Articles By David Taber

3 CRM policies you should never adopt

Too often ignored is the CRM data that's about your users: employees who log in and manipulate data every day.There are some user policies that are tempting, but have some nasty consequences. Here

Published on: March 23rd, 2011 David Taber

How to assess a cloud provider’s access control

Depending on what your cloud application is doing, there will be several levels of access control. The simplest is at the file level: the operating system will enforce user/group/world or access control lists

Published on: February 2nd, 2011 David Taber

7 cloud computing security basics

Cloud computing security is an incredibly broad (and deep) topic, so I can only scratch the surface in a short article. Even so, let's try to get the basics under control.The first order

Published on: January 27th, 2011 David Taber

How to use CRM tools to crowd-source product strategy

In most product-driven firms, product planning is one of the highest leverage processes in the whole company. There's a huge difference in the profitability of a "hit" vs. a me-too product, and a

Published on: November 9th, 2010 David Taber

Three CRM danger zones and how to avoid them

CRM systems are where the data about customer relationships are supposed to live, and they typically provide a report-writing system as well as dozens of canned reports. But reports are incredibly vulnerable to

Published on: August 27th, 2010 David Taber