Results

HootSuite Launches Managed Social Media Security & Compliance Service for Enterprises

HootSuite Launches Managed Social Media Security & Compliance Service for Enterprises

HootSuite Managed Security & Compliance Services educate and empower enterprises to protect their brand and reputation

To help enterprises protect their brands as they scale social media across their organization, HootSuite has announced the launch of its Managed Security and Compliance Services. This new offering provides organizations with security and compliance tools to protect their brand and social media assets from internal and external threats. This is critical that organizations figure out social compliance. It’s one thing to focus on engagement of your customers. It’s another to make sure that ALL the engagement is of the type of engagement is “on brand” and keeps the brand in integrity.

“While businesses have adopted social media in record numbers, the lack of governance puts enterprises at risk for online security and compliance breaches,” says Greg Gunn, VP Alliances, Business Development, and Platform at HootSuite. “Our new managed services are designed to equip the enterprise with the right tools and response plans so they can safely use social media to grow their business while protecting their brand.”

HootSuite’s Managed Security and Compliance Services creates a secure, complete environment for policy management and enforcement across an enterprise’s entire organization, protecting its brand and data against a full spectrum of security and compliance threats. This is even more important for organizations within regulated industries such as finance, healthcare and insurance, as well as those that are publically traded and require persistent monitoring of their brand reputation.

Who’s using it? Check out ING DIRECT. “The nature of social media means that your brand’s reputation is often at risk,” says Jaime Stein, Senior Manager of Social Media at ING DIRECT. “Therefore, it’s important to have your team aligned and prepared to handle any situation that could compromise customer service or brand reputation. HootSuite’s Situational Simulation prepared our communications team for our recent company re-naming launch so that when it took place, our team was able to handle the response from our clients and the public effectively and efficiently.”

HootSuite’s new Managed Security & Compliance Services features include:

  • Social Media Asset Audit: Identify and govern both authorized and unauthorized social media profiles. The audit creates an Access Control Map, which allows administrators to outline legitimate profiles and determine which users can post to those profiles. We also help to remove illegitimate profiles to restore brand reputation.
  • Situational Simulations: Create a response plan for managing situations that could cause a drastic spike in activity volume on Twitter or Facebook. The exercise then engages users across the organization to react to a social media surge in a controlled environment using the HootSuite dashboard. Upon completion, HootSuite provides an executive summary and recommendations on ways to enhance the process and strategy.
  • Social Media Profile Monitoring: Monitor company-owned social media profiles for any security and compliance breaches. This ongoing service provides custom notifications when changes are made to account profiles to provide prompt alert if a hijacking occurs, and real-time content moderation to ensure all content conforms with predetermined compliance policies.

To learn more about managing risk in the enterprise, sign up now for HootSuite’s live webinar, “Managing Risk In a Social Organization: What Every CIO Needs to Know,” on Tuesday, March 11, 2014 at 11:00 a.m. EST. The webinar will feature insights from Nick Hayes, Security and Risk Analyst at Forrester Research; Lissette Santana, Branding and Stakeholder Communications Manager at PPL Electricity; and Sharad Mohan, Director of Customer Success at HootSuite.

More information:

 

Enhanced by Zemanta

Share

Marketing Transformation Next-Generation Customer Experience Revenue & Growth Effectiveness Future of Work Innovation & Product-led Growth New C-Suite Digital Safety, Privacy & Cybersecurity Marketing B2B B2C CX Customer Experience EX Employee Experience AI ML Generative AI Analytics Automation Cloud Digital Transformation Disruptive Technology Growth eCommerce Enterprise Software Next Gen Apps Social Customer Service Content Management Collaboration Chief Marketing Officer Chief People Officer Chief Revenue Officer Chief Customer Officer Chief Human Resources Officer

Avoid SharePoint eDiscovery Headaches Before They Begin

Avoid SharePoint eDiscovery Headaches Before They Begin

1

Sharepoint no colorLast week, this blog featured highlights from the very successful SharePoint eDiscovery webinar with Reed Smith.  It is a topic that came up time and again in my tenure as an analyst; companies and government Agencies are becoming tightly bound to SharePoint and want to be sure that eDiscovery ordeals can be avoided.

Microsoft SharePoint continues to gain widespread traction in organizations large and small.  A recent Forrester Research survey found that 66% of respondents will deploy SharePoint server in the next 12 months (source: Forrester Research August 2013 Global SharePoint Usage online survey).  The attraction to SharePoint is obvious – the system creates business benefits: enabling collaboration in efficient ways; providing ways to track versions of documents edited by multiple parties; allowing non-technical business people to apply basic workflow to content-driven processes, and providing faster access to information (via search and integration with the MS Office suite of apps).

For the value it creates, SharePoint can cause eDiscovery and information governance headaches if proper planning does not take place.  It is all too easy to assume that if information is searchable, eDiscovery will be no problem when the time comes.  But, as is often the case in life, the devil is in the details.  Because SharePoint allows users to add value to content (e.g. adding workflow tasks), there is the factor of metadata to consider.

In eDiscovery, metadata is a critical component of ESI that can wreak havoc on collection efforts.  When we talk about metadata for native ESI, we are usually concerned about the Operating System (OS) fields that are kept in the File Allocation Table (FAT). Different OS formats support a wide variety of fields such as different dates, attributes, permissions and file name formats (long vs. short). These fields are not usually stored within the actual file and so are very vulnerable to alteration or complete loss when items are read or copied. Forensic collection is focused on preserving this ‘envelope’ information so that evidence can be authenticated and the context reconstructed in court. That is only half of the metadata story. Microsoft Office and other programs retain non-displayed information within the header and body of all common file types, especially with the adoption of the XML based Office 2007 file formats.

This metadata issue is only extended with SharePoint because most collection efforts are focused only on grabbing SharePoint document libraries (as they are stored on file systems).  But SharePoint is so much more than document libraries (if it weren’t, it would simply be another file share sitting out there).

A defensible SharePoint collection solution will be able to capture document libraries, metadata, and truly enable contextual preservation.  When considering a SharePoint collection tool be sure that it:

  • Allows for incremental preservation, monitoring changes, identifying and preserving different document versions, and incrementally preserve to multiple matters over time
  • Maps to custodian access and prevent over-preservation, collecting and preserving only what is relevant to a particular custodian, not the entire SharePoint site
  • Is deployable in the same fashion as SharePoint, which tends to be highly decentralized and siloed; thus the collection solution should be deployable on-demand, directly to SharePoint sites through a highly automated, remote installation, with intuitive administration and operation performed through a standard web browser

At the end of the day, informed customers will make sure that the collection tool can get more than just SharePoint document libraries, but all metadata, as well.  Also, look for solutions that will not impact the production environment too heavily; you don’t want to bring SharePoint to its knees when it is a valuable business application.  And finally, get legal and IT together on the same page about how to reasonably prove that your SharePoint preservation and collection methodologies and tools are defensible.


New C-Suite Innovation & Product-led Growth SharePoint Microsoft AR Chief Customer Officer Chief Executive Officer Chief People Officer

Money from Nothing

Money from Nothing

1

Last week I wrote about Bitcoin and cryptocurrencies. Thursday night in New York I stumbled into another innovation in the medium of exchange:

This arrived with my check at the excellent Toshie’s Living Room in the Flatiron Hotel. Hardly a surprising development, but provocative.

I know you’re waiting for me to say this increases the liquidity of your social assets, but I’m not going there.

Consider the next phases of this market:

·  The frank and universal incentive (as opposed to asking your limited number of friends to review you) will further devalue the currency of Yelp approval, or any other social review site.

·  People wishing to monetize their status as Senior Contributor or Mega Maven or whatever should be able to trade-up to the top shelf by showing their status. Finally — value for your Klout score!

·  Would Toshie pour you a second shot to add a review on, say, Timout New York? You could drink all night, going from one club to the next and imbibing in exchange for reviews on all your social media.

More seriously, how does the cost per impression of this medium compare with, say, advertising on taxi screens?  It seems pretty economical, and reasonably well targeted, and builds some goodwill with the customer you already have. So I’d expect to see a lot more of it.

Postscript: earlier in the evening, in exchange for my applause, Melanie Marod, the also excellent singer, gave me a CD of her music. 

To paraphrase Dire Straits, it was an evening of “music for nothin’ and my drinks for free.”  This what happens when Andy Warhol’s 1968 prophecy — “in the future, everyone will be world-famous for fifteen minutes” — meet’s Ray Kurzweil”s from 2001: “We’re doubling the rate of progress every decade.”

Now, everyone’s a nano-celebrity. – CAM

Posted by Chris Meyer on February 26, 2014

New C-Suite Next-Generation Customer Experience Innovation & Product-led Growth Matrix Commerce Digital Safety, Privacy & Cybersecurity Data to Decisions Chief Customer Officer Chief Executive Officer Chief Information Officer

gotofail and a defence of purists

gotofail and a defence of purists

The widely publicised and very serious "gotofail" bug in iOS7 took me back ...

Early in my career I spent seven years in a very special software development environment. I didn't know it at the time, but this experience set the scene for much of my understanding of information security two decades later. I was in a team with a rigorous software development lifecycle; we attained ISO 9001 certification way back in 1992. My company deployed 30 software engineers in product development, 10 of whom were dedicated to testing. Other programmers elsewhere independently wrote manufacture test systems. We spent a lot of time researching leading edge development methodologies, such as Cleanroom, and formal specification languages like Z.

We wrote our own real time multi-tasking operating system; we even wrote our own C compiler and device drivers! Literally every single bit of the executable code was under our control. "Anal" doesn't ever begin to describe our corporate culture.

Why all the fuss? Because at Telectronics Pacing Systems, over 1985-1989, we wrote the code for the world's first software controlled implantable defibrillator, the Guardian 4210.

The team spent relatively little time actually coding; we were mostly occupied writing and reviewing documents. And then there were the code inspections. We walked through pseudo-code during spec reviews, and source code during unit validation. And before finally shipping the product, we inspected the entire 40,000 lines of source code. That exercise took a five person team working five hours a day for two months.

For critical modules, like the kernel and error correction routines, we walked through the compiled assembly code. We took the time to simulate the step-by-step operation of the machine code using pen and paper, each team member role-playing parts of the microprocessor (Phil would pretend to be the accumulator, Lou the program counter, me the index register). By the end of it all, we had several people who knew the defib's software like the back of their hand.

And we had demonstrably the most reliable real time software ever written. After amassing several thousand implant-years, we measured a bug rate of less than one in 10,000 lines.

The implant software team had a deserved reputation as pedants. Over 25 person years, the average rate of production was one line of debugged C per team member per day. We were painstaking, perfectionist, purist. And argumentative! Some of our debates were excruciating to behold. We fought over definitions of "verification" and "validation"; we disputed algorithms and test tools, languages and coding standards. We were even precious about code layout.

Yet 20 years later, purists are looking good.

Last week saw widespread attention to a bug in Apple's iOS operating system which rendered a huge proportion of website security impotent. The problem arose from a single superfluous line of code - an extra goto statement - that nullified checking of SSL connections, leaving users totally vulnerable to fake websites. The Twitterverse nicknamed the flaw #gotofail.

There are all sorts of interesting quality control questions in the #gotofail experience.

  • Was the code inspected? Do companies even do code inspections these days?
  • The extra goto was said to be a recent change to the source; if that's the case, what regression testing was performed on the change?
  • How are test cases selected?
  • For something as important as SSL, are there not test rigs with simulated rogue websites stress test security systems before release?

There seems to have been egregious shortcomings at every level: code design, code inspection, and testing.

A lot of attention is being given to the code layout. The spurious goto is indented in such a way that it appears to be part of a branch, but it is not. If curly braces were used religiously, or if an automatic indenting tool was applied, then the bug would have been more obvious (assuming that the code actually gets inspected by humans).

I agree of course that layout and coding standards are important, but there is a much more robust way to make source code clearer.  Beyond the lax testing and quality control, there is also a software-theoretic question in all this that is getting hardly any attention: Why are programmers using ANY goto statements at all?

I was taught at college and later at Telectronics that goto statements were to be avoided at all cost. Yes, on rare occasions a goto statement makes the code more compact, but with care, a program can almost always be structured to be compact in other ways. Don't programmers care anymore about elegance in logic design? Don't they make efforts to set out their code in a rigorous structured manner?

The conventional wisdom is that goto statements make source code harder to understand, harder to test and harder to maintain. Kernighan and Ritchie - UNIX pioneers and authors of the classic C programming textbook - said the goto statement is "infinitely abusable" and it "be used sparingly if at all." The Telectronics implant software coding standard prohibited goto statements, without exception.

Hard to understand, hard to test and hard to maintain is exactly what we see in the flawed iOS7 code. The critical bug never would have happened if Apple too banned the goto.
Now, I am hardly going to suggest that fanatical coding standards and intellectual rigor are sufficient to make software secure. It's unlikely that many commercial developers will be able to cost-justify exhaustive code walkthroughs when millions of lines are involved even in the humble mobile phone. It's not as if lives depend on commercial software.

Or do they?!

Let's leave aside that vexed question for now and return to fundamentals.

The #gotofail episode will become a text book example of not merely mention attention to detail, but moreover the importance of disciplined logic, rigor, elegance, and fundamental coding theory.

Yet a deeper lesson perhaps in all this is the fragility of software. Prof Arie van Deursen nicely describes the iOS7 routine as "brittle". I want to suggest that all software is tragically fragile. It takes just one line of silly code to bring security to its knees. The sheer non-linearity of software - the ability for one line of software anywhere in a hundred million lines to have unbounded impact on the rest of the system - is what separates development from conventional engineering practice. Software doesn't obey the laws of physics. No non-trivial software can ever fully tested, and we have gone too far for the software we live with to be comprehensively proof read. We have yet to build the sorts of software tools and best practice and habits that would merit the title "engineering" (See also "Security Isn't Secure).

I'd like to close with a philosophical musing that might have appealed to my old mentors at Telectronics. We have reached a sort of pinnacle in post-modernism where the real world has come to pivot precariously on pure text. It is weird and wonderful that engineers are arguing about the layout of source code - as if they are poetry critics.

We have come to depend daily on great obscure texts, drafted not by people we can truthfully call "engineers" but by a largely anarchic community we would be better of calling playwrights.

New C-Suite Next-Generation Customer Experience Digital Safety, Privacy & Cybersecurity Security Zero Trust Chief Customer Officer Chief Executive Officer Chief Information Officer Chief Information Security Officer Chief Privacy Officer

FIDO Alliance goes from strength to strength

FIDO Alliance goes from strength to strength

With a bunch of exciting new members joining up on the eve of the RSA Conference, the FIDO Alliance is going from strength to strength. And they've just published the first public review drafts of their core "universal authentication" protocols.

An update to my Constellation Research report on FIDO will be published soon. Here's a preview.

The Go-To standards alliance in protocols for modern identity management

The FIDO Alliance - for Fast IDentity Online - is a fresh, fast growing consortium of security vendors and end users working out a new suite of protocols and standards to connect authentication endpoints to services. With an unusual degree of clarity in this field, FIDO envisages simply "doing for authentication what Ethernet did for networking".

Launched in early 2013, the FIDO Alliance has already grown to nearly 100 members, amongst which are heavyweights like Google, Lenovo, MasterCard, Microsoft and PayPal as well as a couple of dozen biometrics vendors, many of the leading Identity and Access Management solutions and service providers and several global players in the smartcard supply chain.

FIDO is different. The typical hackneyed elevator pitch in Identity and Access Management promises to "fix the password crisis" - usually by changing the way business is done. Most IDAM initiatives unwittingly convert clear-cut technology problems into open-ended business transformation problems. In contrast, FIDO's mission is refreshingly clear cut: it seeks to make strong authentication interoperable between devices and servers. When users have activated FIDO-compliant endpoints, reliable fine-grained information about their client environment becomes readily discoverable by any servers, which can then make access control decisions, each according to its own security policy.

With its focus, pragmatism and critical mass, FIDO is justifiably today's go-to authentication standards effort.

In February 2014, the FIDO Alliance announced the release of its first two protocol drafts, and a clutch of new members including powerful players in financial services, the cloud and e-commerce. Constellation notes in particular the addition to the board of security leader RSA and another major payments card, Discover. And FIDO continues to strengthen its vital "Relying Party" (service provider) representation with the appearance of Aetna, Goldman Sachs, Netflix and Salesforce.com.

It's time we fixed the Authentication plumbing

In my view, the best thing about FIDO is that it is not about federated identity but instead it operates one layer down in what we call the digital identity stack. This might seem to run against the IDAM tide, but it's refreshing, and it may help the FIDO Alliance sidestep the quagmire of identity policy mapping and legal complexities. FIDO is not really about the vexed general issue of "identity" at all! Instead, it's about low level authentication protocols; that is, the plumbing.

The FIDO Alliance sets out its mission as follows:

  • Change the nature of online authentication by:
    • Developing technical specifications that define an open, scalable, interoperable set of mechanisms that reduce the reliance on passwords to authenticate users.
    • Operating industry programs to help ensure successful worldwide adoption of the Specifications.
    • Submitting mature technical Specification(s) to recognized standards development organization(s) for formal standardization.

The engineering problem underlying Federated Identity is actually pretty simple: if we want to have a choice of high-grade physical, multi-factor "keys" used to access remote services, how do we convey reliable cues to those services about the type of key being used and the individual who's said to be using it? If we can solve that problem, then service providers and Relying Parties can sort out for themselves precisely what they need to know about the users, sufficient to identify and authenticate them.

All of these leaves the 'I' in the acronym "FIDO" a little contradictory. It's such a cute name (alluding of course to the Internet dog) that it's unlikely to change. Instead, I overheard that the acronym might go the way of "KFC" where eventually it is no longer spelled out and just becomes a wood all by itself.

FIDO Alliance Board Members

  • Blackberry
  • CrucialTec (manufactures innovative user input devices for mobiles)
  • Discover Card
  • Google
  • Lenovo
  • MasterCard
  • Microsoft
  • Nok Nok Labs (a specialist authentication server software company)
  • NXP Semiconductors (a global supplier of card chips, SIMs and Secure Elements)
  • Oberthur Technologies (a multinational smartcard and mobility solutions provider)
  • PayPal
  • RSA
  • Synaptics (fingerprint biometrics)
  • Yubico (the developer of the YubiKey PKI enabled 2FA token).

FIDO Alliance Board Sponsor Level Members

  • Aetna
  • ARM
  • AGNITiO
  • Dell
  • Discretix
  • Entersekt
  • EyeLock Inc.
  • Fingerprint Cards AB
  • FingerQ
  • Goldman Sachs
  • IdentityX
  • IDEX ASA
  • Infineon
  • Kili
  • Netflix
  • Next Biometrics Group
  • Oesterreichische Staatsdruckerei GmbH
  • Ping Identity
  • SafeNet
  • Salesforce
  • SecureKey
  • Sonavation
  • STMicroelectronics
  • Wave Systems
New C-Suite Digital Safety, Privacy & Cybersecurity FIDO Security Zero Trust Chief Customer Officer Chief Information Security Officer Chief Privacy Officer

The Social Engagement Rankings of the Top 15 Cosmetic Brands

The Social Engagement Rankings of the Top 15 Cosmetic Brands

Why did Facebook develop EdgeRank?

Are you one of those brands spending hundreds of thousands or millions of dollars on creating content for social media interactions? Facebook themselves admits the average brand page only reaches 16-17% of its fans. Data from PageLever shows that for brands with millions of fans, even less of their fans see the content. They estimate the content only reaches ~3% of their fans. Why is this so? It’s because of an algorithm, EdgeRank, that calculates what posts to filter out.

When Facebook allowed brands to have pages, brands began posting a lot of content. Facebook users felt there was too much content coming at them, almost so much that it felt like spam. As a result, Facebook created a filter that determines who sees particular posts. There are three parts to the filter.

The first part of the equation, affinity, takes into consideration how much time you spend interacting with certain friends, groups and pages. If you are spending a lot of time interacting with them, then your affinity will be stronger. The next piece of the puzzle is about weight. Weight is essentially the level of interaction a piece of content gets. For example how many likes and comments. And the last piece to the puzzle is time. Over time, a post’s relevance decays making it less important, pushing it down the feed.

What are the three big problems around content and engagement?

1. Creating great content so fans will want to interact with it

2. Creating a lot of that great content

3. Promoting the content

The truth is most brands don’t have the budget to create enough great content to be effective at engaging their customers. What makes matters worse, in addition to a content creation budget, you also need a promotion budget. And the cost to promote content can become prohibitive.

cosmetic

How much does it cost a brand to send a Sponsored Posts or Stories?

One sponsored story from Facebook costs $200

• Let’s say the brand posts 2 times per day

• $200 x 2 = $400/day

• 7 days/wk x $400/day = $2,800/wk

• 4 wks/mo x $2,800/wk = $11,200/mo

• 12 mo/yrs x $11,200 = $134,400/yr

• $134,400/ yr just to get your content seen!

And that doesn’t include the cost of the:

• Creative

• Content production

• Content delivery systems (like Buddymedia)

• Community managers

How Do I get EdgeRank to work in my favor and rise above my competitors in the cosmetic industry?

• EdgeRank gives greater exposure (reach) to posts that are more engaging

• Boring posts decrease your reach and thus your bottom line

• The solution is to create more interesting posts

 

What makes a better post in the cosmetic industry?

Here are some hints. It’s the ability to:

Benchmark engagement performance vs. your competitors in the cosmetic industry

Surface the best content and content types to engage your target audiences in the cosmetic industry

Determine how frequently to post

Calculate the best days of the week and hours in the day to post compared to cosmetic industry competitors

Know when to post the right type of content to get the highest engagement in the cosmetic industry

 

Dr. Natalie’s Executive Success Acceleration Firm™
Executive Business Strategy Advisor & Social Customer Experience Industry Authority & Consultant

The Doctor Knows Social Media ROI & Our Business Strategies Rx Get Results!
Our Motto? Be Awesome by: Learning, Sharing & Growing!

What we do: We work with companies to deliver increased revenue and decreased costs:

  • Executive Leadership Guidance on Strategy and Business Use of Social Media
  • Social Media / Business Benchmark Assessments – Tell you what you got/ what you might consider
  • Social Media ROI – set-up measurement capabilities and dashboards
  • Workshops on Business Strategy: Customer Experience, PR, Marketing, Customer Service & Internal Employee Advocacy
  • Instructor MEMES Summer Institutes at UCLA Anderson & UCLA Extension
  • Customer Experience / Social Customer Service Excellence Benchmarking Assessments & Advisory
  • Software Company Visualized-ROI, Persona-based Solution Selling w/ Targeted USP & Messaging / ebooks, White Papers, Webinars…
  • Social Media Training, Organizational Change, Motivation and Goal Setting

My book: Like My Stuff: How To Monetize Your Facebook Fans

Follow Me Here:
Twitter: @drnatalie
LinkedIn: DrNataliePetouhoff
G+ : Google Plus posts
Facebook: DrNatalie Petouhoff

Enhanced by Zemanta

Share

Marketing Transformation Next-Generation Customer Experience Revenue & Growth Effectiveness Future of Work Innovation & Product-led Growth New C-Suite Digital Safety, Privacy & Cybersecurity Chief Marketing Officer Chief People Officer Chief Revenue Officer Chief Customer Officer Chief Human Resources Officer

Where is the Justice? Court finds for both Oracle and Rimini Street

Where is the Justice? Court finds for both Oracle and Rimini Street

;Justice

In a case with potentially important financial consequences, Judge Larry Hicks of the U.S. District Court in Las Vegas has found that Rimini Street infringed on some Oracle copyrights but not on others. The distinction was based on the wording of contracts PeopleSoft customers signed when it was still an independent company, and not the wording of contracts J.D. Edwards or Siebel Systems customers signed. In the short run the decision could (and the operative word here is could) have an impact on Rimini Street's upcoming IPO. In the long run the ruling is unlikely to have much effect.

This is in part because the case is not about is the legality of third parties to offer independent enterprise software support. Oracle does not dispute its customer's right to engage third parties to provide support nor Rimini Street's right to offer it. What it does dispute is the way Rimini Street provided that support. The judge upheld Oracle's position in the case of PeopleSoft customers (but not J.D. Edwards or Siebel customers) that Rimini Street violated Oracle's copyright protections by installing software on servers it owned.

Rimini Street acted promptly to conform to the judge's ruling. In a letter to clients CEO Seth Ravin wrote "Rimini Street respects the Court’s decision and will conform its practices in light of the Court’s ruling.”

The company had already completed all JD Edwards and Siebel client migrations from Rimini-Hosted environments, and will work with the PeopleSoft clients to migrate their Rimini-Hosted environments to client-hosted environments as well.

It is also important to note the ruling is a motion for summary judgment. Although the case was first filed in 2010, it has not yet come up for trial. The summary judgment was made based on a plea from Oracle to decide the issue before the trial began.

Since part of the plea was granted and part was rejected the trial will still take place. The summary judgment will also be held inappropriate if the jury decides the case in favor of Rimini Street. Summary judgments are also subject to appeal which is almost certain to happen no matter who wins. Depending on how the appellate court then rules in that case, it is very likely the losing party will also appeal that decision. Then it will be up to the Supreme Court to decide if it wants to hear the case or ask a lower court to try the case again. Such a process could easily last over a decade.

So this judgment is just one skirmish in a legal battle that has already lasted for 4 years and promises to continue on for many more years to come. Legal sources tell the Observer the judge's ruling may be a sign from the court that he wants the parties to settle. This is not very likely to happen for reasons I am not prepared to discuss here. For the same reasons the smart money sees the case as a plus for Rimini Street's IPO which is why it is called the smart money.

The take away for Rimini Street's current clients, and any customers considering third party support, is that they need to evaluate legal risk the same as any other risk. There is a risk next quarters plans will be disrupted by a giant comet hitting the earth. It’s a real risk, but customers don't need to consult with an astronomer to assess it. By the same token the worst people to assess legal risks are often attorneys. What customer need to evaluate is:

  • How long will the case be expected to last?
  • How likely is either party to appeal?
  • How likely is Rimini Street to win?
  • What will happen to the customer if Oracle prevails in the end?

Since the difference in the ruling had to do with "magic language" in PeopleSoft agreement that was not in the J.D. Edwards or Siebel agreement it is reasonable to expect Oracle (and every other software company) to include that very language in future contacts and to amend existing contracts. It will be up to customers to review their contracts carefully and negotiate on any terms that they think might limit their future options.

The reason most attorneys are poor at assessing legal risk is because they are schooled in a concept developed during medieval times called legal precedence. Precedence holds a rule established in a previous legal case is binding on a court when deciding subsequent cases. The idea at the time was laws should have some consistency and not be subject to some spur-of-the-moment decision by a lord or bannum. The problem is events moved much more slowly in 1250 than they do today. Even though it was only a decade ago, no one involved could have anticipated how much innovation would change enterprise software support. The legal documents were drawn up considering the limits of the technology of the time. Yet precedence assumes that the parties did know what they were agreeing to and where is justice in that?

Tech Optimization rimini street Oracle Chief Information Officer

Bitcoin coming to an ATM by you…

Bitcoin coming to an ATM by you…

Bitcoin, the leading P2P currency, is coming to an ATM near you. There is an ATM right here in Boston now! At least Boston keeps its place as a high tech center…barely. Anyways, first what really is Bitcoin, other than being linked to the infamous Winklevoss twins? Click here for a good crash video on what it is.

Coming to an ATM near you...better get your digital wallet ready

Coming to an ATM near you…better get your digital wallet ready

Basically it is an online generated form of currency, no banks, no physical currency is created. It allows the online community to have a form of money to empower eCommerce – not that your credit cards doesn’t still work. Online commerce could function and not have to pay some of the fees associated with credit cards and other forms of traditional brick and mortar payment methods. So what does it mean that you can now go to the ATM machine and “get” Bitcoins?

For the most part it feels like a marketing scheme, to make the every day user comfortable with this form of currency. Consumers are becoming more comfortable with eCommerce both via their smart phones, tablets or computers. They have become comfortable using their credit cards online. Bitcoin has to hope they start feeling comfortable seeing Bitcoin as a viable payment option. Showing consumers how to leverage Bitcoin in a format they are used to – aka the ATM machine – should allow for an ease of association with the medium. I get that the ATM gives me $20 bills (in New York sometimes $100 bills!), I get how to use my phone for more than phone calls….now I can somewhat better grasp how this all mixes together with Bitcoin. From a marketing and education perspective this makes a lot of sense. It is also interesting when it comes to the timing – with many highly publicized credit card theft issues from Target to Neiman Marcus could Bitcoin find away to offer a “safer” alternative for online commerce?

It will be interesting to see what the reaction is to these Bitcoin ATMs, will it uptick the usage of the currency? Will the curiosity fade after a few days? Regardless it will be interesting to watch and I believe the impact will reach further than we might expect today…think supply chain. A discussion for another post!

Have a disruptive technology implementation story? Get recognized for your leadership. Apply for the 2014 SuperNova Awards for leaders in disruptive technology.

Matrix Commerce Next-Generation Customer Experience Innovation & Product-led Growth Digital Safety, Privacy & Cybersecurity Data to Decisions Tech Optimization Supply Chain Automation Cloud Digital Transformation Disruptive Technology Enterprise IT Enterprise Acceleration Enterprise Software IoT Blockchain ERP Leadership Collaboration M&A Chief Customer Officer Chief Executive Officer Chief Procurement Officer Chief Supply Chain Officer

Keeping it Dynamic

Keeping it Dynamic

Microsoft-intern-talent-show

Source: Flickr JSchementi

“Innovators create value by working on things that are not yet fully known. Periods of technological change have always involved numerous creative experiments followed by shakeouts and establishment of an industry standard.”

Professor Rosabeth Moss Kanter, Harvard Business School

Microsoft's announcement of new marketing, customer care and social listening features added to its Microsoft Dynamics CRM product reveals some true creativity and innovation. Not so much in terms of product features (although there are some). What the announcement really highlights is a creative business and go-to-market strategy.

First the announcement. Sometime next quarter Microsoft will release new marketing features based on its MarketingPilot acquisition, new service features to complement its recent acquisition of Parature, and new social listening features  based on its Netbreeze acquistion. Innovating from typical industry practice, the release will bring social listening capabilities to every sales, service and marketing person in the organization and the new release is expected in the second quarter of 2014.

Now for the innovative part.

The original model for CRM was based on sales as an internal and predictable process like manufacturing and to be controlled by IT. Since then customers have embraced social media and revoluionized marketing.  As much CRM now takes place a much outside the walls of organizations as inside.  Soon marketing may soon be spending as much on technology as IT.   At the same time we are experiencing a re-platforming as field workers become unteathered from their desktop and even laptop computers in favor of mobile devices. Data centers are also moving into the cloud.

Despite being almost 100% saturated, everything in CRM marketplace is up for grabs as organizations are going to have to spend big to stay current with new business processes, new customers, and new platforms.

How will vendors adapt to these turbulent market conditions? Each of the major vendors is experimenting with a different approach and here is where the true innovation in CRM rests, not in products but in business strategy. Traditionally Microsoft has been known as a fast follower preferring to be the second company to introduce features and not the first, but this is different. Microsoft is not following the market leader as much as it is dancing around it. Some of things we see Microsoft doing differently include:

  • Embracing on-premise and well as cloud versions of its products,
  • Looking for monopolies in local markets where it is the only vendor to offer native language support in say Danish or Turkish,
  • Building applications to sell to end users as well as IT,
  • Selling some products, such as Microsoft Dynamics Marketing standalone, but coupling with other products so the Microsoft footprint in an account can be extended if the opportunity arises,
  • Leveraging its expertise in consumer markets to build apps with a mass market look and feel.

Will this strategy prove to be a winner? The market has not made up its mind, yet at the heart of every successful business are the people who make things happen. Clearly Microsoft Dynamics has some heart.

New C-Suite Next-Generation Customer Experience Tech Optimization Data to Decisions Future of Work Innovation & Product-led Growth Marketing Transformation Digital Safety, Privacy & Cybersecurity Microsoft Chief Customer Officer Chief Executive Officer Chief Information Officer Chief Marketing Officer

Technology – The prime mega-trend that drives society

Technology – The prime mega-trend that drives society

1

Every defined era of economic history is characterized by waves of disruption. From the agricultural revolution to the current information and digital revolution, innovation and change is results in continual disruption.

The drivers and outcomes of these eras of economic history have several common themes. The attached figure below highlights common themes that have accompanied each era of economic and social disruption from the Middle Ages. From the explosive growth of trade in resources that accompanied the Middle Ages, through to the shift toward urbanization in the Agricultural revolution; these factors are universal and drive development.

The information or digital revolution is no different. Demographic transition (urbanisation) in developing markets continues unabated. According to the United Nations, by 2025, over 900 million Chinese people will live in cities, and Indonesia’s urban population will exceed 50% of its total.[1] As the information and digital age has evolved, economic development has been a defining event for a number of economies. In the 8 years from 2004-2012 the Philippines GDP almost tripled, Australian GDP per capita increased 50% during the same period. [2]

Whilst the benefits and in particular, social and environmental costs of globalisation can, and should be, argued for months at end, it has created a globally integrated world with the ability for Thomas Friedman’s “Dell Theory of Conflict Resolution”[3] to have real applicability. (For a recent note on the value of an innovative supply chain please see “Innovation can come from history – HP uses the Silk Road to improve supply chain outcomes”) Organisations and consumers can get the benefits of scale and suppliers of various resources can have access to a range of markets globally.

Whilst organisations globally have historically benefited from the combination of all these Mega Trends, in terms of business benefits, Technology is pre-eminent. Technology drives a fundamental transformation in all spheres of society from consumers, through small business, Fortune 500 enterprises and all levels of government. The scale of technology impact is virtually impossible to measure. It ranges from micro-lending in emerging markets, and mobile banking platforms in rural Indian villages to optimised oil and gas exploration, and the ability to have instantaneous global news feeds.


[1] http://esa.un.org/unup/Wallcharts/urban-rural-areas.pdf – United Nations Department of Economic and Social Affairs

[2]http://databank.worldbank.org

[3] The World is Flat (ISBN 1-59397-668-2), Thomas L. Friedman, pg 421

 

New C-Suite Innovation & Product-led Growth Chief Executive Officer