Feeds:
Posts
Comments

Social Media Optimization(Merging of the Traditional Media, SEM and Social Marketing) “Social Media Optimization (SMO) is the collaboration of social media activity with the intent of attracting unique visitors to website content.” Social media sites are among the most popular places to visit online. From social networks like Facebook, Orkut and Twitter, to social bookmarking sites like Delicious, there are many ways a marketer can learn to participate in meaningful ways.

You should begin Social Media Optimization by first identifying your goals, and determining which social sites will help you to best meet those goals. In most cases, regardless of what your goals may be, you would be well advised to center your social media presence in the most popular social sites, such as Facebook, Twitter and LinkedIn. The Social media optimization is a strategy for those organizations that care more about their online businesses and web presence. There are a lot of introductions to social media for personal branding and career advancement, but there is a market gap when it comes to learning how to leverage social media in organizations.

With the rise of social networks a new marketing medium has emerged: one that requires trust, rewards value and thrives on word-of-mouth. From blogging to video-sharing, Flickr to Twitter, social media marketing is delivering impressive returns. The social media has been promising on advertising and marketing through out all corners of the internet. It has been one of the most effective ways to take out your products or services in every corners of the world. There’s a saying “that’s internet”, this is where you can discover almost everything. Rumors, news, celebrities, politics and technology come together. Mainly the way of spreading is viral, where with a single click can take it to millions of eyes around the world, where it will passed from one viewer to another.

Devote a set amount of time each day to actively working at your social marketing and optimization efforts, and see what a difference it will make to your eCommerce website.

The Implications

To recap, Social Media is not digital paper. It is not just a bunch of noise. It is amulti-functional two-way communication system made up of millions of Intelligent Users.

So what does this mean for you?

To the Intelligent Users

You’re not just a statistic. Here are some things you can do to humanize your experience.

  1. It’s an investment. The more you put into social media sites, the more you get back. Your experience is based on your willingness to experience. So put something in. Who knows what you’ll get in return?
  2. Interact – Don’t be afraid of change. Go with your first instincts when using new products. Try it for yourself before you pass judgment.
  3. Give feedback whenever developers ask! In fact, give it when no one asks. Positive feedback is always welcome, but don’t be afraid to give constructive criticism, too. It could make the product, perhaps even the whole industry, better.

To Developers

You are the innovators (or, as Nietzsche named his new philosophers, the attempters). But don’t forget that you’re making a product for the users.

  1. Listen to your users. Your users don’t know as much as you do, but their feedback is important, especially the negative feedback. Be patient. Remember that you’re there to help them, not scare them off with your intimidating technological prowess.
  2. Try new things. New ideas brought us here, and new ideas will lead us to the future. Although you must be attentive to your users, don’t be afraid when they protest new ideas. People are naturally averse to change. Facebook users protested the changes many times, but Facebook kept moving forward, and overall their changes have been an improvement on the experience.
  3. Don’t be afraid of failure and most importantly, learn to recognize it. Remember, it doesn’t matter how many times you get knocked down, what counts is how many times you get back up.

Many local businesses struggle to find ways to promote themselves, get links, rank in search engines, and ultimately drive traffic to their websites. Most small businesses also have limited budgets making the task more difficult. Many small business owners wonder – do I need a brand? They may say “I’m not huge and don’t have that many clients, so I don’t need one.” But every business should have a brand, even if you are a one person company. Why? In order for consumers to make a purchase, they need to feel an emotional trust in your product or service. “Your brand can be your business’ most important asset. A strong brand can make any business stand out from the crowd.

Online local business branding sites are providing such an open space market where you can find/buy the products with less efforts and time. Associating your business or brand with local activities is a great way to show the community that you care about them and that they should care about you as well. “Websites are becoming increasingly important for many businesses to reach new customers and keep existing ones. Therefore, having a brand that works online is essential. Potential customers make emotional buying decisions based on website design and imagery. Larger companies will have specific brand guidelines that their web designers will need to incorporate, which dictate style, colors and fonts, and how and where the logo can be positioned. And Small businesses will often need to start developing their brand from scratch, including designing a logo. “A professional is needed to do that and make certain you are safe from any confusion of an already existing brand. How to become branded is what we do. We look forward to hearing from you.

Few important guidelines that many high-converting local business websites follow:

  1. Make it clear that you operate in your local area so that local visitors know they’ve come to the right place. Referring to your location within your website content may also help to boost your ranking in search engines.
  2. Your website content should take the form of a sales letter designed to generate an action (i.e. an enquiry) from your visitors. A good phrase to start with is, “Are you looking for a [what you do] in [your location]?” E.g. are you looking for a personal trainer in Perth? Then go on to explain the benefits of doing business with you.
  3. Bear in mind that when people search online, they’re probably comparing 3 or more websites just like yours. So be sure to explain how you’re different and give plenty of reasons why customers should choose you and not your competitors.
  4. Provide a clear “call to action”, or instruction about what to do next. e.g. “Fill in the form below for a same-day response.” Our results show that most website enquiries come via an online contact form as opposed to the telephone, so make sure your contact form is easy to find and use.
  5. Just like in a Yellow Pages ad, do everything you can to enhance and communicate the credibility of your business Online.

What is an IP address?

Think of an IP address like you do a mailing address. It’s basically the exact same thing. Consider this, when you send out a letter, what do you do? You put that letter in an envelope, write the address, put a stamp on it, stick in the mailbox and put that red flag up on your mailbox, right?

Apply this to computers: that letter is data, the envelope is the TCP/IP header which is actually wrapped around the packet, just like an envelope. The address would be the IP address, located on that header. You stick that in your mailbox, or in the computer world, a buffer, and it gets sent off to the recipient.

All the traveling that a letter goes through, a packet goes through. A letter sent through the mail is taken from your mailbox to your local post office. From there, it’s sent to a state post office distribution center. Then it gets sent to a regional center. If it’s an international letter goes to one of the national ones. The letter then goes back down this chain until it’s in the recipient’s mailbox. At each stop, a decision is made on whether or not that that particular distribution center should send it to a higher level, or if it can put that letter in a bin at it’s location which will be sent to the next lower level.

Lets say I want to send you a letter, we both live in India but in different cities. I send out the letter, my local post office looks at the address and determines that it can’t deliver the letter to the recipient so it sends it to the state post office. The state post office says yes, I can deliver this to the letter bin that belongs to that city and it’ll go out with the next truck. Your city post office gets the letter and sees the address, says yeah he’s in our area so we can definately send this to him. It gets put on a truck with other letters for people in your area and the driver puts it in your mailbox.

Same thing happens with a packet, except there are no internet truck drivers and it happens a helluva lot quicker. Your packet gets sent to your ISP who routes it back to a local address if it can, or sends it to the next higher ISP until it’s on the Internet Backbone. Once there, if the recipient is still in your country, it’ll go to his regional ISP, and so on and so forth until he gets it.

Why all this talk about regular mail? Again, an IP address is nothing more, nothing less than an address. What about routers, we have internal IP addresses! Ahh good question, think of an internal IP address the same as having a post office box. The post office gets it and decides to route it to you that way, your physical address obscured to the sender.

How the addressing scheme works?

Okay, now that we’ve established what an IP Address is I’ll show you how addresses are assigned.

IP addresses are broken up into several classes, A to E.

Class A addresses are 1.xxx.xxx.xxx – 126.xxx.xxx.xxx
Class B addresses are 128.XXX.xxx.xxx – 191.XXX.xxx.xxx
Class C addresses are 192.XXX.XXX.xxx – 223.XXX.XXX.xxx
Class D addresses are 224.xxx.xxx.xxx – 239.xxx.xxx.xxx
Class E addresses are 240.xxx.xxx.xxx – 254.xxx.xxx.xxx

Okay, what the hell is all that? I’ll explain:

IPv4 address consist of 4 octets. For an A Class address, the first octet, ranging from 1 – 126, describes the network you’re sending a packet to. The rest of the octets describe the node. (Kind of like a City, and a Mailbox, respectively.) (A node is just another name for a device connected to the network.)

In a Class B address, the first two octets represent the network and the last two describe the node.
Wait a minute! What happened to 127? Addresses starting with 127 are loopback addresses. That means it points to your computer. Go ahead, ping 127.xxx.xxx.xxx where the xxx is between 1 and 255. It will resolve to 127.0.0.1 and give you a reply that’s hopefully less than 1 milisecond.

Anyway, Class C addresses are start with 192, go up to 223, and the first three octets describe the network and the last octet describes the node.

Okay, break for a second. A network with only 254 nodes?!? (0 is used kind of like a wildcard and 255 is broadcast.) That’s right, Class C networks are usually given to small time ISP’s and organizations who only have a few nodes on their network. Big companies like IBM and the government are given Class A addresses because they’re bound to have lots of nodes. When the internet first kicked off, lots companies were told that certain address ranges would be reserved for them. This has caused problems because 1) Those companies aren’t using nearly all of those addresses and 2) we’re running out of addresses to assign people. The solution for this is IPv6, where we have 6 octets instead of 4, increasing the number of addresses exponentially.

Alrighty, back to classes. Class D addresses are for multicasting and Class E addresses are reserved for future use.

Ports

If I had a dime for every time I’ve heard, “I scanned xyz and found this many open ports!! How do I exploit them?”.

Ports are logical addresses on a computer where applications send and receive data. That’s it, just like IP addresses, ports are nothing more and nothing less than addresses. To put it in the same perspective as regular mail, think of your computer as an office building and applications on your computer as different companies within that office building. Now your office building isn’t going to have different mailrooms for each company. They’ll receive mail and put it in your company’s bin and you come and get it. Your computer has 66,536 some odd ports, plenty for all of your applications, so your office building has some 66,536 odd mail bins for companies in your building. Will you use all of these ports? Most definately not.

So you scanned a computer and lets say it has 100 ports open. Great, that just means that your “office building” has 100 mail bins, it doesn’t mean that there are companies in your “office building” who use those mail bins. You have to have some kind of application running that relies on a service that uses that port in order to do ANYTHING with it. Just because you found xyz port open, that doesn’t mean that you’re getting instant access to their computer. If there’s no service listening to that port, you’re doing the same thing as sending letters to a mailbox that no one checks.

Also, think of a Firewall as a person in the basement mailroom analyzing each letter to determine whether it’s junkmail or something that a company doesn’t want. Either that or he can hold all mail for that company until instructed otherwise.

Exploiting Services

I’m going to touch briefly on this subject for two reasons. 1) I’m not the most knowledgeable person on the subject and 2) It’s illegal unless you own the computer you’re exploiting or have the expressed permission of it’s owner.

Okay in order to exploit a service, you first have to find a vulnerability. That isn’t always easy because the remote computer more than likely isn’t going to just give you the source code for the service running on a port you want to attack. So if you’re wanting to find vulnerabilities in their service, you’re going to have to guesstimate what kind of service is running on that port and get your own and analyze it’s code. There’s other methods of testing for vulnerabilities. Most well known vulnerabilities (read: ones you find on the internet) are patched already. You can test these and see if they’re patched, but chances are that if the admin on the other side is even a little vigilant, he’ll keep his software updated.

Okay, so he is vigilant and all known vulnerabilities are patched, what now? You poke around and see if you can find one of your own. This varies from service to service and application to application so I’m not going to go into it. (That and I don’t know that much about the subject myself.)

Once you find a vulnerability, you’ll need to exploit it. Depending on what kind of service it is, this is usually going to involve some code writing. And more often than not, you’re going to have to do it their way, meaning write code that the remote service will understand. Again, this varies from service to service and application to application.

Packets

Okay, now that we know a little bit about an IP address, I’m going to go a little more into depth. If having an IP address is like having a mailbox, then it’d be pretty useless unless we sent or received letters, right? That’s basically what packets are.

A packet can be broken up into a few sections. The first section is the header, which contains a bunch of info. The most obvious is the destination IP address, duh. Some others are version, source address, TTL, type, and others.

Some are obvious, some aren’t. TTL is an abbreviation of Time To Live. It’s a value in milliseconds describing how long that packet has to live before it “dies” or gets discarded. The thing with the internet is, it’s not extremely reliable. You get disconnects, reroutes and all kinds of crazy stuff that happens. If packets didn’t have a TTL, we’d have a crapload of lost packets floating around aimlessly looking for a host which could very well have found its way to a dumpster, especially if it was made by Dell. The best way we’ve found to avoid these lost packets is to have them commit suicide if they can’t find their destination. Kinda depressing, huh?

Anyway, there’s about as many different types of packets as there are protocols, which is a bunch so I’m not going to list many. Some are: TCP, UDP, IMCP, SCTP, RTP, etc.

There’s an ID number for each packet. That’s so the host can know how to rearrange them so that the application using that data can understand it. One thing I almost forgot to explain. When you send data over the wire, it’s not exactly streamed. It’s broken up into chunks (packets), so that in the likely event that one of those packets becomes corrupted, your computer resends that one packet instead of the whole file again. Makes sense, right?

Alright, then there’s the body or payload of the packet. Guess what goes in there? If you guessed data you’re right! That’s not all that can go in there though. With error checking, one of the things checked is the size of the packet. Now if the last packet only has 10 bytes of data in it, and it’s sent like that, the host looks at it, says “That’s a lot smaller than the others, something’s wrong, send it again” to your computer. So in addition to data, you have what’s called ‘padding’ to fill the void and make the packet the appropriate size.

The trailer (or footer, depending on how you look at it) contains some error checking information and signifies the end of the packet.

Types of packets

Okay, there’s bunches of these but I’m only going to list a few, when I start getting paid to write tutorials, I’ll quit being so effing lazy, alright?

TCP, probably the most common type of packet out there. It stands for Transmission Control Protocol and is your basic payload packet with error checking. Want more? Go buy a 2 inch book on it, I’ve only got so much time before I fall asleep typing.

UDP, User Datagram Protocol. It’s kinda the same as TCP but without error checking. Now why on earth would I want a protocol that doesn’t use error checking?!?!? You may ask. Cool, I’ll tell ya in two words, then explain: STREAMING MEDIA. If you miss a frame or two from a streaming video, you probably won’t even notice, right? UDP is widely used in online games, media streaming and other applications where all the data doesn’t have to be uncorrupted all the time, if you can think of any. Ever play a game and get that annoying “There is a problem with your connection….” message? Yeah and then your helicopter suddenly appears upside down and an inch from the ground? Yeah I hate that too but that’s because you’re losing a lot of UDP packets for whatever reason.

ICMP otherwise known as the Internet Control Message Protocol. This is how your ping application works. That’s not its only use though. It’s used to send error messages, timestamps, and address masks.

RTP, Realtime Transport Protocol. Alright, all I knew about this was it was like UDP in the aspect that it deals with media. Come to find out, it deals largely with VOIP (Voice Over IP) and was originally designed for multicasting. Gotta love Wikipedia.

Packet switching and Circuit Switching

Briefly, packet switching is basically using multiple routes and let the packets find their own way. This is your normal flavor of internet. This way, if one of those routes closes due to a sledge being taken to a stubborn server, the packets just take another route.

Circuit switching is when your computer finds what is supposidly the best path to a destination and sends the packets down that route. ATM (Asynchronous Transfer Mode) uses this by sending really tiny packets and it’s supposed to be really really fast. The obvious downsides are that 1) your computer has to find the route first and 2) you know what happens when that route closes.

Traceroute

Speaking of routes, there’s a program on most PC’s called tracert which determines how many hops a packet takes to get from your computer to it’s destination. A “hop” is when your packet goes from one server to another. The thing with hops is, they slow you down. RIP, I think, is the routing protocol that only allows 15 hops or something. I degress, the more hops, the more processing that has to be done forwarding your packet and that’s why you slow down.

So anyway, traceroute tells you how many hops it takes to get to a destination and it can even list the servers on which your packets hop. It works by incrimenting a packet’s TTL by one second each time it hits a server. When a server receives a traceroute packet with a TTL of one second, it sends an ICMP packet back, letting traceroute know the who/when/where.

For more info on Traceroute, visit http://lwn.net/Articles/89597/.

References:

http://goo.gl/QS7w
http://www.wikipedia.org
http://lwn.net/Articles/89597/
http://www.ralphb.net/IPSubnet/ipaddr.html

Social networks are designed for information to quickly move from member to member, so campaigns that lean on these capabilities perform to their best. Social Networking can be an effective part of any marketing program, but it must be used correctly. First and foremost, any marketing campaign or activity should match with a business objective, regardless of the tools being used.
Members in social networks like to communicate with each other, or self-express.  Give people time to understand personal details and become friends. As with a face to face networking event, not everyone will be a connection, nor will everyone wish to do business. Over time, as people read posts and learn more, they will be attracted to the business or person posting and seek to do business together. And in the long run, that leads to more profitable, long lasting, and better business contacts.

Social Networks have become very attractive these days as consumers are connecting with other consumers and the trust factor tends to be higher. As a result, campaigns should satisfy these needs with the appropriate tools. Marketing campaigns on social networks, those that are promoted from other locations such as (corporate websites, email newsletter, blogs, podcasts) outside of the social network have a great chance for success.

The importance of online local business branding is discernible in everyday marketing. In the world where global branding seems to run the industries, smart local branding is the only real way for a small business to stand out amongst the large corporations. Surveys suggest that local businesses have an advantage over the global brands in their own local area. So why not try to gain  a solid local brand recognition? Being observed  and visualized is the key to a successful business and our local branding will help to be seen among a crowd of competitors. To be branded is a very difficult task despite these bullet points are extremely important in the branding process along with scoring well and name recognition in your geographically targeted area. How to get branded… Creating a brand is like scientist working on ones DNA. Your target audience must be brought about to fit your brand. Choose a name that determines your business brand.List all your offerings that truly brand your company as different entity and seperates it from its competitors.

Knowing your audience:-Who is your target market? What do they do for a survival? What do they read or look? What is their personality? These answers will help you figure out what your brand personality is and in turn how they like to be marketed to.

Knowing your competition:-How do you differentiate from the competition? What makes your product or service better? Why should a customer choose you over your competitor? The answer to these question, should lead you in the correct direction of how you should promote yourself.

Providing value & Vision:-Create a company mission statement that describes your future goals and values. If you wrote a business plan, you can pull the mission statement from there. If you have not written one, now is the time. A brand must provide a practical value in order to be trusted. Every piece of marketing collateral should follow it, as well as all employees.

Create Credibility:-Have client testimonials. Are you a start-up? Partner with a known company that has the same target market. This will help create trust from the customer. Look professional – have all of your collateral online and in print match. Be a guest writer on other blogs and publications to position you as the authority.

Being Consistent:-Use the same logo, color palette, fonts and images in all online and print promotion. If you are flipping through your local business journal, does your ad match all of your other branding? If you hand your business card to someone at a networking event, does it match your other materials? Does your website match your business card? Consistency over time creates trust.

Logo & Name:-While having a great logo & name is only one part of a brand, it will be the one item that repeats itself the most. Does it send out the message you want? Does it appeal to your target audience? Is the name easy to remember? Does it stand out from your competitor?

Have great customer service:-Return every phone call, email and social media message. Make sure all of your employees are promoting you properly. One rude person can lead to many lost customers. Remember people are quick to tell friends about a bad customer service experience, so one lost customer can lead to many. Business is in its essence are about relationships and you always wanted to encourage building them no matter the form of communication.

Use social media:-Where else can you interact with your current and potential customers daily? Social media is all about building trust online. Make sure your blogs and messages are directly related to your goals and keywords.

Monitoring your brand: – Set up keyword alerts to monitor what people are saying about your brand. How? Sign up with Google Alerts. It works like this – If someone writes your company name anywhere online, you will receive an email. Anytime some types “Your Company Name”, it will alert you. Pretty cool! Respond appropriately to each. If someone is having an issue, try to correct it immediately.

Over time, with continued product use, customers eventually begin to appreciate and even trust particular brands over another, even if there is no reason not to trust a different brand. This type of loyalty is beneficial to brands because it means that customers no longer need to be convinced of the benefits of a company’s products, they are already aware of the quality and functional use of your product or service.

Branding of the website online should always be an ultimate business goal. As the Search Engine evolves so do the patterns and behaviors that users apply when looking for what they need when searching on a search engine. The days of just growing the business online from having rankings are soon going to be over. Who will survive? The websites that have treated themselves as business entity and not just like website. Search Engine Optimization and the online branding for the business goes hand and hand and are a state of mind. If you do not believe in them, they might not work to their full potential. It is important to understand that Search Engine Optimization is the process of efficiency which When done correctly allows everything to work in its most optimal state. Treating website like an online business will allow you to open your mind and push the envelope on delivering the new targeted traffic. I think when people look at it just as a website they find themselves just trying to find the new secret method on how to bring visitors to find it online. There is no secret method when it comes to marketing an online Business. Your website is a business and should always be treated like a business. Every website needs a strong branding approach in order to survive.

Many local businesses struggle to find the ways to promote themselves, get links, rank in search engines, and ultimately drive traffic to their websites. Most small businesses also have limited budgets making the task more difficult for them. Many small business owners wonder – do they need a brand? They might feel that they are not that huge or they may not have that many clients, so they think that they do not need any brand. Every Business should have a brand, why? So as for consumers to make a purchase, they need to feel some emotional trust in your product or service. “Your brand can be your business’ more importantly an asset. A strong brand can make any business stand up front from the crowd. Every time a customer/visitor comes into contact with your business, your brand image will create an impression on them.

In order to create a successful online business brand, you can work with the designers on everything from the look and feel of your website to the designing of your stationery. Your brand should project an effective, consistent and distinctive image of your online business.

A web design company can also help your business by:

  • Moving up your brand onto the internet, ensuring that the values and the identity of your business are clear and well presented online.
  • Writing or rewriting the content on your website so as to attract and engage the clients/visitors and display your brands.
  • Working on your online business identity and the brand.

This information will place your site so that the readers know where you are coming from. You need to create an effective online presence and manage your online branding.

Online auction is going very popular these days. It is also beneficial for those persons who want to sale their products over the Internet and for this purpose they have to take help of auction sites. Peoples have no more time to spend in the market for searching their desired products and they want that everything should be available just a click far away from their reach.

Online auction give the liberty to its registered user bidding on various products. The user, once registered with the site, can explore the products live in the auction and bid on the product of his choice. Various branded products become live in the open auction and prices of those products are very less as compared to the market. This thing mainly attracts the more users for bidding. Online auction sites are providing such an open space market where you can buy or sale the products with less efforts and time.

For creating and developing an auction website there is a need of Penny Auction Script that is loaded on your website. There are various opportunities spread over the net, which are providing such type of script or services to the customers. But before availing the penny auction script or software for starting your own auction website, one should know the main key features of the script and the working strategy of auction website. This script create the administrator interface for website owner and user interface to user. It provides all the functionality to the admin to maintain his site smoothly. Some main key features of penny auction script are described below:-

i. This script powers the admin to see the payment report by payment method and admin can also see which payments are pending, which are paid and also see the status of payment that are pending or not. Admin can edit and delete any record from the list.

ii. Admin has the functionality for opening the new auction list, upcoming auction list, category list with updated features like as upcoming auction list, open auction list, completed auction list, SMS reports, auto bid list etc.

iii. Another feature provided to the admin is to active a user, add a new user, block a user and suspend a user. It features the admin to check the status of a user as online, offline, approved, unapproved, add upcoming auction and check status of currently running auctions etc.

iv. Another main feature of the script is user management that powers admin to access the user list, block the user list, bid transfer and user management etc. Admin can set the status of a user as Active, Inactive, Suspended and Joined today users.

v. Admin has the functionality to see the payment report by payment method and admin can also see which payments are pending, which are paid. He can also see the status of payment that is pending or not. Admin can edit and delete any record from the list.

vi. Next important feature of auction script powers the admin to manage CMS List, frequently asked questions, language settings and auto response settings, add new Web static pages, add new question in the list with the answer of FAQ etc.

There are also other features laid in the penny auction script that is provided to the customers to establish and maintain his website. The auction script, embedded with latest tools and technology, is demanded and also necessary, if you are starting your own auction website in this market. So you should be aware with all the main key features of the script.

Follow

Get every new post delivered to your Inbox.