Computer Tips that Help Small Businesses Operate P

Computer Tips that Help Small Businesses Operate Profitably

by: Sharron Senter

When working properly, computers enable small businesses to make big business profits; however, get booted off your computer and you’re suddenly starving. In most instances, computers usually act up due to lack of care by its owners. Here are four computer tips that’ll keep you up and running smoothly.

Tip #1 Back up your computer’s data no less than once a month.

Too often a small business is thrust back to infancy because it didn’t take time to back up precious data; information that took hours upon hours to create. Information that’s irreplaceable, such as customer databases or employment contracts. Keep in mind you’ll want to back up your written data as well as check books such as Quicken and email address books. If your computer has a CD writer, it’s simple and quick to back up your data. Simply select the files and folders you want to back up and copy them to the writer.

Or if you have an older computer, copy your most important files to a floppy disk. Either way, don’t stop there; now take the CD or disk and store it in a firesafe box! To expedite the process, organize your files within folders so you can quickly grab and copy one or two folders.

Tip #2 – Don’t turn off your computer every evening.

Too frequently computer users turn their computers off every evening. This is unnecessary and not recommended. A computer’s components are at their most vulnerable when turned on and off. When a computer has to heat up [turn on] or cool down [turn off] it’s at this precise moment components fail. It’s recommended you turn your computer off once or twice a week or only when necessary, such as from a power outage. However, don’t do the opposite and never turn your computer off, since many antivirus programs require a computer reboot be performed before new virus patches take effect.

Tip #3 Automate antivirus software so it updates automatically no less than once a week.

Depending on your software, you may need to prompt it to update. Unfortunately, there are people with too much time on their hands who desire to attack and make your computer unusable. A computer user is not ultimately protected from viruses and spyware [popups, cookies, etc.] unless you’re using a combination of antivirus and antispyware software and a firewall, a piece of hardware that protects computers from being hacked. You must have all three pieces in order to ward off viruses, lurkers and attacks. What’s more, most of the attacks are very quiet. You don’t know someone is on your computer. Instead, they secretly store information, such as child pornography or music MP3s on your computer, since itกs illegal, and redirect childporno or MP3 seekers to your computer instead of theirs.

Tip #4 Install a firewall if you keep your computer constantly on.

Using a broadband or DSL connection dramatically increases your exposure to being hacked. It only takes an average of 15 minutes being online before a homebased computer is attacked. The only true way to protect a computer from a hacker is to install a hardware firewall. It’s a misconception that softwarebased firewalls ultimately defend computers. This is simply not true. Computers must have a hardware firewall for ultimate protection, such as a SonicWall or Netscreen firewall, a component installed between a home user’s cable or DSL connection and their computer.

About The Author

Sharron Senter is cofounder of http://www.VisitingGeeks.com an on site computer repair, security and networking company that helps families, home power users and small businesses north of Boston, Southern NH and Maine. Visiting Geeks’ technicians are crackerjacks at squashing viruses, popups and securing and making computers perform faster. To reach Visiting Geeks call (978) 3464087 or visit http://www.VisitingGeeks.com Sharron’s also the author of, ขMake Money While Sleeping.ข Learn more at http://www.sharronsenter.com/fs_increase_seo.shtml

This article was posted on October 05, 2004

by Sharron Senter

Free Content for Individuals

Free Content for Individuals

by: Ron Tower

Free content added to Web pages using an HTML fragment is usually intended for Web sites. But why can’t individuals also use it? It will be useful for them as well as promoting the Web site of the content provider.

There is a lot of free content available. You can get headlines, weather, search forms, jokes, cartoons, a word or quote of the day, tickers, and much more. For examples of free content available as HTML fragments, see Free Sticky (http://freesticky.com). Webmasters can paste the HTML into a page on their site, but what can an individual without a Web site do?

One approach is to have a simple HTML file on your machine that acts as a container of the free content. For example, see the Free Content Container (http://www.sugarloafsw.com/ia/freecc.html), a simple HTML file that already includes some free content and explains how to add or replace that content with content you like. You can just save it to your computer and then access it from your disk to create your own very simple information aggregator.

Go to http://www.sugarloafsw.com/ia/freecc.html. Click on Modify Me to see how you can modify the file. Save the file to your computer using File Save As from your browser being sure to use the กHTML file onlyก option. Edit the file with a text editor such as notepad and you will see that it is a simple table. HTML from free content Web sites can be simply pasted into the file at the places indicated by the comments.

Once you understand the basics of your container, you can do searches on the Web for กfree contentก and create different HTML files with different content. You can use this yourself or send the HTML file to friends as an email attachment and they can also use what you found from their computer, no need for a Web site.

Another approach is to get an information aggregator that supports HTML fragments. The HTML fragments can be placed on personal portal pages along with other content such as RSS feeds. See http://www.sugarloafsw.com/ia/ia.html for more on the use of information aggregators to allow individuals to use free content.

The final approach is to take the plunge and get your own Web site. There are several free options available, such as GeoCities (http://geocities.yahoo.com). You can add your modified Free Content Container to your site along with your other content.

About The Author

Ron Tower is the President of Sugarloaf Software and is the developer of Personal Watchkeeper, an information aggregator supporting a variety of ways to summarize the Web.

http://www.sugarloafsw.com

This article was posted on December 08, 2004

by Ron Tower

Chicken Little and the Disintermediation Myth

Chicken Little and the Disintermediation Myth

by: Paul Shearstone

If Chicken Little were alive today he wouldn’t be running around forewarning us of the sky that was about to fall. He’d be too preoccupied alerting everyone about another potential disaster which may in the end prove to be just as erroneous as his first prediction. Nevertheless, if the conversations around the office water coolers are any indication, he’d still get the attention of many nervous corporate omnismarts. So what’s the new buzz? Disintermediation!

If you haven’t heard the word already, you’re going to hear it ad nauseum.

For those unfamiliar with the term; Disintermediation is a groovy way of saying; ขSoon there won’t be a need for a Middleman.ข That is to say, thanks to things like the Internet, ecommerce, global attraction and fulfillment, manufacturers will no longer require the services of the ขMiddleman in the Channelsข [resellers] to reach end users or customers.

It would seem today’s prognosticating Chicken Littles are quite convinced the death of the middleman is in fact, imminent. But like the chicken that went before them, that doesn’t mean they’re right!

The incredible rise and untimely fall of many of the mighty dotcom’s should serve in no small way to highlight much of what we thought the internet was going to do, it didn’t and probably won’t. And you don’t have to bring up the name, Peter de Jager, to know there is no shortage of redfaced futurists still hiding under rocks looking for ways to get out of town. Fortunes were made and lost especially in hightech resulting from, let’s call it; bad information concerning things like Y2K and the forecasted unavoidable changes to the traditional business landscape, thanks to the Internet.

But to be fair, de Jager wasn’t in a bomb shelter when the clock struck twelve, he was in a plane and as far as I know, he never told anyone to stock up on Tang! We can save that discussion for another time as it is – at the risk of sounding a little ironic – history.

Nevertheless, the argument regarding whether ecommerce will entrench itself as the กpreferredก way of doing business continues. From my perch, I’ll go out on a limb and say, ขIt won’t! At least not totally.ข

Simply put, there are two fundamental transactiontypes that culminate in a sale. One is Tactical and the other is Strategic. Few would argue the implementation of a new ITnetwork or specialized software requires a strategic approach that can only be satisfied in person employing a B2B strategy. Most sales requiring specializations all but eliminate – at least for now – an ecommerce solution.

Tactical sales, however, are entirely different and Amazon.com is a perfect example. For products like books,a bar of soap or an airline ticket, ecommerce has a far better chance of becoming the time and moneysaving fulfillment process of choice – but even that, as we have seen, has no guarantees!

A toy is a toy is a toy. Right? So why did Toys.com go under? Surely their business model personified the quintessential Tactical sale for which ecommerce was designed. It did! Yet it still failed. Why?

Why also do studies conducted by USbased firms like Pittiglio Rabin Todd & McGrath report ecommerce has not – as of yet replaced or significantly reduced traditional channel operations to any significant extent?

I personally am reasonably esavvy but, to date, I have only bought a couple of small items over the net. Not because I haven’t tried to buy more.

Giving out my credit card information has never frightened me. My bank assumes all responsibility for purchases by my card should it fall into the wrong hands. [Note: I, like you, pay handsomely for this privilege].

On several occasions I did try to make a small epurchase. Each went something like this. Step 1: Name / Address / Phone Number / [No problem with that].

Step 2: Date of Birth / [SAY WHAT?] SIN Number / [NOT A CHANCE!]

The fact is; I, like most people, will, not under any circumstances give out sensitive, personal information over a faceless Internet regardless of how secure the connection is. And therein lies one of the major stumbling blocks for even the simplest epurchase. Misuse my credit card; I am inconvenienced. Misuse my personal information; I am potentially devastated for life. A few bars of soap or a new toner cartridge for my printer are in the end, not worth the risk.

What about larger purchases? Not too long ago, the Auto Industry was bracing for what it thought would be a groundbreaking way to sell cars – over the Net. After all, it did meet the Tactical Sale Model ecommerce was designed to satisfy. And when that didn’t happen, they were quick to ameliorate their expectations by saying; customers will purchase cars in three steps. First: They will shop the net for exactly the car they want. Second: They will physically test drive one. Finally: They will again shop the net for the very best price and purchase. … So how come so few buyers have done this?

There is an obvious [predictable] answer and it isn’t so difficult to understand.

Educated salesspecialists know there is an Art and a Science to selling. Both the Art and the Science are timetested and proven and are well rooted in things like Psychology, Human Behavior and Motivation. Ecommerce, although quick to offer a potentially new and better way to buy, has fallen miserably short in its ability to offer the human factor still expressly integral in allowing traditionalists to make the leap of faith from the real world to the eworld. In the end, it doesn’t matter whether it’s a computer part, a bar of soap or a new car. A better strategy is still needed to achieve synchronicity between the two buyingmodels thereby bringing credibility or a speedy end to the argument about Disintermediation.

ขIs Disintermediation real? Or is it a Myth?

For the answers to this and strategies you can use [already embraced by successful emanaged companies], go to >www.success150.com/theanswer

About The Author

Paul Shearstone aka The ‘Pragmatic Persuasionist’ is one of North America’s foremost experts on Sales and Persuasion. An International Keynote Speaker, Author, Writer, Motivation / Time & Stress Management Specialist, Paul enlightens and challenges audiences as he informs, motivates and entertains. To comment on this article or to book the Pragmatic Persuasionist for your next successful event we invite to contact Paul Shearstone directly @ 4167285556 or 18668554590

www.success150.com or [email protected].

This article was posted on March 21, 2003

by Paul Shearstone

Avoid Internet Theft, Fraud and Phishing

Avoid Internet Theft, Fraud and Phishing

by: Daniel Punch

Since its birth, the Internet has grown and expanded to unprecedented, unmanageable proportions. Information, software, news, and much more flow freely through its twisted pathways. Online services such as Internet banking save time and money. However, from the depths of its vast expanse have come the dregs of society intent on preying on the new, the naïve, and the less informed.

Phishing is one of the main scams in the present moment. People set up phoney websites and email addresses. Then they spam Email inboxes with officiallooking messages explaining that your account with Company X has encountered a problem and that they need you to login and confirm some details. The email addresses are masked to appear official and the links provided in the email all seem to check out. If you click on the link provided then you will usually be taken to a site that looks for all intents and purposes to be official. When you click กsubmitก your details will be sent to a criminal somewhere who will do as they please with your information, such as withdrawing money from a bank account or purchasing things in your name. The scam has been labelled กPhishingก because the criminals engaging in the activity behave similarly to a fisherman throwing bait out in the hope that theyกll receive just one bite from the millions of people that receive the email.

So how do you avoid these online scams? First and foremost, it is important to realise that no legitimate organisation should be sending you a request to fill out your personal details because of some server error or for any other reason. Your bank will never send you an email with content along the lines of กWeกve lost your bank account number and password… please supply them again for our recordsก. You should also know that no bank is going to require your social security number, bank account number, and PIN number just to log in to your account or retrieve your password. Other sites such as Ebay, PayPal, and the like will not email you asking for these details either.

If you’re a little unsure as to whether or not an email is official, scroll down a bit until you find the link that they are requesting you to click and simply hold your mouse pointer over the link text without clicking. Now take a look at the bottom lefthand corner of your browser window. The link text is often the address that the phisher wants you to think you will be heading to but the real address will be revealed in the bottom of the browser. This address will most likely not have anything whatsoever to do with the company that the email is attempting to imitate. It could be a dodgy web site or even just a page on someoneกs personal computer. If the address doesn’t appear in the bottom lefthand corner then you can rightclick on the link, select กpropertiesก from the popup menu and then read the address listed in the information box.

To avoid further scams make sure that you have updated firewall and antivirus software active on your system at all times. This will make it harder for anyone to install key loggers, Trojans, spyware, or other similar devices intended to retrieve your information. Keep your operating system up to date with the latest security patches and updates and be careful where you enter your details. Always look into the reputability of the site that is requesting your details and keep an eye on the lower righthand corner of your browser. If the page you are viewing has a little padlock symbol appear in the corner, then it means that your details are being secured by some encryption method. You can double click on the icon to get more details if you wish. Sites without the padlock icon don’t have encryption, which means that your details are a lot easier for malicious crooks to get a hold of. Even if you’re sure the website is legitimate, itกs not a good idea to send your details over an unsecured connection. By the way, email does not count as a secure connection, and neither does any instant messaging program, (such as MSN, ICQ, Yahoo Messenger, AIM etc.) so don’t give out personal details that way either.

Another common scam very similar to phishing involves the emailing of promises of great wealth. Seriously, what do you think your chances are of winning the lottery, let alone one that you never even entered? Or of some obscure yet ridiculously rich person in Africa dying and you being legally allowed to pick up their money? Or of a foreign prince wishing to smuggle money out of his country using your account? These emails are all scams. I wish it were true that I won three different lotteries every single day, but if you get in contact with the people sending these messages they’re going to do their utmost to clean out your pockets. Unfortunate as it may sound, the กPlease Donate to Charityก emails sent are usually also scams. If you really want to donate money to a charity, look them up and send it the usual way, don’t respond to a multirecipient email that may or may not be real. You also shouldn’t donate to some random charity that no one has ever heard of before. Some of the Internet lowlifes have started up fake charities, กdedicated to helping Tsunami victimsก or similar and are simply pocketing the donations.

Everything in this world can be used for either good or evil purposes and the Internet is no exception. Staying alert and having just a little bit of Internet knowhow can keep you out of harmกs way for the majority of the time, and allow you access to the wonderful online services available with relative safety.

About The Author

Daniel Punch

M6.Net Web Helpers

http://www.m6.net

[email protected]

This article was posted on February 10

by Daniel Punch

Three Things You Can Do to Keep Your Computer Runn

Three Things You Can Do to Keep Your Computer Running at Maximum Performance

by: Larry Andrew

Although there are many things that can affect the performance of your computer, there are a few simply things you can do each month to help keep your computer running at maximum performance. This article will focus on two problems that impact the performance of your computer and will then explain what you can do about it.

Problem #1: Computer Hard Disk Files

Your computer is always writing information to your hard disk, no matter what you do. Your computer attempts to keep all file information in the same location on your hard drive. As you add and delete files, blank spaces are left between your files. As you add new programs or files, your computer tries to use these blank spaces.

Over time, this reading and writing of files can affect the way your computer performs. The files eventually become scattered in multiple locations on your hard disk rather than in the same location.

Your computer will still find the information. However, the more scattered the information becomes on your hard drive, the more accesses your computer has to make to find (and gather) the information. This requires your hard disk to work harder and do more reading/writing than is necessary. It will slow down your computer by as much as 200% and causes increased wear and tear on your hard drive.

Problem #2: Spyware

If you use the Internet, at some point you will download a file or software program onto your computer. Sometimes you will know something is being downloaded to your computer. Other times you will have no idea. (Although this article will not talk about small files called ขcookiesข, you may want to look up information on this subject. Cookies are written onto your computer from the Internet.)

Free computer programs (often referred to as Freeware) are a big hit on the Internet. Every day thousands of users download these ขfree programsข. Although there are some great freeware programs, these programs often have advertisements or tracking code associated with their use. The term ขSpywareข refers to programs that gather information about your computer and (Internet) surfing habits without your knowledge. This information is then sold to a third party company as a means of generating revenue.

The problem with Spyware is that it also impacts the performance of your computer. It can make your computer very sluggish and unresponsive.

Three Steps to Improved Computer Performance

Now that we’ve discussed two problems that affect the performance of your computer, let’s discuss three things you can do to get your computer performance back to normal. You should do these three steps in the order presented. Ideally, you should repeat them about once a month or whenever you notice a change in your computer’s performance.

Step #1: Delete Spyware

The first thing you should do is to delete spyware files or programs from your computer. To do this, you can use a free software program such as AdAware SE Personal Edition from LavaSoft. To get the program, go to www.download.com and search for ขAdAware SEข (without the quotes). Select ขDownload Nowข and follow the installation instructions. Once the program is installed, you can scan your computer for spyware files. Then, you can select and delete them from your computer.

Note #1: Always be sure to use the ขCheck for updates nowข option to keep your program current.

Note #2: You need to be aware that when you delete spyware files, some of those ขfreeข programs you downloaded may not continue to work correctly. If you have a program you’ve downloaded and want to continue to use, check very carefully what you select to delete from the ขScanning resultsข once the scan has been completed.

Step #2: Clean up your Hard Disk

Once the spyware is removed, you need to clean up temporary and unwanted files from your hard disk. To do this on your windows PC, select the start option in the lower left hand corner of your computer screen. Then, select the program option. Under the program option, select ขAccessoriesข. Under the ขAccessoriesข option, select ขSystem Toolsข. From the System Tools option, select ขDisk Cleanupข.

Select the drive you want to clean from the pulldown menu and select OK. Usually, this is Drive C. If you have more than one hard drive, select one at a time. This program will then scan your computer for files that could be erased from your computer. You can safely erase all temporary and Recycle Bin files. You can also check the box of any other files you want the program to erase.

Step #3: Defrag your Hard Disk

Once all the spyware and temporary files are removed, you need to defrag your hard disk. This process simply rewrites your computer files so they are no longer scattered all over your hard disk, but are written in the same location for quick sequential access.

To defrag your hard disk on your windows PC, select the start option in the lower left hand corner of your computer screen. Then, select the program option. Under the program option, select ขAccessoriesข. Under the ขAccessoriesข option, select ขSystem Toolsข. From the System Tools option, select ขDisk Defragmenterข. First, select the hard drive from your computer. Usually, this is Drive C. However, many computers have multiple hard drives. Select one at a time.

You can select ขAnalyzeข to have the program check out the hard drive and see if it needs to be defragged. The program will prompt you at the completion of its analysis. Use the defragment option as prompted.

Note: If you’ve never used this option before, I would recommend that you select the defragment option.

Once, you’ve completed these three steps, your computer and hard disk should be able to operate at maximum performance. Don’t forget to repeat these steps at least once a month or whenever you notice a change in your computer’s performance.

About The Author

Larry Andrew is an educational consultant, author and publisher of www.ezsoftwarereview.com. Learn how to purchase cheap, reliable and quality software for your home, school and business.

This article was posted on March 23

by Larry Andrew

Serious Considerations Before Starting A Business

Serious Considerations Before Starting A Business

by: David Silva

Although it may not seem like it, the Internet is still in its infancy.

Itกs undergone incredible change in the two decades since its inception. Starting as nothing more than the nugget of an idea, itกs grown into a revolutionary form of communication, information sharing, and commerce. Even today it continues to evolve, often in new and unforeseen directions.

One of these unforeseen directions has been the dramatic growth of Internet Business.

What is it thatกs fueled this dramatic growth? And at the same time, while we’re asking important questions, whatกs kept it from growing even faster?

The Internet provides consumers with a shopping experience similar to that of going to the local mall, only without the crowds and traffic.

Customers have instant access to a huge inventory of products. They can buy a topoftheline golf club in one corner of the Internet, and five minutes later, they can buy a coffee gift basket in another corner. Whatever they want, they can probably find it on the Internet.

In addition, customers enjoy the ease with which they can make a purchase, and how quickly a transaction takes place. Order a book at Amazon.com and the entire process can be done in less time than it would take you to get ready to drive to the nearest bookstore.

On the downside, thereกs still a large segment of the population thatกs uncomfortable enough with technology that theyกve excluded themselves from the customer pool. And unlike shopping at the local mall, Internet transactions are done on a computer screen without any facetoface interaction. Consumers have to trust someone theyกve never met.

They also have to overcome their fears of identity theft and concerns about credit card security.

Finally, for hard products (as opposed to information products that can be instantly downloaded), they have to pay shipping costs and forego the instant gratification that comes from a purchase made locally.

Thatกs what it looks like from the consumerกs perspective.

What does it look like from the businessmanกs?

Well, the businessman can reach customers around the world instead of being confined to a small geographical area. Thereกs no physical storefront to maintain. Initially, thereกs no need for employees (though as the business expands, employees can always be added).

You can get started part time for relatively little investment and let the business grow as your income grows.

You don’t have to deal facetoface with angry customers. You can automate a great deal of your business system, replicating it whenever you take on new products or move into a new niche.

You can outsource much of the work required by your business.

You can start today, without a website if you wish, even without your own product if you wish.

On the downside, thereกs information overload. Itกs easy to become overwhelmed with all the business solutions out there. It can be easier to lose track of what you need to do today, this moment, to be successful.

Thereกs no facetoface contact with customers (if you enjoy social interaction, Internet Marketing might not be for you).

Itกs still a business … which means long hours, hard work, marketing, testing, retesting, etc. There is no secret formula that will make you an Internet millionaire tomorrow.

As with any endeavor, starting an Internet business has its plusses and minuses.

If you’re thinking about going into business, whether or not itกs on the Internet, you need to take the time to seriously look at your skills and personality traits.

So here are some questions to ask yourself …

Are you a selfstarter?

Are you selfdisciplined?

Are you willing to put in longer hours than you ever put in while working for someone else?

Do you know how to find your niche in the marketplace and how to identify your customers?

Are you psychologically equipped to take risk?

How long can you go without making a profit? Can you obtain or do you have enough money to get the business started, do the necessary initial marketing, and keep your head above water until the profits begin to arrive?

Do you have the expertise or can you quickly learn the expertise youกll need in your niche?

Can you organize, manage and supervise?

Do you have vision? Can you think ahead, anticipate, and plan for the future?

Don’t just brush over these questions. Give them serious consideration. Your future depends on the effort you put into laying the proper foundation, and the first step is to understand your own strengths and weaknesses. Answer these questions honestly.

About The Author

David Silva

http://businessstartertools.com

Don’t even think about going into business, on or off the Internet, before you read Mark Joynerกs Confidential Internet Intelligence Manuscript, Volume II

[email protected]

This article was posted on August 27

by David Silva

A Basic Introduction To Spyware

A Basic Introduction To Spyware

by: Philippa Smith

Spyware is the most troublesome software to appear on the Internet in recent times. When spyware infects a computer system, it may be relatively harmless or it may be devastating.

Spyware like coolwebsearch and new.net are capable of paralyzing a computer system. Laws to regulate spyware are pending in many states and may take years to enforce.

What Is Spyware?

Spyware is any software that collects information about computer usage and/or the computer user. It is installed on one computer and sends information to another computer. Some spywares like the Weather Bug, Bear Share and Kazaa are knowingly downloaded and installed by users. Other spyware is installed without the knowledge or permission of the user.

How Does Spyware Affect A Computer?

Symptoms of spyware infection includes:

Very slow system performance while browsing the Internet.

Your homepage changing mysteriously on its own.

Excessive appearance of popups, on sites likes Google, Yahoo and MSN, which don’t use them.

You can only get your browser to visit sites, which are trying to dupe you into buying spy ware removal software.

Many spyware detection and elimination programs are easily available for free on the Internet.

How Does One Deal With Spyware?

There are many tools and catalogues available to deal with spyware. One of these tools is Spybot Search and Destroy. It scans computers for spyware and harmful programs. It shows a list of problem areas to the user and allows him to delete any or all of them.

A user can leave legitimate programs installed by him. These may include peertopeer file sharing software or software installed to monitor the online activities of children.

A Comprehensive Solution

It may be a good idea for most computer owners to get a comprehensive PC security solution as a bundle. Norton and McAfee, now offer a complete security suite consisting of antivirus, personal firewall, antispam and privacy offerings, and antispy ware.

They are quite easy to install and allow parents to monitor children who use the computer. There are many threats on the Internet, from which these suites can protect your computer.

Click to find a daily updated blog of articles and news about spyware ! Get advice and information about how to protect your computer from attack, and disinfect it.. Click http://www.spyware101.com/

About The Author

Philippa Smith runs a home business in Los Angeles. The constant attacks on here computer caused her to learn all about spyware & viruses, and how to deal with them.

[email protected]

This article was posted on September 07

by Philippa Smith

Cookies: How To Learn From Your Visitors and Impro

Cookies: How To Learn From Your Visitors and Improve Your Website

by: Steve Nash

Time for a quick question and answer session.
Question: How can you improve your visitorsก experiences of your website, AND at the same time learn how to improve your website (or learn how to increase sales)?
Answer: Use cookies
Cookies? Yes. Let me explain…
=> COOKIES EXPLAINED
A กcookieก is simply a small piece of text information which a web server stores temporarily with your web visitorกs browser. (Note: cookies are *not* programs.) This means your visitorกs browser remembers some specific information which the web server can later retrieve.
So cookies simply allow your site to store information on your visitorกs computer for later use.
A basic example of a cookie in action can be found here http://www.jsworkshop.com/js3e/list241.html
Another example is the กonline shopping mallก that uses cookies to add items to a userกs กshopping cartก as they browse.
==Aside==
Here are two examples of how my own sites use cookies (I use them to make sure a popup window loads at a set frequency):
Popup ONCE ONLY http://www.shoptour.co.uk/webmaster.shtml
Popup ONCE PER DAY http://www.anyonecansellonline.com/tips.shtml
For those interested, the cookie code is stored here http://anyonecansellonline.com/makemoneyfiles/cookie1.js
==Aside==
=> WHY YOUR WEBSITE SHOULD USE COOKIES
Basically, cookies allow you to improve a site visitorกs experience of your website. Iกve listed a few examples to show how you can achieve this:

Cookies can store visitor preferences. This means you can present customised information to your visitor, as per their own requirements. (This is how portal sites like MSN work.)
Cookies can prefill form fields for your visitor.
Cookies can automatically login visitors to your site
Cookies can provide visitor statistics and therefore help you understand your visitorsก needs. Cookies can provide site metrics like number of unique visitors, average number of pageviews, percentage of repeat visitors et cetera. And cookiegenerated statistics are much more accurate than using log files.

(Do remember though, that people sometimes share computers; some browsers are set to reject cookies; and cookies can be erased.)
So not only are cookies an efficient way of keeping track of information, they also help personalise your site visitorsก experiences of your website.
And thatกs the point with cookies how can *you* help your site visitor?
No, it doesn’t mean you can now invade your visitorกs privacy! The use of cookies is often abused by site owners, but this ultimately leads to cookieblocking software being installed and used; so do set your cookies cautiously, and include a privacy statement on your site explaining your use of cookies! (See below.)
=> USE THIS COOKIE RESOURCE
CookieCentral is an excellent resource dedicated to all things Cookie. The siteกs described as providing กinformation of persistent cookies, HTTP cookies, cookies with JavaScript, magic cookies, [and] maintaining state with cookies and more.ก
But don’t worry if that sounds too technical for you, CookieCentral really is a great place to learn about the pros and cons of using cookies.
From the concept of cookies through concerns about privacy to JavaScript and CGI demo code youกll find it all at CookieCentral.

http://www.cookiecentral.com/content.phtml?area=2&id=1

=> OR VISIT THESE SITES TO LEARN ABOUT COOKIES
If you want to know more about how cookies work, then visit these sites:

http://www.howstuffworks.com/cookie1.htm
http://www.newbalancecatalog.com/General/cookies.htm
http://www.allaboutcookies.org/cookies/index.html

=> OR JUST DO IT YOURSELF!
As ever, the web is filled with free programs and scripts that allow you to use cookies. Whether you want to use JavaScript, CGI/Perl, PHP or ASP you can find free resources that help you implement cookies on your site.
JavaScript cookies http://webdeveloper.earthweb.com/webjs/cookies/
CGI/Perl cookies http://cgi.resourceindex.com/Programs_and_Scripts/Perl/Cookies/ (all 1 word)
PHP User Personalization System with Cookies http://www.devshed.com/Server_Side/PHP/Cookies/
ASP and cookies http://www.w3schools.com/asp/asp_cookies.asp
=> PRIVACY WARNING!
More and more web users are becoming sensitive to their online privacy. Rightly so. And this includes cookies, and how your site uses them. So do make sure that you understand the issues involved, and set your privacy statement accordingly.
This article explains more…
http://www.sitepoint.com/article/p3pcookiesie6/1
=> READ MORE…
You can find out a great deal more about using cookies on your site from the following excellent resources. Just do a search for กcookiesก and off you go!

http://www.workz.com
http://www.iboost.com
http://www.sitepoint.com

Cookies can improve your visitorsก experiences of your web site, through personalisation. Using cookies, your site may well run more efficiently too, and could provide you with accurate site statistics helping you deliver just what your visitors are looking for.
Just use cookies carefully, so that your visitors benefit!
(And continue to learn from the invaluable resources above, and below 😉 !)
Copyright 2004 Steve Nash

About The Author

STEVE NASH is the author of the ebook: ก3 SuperTips To Build, Promote And Profit More From Your Website.ก Download your free copy now! http://www.wisebuys.info/bonus.shtml
WANT MORE TIPS? Signup to his free monthly Buildtips course here! http://www.wisebuys.info/newsletter.shtml#tips

This article was posted on April 30, 2004

by Steve Nash

Book Summary: Networking For Professional Success

Book Summary: Networking For Professional Success

by: Regine P. Azurin

Book Summary:

This article is based on the following book:

Effective Networking for Professional Success: กHow to Make the Most of Your Personal Contactsก

by Rupert Hart, Stirling Books, 1997

ISBN 0 949 142 09 3

125 pages

We are all ขselfemployedข now.

Today there is absolutely no job security. We are living in an age of corporate downsizing, and freelance consultants, or selfemployed workers are growing by the day. Networking is one skill you need to practice to get ahead and survive these uncertain times.

Wisdom in a Nutshell:

Networking is essential for both new jobs and business contracts.

Effective networking is 12 times more effective than answering advertisements

Advertising is becoming ineffective except on a large scale.

Networking helps you find hidden opportunities and can set you apart from the competition.

An indirect approach is better than a direct one. Use someone you know to introduce you to your target contact. Never go straight to your target without a gobetween who will put in a good word for you.

You can overcome your natural shyness, your fear of using people, and your fear of rejection.

The 3 key networking techniques are:

Build a network of partners to keep an open eye and ear for new opportunities for You.

Reach targeted individuals in two ways: directly or indirectly.

Build visibility by raising your profile. Go to every social gathering you possibly can.

Building your network is an ongoing process. You need to increase your range of contacts constantly.

Planning your campaign:

Define your objective

Select the right technique

Understand that ขdeal flowข or your number of prospects must be great in order to bag one new business contract.

Identify your target

Work out your positioning. This is a short statement of what you are about, what you can offer.

Think about what you can do for your network partners in exchange for information and contacts.

Building Network partners:

Talk to everyone you know about opportunities

Clarify what network partners can and will do for you

Know which contacts to build into network partners

Find those friendly network spiders, those types of people who just seem to know everyone.

Use the telephone.

How to grow and refresh your network:

Go out of your way to be where people are.

Get into the habit of being talkative.

Get the contact details of people you meet. Not just exchanging business cards but stapling information like birthdays, anniversaries, hobby clubs, and key information onto their cards.

Choose the right method for the right person.

Warm up longcold contacts.

How to find targeted individuals:

Focus on what you want to achieve and how people can help you.

Use your network partners to find suitable companies.

Gather key information on these companies.

Figure out who is the one with the power to hire you.

Find people connections and common areas of interest.

Reaching targets through network partners:

Find and persuade the best partner for your targeted individual.

Engineer an introduction.

Build wordofmouth exchanges about yourself.

Reaching targets directly:

Decide if you should write a letter or not.

Be able to demonstrate your achievements.

Have a line ready to get you past the secretary.

Act as though you expect to be put through.

Be ready to leave a short, persuasive message for the decisionmaker.

Your opening line:

Be cheerful, confident and straightforward.

Exploit connections and recommendations.

Mention common interests.

Report news of interest to the target.

Wait for a response. Know when to shut up.

Write down your opening lines before picking up the phone.

How to be visible without really trying:

Ask a question at a conference.

Make a point in a meeting.

Write letters to your industry magazine.

Introduce yourself to lots of people at an industry show or ball.

Buy people a drink at the bar at a lecture.

Discuss a book with an industry leader.

Wear bright ties.

Make people laugh.

Have an opinion on everything. (But keep an open mind)

Hand out an unusual business card.

Recast your CV to be a little different.

Take up an unusual hobby. (But not too unusual)

Don’t overlook using the email and Internet to communicate your cause.

About The Author

By: Regine P. Azurin and Yvette Pantilla

http://www.bizsum.com/freearticle2.htm

กA Lot Of Great Books….Too Little Time To Readก

Free Book Summaries Of Latest Bestsellers for Busy Executives and Entrepreneurs

Mailto:[email protected]

BusinessSummaries is a BusinessSummaries.com service.

(c) Copyright 20012002, BusinessSummaries.com Wisdom In A Nutshell

This article was posted on May 5, 2002

by Regine P. Azurin

Infopreneur Overlooked Golden Opportunity

Infopreneur Overlooked Golden Opportunity

by: Dr. Jamie Fettig

What it takes to be an infopreneur on the internet.

If you like to teach, enjoying writing and write well, and have or can get access to a body of knowledge that other people are willing to pay good money for, then you could be best served by getting into the information marketing business.

Notice the three qualities you need to have for the info marketing business to work for you:

Quality #1 กYou like to teachก. This doesn’t mean you have to have had formal, professional experience as a teacher, but it does mean that you’re the kind of person who enjoys taking the time to break difficult information down so people who are new to the subject can learn it too.

Quality #2 กYou enjoy writing and write wellก the info marketing business is about generating words…lots and lots of words; content, ads, articles, reports, books, home study course, seminars.

You don’t have to be Shakespeare and you don’t have to write everything you need all at once, but to make the big bucks in info marketing, you have to be on a friendly basis with your word processor.

Quality #3 กYou have or can get access to a body of knowledge that people are willing to pay good money forก.

The good news about being an info marketer is you don’t need to be *the* ultimate expert on the information you sell.

You can always partner with another person who has the subject expertise. This can work very well if you pick the right partner. The thing you need to know is that partnerships are difficult at best. The right one can transform your destiny, but the wrong one can cause you endless headaches.

If you go the partner route, choose wisely.

The second part of this equation is you need กa body of knowledge that other people are willing to pay good money forก

Iกm talking here about making *real* money. If you just want to make a few hundred extra dollars a month selling an eBook, fine. But if your goal is to end up with a *business* that pays your mortgage, makes the car payment, and puts the kids through school, and then you’re going to want to take a more serious approach.

When it comes to making a living selling information, there are two things that matter: picking the right kind of กdeep pocketsก market and serving the market you pick like crazy.

There are all kinds of info categories where people are willing to spend serious money…

And those are the kind of markets you want to go after.

But hereกs the price of admission. You have to be able to consistently produce serious, high quality content thatกs *worth* big money.

The กsmoke and mirrorsก guys like to gloss over this reality. กItกs easy,ก they say. กJust put up any old eBook and youกll be rolling in it.ก

Wrong.

The reality is most eBook publishers who are making real money sell a lot more than just eBooks. They sell home study courses, seminars, coaching programs, etc. And none of those things are cheap.

If writing, researching, teaching and high level promotion are your life passions, you can do this too, but if they’re not, be easy on yourself and take a look at one of the two other paths to online success.

About The Author

Dr. Jamie Fettig

If you value entertainment over education… the system seminar is not for you.

But if youกve got brains and guts and you sincerely want to be more than just another member of the กmediocre Internet marketing majority,ก take the FREE PreSystem Training. After just a few lessons youกll see right away if the System is for you or not. The PreSystem Training is a course that stands on its own and over the years, itกs helped a lot of people make a lot of money. http://www.bazuji.com/system

This article was posted on March 18

by Dr. Jamie Fettig