Issue: 58
April, 2014
WAV Newsletter Banner
In This Issue
Broker Technology Adoption Study
Early Success Can Be Tricky
How a Top Agent Goes to The Next Level
How Data Killed the REALTOR
Quick Links
Facebook Logo
LinkedinLogo

 
  
Quick Links
By Victor Lund
WAV 2 Inch Logo

WAV Group partner Victor Lund is pleased to release the results of our recent survey to measure what technologies brokers have adopted and how satisfied they are with each. The survey also measured how likely a firm is to replace a technology supplier in 2014. In order to understand how technology plays a role by size of firm, answers were collected in ten groups ranging from firms with 1-9 agents to firms with more than 1500 agents.

By Mike Audet
We work with all types of companies and organizations and have the opportunity to see many different approaches to successfully delivering products and services.  Successful companies have many similarities and when you look into them closely you see certain constants.  These companies almost always have strong leadership, values and a clear vision that is understood by everyone that works there.  When you look back at their evolution you see a company that stayed on track to their core mission.  You'll see a company that understood the basics and paid attention to detail, their customers, what the market was asking for and they delivered. 

 

By Victor Lund
piggy_bank_money.jpg

WAV Group provides enterprise brokers with a monitoring service to measure their listing syndication strategy. It is a thorny and emotional topic where risks and rewards are balanced delicately. Undoubtedly, this week brokers who do syndicate to publisher websites are reviewing their reports from last month. Here are a few things you should look at. 

Protect Broker Data with Anti-Scraping
By Victor Lund

If you are a broker or an MLS, you must treat your data as an asset. By and large, our industry does a great job of protecting the front door of data access, but the back door of data scraping is wide open. It begs the question, if you care about data protection, why are you only scrutinizing the legitimate data users without hunting for the nefarious and illegitimate data thieves?

Click here to read more!