactive Voice Response Problems

Blog based on 4/28 brain dump about IVR problems and why messaging is the better approach.

Content type: Blog Post

Links:

Don’t Get Lost in Predictive Analytics Hype—3 Challenges You Might Face

Predictive analytics can combine data mining, machine learning, and AI to help business make more informed decisions. But as marketers, we have to avoid getting lost in the promise that predictive analytics will give us the keys to driving demand and generating leads. In this post, we’ll talk about the rise of predictive analytics and 3 (maybe more) challenges marketers might face as they work it into their technology stack.

Content type: Blog Post

Links:

Overnight Success Story

Blog based on notes from Ivy/Overnight CEO. Delivered 5/4

Content type: Blog Post

Links:

[EMAIL] Stylist/Sales Perspective

Email campaign #5 (see screenshot from Ivy via email)

Content type: Blog Post

Links:

Book a Tiger Success Story

Blog based on Ben's notes on Book a Tiger story. See Google doc for notes

Content type: Blog Post

Links:

test pitch 2

test pitch 2

Content type: Blog Post

Links:

test

test

Content type: Blog Post

Links:

Take the Mystery Out of Digital Purchase Intent

A TechTarget post from 4/11 explained the need for quality editorial content when capturing purchase intent. But even when companies believe they’re publishing great content, there’s an air of mystery to digital purchase intent data. Rather than focusing on clicks and page views, we need to dig deeper for valuable purchase intent insights. In this post, we’ll talk about how predictive analytics pairs with editorial content to create a foundation of intent data that drives business decisions.

Content type: Blog Post

Links:

Customers Are People—Not Just Accounts

I recently walked by the ferry building in San Francisco and saw this poster by a well known bank. There is so much truth in this statement. In fact, the term is customer experience and not account experience.A real customer experience means putting the customer in the center and then wrap everything else around it. May that be getting the person to be your customer, interacting with the person physically or digitally, or servicing the person as your paying customer.

Content type: Blog Post

Links:

Computers Give You Algorithms. Humans Give You Experiences

Over the weekend, I read this article about how Goldman Sachs has been quietly changing the employee base mix to let computers do what they do best - processing large amount of data and people what they do best - building relationships. This hybrid approach to providing financial management gives customers the accuracy on the trade but the human touch to build relationship and trust.

Content type: Blog Post

Links:

Third-Party Developers—Helpful or Hurtful for Your Skype for Business Deployment?

Microsoft is in an all-out battle to catch up to Amazon. At the recent BUILD conference, Microsoft explained why its massive reach in the business world will help it gain an edge—and it's using that advantage to push new capabilities to its products. Skype for Business is set to open itself to third-party developers with the new Cortana Skills Kit. In this post, we'll talk about what that means for Skype for Business performance within a business

Content type: Blog Post

Links:

Does Skype for Business Really Improve Workplace Productivity?

We're bombarded with so many new tech releases that it can be difficult to separate the marketing hype from the products that will truly impact your business. There's plenty to read about Skype for Business, but the question remains—will it make your employees more productive, or is it just Microsoft's way of keeping up with competitors? In this post, we'll explain the main productivity benefits of Skype for Business.

Content type: Blog Post

Links:

Blog Edits: Layer UI for Web and Tenor

Invoice for 2 blog edits and social

Content type: Blog Post

Links:

MWC Event Descriptions

Two event descriptions for Mobile World Congress. One 200 words and one longer description (1,000 words max).

Content type: Blog Post

Links:

Stop Taking WiFi for Granted

We take wifi networks for granted. But the reality is that for distributed businesses, WiFi is a major IT challenge. As we rely more and more on our wifi networks, it will become increasingly difficult to maintain the end user experience. In this post, we’ll discuss the toll slow wifi can take on business productivity and the challenges IT faces as they try to track and maintain performance. I can build off of the main wifi blog post from Oct 2016.

Content type: Blog Post

Links:

Bots Are Coming to Office 365—Will They Hurt Performance?

At the recent Build conference, Microsoft doubled down on its commitment to artificial intelligence. However, the bots aren’t a new product. Rather, the Bot Framework is set to extend to many existing products, including Skype for Business and Office 365. In this post, we’ll discuss some of the advantages of having access to the Bot Framework, but provide a word of warning that they could become bandwidth-intensive and hurt app performance.

Content type: Blog Post

Links:

Edge Computing—Are We Stressing About the Cloud for Nothing?

With all the buzz around Internet of Things and mobile technology, the IT community is starting to pay more attention to edge computing. However, some are going as far as to say that edge computing will replace the cloud. Don’t worry—the cloud isn’t going anywhere. In this post, we’ll introduce edge computing and explain how it will impact business networks.

Content type: Blog Post

Links:

Customers Already Dislike Call Centers—Don’t Make It Worse

It’s no secret that customers dislike call centers. However, there’s no way to avoid them in some situations. The worst thing you can do is make the experience even less desirable by delivering sub-par call quality. But your remote office likely doesn’t have many (if any) IT workers on site and real-time quality assurance can be a problem. In this post, we’ll look at some call center quality issues and how IT can troubleshoot more effectively.

Content type: Blog Post

Links:

Influencer Marketing—The Best Bang for Your Business Buck Right Now

Influencer marketing is all the rage right now. But many business leaders don't want to test the unfamiliar waters, choosing to stick with ineffective advertising campaigns to get in front of customers. However, not every influencer costs hundreds of thousands of dollars per post like Kendall Jenner. In this post, we'll discuss why influencers are the best investment if you're strategy is done right.

Content type: Blog Post

Links:

The Value of Enterprise Trade-in Programs

Blog based on 5/25 brain dump with Scott

Content type: Blog Post

Links:

Dubizzle Customer Success Story

Success story based on notes/links sent by Ivy

Content type: Blog Post

Links:

Most Wonderful Time of the Year

Based on call with Scott 7/15

Content type: Blog Post

Links:

Open Letter to Retail [Justin Forte]

This post will be based on my discussion with Justin about how retail can compete against the likes of Amazon.

Content type: Blog Post

Links:

Digital Transformation Series Intro

Introductory blog for an upcoming series around digital transformation in mobile trade ins. Intro based on call with Sanida on 6/1

Content type: Blog Post

Links:

Why Set It and Forget It Won't Work for Unified Communications

Network traffic has always been difficult to monitor, but at least communications traffic was a separate challenge altogether. But with VoIP and video solutions becoming the norm, the network is more complicated than ever. This means we can't take a set it and forget it approach to unified communications. In this post, we'll talk about the top challenges that make proper VoIP/video monitoring a necessity.

Content type: Blog Post

Links:

The Current State of Software-Defined Networking in 2017

It's finally here. When SDN reached peak hype in 2013, every year felt like a new delay in real-world enterprise execution. And while people often talk about the 2020 of its potential (us included), it's important to look at where we are now in terms of software-defined networks. In this post, we'll talk about the commitment some companies have already made with SDN and how SD-WANs are proving to be good introductions for a more software-defined enterprise.

Content type: Blog Post

Links:

Product Post: Layer dashboard with role based access control

The Layer Dashboard is the hub for working with Layer’s services and managing your applications. The dashboard includes organizations with a role-based access control system, that allows administrators to control access to critical data and settings. You can also invite new users into your organization and manage user access. More information can be found here.

Content type: Blog Post

Links:

Product Post: Typing Indicator support for delayed messaging

Typing Indicator support for delayed messagingWhen sending messages through Layer’s Server API on behalf of a bot (or a real user), there may be times when immediate delivery will feel too abrupt to the recipient. It’s a dead giveaway that it’s not coming from a real person. In order to make artificial responses feel more realistic, you may want to simulate the time it normally takes a recipient to process something, start typing, and eventually send a reply.

Content type: Blog Post

Links:

Product Post: Presence

Presence allows a user to see that other users are online, and either available, busy, away or offline. With presence, businesses can identify users who are active within the application and are open to engaging. It also allows users to convey that they are available to have a conversation.

Content type: Blog Post

Links:

7 Unexpected Data Security Risks You Need to Address

There's a fundamental problem with the way we approach data security risks. We look at reports of the most common causes of breaches and shore up those gaps in our own systems. But we should be looking at it from the attacker's point of view—what are the data security risks that fly under the radar? The ones that attackers can exploit before they're addressed? In this post, we'll explain 7 (# TBD based on research) unexpected holes in data security.

Content type: Blog Post

Links:

Customer Experience in Trade-In Programs

Based on 4/11 call

Content type: Blog Post

Links:

Accolade Customer Story

Blog based on all of the Accolade Google Docs and conversation with Ben. Delivered 6/16

Content type: Blog Post

Links:

Trade-In Benefits Go Beyond New Devices

Based on 4/11 call

Content type: Blog Post

Links:

Did We Forget About Marketing with Small Data?

Big data and predictive analytics are driving some of the biggest decisions in tech marketing today. However, as data gets bigger and bigger, it seems that we’re forgetting about the importance of small data. In this blog, we can talk about what small data is and the role it will play in the world of big data-driven marketing.

Content type: Blog Post

Links:

Best Practices for Scaling a UC Business

WP based on brain dump and materials from Tim Dentry

Content type: Whitepaper

Links:

Maximize Trade-In Program with Data Analytics

Based on 4/11 call

Content type: Blog Post

Links:

TWAMP Blog

Blog based on the brain dump that covered TWAMP. This is the first introduction and we can do more topics from here.

Content type: Blog Post

Links:

The BYOD Reality—Staying Business as Usual in IT

It's been nearly a decade since the BYOD term was coined and enterprises are still having trouble with consumerized IT. Even if you've recognized that the workplace is changing and have implemented a BYOD policy, are you effectively maintaining business-as-usual IT? This article will walk through the business impact of BYOD, the employee productivity benefits of an IT-supported program, and the challenges of staying business as usual in the IT department.

Content type: Article

Links:

SD-WAN or WAN Optimization? Why This Question Doesn’t Cut It

Enterprise IT teams have been trying to optimize WAN performance for years. There are plenty of solutions that have come and gone, but is SD-WAN the replacement for WAN optimization needs? Not quite. Regardless of where you stand in the discussion, one thing is clear—we need to maximize application performance at remote locations. In this post, we’ll discuss where WAN optimization and SD-WAN intersect and ask a bigger question—how do you know if your efforts are working?

Content type: Blog Post

Links:

Holding Out Hope for SDN? How to Enforce QoS in the Meantime

When it comes to technology, it seems there’s always a delay between innovation hype and practical implementation. And there’s no better example than SDN, which was supposed to take the world by storm in 2013 and still isn’t mainstream. One of the greatest advantages of SDN is automated QoS enforcement, which is great for IT. But what do you do before SDN gets here? This post will talk about QoS enforcement for the average enterprise IT team dealing with remote locations.

Content type: Blog Post

Links:

Beware Managed SD-WAN Services

We’ve talked about the rise of SD-WAN and what it can (and can’t) do for enterprise IT. And if you’re reading all of this and saying, “can’t someone take this headache away from me?”, managed SD-WAN services might sound like the perfect solution. But are they really best for your business? In this post, we’ll talk about how managed SD-WAN services came to be and whether or not they make sense for you.

Content type: Blog Post

Links:

Living on the Edge (of Your Network) to Optimize Remote Locations

The latest trend in IT reporting is to say that cloud computing is giving way to edge computing. But even if you aren’t quite ready to pay attention to this challenge, the edge of the network is still critical for your company. Ever since enterprises opened up their networks to ISPs, the edge has been the front door to IT networks. Now, you have to make sure you stay in control of the edge—especially when you’re supporting remote locations.

Content type: Blog Post

Links:

When Guest WiFi Is Unusable, What’s the Point?

How many times have you tried to use the WiFi at a retail shop or hotel only to find that it was basically unusable? This isn’t just because the log in process is complicated—sometimes it’s just so slow that you can’t get anything done. Guest WiFi is an expectation, but if it’s unusable what’s the point? In this post, we’ll talk about the challenge of supporting robust guest WiFi and how to stay on top of it.

Content type: Blog Post

Links:

Industrial Internet of Things—Blessing or Curse for Security?

For OT operators that come from the world of private networks, the wave of Industrial Internet of Things adoption can seem like a security nightmare. But is IIoT technology actually poised to make critical infrastructure more secure than in the past? This is a chicken-and-egg situation that might not have a solid answer. However, this post will look at the history of OT security vulnerabilities and explain why IIoT is in a position to fill holes (if implemented correctly).

Content type: Blog Post

Links:

Preparing for the Convergence of IT and OT

For years, the IT/OT separation has been a lot like the marketing/sales separation. Two departments are striving for business success, but with two very different philosophies. While IT has taken the burden of consumerization head on, OT leaders have been content to run Windows XP and old software because constant patching will just lead to interruptions and security vulnerabilities. Now, OT and IT are coming together. This post will discuss what OT leaders can learn from IT.

Content type: Blog Post

Links:

Patch Management—A Growing Concern for Industrial Security

Uptime and availability are the chief concerns for OT networks. That’s why equipment is only meant to be replaced once every 20 years or so. However, there’s no way OT leaders can patch once per quarter (or less) at a time when security risks are at an all-time high. In this post, we’ll talk about the need for better patch management and how that starts with a detailed understanding of device inventory and maintenance logs.

Content type: Blog Post

Links:

Service Providers, You’re Looking at the SMB Market All Wrong

This is drawn from the NA non-adopters report we’re working on. The blog will explain why service providers need to stop thinking of SMBs in a single bucket and start thinking of them in tiers (broken out by EWN research). This can help promote the WP once it’s done.

Content type: Blog Post

Links:

What’s the Real Unified Communications Value Prop?

One thing we learned from the EWN research is that there’s no single problem that is prompting a switch to UC. It would be easy if traditional phone systems were so difficult to manage and UC alleviated that pain. Instead, service providers need to understand what value they’re actually selling. Promote the WP once it’s done.

Content type: Blog Post

Links:

VARs Leaving Money on the Table in the Unified Communications Market

The market potential for UC is nearly $27 billion. Unfortunately, EWN research shows that VARs just aren’t poised to win this market right now. The problem is that there’s a disconnect between what SMBs need and what VARs are offering. In this post, we’ll explain the opportunity for VARs to capitalize on business leaders who are upgrading to UC.

Content type: Blog Post

Links:

7 Keys to Scaling a Unified Communications Business

The number isn’t set in stone, but this will pull from the Scaling UC white paper we worked on. I can cover the idea that automation is key and that when it’s implemented correctly, it opens UC technician resources up for higher value tasks while menial tasks are done at scale. Once the new WP is published, this can point to it.

Content type: Blog Post

Links:

NEO Core Functions Demo 1: Sales/Marketing

based on Tim Dentry's sales demo

Content type: Blog Post

Links:

NEO Core Functions Demo 2: GUI and Functional Area

based on Tim Dentry's sales demo

Content type: Blog Post

Links:

NEO Core Functions Demo 3: GUI Walkthrough

based on Tim Dentry's sales demo

Content type: Blog Post

Links:

NEO Core Functions Demo 4: Provision/Installation

based on Tim Dentry's sales demo

Content type: Blog Post

Links:

NEO Core Functions Demo 5: Operations and Maintenance

based on Tim Dentry's sales demo

Content type: Blog Post

Links:

NEO Core Functions Demo 6: Troubleshooting

based on Tim Dentry's sales demo

Content type: Blog Post

Links:

Celebrating First iPhone Trade-in

Based on brain dump scheduled for 7/24

Content type: Blog Post

Links:

To Repair Or Not to Repair

Based on 7/24 brain dump

Content type: Blog Post

Links:

The Best Time to Trade in Your Old Device

Based on 7/24 brain dump

Content type: Blog Post

Links:

Conversational Commerce: Making It a Reality at Scale

People have been calling for the rise of conversational commerce in recent years. There are plenty of successful use cases, but that doesn't mean implementing a strategy is a simple task (especially if you're a massive, traditional retailer). In this post, we'll talk about striking the right balance of human and AI interaction to scale conversational commerce—even if you're an incumbent retailer trying to compete with smaller, more agile competition.

Content type: Blog Post

Links:

The True Cause of the Sales and Marketing Gap

It's a well-known problem even for the biggest brands in the world—there's a gap between sales and marketing. We know that both departments need to be on the same page to drive business success, but making that happen can be easier said than done. But what's the real root cause of miscommunication and finger pointing? In this post, we'll talk about the common gap between sales and marketing and explain why it's important to unify data from each side to become more effective.

Content type: Blog Post

Links:

How to Turn Customer Data into Fool-Proof Content

There's a reason why companies pursuing content marketing only publish short, high-level content—they don't want to invest time into in-depth content that doesn't work. The problem is that so many marketers just blindly come up with ideas because they saw a competitor write something similar. In this post, we'll talk about how you can turn concrete customer data into content ideas that are sure to strike a chord with your target audience.

Content type: Article

Links:

What White-Box and Brite-Box Mean for Your SDN Deployment

One strength of the Big Switch networks solutions (according to the Gartner report) is its use of white-box and brite-box switches. This is important for true SDN deployments, but what does it mean for visibility? In this post, we'll talk about the market trend toward white/brite boxes and the importance of proper connectivity when your SDN solution uses them.

Content type: Blog Post

Links:

IPv6 Is Here—Can Your WAN Keep Up?

We've just about run out of IP addresses for new connected devices under the IPv4 protocol. The IETF stepped in and introduced IPv6 to open enough IP addresses for years to come. But there's a catch—can your WAN actually handle a flood of newly connected devices? In this post, we'll talk about the new IPv6 reality and how IT leaders can prepare themselves for an inundation of bandwidth challenges

Content type: Blog Post

Links:

In a World of Mobile and BYOD, Is QoS Enforcement Possible?

It wasn't long ago that consumer technology in the workplace was a significant IT fear. You might not be 100% comfortable with it now, but everywhere you turn an employee is using a personal device for work. There's no choice but to integrate them into your IT strategy. But is it possible to push QoS enforcement policies to the new workforce? In this post, we'll talk about extending QoS requirements to every corner of the distributed corporate network.

Content type: Blog Post

Links:

Does Big Data Cause Big Problems for the WAN?

Unlike IoT or machine learning, companies have had some time to get used to big data. But for all of the business benefits of big data, no one really thinks about the strain it places on the network. WAN managers can't afford to sit back and maintain the status quo when supporting big data implementations. This post will discuss how big data impacts the WAN and how managers can set themselves up to maintain seamless operation.

Content type: Blog Post

Links:

Why It Matters that Unified Communications Aren't Actually Unified

Have you invested in unified communications? In theory, it's a great way to bring VoIP, video, messaging, and other forms of communication under one app roof. But even when you have a solution from someone like RingCentral, employees are taking their workstreams elsewhere. In this post, we'll talk about the apps that support IP communications and the importance of preparing for when employees take app downloads into their own hands.

Content type: Blog Post

Links:

Back to Basics: Why It's Time to Pay Attention to End-User Experience Monitoring

Updating the old end-user experience monitoring post from 2015. I know the AppNeta messaging changed, so I can update the post to reflect the new priorities. The goal will be to go back to square one and explain just how important it is to have end-user experience monitoring at a time when employee expectations are so high.

Content type: Blog Post

Links:

The Evolution from Monitoring to SDN

There was an interesting point in the Gartner report, that Big Switch used its BMF as a Trojan horse to work the BCF into the enterprise market (and get into the Magic Quadrant for the first time). This post can talk about the relationship between network monitoring and SDN and how TAPs fit into the BCF picture the same way they fit into the BMF story.

Content type: Blog Post

Links:

The Controller Problem in Software-Defined Networking

The original promise of software-defined networking was rooted in an open source effort. Perhaps the most critical aspect of SDN deployments would be an open-source controller that could intelligently route traffic. However, there have been many open-source controllers in the market and none have become standard. In this post, we'll talk about the Big Switch shift away from open-source controllers and how it impacts SDN deployments and visibility.

Content type: Blog Post

Links:

EMEA UC Report

Will be based on the brain dump scheduled for 7/24

Content type: Whitepaper

Links:

Jobr Success Story

Customer success story based on Ben's notes

Content type: Blog Post

Links:

Rise Conference Summary

Blog based on Ivy's conference notes

Content type: Blog Post

Links:

Chatbots in Native Apps

Blog based on Ben's notes about chatbots moving from third-party platforms to native integration. Delivered 7/24

Content type: Blog Post

Links:

Q2 2017 Trade-in Data

Blog based on Q2 2017 trade-in infographic

Content type: Blog Post

Links:

Is SD-WAN a Long-Term Solution?

One key recommendation from a recent Gartner report is to plan for 3-year depreciation for SD-WAN solutions. For IT teams and service providers accustomed to much longer tech lifespans, this might come as a surprise. Is it worth going through a buying process for SD-WAN if you're going to have to do it all again in a few years? This post will talk about the current state of SD-WAN solutions and how to make the most of yours.

Content type: Blog Post

Links:

The Many Flavors of SD-WAN

Not all SD-WAN solutions are created equal. The same goes for just about every technology, but in terms of SD-WAN there are multiple deployment options you can choose. In this post, we'll explain the lines between carrier-managed, MSP-managed, and cloud-managed SD-WAN solutions. And we'll tie it back into the need for visibility regardless of the option.

Content type: Blog Post

Links:

Digital Transformation Blog 1

Based on conversation with Sanida 8/1

Content type: Blog Post

Links:

Digital Transformation Blog 2

Based on conversation with Sanida 8/1

Content type: Blog Post

Links:

Digital Transformation Blog 3

Based on conversation with Sanida 8/1

Content type: Blog Post

Links:

MobileBeat Video Promo

Blog based on the video with Ron and Justin at MobileBeat 2017. Delivered 7/28.

Content type: Blog Post

Links:

"Mark as Read" Product Update

Based on notes from Ben/Layer engineer

Content type: Blog Post

Links:

Integrating Messaging in SaaS Apps

This blog will be based on an outline from Ben and Ivy (to be provided later)

Content type: Blog Post

Links:

Disney Becoming a Tech Company

Blog based on Ivy's idea and the recent news that Disney is leaving Netflix to build its own streaming service.

Content type: Blog Post

Links:

The Definitive Guide to Monitoring Your Network

This white paper will be based on the loose framework put together in the Google Doc you shared with me. It seems like we're going for a network monitoring guide that includes many of the topics we've discussed in the past. Most of the sections could be standalone topics, so setting it up as a "definitive guide" lets us present the topics as the many considerations when establishing 100% visibility of the network.

Content type: Whitepaper

Links:

Jobr Customer Story (Web feature)

Text for the Jobr case study page based on existing Jobr story and following the Accolade mock-up structure.

Content type: Blog Post

Links:

Webinar Promo: Customer Centric Approach to Digital Transformation

Blog will be based on the Layer webinar provided by Ben, to be delivered by noon PST on 8/17

Content type: Blog Post

Links:

Learning Relationships with Customers

Blog based on Ben's notes (see Evernote), to be delivered for 8/17 posting

Content type: Blog Post

Links:

Webinar Promo: Design Systems

Blog based on the Layer webinar about design systems to be provided by Ben. Will be delivered by noon PST on 8/18

Content type: Blog Post

Links:

Respect Customer Time

Blog based on Ivy's notes, to be delivered 8/22

Content type: Blog Post

Links:

Right to Repair

Blog delivered on 8/23

Content type: Blog Post

Links:

Chatbots WP Promo

Blog teasing the new chatbots white paper

Content type: Blog Post

Links:

Landing Page: Chatbots WP

Landing page text for the new chatbots white paper

Content type: Blog Post

Links:

Alexa and Elderly Care

Blog discussing the rise of Alexa for elderly care and how hospitals and nursing homes are missing the bigger conversation picture. Posting 9/26

Content type: Blog Post

Links:

WP Teaser: Creating Delightful Moments in Customer Journey

Blog promoting the new white paper on conversations throughout the customer journey. Will deliver before I leave Wednesday night.

Content type: Blog Post

Links:

Spent Matters Landing Pages

Landing Pages based on the Spend Matters white papers and Ivy's example. Two new LPs and 1 review

Content type: Blog Post

Links:

Transforming the Airline Customer Conversation with Layer

Based on Ben's outline, will be delivered by 9/6

Content type: Blog Post

Links:

Transforming the Hospitality Customer Conversation with Layer

Based on Ben's outline, will be delivered by 9/6

Content type: Blog Post

Links:

Landing Page: Creating Delightful Moments WP

Landing page copy for Ivy's customer journey white paper

Content type: Blog Post

Links:

Why Internal SLAs Shouldn't Feel Like Punishments

Service level agreements are the IT manager's way of guaranteeing performance levels. But with so many different cloud apps flooding the workplace, managing overlapping SLAs is becoming a challenge unto itself. The employee-IT relationship is already strained and you probably don't want to make it worse by implementing internal SLAs, right? In this post, we'll talk about the importance of internal SLAs and why they shouldn't be made to seem so evil.

Content type: Blog Post

Links:

Stopping Shadow IT in Its Tracks

Welcome to the world of consumerized IT where employees have more power to adopt SaaS apps and IT has less control than ever. Teams are already having troubling containing SaaS sprawl and the ever-growing presence of shadow IT—and it's only just beginning. Controlling the budget, managing SLAs, keeping track of app ownership, and more may seem like too much to handle. This guide will dig into the keys to shutting down shadow IT and regaining control of the IT environment.

Content type: Article

Links:

Industrial Ethernet Attacks Have Hit Home—Now What?

We've written about real cyber attacks on Industrial Ethernet deployments in the past. However, recent news from Symantec researchers shows that the dangerous critical infrastructure threats have now reached the United States. In this post, we'll talk about the emergence of the Dragonfly hacker group and what these attack mean for industrial networks that are trying to take advantage of increased connectivity.

Content type: Blog Post

Links:

Stop Claiming Certain Marketing Strategies Are Dead

Type "Is [insert marketing strategy] dead" and see what happens. You'll find that everything is dead—mass marketing, advertising, social media marketing, content marketing, influencer marketing. They're all dead apparently. Except they aren't and choosing which to focus on isn't so black and white. The reality is that marketing is constantly evolving. In this post, we'll talk about why you should focus more on finding the right blend of strategies rather than jumping ship to the latest trends.

Content type: Blog Post

Links:

Contact Us Is Over

Blog based on Ben's notes about the shift from "contact us" to "message us" in mobile customer support. Delivered 9/19

Content type: Blog Post

Links:

How to Ensure SaaS Deployment Is as Smooth as Possible

Move your apps from on-premises to the cloud and suddenly your IT life becomes a lot easier. That's the dream, anyway. In reality, SaaS deployments aren't inherently the IT saving grace they're often made out to be—there are plenty of potential challenges along the way. In this post, we'll discuss some best practices for avoiding performance issues and end-user experience missteps while taking advantage of the IT benefits of SaaS.

Content type: Blog Post

Links:

Transforming the Retail Banking Conversation

Delivered 9/12

Content type: Blog Post

Links:

Securing the Customer Conversation

Based on the new HIPAA press release and the Layer security web page. Will be delivered early 9/14

Content type: Blog Post

Links:

Aviation Festival Recap

Blog based on discussion with Jamie about Aviation Festival. Delivered 9/15

Content type: Blog Post

Links:

Finovate Fall 2017 Recap

Call based on Michael's notes from the conference. Will be delivered to post 9/20

Content type: Blog Post

Links:

Messaging to Improve Customer Support

White paper following the same idea as the contact us vs. message us blog post. The focus will shift toward the business side with research into which companies have found success with a shift.

Content type: Whitepaper

Links:

What Is Data-Driven Branding? (Brand Consideration 2)

The first Brand Consideration blog focused on the tunnel vision marketers have and the need to spend more time on brand consideration. But branding activities are often abstract. This post will discuss what it means to execute data-driven branding and give marketers more insight into fact-driven efforts.

Content type: Blog Post

Links:

Teaser Blog for Customer Support WP

Blog based on the new customer support white paper, to promote downloads

Content type: Blog Post

Links:

Landing Page: Customer Support WP

LP for the new customer support WP

Content type: Blog Post

Links:

Blog Update: Marketplace Communication

Added new section to old post, fixed links, minor copy edits, and added note about update

Content type: Blog Post

Links:

Lifetime Customer Conversation

Blog delivered 10/6 to be posted

Content type: Blog Post

Links:

test pitch

test

Content type: Blog Post

Links:

Harnessing 3rd party intent for competitive advantage

TechTarget blog, dummy assignment

Content type: Blog Post

Links:

What Does It Really Mean to be Mobile-First?

It didn't take long for "mobile-first" to become a buzzword for just about every business. However, like so many other buzzwords, the root concept is actually very important for modern business success. That's the problem, though—what does mobile-first actually mean? It's much more than just embracing mobile apps and making them available to customers. In this post, we'll talk about the keys to making mobile a leading driver of business strategy.

Content type: Blog Post

Links:

[Marketo] Content Marketing Is Harder than People Think

There's no shortage of content marketing advice online. And to be fair, there are some incredible resources out there. But sometimes we get so caught up in the "best practices" advice that we fail to create a truly impactful content marketing program. Maybe that's why so many brands say their programs aren't successful. In this post, we'll talk about why strategy is ground zero for content marketing (including a personal story about how lack of strategy derailed all content efforts).

Content type: Blog Post

Links:

[Marketo] Why Personalization Isn't Solving Your Engagement Problem (and What to Do About It)

Personalization is supposed the be the holy grail for marketers. Take all that customer data, put it to work with marketing automation software, and start engaging with audience on a one-to-one level. But even though everyone agrees that personalizing marketing messages is a good idea, most are failing to make it work. In this post, we'll talk about where personalization is falling flat and how you can engage with customers more effectively.

Content type: Blog Post

Links:

[Marketo] Sales Funnels Are Broken (No Matter What Industry You're in)

It's no secret that the customer journey is no longer a linear path. Despite all the twists and turns our customers take on the way to a purchase, we still try to map the journey to our trusty sales funnels. The result is a constant need to plug holes in the funnel as engagement missteps send customers to competitors. This post will explain how to plug the holes in a leaky sales funnel. Hint: it's not by simply adding new technology like chatbots.

Content type: Blog Post

Links:

Back to Basics: How Well Do You Really Know Your Network?

Every day, IT leaders are bombarded with information about new security risks that can hurt their networks and new technologies that can maximize performance. But amidst the discussions about SD-WAN, cloud-based business apps, and VoIP/video bandwidth, it's easy to get ahead of ourselves. In this post, we'll go back to square one and explain why every IT team needs a deep understanding of its baseline network traffic.

Content type: Blog Post

Links:

The New World of Internet of Things Management

While business leaders are excited about the endless Internet of Things opportunities, IT leaders are faced with a challenge. How exactly are we going to manage the ever-expanding network of IoT devices on the network? As the IoT market grows, a new market for management services is growing as well. In this post, we'll talk about a few challenges for IoT management and introduce some tools/solutions that can help ease the pain.

Content type: Blog Post

Links:

No, SD-WAN Is Not a Replacement for WAN Optimization

The SD-WAN business is booming—and for good reason. Advancements in SD-WAN technology are bringing new levels of flexibility and performance to enterprise networks. However, enterprises have been investing in WAN optimization solutions for these very reasons. In this post, we'll talk about the relationship between SD-WAN and WAN optimization, highlighting the fact that one does not directly replace the other.

Content type: Blog Post

Links:

[Marketo] 4 Reasons Story Is Your Most Important Marketing Asset

By now, everyone has seen the image depicting just how fragmented and cluttered the martech space really is. These technologies are important, but we can't get so bogged down in comparisons that we lose sight of what really drives marketing success—great stories. In this post, we'll explain 4 reasons why story is your most important marketing asset (including a discussion about the latest Facebook algorithm change).

Content type: Blog Post

Links:

test

test

Content type: Blog Post

Links:

What Is Programmability?

White paper based on the 2/6 brain dump with Kaloom experts.

Content type: Whitepaper

Links:

The VNF Challenge

The shift from traditional networking to virtualized networking is on. The promises of flexibility and cost efficiency are too great to ignore. However, there's a glaring problem. In this post we'll go through the basis for Kaloom's value prop—the VNF challenge. I'll explain the context of increased virtualized networking and the problem outlined in the Kaloom pitch.

Content type: Blog Post

Links:

Virtual Machines vs. Containers: Why You Need Support for Both

The virtualized networking discussion involves a choice between virtual machines and containers. Unfortunately, there's no one-size-fits-all choice. Each option has its pros and cons. In this post, we'll focus on the distinctions between VMs and containers, ultimately pointing to the fact that you need an underlying fabric that works with both if you want to get the most out of virtualized networking.

Content type: Blog Post

Links:

The Data Center Performance Speed Bump

There's a common understanding that data center technology is evolving. And if you track performance improvements, you see there are orders-of-magnitude increases in a number of categories—backhaul latency, storage, VM deployment, etc. However, there's one thing that's holding your data center evolution back. In this post, we'll explain that data center fabric latency hasn't seen the same jump in performance in recent years.

Content type: Blog Post

Links:

Withstanding the IoT Need for Speed

Hadoop has been a major focus for big data pros—and for good reason. Keeping up with the influx of data from IoT deployment requires the kind of speed Hadoop promises. However, too many conversations stop short with Hadoop. Database architects have to make sure they have the right system in place to meet the IoT need for speed. In this post, we'll talk about how balancing response times with consistency requires more than just a focus on Hadoop.

Content type: Blog Post

Links:

The Connectivity Conversation Around SD-WAN Adoption

As much as we talk about the impending rise of software-defined networking, SD-WAN technology is already here. SD-WAN adoption is booming as IT leaders embrace the promises greater efficiency (cost and performance) in networking. With SD-WAN, you can automatically route packets over the most appropriate links to improve bandwidth utilization. But the connectivity aspect of deployment is often overlooked. In this post, we'll talk about the importance of visibility in SD-WAN deployments.

Content type: Blog Post

Links:

The Two Sides of Internet of Things Traffic Management

With the Internet of Things getting closer and closer to mainstream in business networks, plenty of networking pros are concerned with bandwidth constraints. Having so many connected devices won't help much if we max out on bandwidth and miss out on data. However, bandwidth is only one side of IoT traffic management. In this post, we'll discuss the need to address both bandwidth and connection latency as signaling traffic increases exponentially.

Content type: Blog Post

Links:

The Current State of Digital Identification

The concept of digital identification isn't new. But it's looking significantly more practical now that China is moving to WeChat as its national ID system. Now, people are wondering where the rest of the world stands on digital identification. In this post, we'll discuss the current state of digital identification, specifically looking at the security and compliance roadblocks that may keep countries like the U.S. from adoption.

Content type: Blog Post

Links:

Everything You Need to Know About Know Your Customer Compliance

Know Your Customer laws have been around for more than a decade. However, the explosion of digital financial services has led to increasingly strict modifications and compliance requirements. It's more important than ever for business leaders to stay on top of KYC regulations. In this post, we'll go through the components of KYC and introduce the topic so we can dive a little deeper into challenges and strategies in later posts.

Content type: Blog Post

Links:

The Most Pressing KYC Compliance Challenges

U.S. financial firms spent over $160 billion in compliance penalties between 2010 and 2016. Increasingly stringent KYC requirements are one reason for these penalties. If you're having problems with KYC compliance, you're not alone—banks around the world are asking how they can easily prove they know their customers. In this post, we'll go through the most pressing KYC compliance challenges, including the need for a detailed customer identification program.

Content type: Blog Post

Links:

Digital Identification: A Secret Weapon for Customer Experience

It's quickly becoming a cliche, but customer experience is now the key differentiator for businesses. As products become commodities and pricing continues as a race to the bottom, great experiences are what create loyal customers. For retailers, the question is "how do we actually create great experiences?" . In this post, we'll talk about the need for convenience and speed and explain why digital identification may be the secret weapon you hadn't thought of.

Content type: Blog Post

Links:

Database Technology in a Blockchain World

Few terms have achieved "buzzword" status as quickly as blockchain. The hype is so strong that companies are seeing spikes in stock prices just by putting blockchain in their names. On one level, blockchain has lost a lot of its meaning. However, not all projects are doomed to fail in the proof of concept stage. In this post, we'll talk about the current status of practical blockchain and discuss how recursive CTEs can move your project forward. (Acknowledge VoltDB V8 support)

Content type: Blog Post

Links:

Supporting the Challenger Sale with Effective ABM

Published in 2011, The Challenger Sale became a rallying point for sales leaders everywhere. It explains the idea that sales people who deeply understand their targets and can push them to think differently will be most effective. This is the perfect opportunity for marketing and sales to align. In this post, we'll explain how effective ABM provides all the resources and tools necessary for the challenger sale to succeed and drive business results.

Content type: Blog Post

Links:

The Account-Based Marketing Engagement Challenge

There are plenty of convincing stats that point to the effectiveness of ABM. Most notably, 97% of marketers say ABM has higher ROI than other strategies/tactics. Measuring your ABM activities is critical for achieving the ROI you expect. One of the most difficult ABM metric categories for marketers to track is engagement. In this post, we'll discuss the challenges of measuring ABM engagement and how to do it more effectively (especially if you have the help of a vendor like TechTarget).

Content type: Blog Post

Links:

Matching Leads to Accounts Shouldn't be an ABM Roadblock

Marketers are so accustomed to collecting leads. We have forms everywhere feeding data into Salesforce so we can move individual leads through the funnel. But when we start executing ABM, we have to match these leads to our target accounts. And that's a major roadblock for some teams. In this post, we'll talk about the lead-to-account challenge and the value of third-party vendors to break the barrier.

Content type: Blog Post

Links:

Are Your Employees Sleeping Through Security Training?

From a business perspective, your employees are your most valuable asset. But from a security standpoint, they're you're greatest vulnerability. The vast majority of cyber attacks are the result of human error. And as a result, businesses are investing more in security training. Unfortunately, that training won't matter much if it employees are just breezing through it as a formality. In this post, we'll talk about a few keys to making security training far more effective.

Content type: Blog Post

Links:

Taking a More Proactive Approach to eDiscovery

Electronic discovery is nothing new in the legal world. However, just because litigators have been using eDiscovery tools and strategies for 20 years doesn't mean businesses have followed suit. Unsurprisingly, many companies don't start to think about eDiscovery until they're actually under investigation. In this post, we'll talk about the need for a more proactive approach to eDiscovery and explain what that might look like.

Content type: Blog Post

Links:

Avoiding Digital Healthcare Disaster

Every day, innovative companies are finding new ways to transform healthcare operations and delivery with new technology. However, there's always the looming threat of security and compliance to be concerned with. In this post, we'll talk about the how new trends are pushing businesses outside of the security comfort zone. And more importantly, explain how to set the foundation for success in digital healthcare with total network visibility.

Content type: Blog Post

Links:

Businesses Can Trade in, too

Blog based on first half of 2/13 brain dump

Content type: Blog Post

Links:

Enterprise Trade-in Solutions—Finding Value in Retired Devices

Blog based on second half of 2/13 brain dump

Content type: Blog Post

Links:

4 Tips to Maximize Office 365 Performance and End-User Experience

Office 365 is the Office evolution businesses needed to support an increasingly mobile and remote workforce. In theory, these cloud-based Office apps will improve workforce productivity—but only if you can maintain performance. This post will walk through 4 tips to maximize Office 365 performance and, as a result, end-user experience. Tips include preparing TCP settings, overcoming the challenges of MPLS, planning for visibility, and maintaining individual control of applications.

Content type: Blog Post

Links:

3 Reasons Baselining Is Ground Zero for Threat Prevention

Attackers find new, more evasive ways to infiltrate business networks every day. And while companies are getting better at limiting the damage, data breaches still occur in record numbers. As a result, threat prevention is becoming an increasingly important conversation. However, threat prevention will fall flat without an understanding of baseline traffic. This post will explain 3 reasons to start security planning with baselining.

Content type: Blog Post

Links:

What's Holding Your WiFi Back?

There's (almost) nothing more frustrating than slow WiFi. Employees are trying to finish off the last bits of a project at the end of the day, and suddenly they're stuck with slow performance. In our homes, we may chalk these problems up to our service providers and wait it out. But in the business world, lost productivity means lost revenue. In this post, we'll talk about what's really causing slow WiFi and how to stay on top of it.

Content type: Blog Post

Links:

The 2018 State of Cybersecurity Marketing

If there's one thing cybersecurity and marketing have in common, it's that trends and tactics change like the wind. Just when you think you have things figured out, the landscape changes and it's like you have to start over. Last year, Penguin published a post about cybersecurity marketing in 2017. This post will look at those ideas and provide an update based on new trends in both industries.

Content type: Blog Post

Links:

How to Get the Most Out of AI and Test Automation

While many professions worry that AI will wipe them out, software testers know that artificial intelligence and machine learning will only strengthen their abilities. However, the role of AI in testing is still coming into focus. What we know now is that AI and test automation are critical for pushing the boundaries of DevOps. In this post, we'll take a closer look at the growing role of AI in software testing, how testers have to adapt, and whether commercial or open source tools are best.

Content type: Article

Links:

Experience Is Everything for the Modern Marketer

It doesn't take an analyst report to understand that customer experience is what separates today's successful businesses from those that are drowned out in the noise. It's easier than ever for someone to replicate your product and you certainly don't want to get stuck competing on price alone. However, too often the conversation about customer experience is at odds with increased automation. In this post, we'll talk about how marketing automation should enable great experiences, not hinder them.

Content type: Blog Post

Links:

The Right and Wrong Sides of Marketing Personalization

The notion of one-to-one business isn't new. It died out a bit in the mass marketing years, but it's back with a vengeance in the form of personalization. Marketers have become automation experts. Now, the challenge is to infuse personalization into scalable processes to create real relationships with customers and prospects. It doesn't take a lot of digging to see that there's fine line between right and wrong personalization. This post will look at how to find success.

Content type: Blog Post

Links:

Turning Executives into Industry Heroes

Every executive wants the kind of industry influence that draws attention from conference organizers and media outlets. But building that influence doesn't happen just by creating great products (much to a CEO's dismay). In this post, we'll talk about how executives should balance their two halves—one as the leader of a company and the other as an influential thinker within a certain industry.

Content type: Blog Post

Links:

Tech Storytelling: It's Not All About the Tech

In the tech world, it's not uncommon for branding to be seen as useless. Why invest in unmeasurable branding when we're achieving feats of engineering greatness? However, your tech storytelling isn't all about the tech. Prospects are so well-informed that they've become numb to general sales pitches. You need to relate on a deeper level. In this post, we'll talk about how you can balance technical discussions with content aimed to position the company as a key resource for customers.

Content type: Blog Post

Links:

Are Chatbots the Marketing Key to Consumer Hearts?

Every brand wants a presence in consumer messaging apps right now. That's where the attention is. Messaging offers a direct line to consumers that isn't as disruptive as more traditional marketing. So, naturally, chatbots will be the future of marketing. Right? Not quite. While chatbots and messaging are great, marketers will inevitably ruin them. In this post, we'll talk about how marketers will fall short with messaging if they aren't able to truly spark a brand movement.

Content type: Blog Post

Links:

Creating a Chatbot Doesn't Count as Retail Transformation

There's nothing wrong with using chatbots to engage with retail customers. However, it seemed like 2017 brought this wave of hype that made chatbots look like the single retail savior. Let's be clear—retail isn't dying or dead. It's just changing. And to really embrace retail transformation, you can't just rely on one technology. In this post, we'll talk about why chatbots alone can't transform retail and why a bigger-picture evolution is key.

Content type: Blog Post

Links:

Why Competing on Price Is Futile (and What to Do Instead)

The price race to the bottom isn't endless, believe it or not. While retailers have rushed to match prices with Amazon, the reality is that 99% of retailers will never be able to win that battle outright. But does that mean every retailer that isn't Amazon is on its way down? Not necessarily. Meeting customer pricing expectation is important, but now more than ever retailers should be doubling down on experiences. This post will discuss experience as a weak link in Amazon's armor.

Content type: Blog Post

Links:

How to Solve the Brand Awareness ROI Mystery

Funded startups are obsessed with measurable growth. And for good reason. It's critical to convey to board members and investors that the young company is building (and keeping) momentum. This is where executives start to question the value of branding—how do you actually tie brand awareness to ROI? It's a mystery without a concrete answer. However, this post will discuss how to make inroads to measuring the value of branding activities.

Content type: Blog Post

Links:

What CEOs Get Wrong About Influence and Thought Leadership

CEOs have a lot on their plates, so it's not much of a surprise that branding and other marketing activities often take a back seat. However, there's one thing every startup CEO wants—more influence within the industry (and the exposure that comes with it). The mistake some CEOs make is trying to build that influence without a marketing mindset. This post will discuss the difference between being seen as CEO of X company vs. being seen as an industry leader who also runs a startup.

Content type: Blog Post

Links:

Where Testing Fits into the DevOps vs. Site Reliability Engineering Discussion

In recent years, software engineers have started to distinguish between two practices—the tried-and-true DevOps approach and emerging site reliability engineering. Continuous testing is a mainstay of successful DevOps. However, the conversation once revolved around how DevOps was killing QA. Where is the conversation going as SRE picks up momentum? In this article, we'll talk about why DevOps and SRE aren't at odds with one another and how reliability engineering impacts testing.

Content type: Article

Links:

Data Sanitization: Putting Your Security Concerns at Ease

This post will be based off of the data sanitization brochure shared by Linda. While other posts have touched on data sanitization, this will highlight the key reasons why it's important as well as the different components/steps that go into clearing data in a way that is compliant with security standards

Content type: Blog Post

Links:

Omnichannel Experiences Can Make or Break Enterprise Device Trade-Ins

In Scott's recent post about finding value in retired devices, we focused on getting over that initial barrier and getting tech managers to embrace trade-in programs. However, emptying those cluttered closets full of retired devices is only the first step. The next is making trade-in processes an integrated part of upgrade cycles. That means having buy-in from your distributed workforce. This post will discuss the need for streamlined collection processes to get employees participating.

Content type: Blog Post

Links:

The Rising Era of Zero Trust Security

For at least the last 4 or 5 years, business leaders have watched record-breaking volumes of data breaches hit mainstream news. Even one incident could be enough to derail your business. And despite ever-increasing investment in security solutions, attackers keep finding ways to compromise networks. The result? A new, emerging era of cyber defense—zero trust security. In this post we'll talk about what zero trust security is and what it actually takes to implement it (i.e. SDN focus).

Content type: Blog Post

Links:

What Does Customer-First Digital Transformation Actually Mean?

Digital transformation has become a buzzword for businesses and, as a result, has lost a bit of its meaning. Generally, it refers to integrating innovative digital technologies into the IT stack to enable the agility needed to keep up with rapidly changing business demands. And while that's great, there's a missing piece—the customer. Simply integrating digital tech isn't enough. Each new initiative must be rooted in customer value. In this post, we'll dig deeper into what that actually means.

Content type: Blog Post

Links:

Network Visibility Isn't the End Goal

As IT infrastructure becomes increasingly complex, the term "network visibility" has become a bit of a buzzword. Everyone wants to help IT operators improve network visibility, whether it's to improve security or boost application performance. But that's just the thing—network visibility isn't actually what delivers those benefits. Visibility is only as good as the actions you can take because of it. In this post, we'll talk about turning packet-level visibility into actionable insights.

Content type: Blog Post

Links:

Going Beyond Traditional WAN Metrics

Loss, latency, jitter—these are traditional WAN metrics IT operators have tracked for years. But it's becoming increasingly clear that SD-WAN is the future for distributed enterprises. While those metrics will always have value, SD-WAN technology opens the door for more advanced, end-user focused metrics to be tracked. In this post, we'll talk about three SD-WAN metrics—application response time, network transfer time, and server response time—and how they can help improve workforce experiences.

Content type: Blog Post

Links:

IT Simplification Has Its Limits

Legacy IT infrastructure is often the reason enterprises struggle to achieve the flexibility and agility necessary for digital transformation. Now, innovative solutions like HCI and SD-WAN promise to simplify IT to drive more agile operations. In this post, we'll talk about why operators can't rely on these solutions to streamline IT on their own. End-user experience performance monitoring is important no matter what improvements you make to IT infrastructure.

Content type: Blog Post

Links:

Digital Transformation

Based on blog series and talk with Rebekah

Content type: Whitepaper

Links:

The Data Dilemma with Rented Customer Experiences

The big customer experience idea right now is to meet customers where they are. Whether that's Facebook Messenger, WhatsApp, or anything in between, brands should be making experiences as seamless as possible. Except that often leads to over-reliance on third-party platforms (aka rented land). In this post, we'll explain why it's important to own your CX (because if you build on Facebook, you're training them to disrupt your market or at the mercy of sudden platform changes).

Content type: Blog Post

Links:

Critical Infrastructure Attacks Hit Home

We've been talking about industrial/critical infrastructure attacks a lot in the last year. But for all the confirmed threats and overseas attacks, there's still a sense that attacks are a distant reality. Now, Russia has launched a multi-stage intrusion campaign against US critical infrastructure. In this post, we'll talk about the latest attack—the vulnerabilities, the attack technique, and what needs to be done to avoid this problem in the future.

Content type: Blog Post

Links:

Power Page: Digital Transformation

Power page based on the discussion, template, and digital transformation resources we've had. To be delivered on Thursday 4/12

Content type: Article

Links:

An Introduction to Edge Computing

Based on Griffin abstract (in email)

Content type: Blog Post

Links:

Earth Day Post

Blog based on the environmental data from HYLA. Waiting on data, but will have post done for 4/22 Earth Day

Content type: Blog Post

Links:

Quarterly Trade-in Post

Quarterly blog post based on trade-in data from HYLA. Waiting on data from HYLA

Content type: Blog Post

Links:

The Data Challenge for Prescriptive Analytics

Prescriptive analytics has come up in annual big data trends reports for a few years now. It seems each year brings renewed claims that companies will get greater value out of prescriptive. And yet, challenges still remain. In this post, we'll talk about the data dilemma for prescriptive analytics and how real-time streaming helps break down the barriers to real value from this third wave of big data analytics.

Content type: Blog Post

Links:

The Real Reason Digital Transformation Initiatives Fall Short

Even though it's become a buzzword, business leaders can agree that digital transformation is a strategic priority no matter what industry they're in. However, 71% of executives feel they're behind the curve and failed projects can cost hundreds of thousands of dollars. This post will get to the heart of why initiatives fail—an inability to do more than just invest in new technologies. Digital transformation leaders will go deeper and become truly AI-first.

Content type: Article

Links:

Is SD-WAN Really Worth All the Hype?

With all the money pouring into the SD-WAN market, it's easy to get lost in the technology hype. Vendors promise innovative features and business-changing benefits, but is it all noise? Definitely not. In this post, we can talk about the benefits that are driving SD-WAN adoption on a high level (agility, cost efficiency, application performance) and also explain what's on the horizon for the near future. The short article will tie back to the SD-WAN pillar.

Content type: Blog Post

Links:

Tier 3 Business Courses Copy

Based on email discussion

Content type: Blog Post

Links:

Tier 3 Technology Courses Copy

Based on email discussion

Content type: Blog Post

Links:

Tier 3 Creative Design/Tech Courses Copy

Based on email discussion

Content type: Blog Post

Links:

Tier 2: Leadership and Management

Based on email discussion

Content type: Article

Links:

Tier 2 Professional Development (Soft Skills)

Based on email discussion

Content type: Article

Links:

Tier 2 Elearning ROI

Based on email discussion

Content type: Article

Links:

Tier 2 PMP Certification

Based on email discussion

Content type: Article

Links:

Dispelling Myths of the Secondary Smartphone Market

It wasn't long ago that "used" and "refurbished" were concerning labels for any smartphone. Consumers came to understand that these devices were sub-standard and only relied on secondary devices if absolutely necessary. But the story is changing as devices retain more and more value over time. In this post, we'll talk about how the secondary market narrative has changed and how to balance the trade-in process to make sure you get the most value out of devices (even if they're used).

Content type: Blog Post

Links:

The Root Cause of Retail Returns (and How AI Helps Solve It)

Heavy investment in logistics infrastructure is just one way that Amazon has built its empire. But as much as retailers need to streamline shipping/returns processes, simply catching up with Amazon's logistics won't guarantee success. The root cause of retail returns starts with the customer. Improving customer engagement and personalizing experiences to ensure customers get what they want/need the first time is key. And that's where AI comes in. In this post, we'll explain how AI helps returns.

Content type: Blog Post

Links:

The Different Flavors of SD-WAN Solutions

It's not enough to decide that you want to deploy SD-WAN technology for your business. You also have to determine how you're going to deploy it before you make an investment. Aside from the choice between managed and owned, there are also different flavors of SD-WAN to evaluate. In this post, we'll discuss the different corners of the SD-WAN market as well as the advantages/disadvantages to keep in mind as you look for the perfect solution. (Tie back to SD-WAN pillar)

Content type: Blog Post

Links:

Retail Has a Data Problem

When you hear "data problem" your first reaction is probably to think you need more data. For retail, it's just the opposite—we have more data than ever and we just don't know how to put it to work. However, retailers have an opportunity to turn infinite scale into the highly-engaging experiences of pre-mass-marketing days. You just have to make the most of your data with AI. This post will discuss where retail personalization falls short and what to do about it.

Content type: Blog Post

Links:

Can Unified Communications Survive Off-WAN?

The WAN as we once knew it is undergoing major changes. What was once an expensive, yet reliable, MPLS WAN is becoming an internet-connected SD-WAN. And for the most part, this evolution is for the better. However, there's potential cause for concern when it comes to your cloud-based unified communications. Can this new WAN support the high performance demands of UCC suites that often dictate employee productivity? In this post, we'll explore the question and deliver an answer.

Content type: Blog Post

Links:

Messaging and the Art of Customer Experience Management

The telecom industry has never lacked for customer data—companies have been collecting call details, billing records, and event details for ages. But that hasn't exactly led to major boosts in customer satisfaction. And now, true customer delight is the real goal. In one way, this is all about the proper use of big data. However, we also have to focus on delivery of experiences. In this post, we'll talk about how mobile messaging can change customer experience management for telcos.

Content type: Blog Post

Links:

Edge Clouds vs. Traditional Clouds—Why Both Are Needed

There are plenty of articles that pit edge computing and cloud computing against each other. But we shouldn't be asking questions like "will edge computing put an end to cloud computing." Instead, we need to recognize how they'll complement each other. And that means identifying the differences in how each works. This post will look at the main differences between edge clouds and public/hybrid clouds (drawing from the CPLANE graphic).

Content type: Blog Post

Links:

IoT and the Network Edge—Stress Relievers for the Cloud

IoT is pushing compute power to the network edge and to a distributed model. But if we don't take the right approach, But there's the danger of the cloud becoming a fog, overwhelming big data tools to the point that you can't derive any actionable insights. That's why we need to start thinking of the internet of things and edge clouds as stress relievers for traditional clouds. With the right integration between edge and cloud, you can keep everything at maximum performance.

Content type: Blog Post

Links:

What the Different Types of Edge Computing Mean for Communications

We're still in the early days of edge computing, which means there's plenty of confusion regarding what it actually is. There are articles explaining edge vs. cloud computing. There are articles explaining how edge computing differs from fog computing. But we don't pay much attention to the different types of edge computing itself. In this post, we'll discuss the different forms of edge computing and how they impact communications.

Content type: Blog Post

Links:

Edge Computing Increases QoS Control for Communications

Voice and video communications are often hampered by bandwidth constraints as more and more application traffic runs through cloud infrastructure. One key to maintaining communications performance is to implement strict QoS policies, enforcing traffic prioritization across the network. However, there's a point when there's so much traffic that prioritization doesn't cut it anymore. Enter edge computing. In this post, we'll talk about how processing at the edge can increase QoS control.

Content type: Blog Post

Links:

Setting New VoIP Latency Standards with Edge Computing

Latency challenges are as old as VoIP technology itself. Over the years, innovative companies have found ways to help limit latency issues. But in the end, it's always felt like a losing battle—there's an inherent level of latency when you're transferring packets all around the world. Things are changing, though. Now, with edge computing, we can unlock a new tier of latency standards and ultimately improve communications experiences. In this post, we'll explain how it works.

Content type: Blog Post

Links:

Making Mobile Device Insurance a Win-Win Proposition

The general consensus is that consumers dislike mobile device insurance programs. So many articles tell consumers that these programs simply aren't worth the cost even as carriers try to improve their offerings. What's the disconnect? On the carrier side, there's a constant need to avoid fraud, leading to complicated programs and dissatisfied customers. However, it doesn't have to be this way. In this post, we'll talk about how providers can improve insurance programs.

Content type: Blog Post

Links:

Device Grading Post

Blog based on brain dump with Steve on 6/1

Content type: Blog Post

Links:

Customer Experience: The Travel Industry's Secret Weapon Against Google

It wasn't all that long ago that travel aggregators like Priceline and Expedia were seen as the ultimate customer experience innovators. But now, those companies are under fire as Google eats into the online travel agency space. In some sense, this seems like the start of a "retailers vs. Amazon" type scenario. However, incumbent travel companies have a secret weapon. In this post, we'll explain Google's OTA limitations and how dedicated travel brands can fill the gap with innovative CX.

Content type: Blog Post

Links:

Where Storytelling Fits in the ABM Picture

Storytelling has quickly emerged as the favorite buzzword of many marketers. If done well, it can be the engine powering content marketing. But many people still think it's just fluff. For these business leaders, ABM seems like a more practical way to discuss marketing strategies. However, storytelling plays a significant role in effective ABM. In this post, we'll discuss how storytelling fits into ABM as you strive for greater personalization.

Content type: Blog Post

Links:

Mobile Insurance Post

Placeholder for the new insurance blog post. Taking care of it over the weekend.

Content type: Blog Post

Links:

Chatbots Are Not a Customer Experience Strategy

Every new technology has a hype cycle, but few move through it as rapidly as chatbots have. There was a point in 2017 when you could barely check the internet without hearing something new about the chatbot revolution. Some brands believe that chatbots will be the customer experience saving grace, giving them the power to personalize experiences at scale. That might be misguided, though. In this post, we'll talk about why chatbots are just one piece of an overall CX strategy.

Content type: Blog Post

Links:

Digital Twins: A Real-World Application

Digital twins aren't new, but they've been coming to the forefront of digital transformation discussions more recently. The CPLANE blog has explained the relationship between edge clouds and digital twins, but the connection may still seem complicated. In this post, we'll walk through the wind turbine example from the white paper to give a real-world example of how digital twins play a role for digital businesses.

Content type: Blog Post

Links:

Don't Take the Intelligent Edge for Granted

There's been an explosion of edge devices coming to market to meet the growing demand for edge computing use cases. And while edge computing will continue to drive enterprise IoT applications, we have to talk about the "intelligent edge." Just because you deploy edge devices doesn't mean you're making the most of intelligence at the edge. In this post, we'll talk about making the edge more intelligent (and powerful) to support next generation use cases.

Content type: Blog Post

Links:

Q2 2018 Mobile Trade-In Data

Draft completed 7/22. Will submit when pitch is accepted.

Content type: Blog Post

Links:

The Circular Economy

Blog based on 8/1 brain dump with Bishu

Content type: Blog Post

Links:

What's Next for SD-WAN Technology?

Software-defined WANs have taken the business world by storm. Much like the broader topic of software-defined networking (SDN), SD-WAN hype grew quickly amidst demand for more agile operations. But unlike SDN, SD-WAN is a more accessible entry point into software-defined infrastructure. As the hype sustains, SD-WAN vendors have to find new ways to deliver value. In this post, we'll talk about the features on the horizon for SD-WAN solutions and the business benefits of them.

Content type: Blog Post

Links:

Time to Market—The Constant Communications Service Provider Challenge

Internet of Things, edge computing, SD-WAN. These are just a few of the innovative technologies that service providers can lean on as they keep up with digital transformation demands. For all the known benefits of these technologies, actually making the most of them to deliver unique customer experiences is easier said than done. In this post, we'll talk about time to market challenges and stress how important it is to overcome these challenges (and that it's okay to ask for help).

Content type: Blog Post

Links:

Unified Communications and the Edge: How IoT Integration Will Drive Success

While businesses have been taking advantage of UC services for years, the Internet of Things is a more recent development. Businesses across industries are looking for ways to squeeze more value out of the smart devices they're deploying at the edge of the network. But what many overlook is the fact that IoT and UC are a perfect match. In this post, we'll talk about how UC services are impacted (and improved) by IoT and a more intelligent edge.

Content type: Blog Post

Links:

Solution Brief: Tier 1/Tier 2 Support

Based on the recording Griffin sent over.

Content type: Article

Links:

Security and the Software-Defined WAN

There are certain technologies that promise such great benefits that security concerns take a backseat. SD-WAN is one of these technologies. For all the advancements we've already seen in SD-WAN capabilities, there are still looming security concerns that we must address. In this post, we'll explain the current state of SD-WAN security, the vulnerabilities that must be hardened, and how vendors are trying to overcome these concerns.

Content type: Blog Post

Links:

SD-WAN vs. WAN Optimization: Room for Both?

With so much noise in the SD-WAN market, capabilities of the technology seem to get blown out of proportion. In some cases, it's portrayed as a cure-all for the WAN, eliminating the traditional steps you've taken to improve performance. For example, there's often confusion about SD-WAN vs. WAN optimization. Is SD-WAN just a new version of WAN optimization? Not quite. In this post, we'll clear up the conversation between the two. (Tie back to SD-WAN pillar).

Content type: Blog Post

Links:

Solution Brief (Companion): Interoperability

Based on Managed Services Offering

Content type: Article

Links:

The Rise of Contact Center as a Service

The world of customer support has far surpassed the days of call centers and hold times. Now, businesses must take customer-centric approaches to communication, providing access via messaging, phone calls, emails, social media, and more. Building out a contact center to address every need is easier said than done. But the rise of contact center as a service is making it easier. In this post, we’ll explain how.

Content type: Blog Post

Links:

Why Now Is the Time to Embrace Hosted PBX

Sprawling, complex on-site infrastructure has always been a necessary evil for business communications. These systems don’t mesh with modern communication demands, though. Luckily, cloud-based systems are emerging to offer new features while streamlining both management and costs. In this post, we’ll talk about the shift toward hosted PBX for modern business communications.

Content type: Blog Post

Links:

Are You Making Life Too Easy for Hackers?

So many SMB leaders make the mistake of thinking that they’ll never find themselves on the wrong end of a cyber attack. Why would attackers go after a small business when large enterprises are bigger, more lucrative targets? Simply put, SMBs are lower-hanging fruit for hackers. In this post, we’ll talk more about why SMBs are so vulnerable and what to do about it.

Content type: Blog Post

Links:

Human Error—The Biggest Threat to Your Cyber Defenses

It’s easy to fall into the trap of thinking that cybersecurity is solely a technical challenge. Small business leaders often think that as long as they have anti-virus software and a firewall in place, they’ll be safe from data breaches. Except these technical solutions fail to address the biggest threat to any network—human error. In this post, we’ll explain why your employees are the biggest threat to your network and how to address the vulnerability.

Content type: Blog Post

Links:

R2 Certification Blog Post

Based on call on 9/12 with Steve and his write up.

Content type: Blog Post

Links:

Cost of Phones Blog Post

Cost of phones- with Samsung coming out with a potential $2,000 smartphone (rumored) are we past the negative perception of high priced phones? And how can phone trade ins play a primary role in supplementing the costs of these high priced phones?iPhone X, Samsung, etc.

Content type: Blog Post

Links:

Public Cloud Isn't Everything: Where Colocation Fits into Hybrid IT

Many article exaggerate the shift from on-premises IT infrastructure to public cloud services. It's often made to seem like an all-or-nothing situation. But for most businesses, hybrid IT will continue to be the reality. Rather than trying to force every system to move to the public cloud, it's important to understand the value of maintaining on-premises control. That's where colocation can help. In this post, we'll offer an intro to colocation's role in hybrid IT.

Content type: Blog Post

Links:

Colocation vs. Disaster Recovery as a Service—How to Choose Your Best Option

Businesses rely so heavily on connectivity for mission-critical services that disaster recovery has become an absolute necessity. Any downtime (for whatever reason) could cost your company millions of dollars per year. And that leads to a choice between two main options—cloud-based DR in a colocation facility or DRaaS. There's no one-size-fits-all solution. In this post, we'll talk about the advantages and disadvantages of each and explain how to choose your best option.

Content type: Blog Post

Links:

Immersive Experiences

This is a placeholder pitch for the assignment we discussed about immersive experiences in travel, tourism, and entertainment. I'll look into the NFL/NBA investments mentioned and come up with an article geared toward customer experiences. I can't set specific due dates on my end, but I'll have it done by Monday 9/24 if that works (let me know if you had something else in mind).

Content type: Blog Post

Links:

ABM's Personalization Problem

Personalized content is an aspect of ABM that's never forgotten, but rarely executed. B2B marketers know they need to personalize their content, but may not have the budget, technology, or data to make it happen. The problem is that even the best ABM strategies can fall apart without personalization. In this post, we'll discuss the importance of personalized content, the challenges of making it, and how to actually succeed.

Content type: Blog Post

Links:

Managed Services Pages (4)

Assignment placeholder for the 4 remaining Managed Services Pages.

Content type: Blog Post

Links:

WP Update: Firewalls vs SBCs

Placeholder for the updated white paper delivered 9/27

Content type: Whitepaper

Links:

The Small Business Checklist for Proactive Cybersecurity

The signature-based anti-virus software and firewalls that protected SMBs for years are no longer effective. Rather than hoping to get by with the traditional, reactive approach to security, SMBs need to shift to a proactive approach. But how? This white paper will discuss the shift from reactive perimeter defenses to proactive endpoint protection and comprehensive security. Then, we'll provide a detailed checklist to get there (creating a baseline, evaluating tech, etc.).

Content type: Whitepaper

Links:

Don't Confuse Compliance with Security

For highly-regulated industries, compliance is a fact of life. And in these days of rampant data breaches, compliance requirements are stricter than ever to ensure you're properly protecting sensitive personal data. However, just because an SMB is compliant doesn't mean it's secure. In this post, we'll talk about the difference and explain how SMB leaders can ensure they're prepared in both regards.

Content type: Blog Post

Links:

The Circular Economy

White paper based on existing content. Refer to email explanation.

Content type: Whitepaper

Links:

Q3 Data Post

To be completed once the data comes through.

Content type: Blog Post

Links:

Trade Your Phone or Sell It Yourself?

Post based on discussion with Scott

Content type: Blog Post

Links:

Don't Keep Phone as a Spare

Post based on discussion with Scott

Content type: Blog Post

Links:

Addressing SMB Verticals as a CSP

Acting as a jack of all trades is rarely strong advice. That applies to CSPs trying to capture market opportunities with SMBs. You can't be everything to everyone, which means addressing the needs of individual verticals is essential to success. In this post, we'll talk about how CSPs can do just that. (From Gartner report)

Content type: Blog Post

Links:

How the SMB Lifecycle Impacts CSP Sales

For most CSPs, the main focus of sales is on where an SMB stands in terms of communications maturity. Even though VoIP has been around for 20+ years, there are still companies that are using decades-old communications infrastructure. You wouldn't approach that company the same as a more modern SMB. But it's not just about communications maturity. In this post, we'll talk about how business maturity impacts CSP sales. (From Gartner report)

Content type: Blog Post

Links:

Don't Get Lazy with SMB Segmentation

Most CSPs look at the SMB market as three distinct groups: micro, small, and midsize. That broad segmentation will only take you so far—it leaves a lot of room for improvement in terms of capturing market share with SMBs. Believe it or not, specific company size makes a big difference in the way you approach SMBs. In this post, we'll talk about why. (From the Gartner report)

Content type: Blog Post

Links:

Digital Customer Experience in Financial Services

White paper based on the call we had regarding customer experience, digital transformation, and the challenges that the financial services industry faces when adapting.

Content type: Whitepaper

Links:

Market Report: North American Non-Adopters

Market report based on data and analysis from John (call was on 6/8)

Content type: Whitepaper

Links:

Branch Webinar Promo

Blog to promote the upcoming webinar with Branch.io. Draft delivered 6/14

Content type: Blog Post

Links:

Consumerization of IT

Blog based on Ben's notes/direction. Delivered 7/31

Content type: Blog Post

Links:

Creating Delightful Moments Through the Entire Customer Journey

White paper based on discussion with Ivy and all of the notes/files provided. To be finished by 8/4. See Google Drive folder for resources.

Content type: Whitepaper

Links:

A Cloud Computing Reality Check

We've talked plenty about the challenges of monitoring end-user experience as more and more applications go to the cloud. But the rush to the cloud is now evening off. While cloud adoption will continue to grow, reports say that IT hardware is bouncing back in a big way. In this post, we'll talk about why physical infrastructure is "coming back," the growing reality of hybrid IT, and why monitoring solutions have to cover both sides of the discussion equally well.

Content type: Blog Post

Links:

WebRTC: Boon for End-User Experience, Burden for Networks?

In theory, WebRTC enables voice and video apps to run natively in web browsers rather than forcing users to download plugins or apps. But more than that, WebRTC also created the potential for direct endpoint-to-endpoint calls without the needing complex backend infrastructure. WebRTC adoption hasn't been as smooth as people may have expected, but it's seeing increased support. In this post, we'll talk about why that's great for end-users but a challenge for network admins.

Content type: Blog Post

Links:

Wearables Blog Post

Blog post based on the 4/3 brain dump. Discussing high level awareness that the wearables/smart watch market is growing and trade-ins are valuable.

Content type: Blog Post

Links:

IoT is Pushing Computing to the Network Edge

With the growth of IoT, we are seeing a host of innovative technologies, mainly aimed at cutting down the lag time between gathering data into a cloud platform, analyzing it and taking action, according to Forrester. As a result of this, there is an acceleration in edge computing, an architecture where data is processed closer to where it is generated, at the “edge” of the network. Emerging tools, such as gateway servers, microdata centers, cloudlets, fog fabric nodes and other innovations...

Content type: Blog Post

Links:

Break Down Silos, Bring Order to Your Data Pipeline

There's no such thing as too much data. Instead, there's only data management that's too inefficient. With so much data at your fingertips, you should be able to make dynamic decisions—except silos create pipeline chaos that prevents business leaders from making the most of data. The key is to bring automation to the data pipeline and make analytics more approachable to business stakeholders. This post will discuss how Apache NiFi helps make that happen. (Will help promote the book)

Content type: Blog Post

Links:

Secrets to Acing Your Presales Process

"Preparation is the key to success." It's a cliche for a reason and that reason is especially clear in the presales process. But preparation is time consuming and your sales reps don't have time to bounce back and forth between different apps and emails and documents trying to get a clear picture of the prospect. In this post, we'll talk about the secrets to streamlining presales process—the information you need and, ultimately, the automated tech to bring it all together.

Content type: Blog Post

Links:

3 Pillars of Connectivity for Multi-Access WAN Design

Multi-access WAN designs are becoming the norm as businesses across industries become increasingly dispersed geographically. It’s one of the main reasons why SD-WAN solutions have gained popularity so quickly. When investing in SD-WAN and establishing your network design, it’s important to address 3 pillars of diverse connectivity—providers, access, and routing. In this post, we’ll explain what each pillar means.

Content type: Blog Post

Links:

How to Ease the Shift to Data Center Colocation

Sometimes data center colocation is more of a necessity than a luxury. Because agility and mobility are so important for business success, you can't afford to keep every service on-premises and ignore the benefits of cloud models. However, shifting to a colocation model doesn't have to be so intimidating. In this post, we'll talk about the keys to successfully preparing for a move to your colocation facility.

Content type: Blog Post

Links:

Think Your Small Business Is Secure? One Way to Find Out

So many small businesses take a set-it-and-forget-it approach to cybersecurity. They want to put defenses in place and then focus their resources on growing their businesses. But with the current threat landscape, it's not enough to just assume your aging security measures are getting the job done. That's why penetration testing is such an important first step in maximizing small business security. In this post, we'll talk about the perception of pen testing and explain why it's so valuable.

Content type: Blog Post

Links:

Can Cyber Attackers Really be Stopped?

The short answer is yes. But data in the 2018 State of Endpoint Security Risk Report suggests that business and IT leaders are rapidly losing confidence in their defenses. As the number of connected endpoints expand the attack surface for an organization, hackers have more chances than ever to compromise your network. In this post, we'll talk about some of the findings from this report and explain what to look for in a proper endpoint security solution that bucks the current trends.

Content type: Blog Post

Links:

You Can't Throw Money at the Ransomware Problem

If you watch enough TV and movies, you know that paying a ransom is never actually the surefire way to end a threat. When you give up the money, you lose leverage and the attackers/criminals can do whatever they way. The same goes for small business data. Many leaders' first instincts are to simply pay the requested ransom to release files. But it doesn't work that way. In this post, we'll explain why (and what to do instead of panicking).

Content type: Blog Post

Links:

Tech Strategy and Your Bottom Line

Hey Griffin, just throwing this placeholder assignment in for the WP we discussed. I have everything I need from your emails (and the recording worked just fine). Let me know if there's anything else, but otherwise, I'll get you a draft soon! Putting 2 weeks in as the turnaround, but I should have time before that deadline.

Content type: Whitepaper

Links:

Don't Count Carriers Out of Your Trade-in Options

Consumers looking to get some value out of their old devices might do a quick search for their best cell phone trade-in options. A popular CNET article lists 13 different outlets for trade-ins—none of which are carriers. There's expected friction when working with carriers that keeps consumers from thinking of them as trade-in options. In this post, we'll talk to consumers about what they can expect from modern trade-in programs and convenience of working with carriers when you upgrade.

Content type: Blog Post

Links:

Employee Experience: The Pitfall of Corporate Owned, Personally Enabled Device Policies

Bring your own device programs are great for businesses because they offer the best possible employee experience when it comes to mobile devices. But BYOD isn't exactly secure—or easy to manage. One alternative is the corporate owned, personally enabled (COPE) policy. However, locking employees into certain (often old) devices can be less than ideal. In this post, we'll talk about the ways a good trade-in program can make COPE a win-win for employees and business leaders.

Content type: Blog Post

Links:

Make Your Legacy Systems Speak a Modern Language

When you hear about the IT skills gap, it's usually in the context of having more engineering and developer jobs than there are candidates to fill them. For enterprises, there's more to consider. Finding the best Python, Node.js, and Java developers is one thing—but what about finding emerging talent that can work with COBAL and legacy systems? In this post, we'll talk about the importance of making legacy systems speak modern languages to make the most of developer talent.

Content type: Blog Post

Links:

Clearing Up Engagement Confusion in Account-Based Marketing

One of the biggest issues with ABM is confusion about the practice and how to make it work. Having a seemingly-vague metric like "engagement" play such an important role doesn't help. The problem is that misguided ABM programs stop short with metrics like website visits and marketing automation activities. Bringing those stats to the sales team won't help win accounts. In this post, we'll talk about how marketers can go deeper to track engagement and really qualify accounts for sales teams.

Content type: Blog Post

Links:

Beware the Allure of ABM Vanity Metrics

Page views, email opens, webinar registrations, social shares. All of these metrics (and other vanity options like them) present easy opportunities for marketers to showcase some level of success. Except they're value to ABM as a whole is limited. They only scratch the surface of what is truly necessary to win new business. In this post, we'll talk about the attributes of valuable metrics and explain why uncovering purchase intent needs to be the driving motivation for marketers.

Content type: Blog Post

Links:

Event Content Strategy: Why Blogging Still Fits into the Equation

Building up a hashtag, creating social media buzz, discounting tickets, running promotional contests. All of these tactics play a role in generating interest in your event over the course of a year. In the midst of so many short-term promotional tactics, event organizers often downplay the value of blogging. In this post, we'll explain why blogging forms the bedrock of event content strategy, giving you an opportunity to build an audience for long-term event growth.

Content type: Blog Post

Links:

How to Choose a Topic for Your Event Blog

It's the make or break decision of any business blog—what should you actually blog about? For event organizers, this can be an especially difficult decision. When your primary objective is to sell tickets and maximize attendance, it's easy to fall into the trap of making your blog posts overly promotional. This post will go through some tips for picking a blogging focus that builds a loyal audience (assessing event speaker topics, focusing on value first, building audience personas, etc.)

Content type: Blog Post

Links:

Hosted UC and SIP Trunking Troubleshooting Interface

Just sending an assignment for the blog post you requested: "How a centralized, graphical, and easy to use interface allows you to monitor, troubleshoot, and resolve issues with your Hosted UC and SIP Trunking network?"

Content type: Blog Post

Links:

Microservices and the Slow Shift Away from Monoliths

In the first wave of digital disruption, enterprises rushed to transform themselves before competitors passed them by using the cloud and mobile support. Those technologies put stress on legacy enterprise monoliths. However, in the next wave of digital transformation (AI, IoT, machine learning, etc.), monoliths will hold you back. In this post, we'll talk about how microservices are giving enterprises a chance to meet digital transformation demands despite their complex, monolithic architecture.

Content type: Blog Post

Links:

Don't Let Your Monoliths Turn DevOps into a Pipe Dream

DevOps has quickly become a necessity for businesses looking to stay ahead of competitors. While startups can establish themselves as DevOps-first companies, enterprises aren't so lucky. The reality is that enterprise DevOps looks a lot different than the typical definition. That's because legacy systems and monoliths present roadblocks to implementing the principles of successful DevOps. In this post, we'll talk about what makes enterprise DevOps different and how to best support it.

Content type: Blog Post

Links:

The Data Security Dilemma: Protecting Legacy Systems when DevOps Steps in

In a world of cloud computing, agile development, and DevOps, legacy systems still present at least one key advantage—security. As complex as they are, legacy mainframes keep data safe because they're siloed from so many of the vulnerabilities modern infrastructure must contend with. But you can't just ignore the advantages of modern infrastructure. In this post, we'll discuss how to maintain data security as you modernize legacy systems.

Content type: Blog Post

Links:

Making the Most of Artificial Intelligence for Small Businesses

For small business leaders, the path to success with artificial intelligence isn't always clear. It's easy to buy into the promises of innovation that AI brings. But for SMBs with limited resources, it's equally easy to see AI as a pipe dream reserved for large enterprise budgets. Rather than getting lost in the complexities of AI and machine learning, SMB leaders should focus on practical use cases. In this post, we'll talk about making AI accessible for small businesses.

Content type: Blog Post

Links:

Quality vs. Quantity: How Intent Data Improves Your Email Marketing

There's an art and science to email marketing. You want to provide value to your list, but there's a fine line between communicating too much and sharing too little. Too often, brands will just blast entire lists with the same information, hoping that high quantities will increase total conversions. But with intent data, you can focus on quality over quantity. In this post, we'll talk about using intent data to tailor emails to the buyer's journey—increasing conversions in the process.

Content type: Blog Post

Links:

Building a Productive ABM Practice with Intent Data

At a high level, account-based marketing sounds great. You focus your efforts on specific accounts, tailor content to their needs, personalize outreach, and increase your chances of closing a deal. Except sometimes you spend all that time and effort just to see the prospect sign with a competitor. How do you minimize lost productivity? In this post, we'll talk about using intent data to target the right prospects at the right time so your team spends its time wisely.

Content type: Blog Post

Links:

Can You Trust Third-Party Data to Improve ABM?

There are plenty of vendors out there who will supply you with third-party data for your ABM efforts. But not all providers are created equal. And as a result, third-party data has gained a bit of a reputation for poor quality. However, if you find the right partner, you can trust third-party data and significantly benefit from using it. In this post, we'll talk about the value of third-party data for ABM and how to find a trusted provider.

Content type: Blog Post

Links:

The Content Marketing Engagement Challenge (and How Intent Data Helps)

Content marketing is facing a bit of a crisis. It took a while, but it seems most businesses have bought into the value of content. However, that's created an over-abundance of quality content, making it harder than ever for your brand to stand out. Before you jump on the "content marketing doesn't work" bandwagon, take a step back and see how intent data can solve your problems. This post will talk about how intent data can help you pick topics that will engage readers and deliver results.

Content type: Blog Post

Links:

How Intent Data Unlocks the True Meaning of Email Personalization

Email personalization isn't just about putting a recipients first name in the subject line and greeting. With the data and technology at our fingertips, we can do so much more. However, subject line personalization leaves a lot of room for improvement. Most advice for writing subject lines revolves around gaming the system to get as much attention as possible. This post will talk about how intent data helps you write truly personalized subject lines that are tailored to interests of recipients.

Content type: Blog Post

Links:

Total Addressable Market: Using Intent Data to Get a Clear Picture

Even before you do any ABM research, you could probably come up with a list of target accounts that you'd love to sell to. However, just because you think an account is a good fit for your product doesn't mean that account is in your market. Instead of chasing accounts you won't win (for now), you need to see the total addressable market clearly. This post will discuss how intent data gives you the information necessary to outline the total addressable market and pursue it accordingly.

Content type: Blog Post

Links:

Bridging the Gap Between Lead Gen and ABM with Intent Data

Many explanations of account-based marketing paint the emerging strategy as some kind of replacement for lead generation. After all, why focus on generating leads when what your sales team really cares about is closing accounts? But lead generation still plays an important role for marketers and, with the right approach, can serve ABM well. In this post, we'll talk about how intent data turns leads into the contact information that fuels ABM success.

Content type: Blog Post

Links:

Intent Data: A Common Language for Sales and Marketing

There have been plenty of articles written about the disconnect between sales and marketing teams. And while many offer advice for improving communication and collaboration between the two departments, one fact remains—sales and marketing continue to speak different languages. But with account-based marketing, that finally changes thanks to intent data. In this post, we'll talk about how intent data can help marketers align with sales goals to generate business results.

Content type: Blog Post

Links:

5 Ways that Marketers Frustrate Sales Teams and How to Adapt

We've talked about the gap between sales and marketing teams. But even if your sales and marketing teams aren't fighting against each other, the reality is that traditional sales enablement processes often only complicate the relationship. To achieve better business results, marketers need to take more action to improve sales enablement. In this post, we'll present 5 different gripes that sales often has with marketing and how intent data can resolve the issues.

Content type: Blog Post

Links:

Why Time is of the Essence in Digital Advertising

In the earliest days of inbound/content marketing, you could carve out your corner of the internet, provide helpful content, and win business through lead generation. But the world of content marketing has increasingly become pay-to-play, putting pressure on digital marketers to optimize ad spend. Digital advertising gives you an opportunity to get the right messages in front of the right people. In this post, we'll talk about why timing is everything and the role intent data plays.

Content type: Blog Post

Links:

Get Content Syndication Right with Intent Data

There's nothing worse than putting all the time and effort into creating a great piece of content just for no one to see it. But that's the reality for a vast majority of content. One of the best ways to get your content in front of your target audience is to create a comprehensive content syndication strategy. However, syndicating your content doesn't automatically lead to success. In this post, we'll talk about how intent data helps you target the right syndication opportunities.

Content type: Blog Post

Links:

The Problem with Influencer Marketing (and How Intent Data Solves It)

Influencer endorsements can be a gold mine for brands looking to increase awareness and generate more demand. Or, maybe you end up investing in influencer marketing only to find that you can't track ROI. There's a wide range of possibilities when it comes to influencer marketing. And the biggest problem is that businesses struggle to identify the right influencers—the ones that will have an impact on your goals. This post will talk about how intent data helps identify the right influencers.

Content type: Blog Post

Links:

3 Ways that Intent Data Maximizes Digital Ad Performance

Unlike other forms of advertising, digital ads aren't meant to reach a mass market. If your target audience is too broad, you could end up wasting your budget on clicks that never convert. By using intent data effectively, you can maximize digital ad performance and improve business results. In this post, we'll go over 3 key ways that intent data boosts ad performance—topic choice, contextual targeting, and demographic decisions.

Content type: Blog Post

Links:

Building Intent Data into Your Sales Enablement Processes

Simply investing in third-party intent data won't revolutionize your business results. You need to know how to build processes around the data at every stage of the funnel. The most important component of building intent data into sales enablement is to have a comprehensive plan for intent scoring. In this post, we'll take a closer look at how intent scoring works to improve sales enablement and close deals more efficiently.

Content type: Blog Post

Links:

Finding Your Best Intent Data Use Case

Intent data has surged in popularity in recent years. Marketers know that every insight they have into their target audience can help close deals more efficiently and maximize ROI. But is intent data really worth all the hype? It is—if you use it properly for your specific needs. In this post, we'll talk about the current state of intent data and the various use cases marketers can consider if they're just starting out.

Content type: Blog Post

Links:

The 4 Keys to Effective Intent Marketing

Don't just look at intent data in a vacuum. It's more effective when you use both first-party and third-party intent data to create a larger, more strategic intent marketing plan. But how? Effective intent marketing strategies use intent data to inform every tactic. And in this post, we'll discuss the four pillars that make this work—identifying customers, understanding interests, predicting behavior, and taking data-driven action.

Content type: Blog Post

Links:

Behind the Scenes Integration

Based on call with Scott 7/15

Content type: Blog Post

Links:

Device Protection White Paper

Based on call with Linda and Alan on 5/8. Setting the turnaround at 2 weeks, but should get it done sooner (I just don't have flexibility to set specific days).

Content type: Whitepaper

Links:

Solving 3 Brand Awareness Challenges with Intent

"If you build it, they will come" doesn't usually apply to the world of B2B products. There are so many options available to buyers that you have to do more than just create a great product if you want to stand out. But the path to brand awareness is often a mystery to B2B organizations. In this post, we'll cover 3 of the most common brand awareness challenges and explain how they can be solved with a strong foundation of intent data.

Content type: Blog Post

Links:

Intent Data: Your Key to Building Relationships with Field Marketing

It may be called field "marketing," but the reality is that field marketers are more like extensions of a sales team. Field services give you a chance to get out from behind emails, social media, and web content to build in-person relationships with your target customers and accounts. But no one said it would be easy. Whether it's at an event or elsewhere, you need to make a lasting impression quickly. In this post, we'll talk about how intent data gives you the insight needed to do just that.

Content type: Blog Post

Links:

Maintain Phone Value

Based on call with Scott 7/15

Content type: Blog Post

Links:

4 Keys to Acing Your Next Product Demo

In a marketing world dominated by self-serve digital channels, social media, and minimal human contact with customers, field marketing can seem old-fashioned. But for B2B companies, this kind of direct selling is an essential piece of the buyer's journey. Just because field marketing is a more traditional discipline doesn't mean it has to feel that way to your prospects. In this post, we'll talk about 4 keys to modern product demo success. And in the end, they're all fueled by intent data.

Content type: Blog Post

Links:

Marvel Data Visualization

This might be a stretch, but I'm going off of the data visualization request. I recently saw a Marvel Cinematic Universe data visualization that tied together all of the characters and storylines from the 20+ movies since 2008. I think this could be tied back to the value of intent data visualization. Like the MCU, customer relationships come with long, complicated histories. Visualizing the data can offer insights you wouldn't notice at first glance.

Content type: Blog Post

Links:

Intent Data News

This is based off the news roundup idea that was requested. I grabbed a couple of articles quickly and will look to find more from June when I go to write. Topics include: Salesforce buying Tableau, IntentData.io new contact feature, new Google features to drive in-store purchases, Trump advertising during Democratic Debates.

Content type: Blog Post

Links:

Precision: The Main Reason You Can Trust Intent Data

The last thing any marketer needs more of is data for data's sake. You have enough information to sift through already. What's more important is finding data that you can trust and that will ultimately help you drive business results. While there are many different types of data you could purchase from third-party providers, intent data is one of the most trustworthy. In this post, we'll talk about how intent data offers precision that mitigates risk when investing in third-party services.

Content type: Blog Post

Links:

The Keys to Running Display Ads that Don’t Fail

Let’s face it—the average clickthrough rate on display ads is awful. And yet, annual spending on display ads continues to rise. The problem isn’t that you can’t see ROI with display ads. It’s that we’re running them inefficiently. This post will cover some of the biggest red flags that lead display ads to fail (and how intent data makes a difference).

Content type: Blog Post

Links:

Retargeting with Intent: Getting Ads to the Right People at the Right Time

Timing is everything for marketers trying to get the most return on advertising investments. Retargeting is the best way to automate the process. But running a retargeting campaign isn’t as simple as just clicking a button. While ad networks will help you run retargeting campaigns, it’s not guaranteed to get you results. In this post, we’ll talk about how intent data can improve your odds of success and help you time your ads correctly.

Content type: Blog Post

Links:

How to Write Guest Posts that Actually Work

One of the most common pieces of advice for content marketers is to focus more on guest posting. At one point, guest posting was the most surefire way for bloggers and marketers to get the word out about their brands. But now, there are so many places to post and so much content that results can vary. This post will explain how intent data can help you make informed decisions about where to guest post and what to guest post about to get results.

Content type: Blog Post

Links:

3 Keys to Better Relationships with Your Influencers

A few years ago, many marketers thought that influencer marketing would be a silver bullet for brand awareness. Throw some money at an “influencer” and watch the purchases roll in. Soon enough, people realized this just wasn’t true. Influencer marketing is about building strategic partnerships and relationships. In this post, we’ll talk about how intent data helps you approach influencers in ways that form better relationships.

Content type: Blog Post

Links:

The Middle of the Funnel: Where Too Many Potential Deals Fall Apart

Content marketing isn’t supposed to be exclusive to one part of the sales funnel. And yet, so many programs focus so heavily on the top of the funnel that the middle and bottom fall short of expectations. You can bring all the traffic in the world, but if you aren’t supporting sales with the next steps, it could all be for nothing. In this post, we’ll talk about improving mid-funnel engagement with tactics powered by intent data.

Content type: Blog Post

Links:

Why All Marketers Might be at Least Part-Visual Learners

Marketers create so much written content that you might think it’s the only way to learn or consume information. Shifting some focus to videos and images can help capture attention more effectively. But it’s not all about customer-facing tactics. Data visualization can have a significant impact on how you strategize, too. In this post, we’ll talk about the value of data visualization for content analytics and other aspects of marketing.

Content type: Blog Post

Links:

What Really Makes Intent Data So Valuable?

We talk a lot about the different ways that intent data gives companies a significant competitive advantage. But what doesn’t get enough attention is the one key characteristic that makes intent data so valuable—precision. In this post, we’ll look closer at how intent data is collected and what makes it so precise.

Content type: Blog Post

Links:

Which ABM Metrics Are Most Important for Success?

The biggest difference between ABM and traditional demand gen is the shift away from leads as the primary KPI. ABM can make your marketing more efficient—but only if you adapt your measurement accordingly. Traditional metric tracking won’t necessarily lead to success. In this post, we’ll talk about the key metrics for ABM success and why intent has to be involved.

Content type: Blog Post

Links:

How to Get Your Data Ready for ABM

Teams that are just getting on board with ABM make a common mistake. They take the data they have and just dive right into a strategy. And while experimenting with new tactics and learning quickly is essential, you can save some time by setting yourself up for success early. In this post, we’ll discuss the importance of data preparation in the success of any ABM program.

Content type: Blog Post

Links:

Why Your ABM Might be Falling Short of Expectations

Account-based marketing is supposed to be the answer to all of marketing’s biggest problems. Finally, no more stuffing the funnel with leads that will never convert. We can focus on the right accounts and watch the sales roll in. Except not every team finds success with ABM. In this post, we’ll talk about why the problem isn’t ABM itself and what causes so many strategies to fall short of expectations.

Content type: Blog Post

Links:

Recommendations

Highly skilled tech writer

Joe is an outstanding writer who consistently produces extremely well-written and well-researched pieces on a variety of tech topics. He is able to tackle any subject, and always delivers top quality content in a timely manner. He is also extremely pleasant and easy to work and truly cares that the client is satisfied.

Yeru Chernilovsky, KeyScouts

My Go-To Writer for, well, Everything.

Joe has been absolutely amazing to work with - both as a writer and, more importantly, as a partner in marketing. He understands the need for content to resonate with the respective audience and is seemingly an endless source of topic knowledge.

Matt Solar, nDash.co

Intelligent, talented, creative, and extremely hard-working

I'm continually impressed with Joe's ability to tackle the most complex types of writing projects. Not only is he a great writer (who loves what he does) but he's able to immerse himself into a brand's story, while also taking the time to learn the ins and outs of their space, no matter how technical. Highly recommend making him part of your content community.

Michael Brown, nDash.co