<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / lillymark / tag / information</title>
<link>http://netvouz.com/lillymark/tag/information?feed=rss&amp;pg=1</link>
<description>lillymark&#39;s bookmarks tagged &quot;information&quot; on Netvouz</description>
<item><title>A Global Look at Consumer Mobile and Social Habits</title>
<link>http://www.sdl.com/community/blog/details/30642/a-global-look-at-consumer-mobile-and-social-habits</link>
<description>We are at the start of a new movement, one that meets consumers where they are – regardless of where brands are. And, it’s a game changer. To help brands better understand this opportunity, we surveyed 4,000 consumers in the United States, United Kingdom, Singapore and Australia. The intent was to learn about their expectations using mobile devices and social media to engage with brands. While you can make educated guesses about their experiences, there’s nothing like hearing it straight from the source – the customer.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 16 May 2013 09:31:57 GMT</pubDate>
</item><item><title>A Landmark day for Customer Experience Management, Big Data and Big Chandeliers</title>
<link>http://www.sdl.com/community/blog/details/20947/alandmarkdayforcustomerexperiencemanagement2cbigdataandbigchandeliers</link>
<description>Juxtaposed beneath the grandiose chandeliers of the Landmark Hotel in London’s Marylebone, the ‘giant iPad’ video screen was the frame for several excellent presentations at Tuesday’s Innovate conference, where over 100 folk gathered to hear the tales of Best Western and HP, and the insights of Shaun Smith and Greg Oxton.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 03 Dec 2012 11:13:53 GMT</pubDate>
</item><item><title>A Quick Test to find out if your Company is really serious about Security</title>
<link>http://blog.aujasnetworks.com/quick-test-find-company-security.html</link>
<description>LinkedIn – the popular social media network – recently confirmed that a breach of its network has compromised hashed passwords associated with its accounts. News reports estimate almost 6.5 million passwords have been compromised.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 19 Jun 2012 07:26:22 GMT</pubDate>
</item><item><title>A Secure Framework with Mobile Security Services</title>
<link>http://www.articleblast.com/Computers_and_Internet/General/A_Secure_Framework_with_Mobile_Security_Services/</link>
<description>The globalized business world with its highly networked environment makes use of the best of the breed technology solutions and world class infrastructure to cater to the requirements of a widespread workforce and large customer base.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 01 Jan 2013 06:09:16 GMT</pubDate>
</item><item><title>A Wide Range of Government Services</title>
<link>http://www.estuate.com/govt-services</link>
<description>As a GSA Multiple Awards Schedule holder, Estuate offers a wide range of Information Technology Services and expertise, including Security Cleared Professionals. Visit us at www.estuate.com to read more.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 16 Apr 2014 07:18:03 GMT</pubDate>
</item><item><title>Add Value to Enterprise Risk Management Using IAM Solutions</title>
<link>http://amynn.posterous.com/add-value-to-enterprise-risk-management-using-44698</link>
<description>Compliance requirements and corporate security mandates are important drivers for Identity Access Management (IAM). Internal policy enforcement is the primary focus for big companies, and according to  Forrester, context-driven IAM is going to be the market force in the future years.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 26 Apr 2013 09:25:57 GMT</pubDate>
</item><item><title>Adding interactivity to videos</title>
<link>http://www.sdl.com/community/blog/details/31592/adding-interactivity-to-videos</link>
<description>You can meet me at the upcoming SDL Innovate in San Jose, where I&#39;ll be speaking more about how you can bring rich media to the Customer Experience. I hope you&#39;ll join us!</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 28 May 2013 07:03:11 GMT</pubDate>
</item><item><title>Adding value with a personal touch</title>
<link>http://www.sdl.com/community/blog/details/24832/adding-value-with-a-personal-touch</link>
<description>The promise of personalization is that a visitor is granted their three wishes before they&#39;ve uttered a word. In addition to a focus on who the customer is, this approach needs to integrate what they want to do where by focusing on action points rather than just messaging.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 14 Feb 2013 05:14:42 GMT</pubDate>
</item><item><title>Address Effective Security Requirements with Secure Application Development</title>
<link>http://www.articleblast.com/Computers_and_Internet/General/Address_Effective_Security_Requirements_with_Secure_Application_Development/</link>
<description>Enterprises usually spend a great deal of resources, time and money to protect their network perimeters from threats.Vulnerabilities at the application level are usually not detected using routine scanning methods like automated network vulnerability scanning.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 04 Apr 2013 05:10:15 GMT</pubDate>
</item><item><title>Address Security Issues with Information Risk Management Solutions</title>
<link>http://www.slideshare.net/AujasNetworks/address-security-issues-with-information-risk-management-solutions</link>
<description>Double-edged sword is the phrase that best describes technological advancement. This is because technological advancements have brought both advantages as well as disadvantages.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 26 Apr 2013 09:35:28 GMT</pubDate>
</item></channel></rss>