Category Archives: #contentmarketing

Walmart Training via Virtual Reality, Microsoft Releases Managed Desktop, More News

Walmart Training via Virtual Reality, Microsoft Releases Managed Desktop, More News

Microsoft’s Ignite conference takes place next week in Orlando, Florida. The company has been sending out a series of releases in the weeks leading up to the conference and is sure to continue doing so throughout the event.

Continue reading...

Improving the security of your containers in OCIR with Twistlock

Introduction to OCIR

Last May, Oracle introduced a new cloud service on Oracle Cloud Infrastructure, for container native developers to store their Docker images.  Simply, Oracle Cloud Infrastructure Registry, or OCIR for short.

Usage of this new cloud service has grown rapidly, and its primary use is to store container images used in conjunction with Container Engine for Kubernetes, or OKE for short.  A managed Kubernetes service on Oracle Cloud Infrastructure .

Customers have asked how they can scan their container images stored in OCIR, and add an additional amount of security and control to their CI/CD pipelines.  As a response to these types of questions, we wanted to highlight one of these solutions, that focuses on vulnerability and compliance, Twistlock.

Connecting a solution like Twistlock is easy.  Simply supply the Twistlock setup screen with a username (in the form of tenancy_name/user_name), an OCI generated Auth Token and the target registry, such as  Customers can easily create service accounts, to fulfill this need, with policies limited to read only access of the registry.

How Twistlock Helps
Twistlock is a cloud native security platform.  Started in 2015 as the first solution for container security, Twistlock’s platform now leverages the benefits of cloud native technology to make application security better - more automated, more efficient, and more effective.

A key way this happens is by ‘shifting left’ - ensuring security isn’t just a run time activity.  Twistlock’s native integration with OCIR allows Twistlock to monitor and identify vulnerabilities and compliance issues for all images stored in registry - and block use of images that contain violations.  By preventing risky container images from being deployed - this reduces your runtime risk, and helps development teams more quickly correct issues.

Twistlock easily integrates with OCIR to provide an overview of risks in your registry

But knowing about a vulnerability isn’t enough for container images.  Containers pose 3 distinct challenges to vulnerability management:
Containers often have hundreds of CVES present - and traditional scanning tools often bring with them a number of false positives - making it hard to know what’s a real risk, and what’s not.
Once you’ve weeded out the false positives - numerous CVEs still remain.  Knowing what to prioritize a fix for isn’t straightforward - because you often don’t know how the container image will be deployed.
And then, once you know what CVEs to tackle first - tracking down what layer of the container image the CVE was introduced in is no easy task - requiring manual effort, or in larger organizations, coordination across different development teams.

To tackle these problems, Twistlock does three things:
Uses over 30 upstream sources to source CVE information, then parses, correlates and consolidates the data into the Twistlock Intelligence Stream.  By comparing multiple sources and going direct to vendors, Twistlock is able to provide a significantly reduced false positive rate vs. traditional vulnerability management tools.
Generates a risk score for every CVE detected that is specific to your deployment and environment. This lets your prioritize what to fix in registry based on the risk it brings to your production environment.
Provides a per-layer analysis of every CVE detected - showing the exact layer of the container image where the CVE was introduced.  This makes fixing vulnerabilities quicker - no more hunting down which layer the CVE originated in.

Twistlock factors in specifics from your environment to create a tailored risk score for each CVE

Twistlock’s per layer analysis makes it easy to pinpoint where CVEs are introduced

For more information, or to learn about how the Twistlock platform provides zero touch active threat protection and layer 3 micro-segmentation, along with cloud native layer 7 firewalls, and precise vulnerability management - visit


How Skype’s 2017 Redesign Failed the User

How Skype’s 2017 Redesign Failed the User

Skype has once again been making the news, following Microsoft’s Aug. 31 announcement that a redesign was coming, roughly a year after the last one. A look at the decisions and events that led Microsoft to change course with Skype offers a product design object lesson.

Continue reading...

Where Document Management Systems Fit into The Digital Workplace

Where Document Management Systems Fit into The Digital Workplace

Despite ongoing debate about what technology should and shouldn’t be in a digital workplace, the "old" traditional workplace technologies are still creating problems. In one of its research reports at the end of last year the Association for Image and Information Professionals (AIIM) pointed out that enterprises are still struggling

Continue reading...

Adobe Acquires Marketo, Gartner Names CRM Lead Management Leaders, More News

Adobe Acquires Marketo, Gartner Names CRM Lead Management Leaders, More News

Adobe has agreed to acquired Marketo for $4.75 billion in a digital customer experience software mega deal that confirms rumors first published last week. Adobe made the announcement Thursday afternoon in a press release. The move combines software from two of the major players in digital experience software

Continue reading...

4 Little Known Ways to Implement Cross-Channel Marketing

It's a great time to be in marketing because there are so many more channels and outlets to reach customers and prospects. Each channel has different expectations and opportunities to connect with your audience.  You need to know which channels mean the most to your specific audience. Plus, it's important to determine how to leverage them effectively and how to use them together to increase return. It's a cross-channel marketing strategy that brings all those components together.

One way of creating and implementing your cross-channel marketing strategy for business success is to use tactics like these:

1. Have One Script, Many Writers

In a choir, everyone sings from the same sheet of music. Yet, it doesn't mean they all contribute the same thing to the overall sound. Use the same approach in your cross-channel marketing. Be consistent in your messaging and theme across channels. However, don't just copy and paste what you had in your blog onto your social media pages and then make it an email, too. This bores your audience. Eventually, they will stop following you on certain channels and you'll lose that engagement.

Instead, a choir features a soprano, alto, and other distinct pitches. This adds depth to the sound while creating harmony. Likewise, your cross-channel marketing effort can use many writers on the team. They can generate multiple dimensions and narratives for your brand message, resonating with different audience members on various channels. This same harmonious result can be achieved where there are not conflicting messages or redundant content.

Use a content calendar to create your overall themes and messaging. Then, assign various team members or freelancer channels so their voice and unique style put a different spin on your storytelling efforts. Consider rotating these writers across channels so that they work on blogs one month and perhaps email marketing the next.

2. Localize Your Efforts

With cross-channel marketing, it's easy to just focus on the broader set of channels that reach across your entire target audience. To change your approach, consider looking at how to localize one or two of those channels. Select those channels where you know your audience might be inclined to use in conjunction with their local errands and needs, such as social media, SMS, and search. Then, you can adapt your content periodically to address local promotions at certain locations while still maintaining an overall promotion strategy.

Likewise, you can consider this strategy if you plan on expanding into international territories and need to address the subtle differences, cultural attributes, and varied languages of these markets. When implementing this type of cross-channel approach, you'll also need to think about how to adapt taglines, product names, slogans, and other types of content for other languages and cultures. Get local talent to help you achieve this to ensure you are not sending a confusing message to this new international audience segment.

3. Integrate Your Data Across Channels

Cross-channel analytics is an integral part of your strategy that’s often not implemented to the depth it should be to create the valuable insights for greater success. Instead, companies tend to leave their analytics in silos related to each channel. Then, they view the data separately for each channel. The better implementation strategy is to synchronize data across all channels. This uncovers how your audience interacts with more than one channel – and sometimes does so simultaneously.

The results from doing so will provide a way to make sure all the customer experiences and interactions you are creating across all the channels – email, social, mobile, web, and more – are relevant and timely for your audience. Also, it's a way to understand the impact and location of referrals. Additionally, analytics can uncover which channel combinations deliver the greatest conversion rates. That will help you optimize your spend on channel strategies such as paid social media, Google ads, and other tactics that may consume more of your budget.

4. Return to Traditional Channels

What has also happened recently is an obsessive focus on digital transformations, which means that traditional marketing channels are now being neglected. In reality, a large part of the millennial demographic prefers these old school marketing methods, especially tactics like direct mail. Determine how your audience might respond to print ads, billboards, television ads, and direct mail.

For example, a direct mail piece to a targeted local area can drive prospects and customers to your physical location. However, if you add a QRC code, they can also use that through their smartphone. This can connect them with your business through a website or social media page. In this way, your call to action is drawing customers to your online or offline presence and influencing their purchase decision. Also, you can use the traditional channel as the introduction to the new campaign. Then, follow that up with a digital rollout on email or social media a few days later. This reinforces the message and catches your audience on different channels at an optimum time.

How to Ensure Your Product Roadmap Embraces Facts, Not Fallacy

How to Ensure Your Product Roadmap Embraces Facts, Not Fallacy

It’s autumn. For a lot of folks, that means it’s football season. For product teams, it’s planning-for-next-year-and-product-roadmap season. Now’s a good time to remind ourselves to beware the Next Feature Fallacy and avoid falling into a moral panic when we inevitably reach a plateau in adoption and growth.

Continue reading...