Feeds

Cudo CEO exits for startup

Data mining lessons basis of new business

Seven Steps to Software Security

The founding CEO of NineMSN’s daily deal success story, Cudo, has revealed that he is leaving the post to start a new venture.

Billy Tuckerwho, who joined Cudo from Microsoft Australia, will be replaced by Mike Sneesby in February 2012. Since 2010, Cudo has been one of the trailblazers in the Australia group buying sector, and has shared the sector's fast growth.

Sneesby is also a former NineMSN executive, holding the role of Corporate Strategy and Business Development. He has also worked with HWW and Optus, and joins returns to Australia from the UAE where he was VP of IPTV and Technology at Intigral.

“I could not think of a more exciting time to come back into the Australian media industry. Cudo delivers a great service for consumers and advertisers and I look forward to exploring new avenues to take the business. We are coming off a very strong base with great momentum and we have the team in place to continue to evolve and innovate our offering,” Sneesby said.

Meanwhile, Tucker said the time was right to leave Cudo. “In a relatively short space of time we have built an exceptional team who have turned Cudo into a household name.”

Tucker will be applying his digital expertise to a data mining outfit called 57 Signals.

“Every business, offline or on, generously receives up to 57 signals from a prospective client at the point they touch your business. Those signals are there to be read and understood allowing your offering to be optimised in real time – maximising the likelihood of purchase.

"Finding and exploiting these signals has contributed greatly to our success at Cudo, and over the coming months I will be talking to retailers across multiple industries about finding this kind of value from their existing data,” Tucker cryptically states on his blog. ®

Boost IT visibility and business value

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.