Vendor Relationship Management
   HOME
*





Vendor Relationship Management
Vendor relationship management (VRM) is a category of business activity made possible by software tools that aim to provide customers with both independence from vendors and better means for engaging with vendors. These same tools can also apply to individuals' relations with other institutions and organizations. The term appeared in Computerworld magazine in May 2000, albeit in the context of a business managing its IT vendors. The term was first used in the context here by Mike Vizard on a Gillmor Gang podcast on September 1, 2006, in a conversation with Doc Searls about the project Searls had recently started as a fellow at the Berkman Center for Internet & Society at Harvard University. Vizard saw VRM as a natural counterpart of customer relationship management. Searls' project then became named ProjectVRM, and has since worked to guide the development of VRM tools and services. VRM tools provide customers with the means to bear their share of the relationship burden with vendo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Computerworld
''Computerworld'' (abbreviated as CW) is an ongoing decades old professional publication which in 2014 "went digital." Its audience is information technology (IT) and business technology professionals, and is available via a publication website and as a digital magazine. As a printed weekly during the 1970s and into the 1980s, ''Computerworld'' was the leading trade publication in the data processing industry. Indeed, based on circulation and revenue it was one of the most successful trade publications in any industry. Later in the 1980s it began to lose its dominant position. It is published in many countries around the world under the same or similar names. Each country's version of ''Computerworld'' includes original content and is managed independently. The parent company of Computerworld US is IDG Communications. History The first issue was published in 1967. Going international The company IDG offers the brand "Computerworld" in 47 countries worldwide, the name and fre ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


David Weinberger
David Weinberger (born 1950) is an American author, technologist, and speaker. Trained as a philosopher, Weinberger's work focuses on how technology — particularly the internet and machine learning — is changing our ideas, with books about the effect of machine learning’s complex models on business strategy and sense of meaning; order and organization in the digital age; the networking of knowledge; the Net's effect on core concepts of self and place; and the shifts in relationships between businesses and their markets. Career Weinberger holds a Ph.D. from the University of Toronto and taught college from 1980-1986 primarily at Stockton University (then known as Stockton State College). From 1986 until the early 2000s he wrote about technology, and became a marketing consultant and executive at several high-tech companies, including Interleaf and Open Text. His best-known book is 2000’s Cluetrain Manifesto (co-authored), a work noted for its early awareness of the Net ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Vendor Lock-in
In economics, vendor lock-in, also known as proprietary lock-in or customer lock-in, makes a customer dependent on a vendor for products, unable to use another vendor without substantial switching costs. The use of open standards and alternative options makes systems tolerant of change, so that decisions can be postponed until more information is available or unforeseen events are addressed. Vendor lock-in does the opposite: it makes it difficult to move from one solution to another. Lock-in costs that create barriers to market entry may result in antitrust action against a monopoly. Lock-in types ; Monopolistic : Whether a single vendor controls the market for the method or technology being locked in to. Distinguishes between being locked to the mere technology, or specifically the vendor of it. This class of lock-in is potentially technologically hard to overcome if the monopoly is held up by barriers to market that are nontrivial to circumvent, such as patents, secrecy, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Personal Data Service
Personal data services or personal datastores (PDS) are services to let an individual store, manage and deploy their key personal data in a highly secure and structured way. They give the user a central point of control for their personal information (e.g. interests, contact information, affiliations, preferences, friends). The user's data attributes being managed by the service may be stored in a co-located repository, or they may be stored in multiple external distributed repositories, or a combination of both. Attributes from a PDS may be accessed via an API. Users of the same PDS instance may be allowed to selectively share sets of attributes with other users. A data ecosystem is developing where such sharing among projects or "operators" may become practicable. Open Source Projects Cloud-only Note: Cloud-based PDSes are sometimes called personal data clouds or personal clouds. (HAT) Hub-of-All-ThingsPersonium.io- open-source personal datastore SOLID Project- SOLID (Social Link ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Customer Relationship Management
Customer relationship management (CRM) is a process in which a business or other organization administers its interactions with customers, typically using data analysis to study large amounts of information. CRM systems compile data from a range of different communication channels, including a company's website, telephone, email, live chat, marketing materials and more recently, social media. They allow businesses to learn more about their target audiences and how to best cater for their needs, thus retaining customers and driving sales growth. CRM may be used with past, present or potential customers. The concepts, procedures, and rules that a corporation follows when communicating with its consumers are referred to as CRM. This complete connection covers direct contact with customers, such as sales and service-related operations, forecasting, and the analysis of consumer patterns and behaviors, from the perspective of the company. According to Gartner, the global CRM market ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


HIE Of One
HIE of One is a free software project developing tools for patients to manage their own health records. HIE stands for Health Information Exchange, an electronic network for sharing health information across different organizations, hospitals, providers, and patients. This is one of a growing number of tools for encrypted data exchange within the healthcare sphere. Journalist Doc Searls claims that a major structural problem with health care in the United States is that it is paid for by insurance companies and not patients, thus robbing patients of the power they would normally have as customers in a free market. Searls writes that the best approach I have seen so far to this challenge is HIE of One, a project of two MDs, Adrian Gropper and Michael Chen." He notes that HIE of One provides a patient-centered toolkit built around open source software and open data exchange standards. Prof. Phillip Windley, former Chief Information Officer of the State of Utah, has noted the positiv ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

User-Managed Access
User-Managed Access (UMA) is an OAuth-based access management protocol standard. Version 1.0 of the standard was approved by the Kantara Initiative on March 23, 2015. As described by the charter of the group that developed UMA, the purpose of the protocol specifications is to “enable a resource owner to control the authorization of data sharing and other protected-resource access made between online services on the owner’s behalf or with the owner’s authorization by an autonomous requesting party”. This purpose has privacy and consent implications for web applications and the Internet of Things (IoT), as explored by the collection of case studies contributed by participants in the standards group. History and background The Kantara Initiative's UMA Work Group held its first meeting on August 6, 2009. UMA's design principles and technical design have been informed by previous work by Sun Microsystems employees, begun in March 2008, on a protocol called ProtectServe. In ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Kinetic Rule Language
Kinetic Rule Language (KRL) is a rule-based programming language for creating applications on the Live Web. KRL programs, or rulesets, comprise a number of rules that respond to particular events. KRL has been promoted as language for building personal clouds. KRL is part of an open-source project called KRE, for Kinetic Rules Engine, developed by Kynetx, Inc. History KRL was designed by Phil Windley at Kynetx, beginning in 2007. Development of the language has since expanded to include libraries and modules for a variety of web services, including Twitter, Facebook, and Twilio. Philosophy and design KRL is event-based with strict evaluation, single assignment, and dynamic typing. In event-driven programming, events, a notification that something happened, control the flow of execution. KRL supports a programming model based on three key ideas: Entity orientation – The programming model of KRL has identity as a core feature. KRL programs execute on behalf of a particular ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Customer Commons
In sales, commerce, and economics, a customer (sometimes known as a client, buyer, or purchaser) is the recipient of a good, service, product or an idea - obtained from a seller, vendor, or supplier via a financial transaction or exchange for money or some other valuable consideration. Etymology and terminology Early societies relied on a gift economy based on favours. Later, as commerce developed, less permanent human relations were formed, depending more on transitory needs rather than enduring social desires. Customers are generally said to be the purchasers of goods and services, while clients are those who receive personalized advice and solutions. Although such distinctions have no contemporary semantic weight, agencies such as law firms, film studios, and health care providers tend to prefer '' client'', while grocery stores, banks, and restaurants tend to prefer ''customer'' instead. Clients The term client is derived from Latin ''clients'' or ''care'' meaning ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Christopher Locke
Christopher Locke (born November 12, 1947, died December 20, 2021) was an American business analyst, consultant, journalist, author and speaker. He is known as a coauthor of ''The Cluetrain Manifesto'', and author of two other books: ''Gonzo Marketing: Winning Through Worst Practices'', and ''The Bombast Transcripts: Rants and Screeds of RageBoy''. In a Financial Times Group survey from 2001, Locke was named as one of the fifty leading business thinkers in the world. Career In the late 1970s, Christopher Locke was working as a construction contractor and cabinet maker, but was forced out of business in the housing downturn of the early 1980s. His interest in artificial intelligence secured him a number of jobs in Tokyo between 1983 and 1985: He was working as a documentation editor for Fujitsu and the Ricoh Software Research Center, and as a technical editor at the Japanese government's Fifth Generation Computer Systems project. In 1986, Locke was working in the marketing departme ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]