Conversation Agent - Valeria Maltoni - Developing a B2B Content Strategy: Start with Who

Subscribe

Book Reviews

  • Recommended Books
    Conversation Agent participates in the Amazon Services LLC Associates Program.

As seen on

Advisory Boards


Comment Policy, Social Guidelines

  • Critical discourse is welcomed. I reserve the right to delete inappropriate comments. See my social guidelines.

« Twitter, Customer Service, and Good Brand Management | Main | Avinash Kaushik, Web Analytics 2.0 »

Comments

You also could consider to integrate - on your own web pages - a web application to automatically identify and qualify the companies that visit your website.
So you'll obtain every day a qualified list of fresh b2b leads and you could automatically deliver them to your sales networks, to optimize and support their efforts.

Pitch: A 20-days free trial is also available here: http://www.domodomain.com/ppc/index.html

Great post and thanks for sharing these insights Valeria!

Kipp's point on access controls can be a big hurdle to effective and timely social media listening and engagement. If it isn't corporate culture that perpetuates the silos in the enterprise, its stifling policy and mandate.

That said, as a vendor in the listening space, we have seen some improvements that are encouraging and have to agree that things seem to be moving in a positive direction, especially in relation to companies taking action in more coordinated and responsible ways whenever incidents emerge that scrutinize a businesses Google resume.

Joseph
@RepuTrack

Valeria,

I agree a lot with Jay. I think in many ways B2B organizations are ahead of B2C in measuring ROI and tying it to social media.

If you look at what folks like BreakingPoint Systems are doing, it is pretty impressive. I am researched a lot of B2B Social Media examples and sure not all of them are good, but they are moving in the right direction.

It is also important to realize the Social media doens't work in some situations. For example if the decision maker sits behind a secure firewall with no public Internet access.

The comments to this entry are closed.