Khoros-Kudos-Tealium.jpgTealium is excited to announce that we recently won the 2020 Khoros Community award in the category of All-Ways Connected.  We flexed our integration muscles to show how using Tealium on Tealium can improve the customer experience.

Read more...

3 Kudos

noun_API_410844.png

Tealium provides an HTTP API endpoint for collecting event data from any location.  This means that you can collect data from events that happen in your app or, in the case of Alexa, events that happen in a cloud provider. This example shows an AWS Lambda function used for an Alexa skill that tracks usage of that Alexa skill.  Alexa developer tools allow you to create the Lambda function without the traditional AWS setup and permissions.

Read more...

3 Kudos

noun_Privacy_230478.png

Apple's annual user conference took place in June (for the first time, an entirely virtual event), and among all the exciting announcements about new hardware and apps, was the slightly less exciting, but equally headline-worthy change of direction regarding usage of the IDFA (Identifier for Advertisers - Apple's user-resettable marketing ID). The change essentially means that while it's still technically possible for marketers to access the IDFA, they can only do so with the user's explicit consent, which comes in the form of a mandated (and quite intimidating-looking) "permission to track" modal dialog when the app launches for the first time.

Read more...

11 Kudos

Screen Shot 2020-07-28 at 8.14.38 AM.png

The Tealium community is thrilled to shine its Expert Spotlight on @Jane_PS. Jane is a Senior Associate Data Science and Analytics member of the Publicis Sapient organization, and the author of our latest user blog: Add These 4 Tools to Your QA Tool Kit. Keep reading below and get to know Jane better. 

Read more...

5 Kudos

AS_toolkit_blog.png

In my last post I spoke about what to do when your QA test goes wrong. As you go through the process of testing your logic for assigning attributes and audiences, one important tool you need for validating end-to-end scenarios is Trace. That said, along the way, I have collected other tools that I rely on to ensure that everything is working as it should.

Read more...

11 Kudos

product_certification_blog.png

We, as the greater Tealium Education Training team, frequently get questions regarding our certification process. I will say that, while the path to certification is (intentionally) a challenge, our team is here to help you along the way by providing top notch training and helpful resources along the way. In this post, learn how to become Tealium Product certified.

Read more...

8 Kudos

resume_blog_image.png

It’s June! Six months into a year that feels like it has seen brighter days. As always, the Tealium Recruiting team is moving forward - we’ve made several key hires with more on the way and making progress on various initiatives slated for 2020. Nevertheless, it has been impossible to ignore the collective fear and uncertainty we all face in the time of Covid-19.

Read more...

2 Kudos

Screen Shot 2020-05-07 at 12.15.10 PM.png

Building attributes and audiences in Tealium AudienceStream is pretty straightforward. But as your audiences get more advanced and you get more team members using the platform, you might run into issues with overlapping or conflicting rules that will impact the success of your solution.  In this post I focus on how to build a solid test plan to avoid common pitfalls during an AudienceStream implementation.

Read more...

23 Kudos

blog_spotlight4.png

The Tealium community is thrilled to shine its Expert Spotlight on @thyngster. David is a freelance Implementation Specialist from the Basque Country in Spain, and the author of our latest user blog: UDO Debugger Chrome Extension for Tealium iQ Implementations. Keep reading below and get to know David better. 

Read more...

4 Kudos

subresource_integrity_blog_image.png

These days there's no shortage of privacy and security issues to concern yourself with, and there's good reason for it. While the vast majority of online systems are secure, there's always a risk that one component in a system will get compromised. The way websites are built these days, with hundreds of components, many third-party JavaScript libraries have become ubiquitous and used by millions of sites. This is a great convenience to developers of websites, but it's also an attractive target for the "bad guys" that want to hack your site. 

Read more...

11 Kudos
Public