David Byrd : Cirrious Cloud Sense
David Byrd
Chief Marketing Officer/EVP of Sales for CloudRoute

ITW and the Importance of Services

As many of you know, ITW has historically been about wholesale voice minutes exchange.  But as voice minutes exchange has lessened in...

Full Story »

All About the API: The One Developer Event You Need

OK, I am going to start off by taking back the headline of this post... There isn't one of anything you need....

Full Story »

API of the Week: Use Flowroute to Access the Multibillion Dollar Telecom API Space

Flowroute is one of the companies in technology that “gets it” when it comes to APIs. Yes, I know APIs aren’t new…...

Full Story »

API of the Week: Vidyo APIs Add Value All Around Us

If you want your company to have a tremendous valuation, make it an integral part of a platform which allows others to...

Full Story »

The Growing Importance of VoWiFi Beyond VoLTE

Last week, I wrote about the importance of VoWiFi as an extension to the VoLTE strategy.  When you look at the chart...

Full Story »

The Opportunities of the Dark Web

What I learned from the first-ever dark web event. Yesterday, we held the world’s first Dark Web conference called Inside Dark Web...

Full Story »

Inside Dark Web Live Blog 2016

I will be live-blogging all about the latest dark web happenings from the show starting tomorrow. Gordon G. Chang, the author of...

Full Story »

The Newfound Fave Five Office 365 Features

May 24, 2016







                            



It is very popular for various writers to research new applications and produced lists of new features or functions. My favorite are lists that inform us of features or functions on familiar products that we have never used or were unaware. From time to time I read an article on smartphones that introduces me to a feature that I actually find practical and of value.









Why Office 365: 10 Excellent Reasons

April 7, 2016

The reasons to buy Office 365 are many and varied depending upon the business legacy software technology, experience level and overall business strategy. However, there are some specific things to keep in mind when considering Office 365.

Office 2016 is the core of Office 365 delivering Word, Excel, PowerPoint, OneDrive and Outlook. These solutions have been effective for many years, and as a result, the products have a substantial following.

Enterprise Mobility: Analysis and Threat Identification

March 8, 2016

The need for the enterprise mobility suite for Microsoft continues to grow every year. While many small business owners or SMBs do not believe that they are the target of hackers because most media reports concern large enterprises, it is important to note that 36% of SMBs are targeted every year by hackers. It's not because the individual business are worth a lot but because there are many more of them and the security is a lot weaker than that of large enterprises. And while the cost to a small business for being hacked is relatively low at $9,000 per incident, the damage to the brand and customer loyalty is much greater.

Information Security and Protection with EMS

February 25, 2016

Microsoft’s approach to handling Identity and Device management along with Information security and protection is to build and enhance an integrated solution, rather than offer point products. The result is an increased value that is much stronger than the piece parts. It becomes easier to implement, manage and ultimately gain adoption by the users. Over the last few weeks I have discuss the importance of employee mobility, the Microsoft Enterprise Mobility Suite (EMS) and Identify Management and Access.

EMS - Identity Management and Access

February 16, 2016

While it is always news when a larger corporation or retailer is hacked, there are many more untold stories of SMBs suffering from unwanted intrusions. According to the National Small Business Association, 44% of small businesses in 2013 were attacked. More recently, Travelers noted that 60% of all hacking target attacks struck SMBs. Moreover, the cost of such attacks has been estimated at $8,700 each for small businesses. Therefore, it has become important for SMBs as well as enterprises to strengthen their ability to prevent unauthorized access.

The Next Chapter for Mobility - Enterprise Mobility Suite

February 9, 2016

To begin, I am not a fan of the name “Enterprise Mobility Suite”. It seems to infer that it is both not required by SMBs (not true) and that it is only for enterprise size companies (also not true). According to Forrester Research, 29 percent of the global workforce or approximately 1 billion people are now “anytime, anywhere information workers” who use three or more devices. Specific to the US, IDC notes that in 2015 there were 96.2 million mobile workers.

The Building has no Walls...Enter EMS

February 2, 2016

Today’s business environment often reminds me of the Hans Christian Andersen fable about two weavers who promise an emperor a new suit of clothes. However, the clothes are invisible to those who are unfit for their positions, stupid, or incompetent. The story of the “Emperor’s New Clothes” notes that people can be duped into acquiring new things at great cost that deliver no value. Given the many technology choices available, it is difficult for a business to select and implement solution strategies that always lead to success.

Cloud Computing, Telecom, the Internet and SOTU

January 13, 2016

I have been writing a blog covering technology and telecommunications for seven years and each year I listen to the State of the Union (SOTU) address with an ear towards how the industry, to which I have dedicated many years, will be referenced.

Last night, the SOTU given by President Obama did not mention our industry. That was nothing new as it has been left out more times than not. However, the speech was not the administration’s usual litany of accomplishments and open agenda items for the coming year.

Delve into Office 365 and Expand the Value of Information

December 16, 2015

Productivity tools, employee engagement, collaboration and mobility are business concerns and requirements that are undergoing a major evolution. New technology is a factor but the greatest redefinition and changes are as a result of the changing nature of the employee. In 2015, Millennials passed Generation Xers as the largest represented generation of workers. Represented by 53.5 million workers (Pew Research Center), more than one in three American workers are a Millennial (18 to 34 years old).

How do Partners Cross the Chasm to Robust MRR?

December 9, 2015

Crossing the Chasm is a book released in 1991 and now common marketing phrase that refers to the gap of time or vision that exists between a newly released high technology product’s positive reception by a limited number of people (early adopters) and acceptance by a broader range of people (early majority). In Crossing the Chasm, Geoffrey Moore finds that success comes from understanding how to position a product for those that want their expectations to be fulfilled is very different from those that gravitate towards the promise of new high tech products. In applying the term to revenue generated by sales of cloud applications, the visionaries are those who believe in the promise of the cloud and the pragmatists are those hesitant to fully embrace a new cloud computing business strategy.

Partners are expressing both real and imagined concerns about how to build successful cloud businesses and it would be wrong to state that only the visionaries are correct and will succeed.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 67 Next
  • cloud solution provider
Featured Events