Skip to Main Content

Blog: Uncategorized

What do Identity Fraud and a Wilting Head of Lettuce have in Common?
27 | Oct

Neither one has to last very long to have an impact….   With all the talk of lettuce and political longevity, it strikes me that a fr...

Read Post
Security. Customer Experience. Privacy. Pick Three.
13 | Jun

A fast, secure, elegant experience in the contact center is here.  Despite the explosion of digital interactions that are now possible usin...

Read Post
The Basic Experience of Calling a Contact Center Hasn’t Changed in 30 Years. Why?
08 | May

Our smartphones have revolutionized the way we live life. Their embedded sensors and digital capabilities change the way we live our lives. ...

Read Post
A Finger in the Dike Just Doesn’t Cut it….
16 | Dec

The Little Dutch Boy was a piece of American fiction Written in 1865, but it Would Have Never Worked…. “When a dike is about to break, a...

Read Post
Imagine an Internet Safe For Our Children….
07 | Dec

People Say I’m a Dreamer, but I’m Not the Only One. The news stories are all around us.  Online stalker jailed for nine years, a man wh...

Read Post
Why is the Internet Doing This to My Mom?
30 | Nov

And what are we geeks doing about it?…. I have written a lot of blogs about identity, privacy, and the protection of sensitive personal in...

Read Post
16 | Nov

What exactly does “verified” mean? Well, whatever you want or need it to mean…. Unlike the telephone network as it was origina...

Read Post
Privacy, It’s Not Just for Breakfast Any More!
10 | Nov

Like any new technology, the internet (which constantly introduces new technology) has unintended consequences….   As the internet ha...

Read Post
The Many Faces of Authentication
03 | Nov

Why Versus How: Evaluating the Reason for the Authentication to Determine the Best Method There seems to be much variation in how the authen...

Read Post