Annalect Research: The Mobile Wallet
The mobile payments space is rapidly evolving, with everyone from Apple to Visa releasing ways to pay by mobile device. Mobile payments are expected to more than double this year, to nearly $9 billion. With this much at stake, the major players are competing fiercely for a share of the…
Going on a Diet: How Marketers Are Adjusting to a Cookie-less Future
Problems created by cross-device usage, shared devices and voluntary cookie purging have forced digital marketers to find a suitable cookie substitute. Brands and marketing agencies alike have known for several years that at some point they would have to come to terms with the flaws of the browser cookie in…
Chasing Lions and Unicorns in Cannes: 2015’s Biggest Takeaways
The Cannes Lions International Festival of Creativity is a celebration of business’s human element. Find out the highlights and trends from this year’s festival. Every year, thousands of advertisers, marketers, creative agencies and consultants descend upon Cannes for a weeklong celebration of all the things that are wonderful about the…
3 Ways CMOs can Reap Benefits from Data
Big data is taking much of the guesswork out of marketing. Companies are getting smarter than ever about not only stocking the right products and offering them at the appropriate time, but they are also ensuring that there will be a demand for the product before it ever leaves research…
The Past, Present and Future of Mobile Marketing
While much of the innovation in the 20th century focused on electronics, the past decade has seen a shift toward information – how it is shared, stored and distributed. Today, most customers are looking for mobile products that link to social media channels or help with tasks, such as paying…
How Brands Should Respond to Data Breaches
Data Breaches: Aspects of emotional and behavior turmoil It has become almost commonplace to open up your favorite news site, pick up the newspaper, or listen to the evening news to find out that yet another company has experienced some type of electronic intrusion. The conversations about these “hacks” seem…