I am an accomplished digital content writer and marketing professional with over five years of experience crafting compelling content for leading information communications and technology businesses.
Top 5 challenges CMOs will face in 2018 and how AI can help
Key Points:
– AI is not only helping enterprises empower customers, it’s making the omni-channel experience, personalization and self-service competitive imperatives
– Only about 7 percent of Chief Marketing Officers (CMOs) surveyed found their digital transformation initiatives were exceeding their expectations
– AI can help companies to get better insights from a multitude of applications, and enable their employees to better serve customers, and understand their buying behaviors
The Hunt f...
Virtual Data Rooms for Clinical Trials Sell Sheet
I created an ebook to promote how Firmex' Virtual Deal Rooms can help pharmaceutical companies to store and share unstructured files and data about clinical trials.
3 Steps to Building a High Performing Sales Team
Oracle was looking for a thought leadership ebook to inspire sales managers to build high performance sales teams. Topics included how gamification, coaching, territory assignment and other tactics
The Impact of Digital Transformation on Customer Experience
A whitepaper on how customer experiences are improved as companies move their business processes to digital channels like the cloud, VoIP the internet, their intranet and Software as a Service.
2016 Social CEO Report
A research report on the adoption and use of social media by Fortune 500 CEOs. An annual report sponsored by Domo, published by CEO.com
Why data retention is vital for businesses in the financial services sector
The financial services industry is highly regulated, and businesses within this sector need to meet strict compliance requirements—managing unstructured content like contracts, bank statements, insurance policy documents, and investment certificates.
How to exceed gamers’ customer service expectations through outsourcing
The gaming industry can be a dog-eat-dog world.
With a market estimated at $23.5 billion in the U.S. alone, video-game studios are perpetually locked in a cutthroat battle to produce the next big thing — the best graphics, the best storytelling, the best soundtracks.
When to Source vs When to Hire
Let’s say your business has reached a growth phase, or requires a skillset or extra set of hands, feet and brains beyond that of the founding partners. Let’s also say you’ve got limited finances at the moment to bring on that extra help. What should you do?
You could hire a fulltime employee, and cross your fingers the demand for your products or services continues to grow to a stage where you can sustain their salary and related expenses. Or, you could hire a freelancer or contractor, and ho...
Why Cloud Service Providers Should Outsource IAM Services
Reading Time: 3 minutes
Cloud service providers are facing increased demand for convenient and user-friendly access to their services. The ability to support multiple access and authentication protocols for single sign-on (SSO) has become an important competitive advantage.
These protocols include:
● Web security protocols like SAML, OpenID and OAuth.
● National digital identity systems.
● Social media credentials like Twitter, Google or Facebook.
● Two-factor or multi-factor authentication t...
Lululemon Athletica - AWS Case Study
Several years ago, lululemon decided to offer more digital services and push out new applications and features faster. However, the company had a limited ability to quickly develop new applications because of its collocated IT environment. “We didn’t have the ability to move as quickly as we needed to,” says Sam Keen, director of product architecture, who was recently hired to design and implement the environment for new products.
Stop departing employees from exiting with your information
When an employee resigns or is terminated, it is a challenging time for management and former colleagues. On the employee’s last days, focus tends to be on enabling the ex-employee to leave with dignity, and to make arrangements to reassign their duties to their former colleagues.
Policies and procedures to “offboard” former employees are often not as well documented as for onboarding new hires. If an employee had access to a myriad of business applications, their credentials to some of them ...
Why it's important for employees to escape their desks over the lunch hour
There’s always a conference call, report deadline or “lunch and learn,” which seem to keep your employees at their desk over the lunch hour. Yet the benefits of allowing them to submit the report a little later or plan their calendar more effectively can produce significant gains
Investing in Technology to Move Your Business Forward
Yes, adopting new technology can often help you make more money or to cut costs. And that’s usually reason enough to prioritize an investment in technology for your business.
But seizing and maintaining a leading edge is another other important reason to prioritize new technology. So if your business needs a dose of innovation, these are four of the reasons you should invest in technology that we came up with, just for you:
1. Improved Quality of Service/Net Promoter Scores
If your business h...
Low Impact IT Management
Ensuring your company’s information is available, secure and reliable on an ongoing basis is a daunting task. IT managers and administrators are being asked to deliver more value with fewer resources. Further applications need to be managed, and user devices need to tuned and protected. Yet you can’t close down your business to optimize your technology.
Before you throw up your hands in frustration, there are ways to cope. You can change your role and reputation in the company from an IT mech...
Provision your Virtual Data Room as a Board Portal
Boards of Directors need to be constantly equipped with materials which can provide them with
reliable data to make informed decisions. Directors require access before they assemble in your
boardroom, and preparation time is required to ensure meetings adhere to the agenda. Emailing
several large attachments is not only challenging, it doesn’t meet the security requirements which
your confidential documents need to be properly protected.