“But it’s not just a black and white question,” says Megan Tederick, Senior Manager, Product Marketing & Strategy for Cognizant. “‘Do digital events work for you,
In today’s digital world, your company’s website is an online billboard and storefront that’s open 24/7. In an ongoing survey with DeLaune clients and contacts, we found that many enterprises’ most valuable leads spring from live events.
One respondent noted that after taking part in this year’s RSA and CES conferences, her company “came away with some solid leads as well as an invitation to do a briefing for Gartner,” saying “[As] a start-up,
Remember life before Google? Even when information existed in digital form somewhere, searching for it was mostly a manual process. Rereading David Weinberger’s 2007 Everything is Miscellaneous made me think about how far we’ve come to address search in the modern age, and how far there is to go.
It’s around here. Somewhere.
Searching network data stores with Windows’ native tools is slow, and the results are harder to interpret and to trust than those of modern Internet search engines.
In 2012, Shaku Selvakumar took the kind of step that entrepreneurs live for: She stepped out of a successful marketing career at IBM to help guide the growth of a stealth-mode startup.
That startup, CognitiveScale, took a hint from its own name: Shaku started as employee number five; the headcount now is over 150.
I spoke with Shaku about the insights that experience yielded, in going from an established enterprise to a nimble startup.
The Austin American-Statesman says that whether Austin is fit to be called a cybersecurity hub depends on who you ask. We think that Austin’s clearly arrived on that front already—partly because of the kind of companies and organizations the paper highlights, including Jask, SailPoint, and the U.S. Army’s Futures Command HQ, and partly because of the security ventures, subsidiaries, and infrastructure elements the article glosses over.
At DeLaune, we specialize in creating benefit-driven digital marketing assets, and we pride ourselves on it. We’d be happy to help you craft a new infographic, a buyer’s guide, or a series of in-depth white papers.
But every organization has a different set of needs. So it makes sense to ask: Are you keeping the right parts of your message creation in-house? Are you taking advantage of outside teams when it makes the most sense?
“A relationship, I think, is like a shark. You know? It has to constantly move forward or it dies. And I think what we got on our hands is a dead shark.”
Alvy Singer, Annie Hall
A blog is a lot like a relationship—and it is one, in fact, even if it might seem awfully one-sided at times. What’s more, it’s a relationship that comes with a commitment problem,
Imagine what would happen if you lost your most important work password—and everything it protected—with no chance of retrieval. Your data? Just “poof”—gone! How much would it cost your company? What if it were well over $100 million? Because that’s what just happened to Canadian crypto-currency exchange QuadrigaCX with the apparent death of its CEO, Gerald Cotten. A high price to pay for poor security practices.
A sad lesson
It’s clear that no one in the company instituted proper Identity Governance Administration (IGA) practices.
In late December of last year, the news emerged that on October 23rd, NASA had discovered a data breach that may have exposed personal data (such as Social Security numbers) associated with current and former NASA employees.
How does such a thing happen? The folks at NASA are smart and hardworking; they know how to make systems about as bullet-proof and reliable as any ever devised, and they’re no pushovers about IT security,
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok