Gartner Blog Network

"Re-materialization" is what digital business might do to your product.

by Mark Raskino  |  January 30th, 2015

People as old as me can remember when the internet arrived and when companies created their first websites. Very quickly, it became obvious that some big companies could sell their stuff directly to end customers by electronic commerce, because websites could be developed to become online self-service machines. Orders could be...

Read more »

How One Lululemon Educator Won My Loyalty Through Surprise & Delight

by Kirsten Newbold-Knipp  |  January 30th, 2015

How One Lululemon Educator Won My Loyalty Through Surprise & Delight Every interaction with a brand is an opportunity to win or lose a customer, sometimes for life. Most of the time though, it’s a draw, with customers ending a conversation, transaction or web visit no more or less loyal...

Read more »

My "How to Work With an MSSP to Improve Security" Paper Publishes

by Anton Chuvakin  |  January 30th, 2015

My “How to Work With an MSSP to Improve Security” has just published. It took a lot of work, and – at 37 pages – it cannot be called “an MSSP user bible.” However, I think I hit many of the sore spots of client – MSSP relationship and provided...

Read more »

Share your Innovative Information Management Case Study at Gartner Summit!

by Andrew White  |  January 30th, 2015

Gartner is hosting its 2015 Enterprise Information and Master Data Management Summits – inEMEA on March 11th and 12th in London, UK, and in the US on April 1st and 2nd in Las Vegas, NV. As part of the exciting agenda we always include end-user case study presentations.  They are the best attended...

Read more »

Five Tips for Companies Considering Cyber Insurance

by John A. Wheeler  |  January 27th, 2015

As cyber attacks and data breaches are surfacing on a daily basis, our clients are looking for ways to mitigate the risk associated with these events. One of the most popular methods being explored is the use of cyber insurance. But, just what is cyber insurance? Gartner defines cyber insurance...

Read more »

When a Security Breach Becomes a Disaster Recovery Event

by Tony Iams  |  January 30th, 2015

Sony recently announced that it filed an application to delay its third-quarter earnings announcement as a result of the highly publicized cyberattack on its Sony Pictures Entertainment (SPE) division in November. As a result of the cyberattack, which forced SPE to shut down its entire network, the company will not...

Read more »

Microservices : Building Services with the Guts on the Outside

by Gary Olliffe  |  January 30th, 2015

If you’re an application architect it’s unlikely that you have missed the emergence of the latest buzzword in our armoury : Microservices.   And, if you missed it before you’ve found it now. Whether or not you are familiar with microservices, I want to introduce you to what I think is...

Read more »

Wading In the Trough of Disillusionment: Social for CRM

by Jenny Sussin  |  January 30th, 2015

If you're looking to listen to some music appropriate for the reading of this post, just hit play and begin your read. https://www.youtube.com/watch?v=rId6PKlDXeU     Welcome to the trough of disillusionment Social CRM, we're happy to have you.   So, how did we get here?   First we made "social"...

Read more »

The Emotion-Watchers are Coming; The Emotion-Watchers are Coming!

by Robert Hetu  |  January 29th, 2015

An interesting WSJ piece yesterday, The Technology that Unmasks Your Hidden Emotions, highlights the potential for reading emotions and the possible legal implications created. I don’t plan to dig too deeply into the ethical questions other than to say that the human mind reads peoples facial expressions, gestures and movements,...

Read more »

The Best Customer Experiences Hide the Seams

by Jake Sorofman  |  January 28th, 2015

There’s nothing particularly new in the insight that our functional orientations can breed inside-out—rather than outside-in—thinking. Sales, marketing, customer support. These functions exist, first and foremost, to support a separation of enterprise concerns, the roles and responsibilities designed to make an organization go. But sometimes they also create a sort...

Read more »

Here we go again! More bad assumptions fueling new movies, fears...

by Tom Austin  |  January 29th, 2015

In a recent article, the BBC has repeated fear stories like this: "The Spectrum computer's inventor Sir Clive Sinclair … [says] he believes it is unavoidable that artificial intelligences will wipe out mankind. Once you start to make machines that are rivalling and surpassing humans with intelligence, it's going to be...

Read more »