Core Competencies in Digital Marketing

  • October 30, 2013

The current digital marketing and web content & experience management marketplaces overflow with advanced technology services. Unfortunately, most enterprises have insufficient internal capacity and expertise to leverage many if not most of the features found in these tools...

Why is Mobile Testing So Hard?

  • October 16, 2013

We often find enterprises underestimating the effort required to test mobile apps. After all, how much testing effort will it take if you are developing native apps for just two operating systems -- iOS and Android?...

The Enterprise Technology Cocktail: Who's Your Mixologist?

  • August 21, 2013

As most who have met me know, I am a gourmand in the traditional sense -- I love to indulge in great food, fine wines, and a well-crafted artisan cocktail. I spend almost as much time thinking about how great dishes, wines, and mixed drinks are assembled and made to "work" as a successful combination, as I do the technical components of digital asset management systems, and how they fit into larger enterprise architectures with other technologies Real Story Group spends its time dissecting and evaluating...

Avoiding Snowdens in your business applications

  • July 18, 2013

If you only muse about the Edward Snowden affair from the point of view of how much the NSA and the government may know about your Skype calls to colleagues in Ohio, you may want to consider another angle: security and your business applications....

User Management in Your WCM System

  • April 15, 2013

In our WCM selection advisory services, user security and entitlements continue to come up as tricky issues. These are certainly not new challenges, but vendors address them in different ways, and certainly customers vary in their requirements here. So to provide a little education, below I've excerpted bits of the front matter from...

Is Plone Really More Secure Than Drupal and Joomla?

  • February 11, 2013

Security is a touchy subject in the Web CMS world in general and very touchy in particular among open source WCXM projects, since open source platforms are frequently accused (often unfairly) of being inherently insecure by dint of their more open development models.

So it's been interesting to watch some Plone adherents contrast their platform's security profile to that of some major competitors...