Posted

Last week, General Mills, Perdue Farms, and Tyson Foods all issued sustainability reports ahead of Earth Day, announcing they were approaching major sustainability goals. In addition, the three companies revealed new plans to further reduce their environmental footprints. Tyson Foods announced plans to improve the agricultural practices they use for their corn fields—which span over… Read more »

Posted

Big data is quickly becoming one of the most valuable assets to predict human behavior and interactions. But, collecting and storing consumer data is also a significant responsibility that shouldn’t be taken lightly. After millions of social media profiles were misused without their permission, consumers around the world are more cautious now than ever with… Read more »

Posted

One challenge that the Consumer Packaged Goods (CPG) market continues to face is an obvious e-commerce gender gap. In order for these companies to effectively target men and women, marketers need to understand the different attitudes and behaviors of male and female shoppers. Marketing Dive reported on a recent study indicating that male consumers clearly… Read more »

Posted

You may have heard the analogy that a job interview is like a first date. The candidate researches her “date,” puts on her best outfit, and does her best to make an impression to earn a second date. But what happens when the balance of power in this relationship tilts? There’s no denying that in… Read more »

Posted

In March 2018, we learned that “I don’t want to grow up, I’m a Toys R Us kid,” would be heard no longer—retail giant Toys R Us announced it plans to sell or close all 735 of its stores in the U.S. While it may seem that Toys R Us is another casualty of retail… Read more »

Posted

Malware attacks continue to increase in both volume and complexity around the world, leaving companies to search for new and innovative ways to protect one of their most valuable assets-their data. Big data analytics can be one of the most effective tools used to not only prevent cyber-attacks, but also to detect and respond to… Read more »