How To Get Social With Your Marketing

Everything is going “social.” First we had social media and social networking, then the social customer and now social CRM. I’ve always believed in using the right technology to enable a customer-centric approach. When I started to see “Social CRM” appear as the latest buzzword in social media, I realized it was a great way to describe being customer-centric in today’s online world.

Paul Greenberg, founder of the 56 Group, describes the social customer perfectly when he notes that customers are now communicating outside traditional channels, and that who and how they trust is different than it used to be.

Comments (0)

Disaster Recovery In The Cloud

Is your IT staff prepared to deal with the unthinkable? Imagine for a moment what would happen if your network, and all the systems and applications that rely on it, were suddenly unavailable. Have you considered the impact of this scenario – not only when a disaster strikes, but also when outages are caused by a spike in business activity or a problem with your provider’s network?

Here at Qwest, we’ve developed a framework that enables multiple groups to work together to support business continuity and incident response. We have cross-functional teams tasked with this endeavor and have made disaster recovery and business continuity priorities for our business.

Comments (0)

It’s Official

When we heard that Microsoft used its B2B Worldwide Partner Conference to show off phones, an iPad-like slate, and motion sensors for the Xbox video game system, it confirmed one of our latest theories and one of our customers’ biggest challenges: Consumerization has hit the corporate mainstream.

Jason Hiner, editor of TechRepublic, calls the consumerization of IT one of the industry’s key trends. When the topic first arose, “It was primarily an annoyance involving a few power users who were bringing their own Palm Treos into the enterprise and using some unauthorized Web tools to get their work done.”

But these days, corporate IT must deal with personal laptops and smartphones and a mobile workforce. The buzz around unified communications, and the growth in popularity of Web-based tools such as Evernote, Skype and Google Docs, raise questions about where your enterprise data lives and who can access it.

Comments (0)

SIPping the Kool-Aid: Are You Ready for SIP Trunking?

If you’re thinking about deploying or upgrading a VoIP solution, you’ve heard about SIP trunking as a way to reduce both hard and soft costs, while tapping nearly unlimited bandwidth and enabling access to rich communications.

One of a SIP network’s biggest virtues is the ability to share resources cost-effectively. For example, a business with 10 locations nationwide can streamline down to one central call center in a way that’s invisible to customers. Or a company whose inbound calls come in bursts can dedicate bandwidth to voice when needed, instead of paying for more bandwidth to handle a few heavy traffic days a year.

SIP talk seems to be everywhere this summer, but the standard continues to evolve. Interoperability issues make the technology appropriate for some enterprises, but not all. In short, your communications platform may not work with the SIP gateway or edge device you want to buy.

Comments (1)

Five Must-Haves on Your Unified Communications Checklist

So you’ve moved from being “interested” in Unified Communications (UC) to actively considering UC. Here are a few UC best practices to think about before you implement. Together, they may save you hours of headaches, not to mention significant amounts of time and money.

Comments (1)

Groundhog Day in the Great Outsourcing Debate

A question we see more businesses asking as they assess their workload coming out of the recession:

“What is the business of my business?”

While seemingly self-evident, this question gets down to important considerations. Is this process or function our core business or should we consider outsourcing to a partner? What is really the best use of our people and resources right now?

We’ve been hearing this more often lately, and it’s a bit like the movie “Groundhog Day” – in a good way.

Comments (0)

Controlled Chaos: Oxymoron or the Future of Enterprise Mobility?

Employees can be demanding. They want to be able to access all their favorite applications from any device, anywhere, and it’s hard to deny this request when it’s actually making someone more productive. But what is the norm? All too often, only email is approved for use on nontraditional corporate devices, which puts significant limits on true mobility.

Take sales reps as an example. Imagine what they could do if they could access their CRM and ordering systems while at a customer visit – faster quotes, faster order placement and faster service or product delivery. Seems like the way to become a well-oiled, customer-centric machine.

But put this scenario in front of IT managers and notice the fear in their eyes. Far from utopia, it represents pure chaos and risk. Visions of issues start running through their heads:

Comments (0)

Securing Your Business: One Size Does Not Fit All

During the downturn, you streamlined operations to make them truly lean. Now, with economic conditions brightening, you don’t want to take your eye off the ball. But, during all this belt-tightening, did you let things go that exposed you to risk?

Network security often lands on the back burner when the going gets tough. We hear about security risks every day and understand what could happen…but dismiss the likelihood it will happen to us.

The truth is, the risk is just too high and now is a good time to evaluate your security strategy. But how do you know what’s right for you?

Comments (1)