“Why I’ll never buy another piece of business software again.” Those are pretty bold words coming from any seasoned, time-tested, I-grew-up-in-a-server-room CIO or line of business owner. However, I’d propose that with the benefits and maturity of the cloud improving with every tick of my virtual atomic clock, that those are words we’ll be hearing more and more.
The cloud just makes so much sense for so many reasons:
Important business applications have all moved to the cloud and some of the best new ones are only available in the cloud. Flexibility is a “trade-up” for reduced control. Come on […]
In my previous post about password security, I looked at the setting commonly found on password-protected systems, namely the number of incorrect login attempts. In this post, I will look at password complexity.
Most of us, at some point, have had an intended password rejected by the system for not meeting password complexity requirements. But, are so called “strong” passwords really more secure?
Security is, at the end of the day, a function of time. How long would it take to perform a brute-force (keep guessing until you get it right) attack. The more passwords we have to go through, the […]
Security is a key component of many modern computer systems and our Customer Interaction Center (CIC) solution is no exception. Sadly, too often we in the IT world don’t really understand the entire security issue, and as a result, produce a system that is easily compromised. There are two components to consider for good security – the technology and the people. If we don’t consider the latter and make their lives easier, they will take steps to work around the technical measures we put in place.
In this post, I want to focus on a single security setting, the number […]
Please re-read the title. Multitenancy vs. Individual Virtual Machines: Do Customers Care? The short answer is yes, but not for the reasons some vendors tell you.
To be sure we are on the same page, multitenancy is a hosted environment where multiple customers are partitioned on a platform utilizing the same hardware and software resources. The alternative, a single customer multi-instance environment running on individual virtual machines, operate as the name suggests and segregate each customer onto its own virtual machine using something like VMware or Microsoft Hyper-V.
It makes me laugh when the multitenant contact center vendors run around […]
As 2011 comes to a close, it is always good to be introspective about things that you have done over the year. In order for your business to remain competitive, functional and efficient, it is important to continually monitor your processes and operations. It is also good to audit security policies.
One thing I have noticed is over the last decade, the remote worker is becoming increasingly abundant. One of our customers, VIPdesk, modified their entire business model to adjust for remote workers. They found that remote workers were typically more educated, and had lower attrition rates than traditional contact […]