Categories

Dream. Dare. Do – that is Suyati’s work principle in a nutshell.

Missed Dreamforce’18? Read about the Key Takeaways from the event

Dreamforce18 – A celebration of a thriving ecosystem!  “This is a celebration of you, our Trailblazers, of everything you are doing. It’s an incredible moment.”, said Marc Benioff, Salesforce Chairman and Co-CEO as he kick-started the 16th Dreamforce with his keynote. And celebration it indeed was – with 171,000+ “Trailblazers” coming in from around 90+ […]

CUSTOMER 360 FOR A DELIGHTFUL CUSTOMER EXPERIENCE

When we order food through UberEats, hire a cab using Lyft, or buy an insurance online we leave behind our digital footprints with the online business we are transacting with. The more we interact with them, the more they know about us – who we are, what and when we bought, how did we buy […]

Suyati at Dreamforce ’18: Powered by connected insights

The countdown has begun. We are just days away from Dreamforce! Needless to say, Suyati will be there in full swag with our team of Salesforce enthusiasts and leaders to network with other evangelists and prospects.  At Dreamforce 2018, we will be highlighting connected insights and how it will drive businesses to data-driven intelligent experiences […]

Why does your business need a CRM and Marketing Automation Integration

Why do I need a marketing automation software when I have a CRM? A number of businesses ask us this question because it seems rather obvious – after all CRM and marketing automation software are the same, right? WRONG! If you have been having problems with your marketing and sales funnel, it is probably because […]

Sitecore Positioned a Leader by Gartner in their Magic Quadrant for Web Content Management for the ninth time

Sitecore®, the global leader in digital experience management software, has been recognized by Gartner as a Leader in the Magic Quadrant for Web Content Management for the ninth time. Sitecore was also positioned the highest on the ability to execute axis for four years in a row. Gartner categorizes website management, providing metadata for the […]

Finney or Exodus? Here is what you can expect from the world’s first blockchain phone

Switzerland based Sirin Lab has unveiled the launch of Finney this November with claims of being the first blockchain phone to be released. Taiwan based HTC has also joined the bandwagon, planning for the launch of their blockchain phone HTC Exodus on Q3 this year. Finney is competing with HTC Exodus for the title of […]

What makes MS Dynamics 365 for Marketing the undisputed choice for marketers

The much-awaited marketing module for Dynamics 365 by Microsoft finally hit the markets early this year. This marketing automation application has a lot to offer, providing marketers with a 360-degree view of the market, and helping them improve branding, communications and customer relationship. MS Dynamics 365 for marketing is available as a business edition. It […]

The Seven Laws Of Open Source Leadership

The open source revolution is more than throwing open source codes of software application development to all and sundry. It also signifies a change in the approach to leadership – from a model based on dominance, authority, and control, to a model of innovation, collaboration, and social connections. Here are seven top characteristics of Leadership […]

URL rules at runtime in Yii

Introduction When you are developing an application with pluggable module , you  need to somehow inject your module-specific rules into an existing application. Set-up your application 1. Create new application using yiic webapp.2. Add .htaccess to your webroot. Options +FollowSymLinksIndexIgnore */*RewriteEngine on# if a directory or a file exists, use it directlyRewriteCond %{REQUEST_FILENAME} !-fRewriteCond %{REQUEST_FILENAME} […]

How to truly secure the Data

In the age of heightened security risks, securing data has become more important than ever before. The ingenuity of the cyber-criminals and the increasing incidence of threats from insiders with access privileges have almost rendered obsolete conventional approach of installing perimeter rings of defense around the data, such as firewalls. The new approach to security […]