Quarterly Review of the Software & Internet Sector

Total Page:16

File Type:pdf, Size:1020Kb

Quarterly Review of the Software & Internet Sector Quarterly Review of the Software & Internet Sector Q4 2014 Member: FINRA / SIPC About Navidar Navidar is an investment banking firm providing companies and investors in dynamic industries with strategic M&A advice, capital raising solutions, vital insights and breakthrough opportunities. ■ Big Firm Experience Combined with Senior Banker Attention ■ Global Relationships with Top-Tier Investors and World-Leading Companies ■ Greater Creativity and Customized Solutions ■ Focused on the Middle Corridor of the United States Past Transactions Executed by Navidar October 2014 September 2014 June 2014 April 2014 Has been acquired by Has acquired Has been acquired by Has been acquired by Buyside Advisor Sellside Advisor Sellside Advisor Sellside Advisor March 2014 December 2013 October 2013 December 2012 Has been acquired by Has acquired Has been acquired by Private Equity Placement Sellside Advisor Buyside Advisor Sellside Advisor October 2012 August 2012 February 2012 February 2012 Has been acquired by Has been acquired by NOL Shareholder Rights Capital Structure Review Plan Sellside Advisor Sellside Advisor October 2011 July 2011 January 2011 January 2011 January 2011 Has been acquired by Has been acquired by Debt Placement Sellside Advisor Sellside Advisor Private Equity Placement Debt Placement July 2010 July 2009 November 2010 January 2009 Has acquired World Golf Systems Group PLC Private Equity Placement Recapitalization Private Equity Placement Buyside Advisor Note: Transactions above only represent a sample of past transactions executed by Navidar. 2 Navidar at a Glance Experienced Strategic Advisors Advising Dynamic Companies Executed Over 300 Deals, Nearly $70B of Transaction Volume Technology Internet/ E-Commerce Business SaaS Financing Services Software M&A $31.5B $35.9B 47% 53% Specialty MedTech and Manufacturing HCIT Creative Insights & Customized Solutions International Expertise $8.4B of Transaction Volume Public Companies Public M&A Canada, $1.3B 16% Europe, Asia $2.2B $4.9B Corporate Capital 26% 58% Finance Raising Advisory Private Companies Private Contact Us Austin Office 400 W. 15th Street, Suite 325 Austin, TX 78701 T: (512) 765-6970 Stephen Day Managing Principal O: (512) 765-6973 | E: [email protected] Tim Walsh Managing Principal O: (512) 765-6972 | E: [email protected] 3 Q4 2014 Software & Internet Sector Review Relative Share Price Performance – YTD 125% 120% 16.4% Diversified Sw. 115% 14.6% Application Sw. 14.3% NASDAQ 110% 9.7% Security 8.7% Internet 105% 100% 0.6% SAAS (0.4%) IT Infra. Mgt. (1) 95% 90% (11.0%)E-Commerce 85% 80% 2-Jan-14 16-Feb-14 2-Apr-14 17-May-14 1-Jul-14 15-Aug-14 29-Sep-14 13-Nov-14 28-Dec-14 Software & Internet Sector Share Price Performance Key Takeaways From the Quarter: Q4 YTD Navidar’s Software & Internet sub-sector exhibited mixed Sub-Sector Return Return performance in Q4’14 with three sub-sectors (Security, Security 12.3% 9.7% Application Software and SaaS) outperforming the NASDAQ Index and four sub-sectors (Diversified Software, IT Application Software 11.6% 14.6% Infrastructure Management, eCommerce and Internet) SaaS 8.8% (0.6%) underperforming the NASDAQ Composite. NASDAQ 7.1% 14.3% Global Software & Internet M&A deal volume was relatively Diversified Software 5.6% 16.4% flat in Q4’14 with 856 announced deals compared to 858 (1) IT Infra. Mgt. 1.5% (0.4%) announced deals in Q3’14. Global disclosed deal value eCommerce 0.9% (11.0%) decreased significantly to $19.2 billion in Q4’14 from$47.3 Internet (2.6%) 8.7% billion in Q3’14. U.S. deal volume in Q4’14 experienced a steep decline with 341 Top 5 Global M&A Deals in Q4 By Value transactions as compared to 395 transactions in Q3’14. Likewise, U.S. disclosed deal value also declined to $9.2 billion Deal Value Date Buyer Target ($M) in Q4’14 from $35.8 billion in Q3’14. There were eleven large deals (EV > $500M) in Q4’14 as 12/01/2014 $1,200 compared to nineteen deals in Q3’14, nine deals in Q2’14 and 13 deals in Q1’14. 10/23/2014 1,032 Strategic acquirers accounted for 93% of deal volume in Q4’14 10/09/2014 932 (794 out of 856 transactions). U.S. Middle Market M&A deal volume declined slightly in 11/12/2014 835 Q4’14 as compared to Q3’14 (71 deals to 69 deals). Over 70% of announced transactions in Q4’14 with disclosed 12/11/2014 800 deal values were below $50 million. Source: CapitalIQ, Industry Research, Online Publications and Navidar Research. (1) IT Infrastructure Management. 4 Software & Internet Sector M&A Review Global Software & Internet M&A Deals – Since 2011 Commentary $60 880 858 900 Global Software & Internet sector M&A 856 800 deal volume remained flat in Q4’14 as 729 702 724 $50 689 692 695 $47.3 771 735 700 compared to Q3’14. Disclosed deal value in 704 720 613 $40 640 600 Q4’14 reached its lowest level over the last No.ofDeals ) $34.5 $33.1 558 six quarters. bn 500 $30 $24.7 $24.2 400 $22.0 $22.0 Global transaction volume in Q4’14 $19.6 $19.2 $18.4 $19.4 $20.5 Value($ $20 $16.7 $15.5 300 increased by 23% as compared to Q4’13, $15.2 200 from 695 acquisitions to 856. However, $10 $6.1 100 global transaction value decreased by 22% $0 0 over the same period. Transaction value in Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q4’14 was primarily driven by: 2011 2012 2013 2014 - Centerbridge Partners’ $1.2 billion U.S. Software & Internet M&A Deals – Since 2011 acquisition of IPC Systems $45 399 400 - Siris Capital’s $1.0 billion acquisition 340 355 395 $40 324 332 334 350 of Digital River 297 321 311 $35.8 $35 295 328 331 341 300 309 U.S. transaction volume declined sharply in $30 281 $26.9 No.ofDeals ) 250 Q4’14 as compared to Q3’14. Likewise, bn $25 200 U.S. transaction value also experienced $20 $15.1 $16.3 declines in Q4’14. U.S. transaction value $14.8 $14.4 150 Value($ $15 $12.8 $12.6 $11.8 $11.7 contributed 48% of global transaction $10.9 $11.5 $10.0 100 $10 $9.2 value in Q4’14. $6.0 50 $5 $2.8 U.S. transaction volume increased 10% in $0 0 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q4’14, as compared to Q4’13, from 311 to 341 acquisitions. U.S. transaction value 2011 2012 2013 2014 decreased by 20%, from $11.5 billion to U.S. Middle Market Software & Internet M&A – Since 2011(1) $9.2 billion, over the same period. $8 97 100 About 60% of U.S. Software & Internet $7 82 84 81 transaction value in Q4’14 was driven by 76 78 80 71 $6 71 71 69 six deals over $500 million EV. $4.9 59 62 $5.0 $4.5 No.ofDeals ) $5 54 $4.4 $4.2 60 U.S. Middle Market transaction volume in bn $4.1 $4.2 $3.8 $4 53 $3.8 $3.8 Q4’14 continued its downtrend in Q4’14, $3.4 $3.4 40 36 40 $3 declining from 71 deals in Q3’14 to 69 deals Value ($Value $2.3 $2.1 in Q4’14. $2 $1.6 20 $1.0 $1 Transaction volume in Q4’14 increased 30% from Q4’13, from 53 to 69 $0 0 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 acquisitions. Deal value decreased from 2011 2012 2013 2014 $4.2 billion to $3.8 billion over the same period. Source: CapitalIQ and Industry Research. (1) Defined as deal value of $500M EV and less. 5 Software & Internet Sector M&A Review (Cont.) Top 10 Global Software & Internet M&A Transactions in Q4 2014 Announced Ent. Value EV / LTM EV / LTM Acquirer Target Date ($USDmm) Revenue (x) EBITDA (x) 12/18/2014 Tack Fiori International Group Beijing Feiliu Jiutian Technology $624.9 NA NA (Hong Kong) (China) 12/11/2014 Adobe Systems (U.S.) Fotolia (U.S.) 800.0 NA NA 12/09/2014 Belden (U.S.) Tripwire (U.S.) 710.0 NA NA 12/01/2014 Centerbridge Partners (U.S.) IPC Systems (U.S.) 1,200.0 NA NA 11/18/2014 Mozido (U.S.) PayEase (U.S.) 750.0 NA NA 11/13/2014 ORIX (Japan) Yayoi (Japan) 691.4 5.0x NA 11/12/2014 Churchill Downs (U.S.) Big Fish Games (U.S.) 835.0 NA 14.6x 11/05/2014 The Carlyle Group (U.S.); Euromoney Dealogic (Holdings) (U.K.) 522.1 3.6x 9.6x Institutional Investor (U.K.) 10/23/2014 Siris Capital Group (U.S.) Digital River (U.S.) 1,031.7 1.7x 18.1x 10/09/2014 Apax Partners (U.K.) Exact Holding NV (Netherlands) 932.3 3.2x 16.2x U.S. Technology M&A Activity by Sub-Sector M&A Deal Value ($ billions) M&A Deal Volume Q4'14 $26.4 Q4'14 511 Q3'14 $46.3 Q3'14 554 Q2'14 $30.4 Q2'14 581 Q1'14 $41.4 Q1'14 545 Q4'13 $25.6 Q4'13 442 Q3'13 $24.9 Q3'13 457 Software Semiconductor Software Semiconductor Hardware IT Services Hardware IT Services U.S. Software & Internet M&A Deal Volume by Size Q4'2013 Q4'2014 Q3'2014 $ in millions Number of Total Deal Number of Total Deal Number of Total Deal (except # of deals) Deals Value Deals Value Deals Value < $50M 34 478 50 646 47 423 $50M to $100M 4 255 9 689 7 452 $100M to $250M 9 1,035 5 738 10 1,869 $250M to $500M 5 1,633 5 1,763 7 2,266 $500M to $1000M 2 1,494 4 3,095 5 4,113 >$1B 4 6,312 2 2,232 9 26,656 Undisclosed 243 - 266 - 310 - Total 311 11,476 341 9,163 395 35,779 Source: CapitalIQ and Industry Research.
Recommended publications
  • Dipartimento Di Impresa E Management Cattedra Di Strategia
    Dipartimento di Impresa e Management Cattedra di Strategia di Impresa CORPORATE VENTURE CAPITAL ED OPEN INNOVATION: MOTORI PER LA CRESCITA INNOVATIVA AZIENDALE RELATORE Prof. Paolo Boccardelli CANDIDATO Carlo Maria Torregrossa Matricola 681361 CORRELATORE Prof. Luca Pirolo ANNO ACCADEMICO 2017/2018 INDICE INTRODUZIONE ............................................................................................................................. 3 CAPITOLO 1 – CORPORATE VENTURE CAPITAL ................................................................ 4 1.1 - Definizione, numeri e classificazione ...................................................................................... 4 1.2 - Principali tipologie di investimento ......................................................................................... 9 1.3 - Modelli e fasi di corporate venture capital ............................................................................ 11 1.4 - Il concetto di open innovation ............................................................................................... 14 CAPITOLO 2 – L’INVESTIMENTO IN INNOVAZIONE ........................................................ 23 2.1 - Start-up e corporate venturing ............................................................................................... 23 2.2 - Il fenomeno delle start-up nel mondo e in Italia .................................................................... 25 2.3 - Valutazione d’azienda: come valutare grandi imprese e start-up .........................................
    [Show full text]
  • Signing Me Onto Your Accounts Through Facebook And
    Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services Rui Wang Shuo Chen XiaoFeng Wang Indiana University Bloomington Microsoft Research Indiana University Bloomington Bloomington, IN, USA Redmond, WA, USA Bloomington, IN, USA [email protected] [email protected] [email protected] Abstract— With the boom of software-as-a-service and social extensive commercial deployments as what happen on networking, web-based single sign-on (SSO) schemes are being today’s web, thanks to the increasing popularity of social deployed by more and more commercial websites to safeguard networks, cloud computing and other web applications. many web resources. Despite prior research in formal verification, little has been done to analyze the security quality Today, leading web technology companies such as of SSO schemes that are commercially deployed in the real Facebook, Google, Yahoo, Twitter and PayPal all offer SSO world. Such an analysis faces unique technical challenges, services. Such services, which we call web SSO, work including lack of access to well-documented protocols and code, through the interactions among three parties: the user and the complexity brought in by the rich browser elements represented by a browser, the ID provider (a.k.a, IdP, e.g., (script, Flash, etc.). In this paper, we report the first “field Facebook) and the relying party (a.k.a, RP, e.g., Sears). Like study” on popular web SSO systems. In every studied case, we any authentication scheme, a secure web SSO system is focused on the actual web traffic going through the browser, and used an algorithm to recover important semantic expected to prevent an unauthorized party from gaining information and identify potential exploit opportunities.
    [Show full text]
  • CIAM Platforms LEADERSHIP COMPASS
    KuppingerCole Report LEADERSHIP COMPASS by John Tolbert December 2018 CIAM Platforms This report provides an overview of the market for Consumer Identity and AcCess Management and provides you with a Compass to help you to find the Consumer Identity and ACCess Management produCt that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaChes to providing CIAM solutions. by John Tolbert [email protected] December 2018 Leadership Compass CIAM Platforms KuppingerCole Leadership Compass CIAM Platforms By KuppingerCole Report No.: 79059 Content 1 Introduction .................................................................................................................................... 6 1.1 Market Segment ...................................................................................................................... 7 1.2 Delivery models ....................................................................................................................... 9 1.3 Required Capabilities .............................................................................................................. 9 2 Leadership .................................................................................................................................... 12 3 Correlated View ............................................................................................................................ 20 3.1 The Market/Product Matrix .................................................................................................
    [Show full text]
  • Customer Relationship Management (CRM) Chapter Leads to the Most Arguments About Placement Whenever We Update This Book
    Retain › Introduction Introduction to Retain By this stage of the book you’ve probably realised that getting your customers’ attention through digital channels is only part of the battle. Holding on to that attention in order to build a long-term customer relationship is the next essential step. We’ve covered planning, building and driving traffic to carefully developed digital assets. The next few chapters deal with methods and tools for retaining the stream of potential and existing customers by building relationships with them and leading them to conversions. The Customer relationship management (CRM) chapter leads to the most arguments about placement whenever we update this book. A core approach in taking care 14 of and converting customers, CRM can be a core business strategy as well as an approach and should be considered at all stages of the customer journey. Content marketing lays out the building blocks for effectively using content, not advertising, to reach audiences. With users becoming increasingly blind to adverts Customer and wary of blatant promotional material, there is a strong need for brands to provide value in the forms of good content to engage and retain their audience. Being chosen as a customer’s preferred brand often hinges on how favourably you relationship are seen by others in the market. Being well represented on Social media, and implementing a sound Social media strategy, is important for brands marketing online. Monitoring sentiment around your brand, using online monitoring tools, will management help you to understand how digital communities perceive brands. Video marketing is another excellent tool for engaging and capturing your audience’s (CRM) attention.
    [Show full text]
  • Getting to Know Your Customers: the Emergence of CIAM Abstract
    Getting To Know Your Customers: The Emergence of CIAM Abstract Ten years ago identity and access management (IAM) solutions were rarely deployed beyond the company firewall, providing permissions and access rights to enterprise resources to employees and contractors. When available, the management of customer and partner access to a generally limited set of resources was often poorly coordinated. Today, however, a very different social, technology and business environment demands that enterprises make their customers’ online experience as sleek and personalized as possible. And to do this, enterprises are embracing a new breed of consumer or customer identity and access management (CIAM) solutions from their IAM vendors. The investment and commitment to CIAM are being driven by an ever- increasing sophistication of customer expectation in terms of a ‘joined up’ user experience and real-time availability of relevant resources accessible anywhere, anytime and from any device. Alongside the need to protect the ‘disappearing perimeter’ with adequate security is measured the need to address competitive advantage and maintain customer loyalty. Boosting transparency between marketing and lines of business has the potential to deepen the customer relationship. In this report, we investigate this emerging trend, what the major players are doing, and what should be the next steps for TechVision Research clients. This report covers: • The CIAM value proposition and business rationale for the enterprise • Getting the balance right between enterprise IAM (EIAM) and CIAM • TechVision Research’s shortlist of CIAM vendors • Eight steps an enterprise should take to best leverage CIAM Author: David Goodman, D. Phil Principal Consulting Analyst [email protected] Getting To Know Your Customers: The Emergence of CIAM David Goodman Table of Contents Abstract .............................................................................................................................................................................
    [Show full text]
  • 10 Best Practices to Drive On-Site Engagement.Pdf
    10 BEST PRACTICES TO DRIVE ON-SITE ENGAGEMENT Contents Introduction 3 Leverage Existing Social Identities 4 Define Reasons to Register 5 Provide a Welcoming Return Experience 7 Encourage Users to Link Multiple Social Accounts 8 Encourage Social Sharing 9 Drive Engagement by Including Friends 10 Optimize for Mobile Browser Experiences 11 Reward Participation and Loyalty 12 Offer Ratings and Reviews 13 Test, Learn and Iterate 14 Conclusion 15 tm Introduction Introduction Today’s connected consumer has a number of fundamental expectations about what they should be able to do online Regardless of the type of website (media, entertainment, retail, consumer brand, etc ), people increasingly expect an element of social interactivity This shift in behavior creates new acquisition and engagement opportunities, and thankfully the tools that enable marketers to step up to this challenge are continually improving This paper explores best practices for incorporating social technologies into your site, including key considerations for how, when, why and where to integrate social components to maximize the experience as well as your return, along with some real-world examples We’ll cover these opportunities to integrate social: • Social Login • Social Sharing • Leveraging the Social Graph • Loyalty and Rewards • Mobile and Tablet Consideration Copyright © 2013 Janrain Inc All rights reserved On-Site Engagement | www janrain com | 888 563 3082 PG3 tm 1 Leverage Existing Social Identities When people arrive at a website, many of makes the process quick
    [Show full text]
  • On the Security of Single Sign-On
    On the Security of Single Sign-On Vladislav Mladenov (Place of birth: Pleven/Bulgaria) [email protected] 30th June 2017 Ruhr-University Bochum Horst G¨ortz Institute for IT-Security Chair for Network and Data Security Dissertation zur Erlangung des Grades eines Doktor-Ingenieurs der Fakult¨atf¨urElektrotechnik und Informationstechnik an der Ruhr-Universit¨atBochum First Supervisor: Prof. Dr. rer. nat. J¨org Schwenk Second Supervisor: Prof. Dr.-Ing. Felix Freiling www.nds.rub.de Abstract Single Sign-On (SSO) is a concept of delegated authentication, where an End- User authenticates only once at a central entity called Identity Provider (IdP) and afterwards logs in at multiple Service Providers (SPs) without reauthenti- cation. For this purpose, the IdP issues an authentication token, which is sent to the SP and must be verified. There exist different SSO protocols, which are implemented as open source libraries or integrated in commercial products. Google, Facebook, Microsoft and PayPal belong to the most popular SSO IdPs. This thesis provides a comprehensive security evaluation of the most popular and widely deployed SSO protocols: OpenID Connect, OpenID, and SAML. A starting point for this research is the development of a new concept called malicious IdP, where a maliciously acting IdP is used to attack SSO. Generic attack classes are developed and categorized according to the requirements, goals, and impact. These attack classes are adapted to different SSO proto- cols, which lead to the discovery of security critical vulnerabilities in Software- as-a-Service Cloud Providers, eCommerce products, web-based news portals, Content-Management systems, and open source implementations.
    [Show full text]
  • Automated Malware Analysis Report For
    ID: 446205 Sample Name: Open_Purchase_Order_Report_by_Supplier_- _ProReport_188165628308.xlsx Cookbook: default.jbs Time: 00:16:48 Date: 09/07/2021 Version: 32.0.0 Black Diamond Table of Contents Table of Contents 2 Windows Analysis Report Open_Purchase_Order_Report_by_Supplier_- _ProReport_188165628308.xlsx 3 Overview 3 General Information 3 Detection 3 Signatures 3 Classification 3 Process Tree 3 Malware Configuration 3 Yara Overview 3 Sigma Overview 3 Jbx Signature Overview 3 Mitre Att&ck Matrix 4 Behavior Graph 4 Screenshots 4 Thumbnails 4 Antivirus, Machine Learning and Genetic Malware Detection 5 Initial Sample 5 Dropped Files 5 Unpacked PE Files 5 Domains 5 URLs 5 Domains and IPs 7 Contacted Domains 7 URLs from Memory and Binaries 7 Contacted IPs 7 General Information 7 Simulations 8 Behavior and APIs 8 Joe Sandbox View / Context 8 IPs 8 Domains 8 ASN 8 JA3 Fingerprints 8 Dropped Files 8 Created / dropped Files 8 Static File Info 9 General 9 File Icon 10 Network Behavior 10 Network Port Distribution 10 UDP Packets 10 Code Manipulations 10 Statistics 10 System Behavior 10 Analysis Process: EXCEL.EXE PID: 6512 Parent PID: 800 10 General 10 File Activities 11 File Written 11 Registry Activities 11 Key Created 11 Key Value Created 11 Disassembly 11 Copyright Joe Security LLC 2021 Page 2 of 11 Windows Analysis Report Open_Purchase_Order_Repo…rt_by_Supplier_-_ProReport_188165628308.xlsx Overview General Information Detection Signatures Classification Sample Open_Purchase_Order_Re No high impact signatures. Name: port_by_Supplier_- _ProReport_188165628308
    [Show full text]
  • 80061 Leadership Compass Consumer Authentication 2019
    KuppingerCole Report LEADERSHIP COMPASS by John Tolbert September 2019 Consumer Authentication This report provides an overview of the market for Consumer Authentication products and services and provides you with a compass to help you to find the Consumer Authentication product or service that best meets your needs. We examine the market segment, vendor product and service functionality, relative market share, and innovative approaches to providing Consumer Authentication solutions. by John Tolbert [email protected] September 2019 Leadership Compass KuppingerCole Leadership Compass Consumer Authentication Consumer Authentication Report No.: 80061 By KuppingerCole Content 1 Introduction ................................................................................................................................. 6 1.1 Market Segment ....................................................................................................................... 7 1.2 Delivery models ........................................................................................................................ 7 1.3 Required Capabilities ................................................................................................................ 7 2 Leadership.................................................................................................................................. 11 3 Correlated View ......................................................................................................................... 19 3.1 The Market/Product
    [Show full text]
  • Customer Identity and Access Management, Q2 2017 Top Eight Providers That Matter Most and How They Stack up by Merritt Maxim June 15, 2017
    FOR SECURITY & RISK PROFESSIONALS The Forrester Wave™: Customer Identity and Access Management, Q2 2017 Top Eight Providers That Matter Most And How They Stack Up by Merritt Maxim June 15, 2017 Why Read This Report Key Takeaways In our 20-criteria evaluation of customer IAM Gigya And Janrain Lead The Pack (CIAM) providers, we identified the eight most Forrester’s research uncovered a market significant ones — Auth0, ForgeRock, Gigya, in which Gigya and Janrain lead the pack. Janrain, LoginRadius, Microsoft, Ping Identity, Salesforce, ForgeRock, and Ping Identity offer and Salesforce — and researched, analyzed, competitive options. Microsoft, LoginRadius, and scored them. This report shows how each and Auth0 lag behind. provider measures up and helps security and S&R Pros Want Secure, Seamless Digital risk professionals make the right choice for their Experiences For Customers digital businesses. The CIAM market is growing because more S&R professionals increasingly trust CIAM providers to help solve key customer IAM challenges and support customer-centric digital transformation initiatives. Every vendor in this Forrester Wave™ is tracking toward this goal. Analytics, Customer Data Management, And Geographic Coverage Are Key Differentiators As home-grown, disparate technologies for managing customer identity and access become more expensive to administer and less effective, improved customer analytics, customer data management, and the ability to service customers in multiple geographies will dictate which providers will outpace their competitors.
    [Show full text]
  • The Value of Social Login Solving the Engagement Gap Insights from Consumer Research
    The Value of Social Login Solving the Engagement Gap Insights from Consumer Research tm + As marketers we endeavor to communicate meaningful and authentic dialogues with consumers. But 98% of people say the information we’re trying to share is misaligned. Almost all 10% Q the time Frequently 48% “How often do companies send 98% are information, promotions, etc. mistargeted not relevant to you?” Infrequently 40% Never 2% Q1. How often, if at all, have you experienced a situation where a company has sent you information, promotions, etc. that are not relevant to you? n=593 Why are we having this problem? We need to know who we’re talking to in order to be relevant. Site registration aims to solve this problem. But why doesn’t it always work? For one, people are account fatigued, and more resistant to registering. 53% have 5+ usernames 57% have 5+ passwords *** Q *** “How many 29% have 4—5 usernames *** di!erent *** usernames and 26% have 4—5 passwords *** *** passwords have *** you created 15% have 2—3 usernames *** *** online? 16% have 2—3 passwords *** 3% have 0—1 usernames 1% have 0—1 passwords Q6A. You may not use, let alone remember, all of the di!erent username and passwords that you have created online. However to the best of your knowledge, how many di!erent usernames have you created online for sites that require a username and password? n=593 Even after they’ve created an account, many have forgotten login information and decide to leave sites. Q 92% “How often have 61% have left instead of Qyou gone to a A Few resetting or recovering ? Times website, forgotten login information.
    [Show full text]
  • Agrofuels in the Americas.Pdf
    Agrofuels in the Americas. Edited by Richard Jonasse, PhD. Copyright © 2009 Institute for Food and Development Policy. All rights reserved. Food First Books 398 60th Street Oakland, CA 94618 510-654-4400 www.foodfirst.org Cover and text design by Richard Jonasse Production: Richard Jonasse Acknowledgements: This project began a little over a year ago with five of the authors sitting around a table at Food First in Oakland, CA. They included Annie Shattuck, Isabella Kenfield, Jessica Aguirre, Gretchen Gordon, Ellen Tarby, and myself. Beyond the wonderful work of the authors herein, we would like to thank Eric Holt-Giménez for providing his insights and many key paragraphs to most of the pieces herein. Annie Shattuck, had a hand in every article. Marilyn Borchardt provided tremendous support, humor, feedback, and commentary. Martha and Rowena shared their kindness and mung beans. There have been a number of people here who have stepped in to help with research, fact checking, translation, proofreading, citation hunting, fact-finding, and general commentary. These include: Annie, Marilyn, Martha, Jessica Aguirre, Jody Zaitlin, Karla Pena, Tamara Wattnem, Leonora Hurtado, Loren Peabody, Zack Zimbalist, Matt Dintenfass, Angie Rodriguez, Maria Barrera, Ellen Tyler, Amanda El-Khoury, Mihir Mankad, Jasmine Tilley, William Wroblewski, and Matt King. About the Author: Richard Jonasse is currently a Research Fellow at Food First in Oakland, CA. His research interests lie in development issues, including International Finance Institutions, food sovereignty, labor/human rights, and environmental sustainability. He has a Masters Degree in Telecommunication and Film from University of Oregon, and a Ph.D. in Communication (emphasis in technology studies) from U.
    [Show full text]