If you want to win new business and build a valuable network on LinkedIn, it's all about understanding how to find (and utilize) context for a one-on-one conversation.
With the plethora of available data on all 550 million members of the world's largest social platform for professionals, LinkedIn makes "cold" introductions and exchanges easy to accomplish.
Taking just a few moments to glance at someone's LinkedIn profile gives you any number of potential ice-breakers or conversation starters--where someone lives, his or her job title, where he or she attended school, hobbies and interests, awards and honors, publications, and so on.
In short, you should never be reaching out to someone on LinkedIn with a "cold" or generic invite or message.
Instead, you need to find context for the conversation, meaning you quickly share the reason why you are reaching out to someone on the network while also asking an ice-breaker question.
The Best Place to Find New Business on LinkedIn
Now, there's no easier (or better) place to begin one-on-one conversations with potential employers, business partners, or customers than the "Who's Viewed Your Profile" section of LinkedIn.
(Note: You can find the "Who's Viewed Your Profile" page by clicking on the number of recent profile views highlighted on the far left section of your LinkedIn Feed or in "Your Dashboard" on your profile page.)
With "Who's Viewed Your Profile," LinkedIn literally gives you the names, faces, and profile information of every single person who takes the time to check you out on the platform.
"This month we refreshed the 'Who's Viewed Your Profile' page with a new look and brought back functionalities that provide a quick snapshot into who has visited your profile over time," LinkedIn recently shared on its blog. "Whether it's because they noticed you changed jobs, saw something you posted in their feed, or they generally wanted to know more about your professional life, someone viewing your profile is a great indicator that they could be open to reconnecting.
"Use these insights as an 'in' to reach out. For example, if you notice someone from a company you're interested in has viewed your profile, send them a message to ask about their role or invite them to coffee."
See how easy this is?
Someone looking at your LinkedIn profile means they are interested (to some degree or another) in who you are and what you do.
Now, if you've set up your profile the right way, that person will immediately be "warmed up" and ready to engage you even more based on what he or she discovered by reading through your profile page.
(Note: If you need help setting up your LinkedIn profile properly, I have a copy-and-paste template you can use to instantly make it more appealing to your ideal clients and customers.)
Someone Viewed My Profile--Now What?
Once someone views your profile page on LinkedIn, you'll want to reach out as quickly as possible with an invite to connect (if you're not already first degree connections).
And, best of all, you now have some great context for this new conversation.
So, when you see someone who viewed your profile and that person is not yet connected to you, send them a personalized invite that reads like this:
Hi [NAME]--noticed you checked out my profile here on LinkedIn and thought I'd reach out to connect. Curious how you came about finding my profile and what made you want to have a look? Either way, would love to connect, learn more about what you're up to professionally, and see how I can help you out. Cheers!
That's a simple, easy, and effective invite script you can use over and over again with anyone who views your profile each day. Best of all, it will spark a one-on-one conversation inside your LinkedIn messages, given that you're asking the person to explain A) how they found you, and B) why they were interested in your profile.
Why Are You Looking at Me?
If someone is already connected to you (first degree) and has recently viewed your profile, you'll want to send them a direct personal message right away.
Why did this person (whom you're already connected to) suddenly look at your profile? What caught their eye? Are they looking for someone who has your skill set or specific products and services? Did someone recommend they check you out?
There are all kinds of reasons to want to know why, so here's a script you can use to send as a one-on-one personal note to those people who recently viewed your profile:
Hey [NAME]--noticed you recently checked out my profile here on LinkedIn. Curious--what piqued your interest to view my profile? Was it a status update, article, or something else I recently shared? Also, how are things going? What's new in your world, professionally? Excited to chat more and thanks for stopping by my profile!
This is another copy-and-paste, conversational script you can use to spark some one-on-one engagement with someone who has you on their mind. It also helps you understand (based on what the person tells you) what type of content or methods that you're deploying on LinkedIn are leading to profile views with your existing connections.
The Power of a Profile
Even LinkedIn acknowledges how important the "Who's Viewed Your Profile" feature can be to lead generation and job opportunities--especially if you have a premium (or paid) subscription to the site.
"With LinkedIn Premium, you have the added benefit of looking back at all the people who have viewed your profile over the past 90 days," LinkedIn notes in its recent blog. "This means more chances to reach out to folks, and gives you the assurance you won't miss an opportunity to connect or reconnect with someone."
Context is everything when it comes to creating a "warm" conversation with a potential employer or prospect online, and that's why LinkedIn's treasure trove of user data is critical to utilize when you're reaching out to others on the platform!
The funny thing about language is how words and phrases seep in everyday use without anyone realizing exactly where they came from. As ubiquitous as technological devices are in our daily lives, so is the vocabulary that is attached to the innovation that made them possible.
But who invented the words that have become so commonplace? Read on to find out.
If you have referred to a tech problem as a bug, you can thank pioneers including Thomas Edison and U.S. Navy Rear Admiral Grace Hopper. Edison used the term in some correspondence about the development of the telephone in 1878, and Hopper, one of the inventors of the electronic computer in the 1940s, is believed to have coined the term when she discovered an actual moth trapped inside one of her prototypes.
If you’ve used a site such as Yelp or TripAdvisor to narrow down your choice of restaurant or lodging, you’ve taken advantage of crowdsourcing. But the term wasn’t invented until 2006, in an article in Wired by a writer and editor named Jeff Howe.
A Stanford engineer named Doug Engelbart invented the computer mouse as a prototype in 1961. But why it was called a mouse is a little bit of a mystery. According to the Computer History Museum, Engelbart couldn’t remember who was responsible for calling it a mouse. The name served as a shorthand to describe the device, which at the time had a long wire that made it look like a rodent with a tail.
Open source software, which comes with code that anyone can access and improve or change, wasn’t always called “open source.” Scientist Christine Peterson came up with the term in 1998 at the Foresight Institute, a nonprofit think tank dedicated to nanotechnology and advances in AI. Today, companies such as Amazon, Google and Microsoft all use open source as a part of their business models.
While it's hard to pin down the one person who decided that junk mail should be called spam, internet entrepreneur and author Brad Templeton says that the famous Monty Python viking spam sketch, which made the lunch meat synonymous with unrelenting repetition, was adopted by the users of very early chat rooms in the late 1980s to describe the process of overwhelming a computer with data to crash it.
In 1997, a writer named Jorn Barger created a site where he shared links with readers called Robot Wisdom WebLog, with WebLog short for logging the web. In 1999, a programmer named Peter Merholz shortened the phrase even further to blog, which started gaining traction by users of platforms such as LiveJournal and Wordpress.
While the definitive source of the term big data -- which is used describe a collection of analytics that companies use to predict customer behavior -- is a little fuzzy, according to some digging done by New York Times reporter Steve Lohr, the person responsible for its popularization is a man named John Mashey, a computer scientists who was VP and chief scientist at company called Silicon Graphics in the early 1990s and 2000s.
While we share memes every day, the word actually didn’t get its start online, but in a different field of science. It was coined by Richard Dawkins, the famous British evolutionary biologist who was a professor at the University of Oxford. He introduced the word in his 1976 book The Selfish Gene, and used it as a way to describe how trends and societal practices catch on and become popularized.
Internet of Things (IOT)
The phrase is used to describe a system of everyday items that are built to be equipped with wi-fi capabilities. Think of the setup of a smart home, with for example, a refrigerator that knows when to order new groceries. Kevin Ashton, a British author and scientist who is an expert in the field of sensing technology, coined the term in 1999 when he was working at Proctor & Gamble to help improve supply chain communication systems. He is also the founder of the Auto-ID Lab at MIT.
If you were wondering why crazy successful tech startups -- ones that are valued at more than $1 billion -- are called unicorns, you can thank Aileen Lee, a venture capitalist and the founder of the firm Cowboy Ventures. Why unicorn? Because of the mythic rarity of a startup reaching that milestone. Not something you see in the wild every day, if at all.
As far as I know, I never took “thisisyourdigitallife,” the personality quiz that researcher Aleksandr Kogan used to harvest 50 million Facebook profiles which he then turned over to Cambridge Analytica, the voter-profiling company that worked on the 2016 Trump campaign. But as details of this story emerged over the weekend, I was moved to check out which third-party apps I had given access to my Facebook data over the years. (Here’s my colleague Marcus Baram’s tip on how to pull up your own list.)
I can’t say that what I found stunned me, because … well, I didn’t know what to expect. But it turned out that I’ve given 300+ apps and services permission to rummage around in my Facebook data over the years.
They break down into some broad categories:
How about things that I know I want to be connected to Facebook? There are shockingly few of them. I granted Twitter access so it could push my Tweets into my Facebook news feed. I’m happy to allow apps like Nuzzel and Patreon to see my Facebook friends so I can find them on those respective services. And Ancestry grabs photos from my relatives on Facebook and adds them to my family tree, which is nice. That’s about it, though.
Now, I don’t have any reason to suspect that anyone at any of the 333 apps and services I’ve permitted to poke around my Facebook has used it for underhanded purposes, as researcher Kogan is alleged to have done. But the fact that I can’t even remember some of the names on my list tells me that I haven’t taken the whole matter seriously enough. I clicked without thinking. Over and over. For years.
Here’s what I’m going to do henceforth:
So help me, I like Facebook and have no intention of leaving it or even grinding my activity down to the bare minimum. But with very few exceptions, the value I get out of it is created by my friends and acquaintances posting stuff I care about. Almost everything else is dispensable–and my plan is to start dispensing with some of it.
By Michael Grothaus - 3 minute Read
You can’t go back in time and not post those embarrassing photos, but you can erase your mistakes before your future boss Googles you.
When I graduated from college in 2000, social media didn’t really exist, and managers didn’t do Google background checks. I didn’t realize how easy I had it compared to today’s graduates.
“It isn’t at all uncommon for hiring managers to look at Facebook or Instagram to see what type of person the candidate is. You can gauge what someone’s like from an interview, but only to a certain extent,” says Callum Williams, a senior recruitment consultant at FRG Technology Consulting. “The attitude [the applicant] displays once they have the job could be entirely different, so social media can offer valuable insight at times.”
If you’re entering the workforce now, you were raised in an era where social media has been ubiquitous. Your posts from high school might come back to haunt you when a prospective employer searches your accounts.
Of course the best way to stop embarrassing posts from coming on to the radar of a prospective employer is not to post things that you wouldn’t want your boss to see in the first place. But if you’re reading this article, it’s clearly too late for that. So here are some steps you can take to reduce the chances that your past online activity and digital footprint will hurt your job prospects.
Make Your Social Media Accounts Private
As soon as you enter the professional realm, or enter the phase of looking for your first professional job, it’s time to privatize your social media profiles. Yes, it feels good to have hundreds or thousands of followers, even if you don’t know 90% of them, but is that dopamine high you get when you snag a new follower worth it if your public social media account stops you from getting a job?
Here’s how to make your Facebook profile private, make your Twitter profile private, and make your Instagram profile private.
Review Your Timelines
Of course, there are times when it’s beneficial to have public social media profiles when hunting for a job. This is especially true if you’re looking for a job in the media, where your social media profile can serve as an addendum to your resume.
But even if this is the case, you’ll still want to scan through all your social media posts and remove any photos or comments that could cast you in a negative light. Such posts include anything that makes you look petulant, nasty, or immature. Obviously get rid of “funny”/potentially embarrassing photos, and comments that could cause offense. As far as posts about politics go, it’s okay to stand by your political views, just don’t leave any posts up that demonize the other side simply because they disagree with your point of view.
Of course, sometimes you can appear on social media despite not posting the content yourself. This often happens when our friends or family tag us in content they post. These tags with our names can often show up in Google searches, especially Google Image searches, as most tags are applied to photos.
“Be conscious of the things you are tagged in,” warns Williams. “Friends have a habit of tagging you in pictures and videos that you would rather not share with the world. Ask them to remove the tag or remove it yourself.”
Besides asking friends to untag you, most social media sites also give you the ability to disable other people from tagging you in the first place. Here’s how to control tagging on Facebook, Twitter, and Instagram.
Find And Close Any Old Social Media Accounts
When we think of managing our social media profiles, we generally think of the current big three social media platforms: Facebook, Twitter, and Instagram. However, chances are that many of us have digital footprints floating around online from other platforms that we’ve long since abandoned. I’m talking about old platforms like MySpace or Friendster or abandoned social media profiles on services like Google+, or from that time we created a Flickr account just to post our pics from that wild trip to Cancun.
You might not even remember how many abandoned social media accounts you have. To find them, Google your name to see what comes up (check past the first page of results) or try a service like Deseat.me, which aims to help you find all your forgotten online accounts. Any accounts you do find, either make them private or close them down completely.
Not sure if a certain post might hurt your job prospects?
“If in doubt about a historical social media post, consider the first impression it would give a stranger,” says Williams, “and be mindful that the standard of a hiring manager is higher than that.”
By Brit Morse
LinkedIn is a great way to showcase your professional skills to recruiters and potential partners. Here's how to strengthen your profile.
BY Klint Finley - WIRED
It's super secure and slightly hard to understand, but the idea of creating tamper-proof databases has captured the attention of everyone from anarchist techies to staid bankers.
Depending on who you ask, blockchains are either the most important technological innovation since the internet or a solution looking for a problem.
The original blockchain is the decentralized ledger behind the digital currency bitcoin. The ledger consists of linked batches of transactions known as blocks (hence the term blockchain), and an identical copy is stored on each of the roughly 200,000 computers that make up the bitcoin network. Each change to the ledger is cryptographically signed to prove that the person transferring virtual coins is the actual owner of those coins. But no one can spend their coins twice, because once a transaction is recorded in the ledger, every node in the network will know about it.
The idea is to both keep track of how each unit of the virtual currency is spent and prevent unauthorized changes to the ledger. The upshot: No bitcoin user has to trust anyone else, because no one can cheat the system.
Other digital currencies have imitated this basic idea, often trying to solve perceived problems with bitcoin by building new cryptocurrencies on new blockchains. But advocates have seized on the idea of a decentralized, cryptographically secure database for uses beyond currency. Its biggest boosters believe blockchains can not only replace central banks but usher in a new era of online services outside the control of internet giants like Facebook and Google. These new-age apps would be impossible to censor, advocates say, and would be more answerable to users.
Several companies are already taking advantage of the Ethereum platform, initially built for a virtual currency. The startup Storj offers a file-storage service, banking on the idea that distributing files across a decentralized network is safer than putting all your files in one cabinet.
Meanwhile, despite the fact that bitcoin was originally best known for enabling illicit drug sales over the internet, blockchains are finding acceptance in some of the world's largest companies. Some big financial services companies, including JP Morgan and the Depository Trust & Clearing Corporation, are experimenting with blockchains and blockchain-like technologies to improve the efficiency of trading stocks and other assets.
Traders buy and sell stocks rapidly, but the behind-the-scenes process of transferring ownership of those assets can take days. Some technologists believe blockchains could help with that.
There are also potential applications for blockchains in the seemingly boring world of corporate compliance. After all, storing records in an immutable ledger is a pretty good way to assure auditors that those records haven't been tampered with.
It's too early to say which experiments will work out or whether the results of successful experiments will resemble the bitcoin blockchain. But the idea of creating tamper-proof databases has captured the attention of everyone from anarchist techies to staid bankers.
The First Blockchain
The original bitcoin software was released to the public in January 2009. It was open source software, meaning anyone could examine the code and reuse it. And many have. At first, blockchain enthusiasts sought to simply improve on bitcoin. Litecoin, another virtual currency based on the bitcoin software, seeks to offer faster transactions.
One of the first projects to repurpose the bitcoin code to use it for more than currency was Namecoin, a system for registering ".bit" domain names. The traditional domain-name management system—the one that helps your computer find our website when you type wired.com—depends on a central database, essentially an address book for the internet. Internet-freedom activists have long worried that this traditional approach makes censorship too easy, because governments can seize a domain name by forcing the company responsible for registering it to change the central database. The US government has done this several times to shut sites accused of violating gambling or intellectual-property laws.
Namecoin tries to solve this problem by storing .bit domain registrations in a blockchain, which theoretically makes it impossible for anyone without the encryption key to change the registration information. To seize a .bit domain name, a government would have to find the person responsible for the site and force them to hand over the key.
Bitcoin’s software wasn’t designed to handle other types of applications. In 2013, a startup called Ethereum published a paper outlining an idea that promised to make it easier for coders to create their own blockchain-based software without having to start from scratch, without relying on the original bitcoin software. In 2015 the company released its platform for building “smart contracts,” software applications that can enforce an agreement without human intervention. For example, you could create a smart contract to bet on tomorrow’s weather. You and your gambling partner would upload the contract to the Ethereum network and then send a little digital currency, which the software would essentially hold in escrow. The next day, the software would check the weather and then send the winner their earnings. At least two major "prediction markets" have been built on the platform, enabling people to bet on more interesting outcomes, such as which political party will win an election.
So long as the software is written correctly, there's no need to trust anyone in these transactions. But that turns out to be a big catch. In 2016 a hacker made off with about $50 million worth of Ethereum's custom currency intended for a democratized investment scheme where investors would pool their money and vote on how to invest it. A coding error allowed a still unknown person to make off with the virtual cash. Lesson: It's hard to remove humans from transactions, with or without a blockchain.
Even as cryptography geeks plotted to use blockchains to topple, or at least bypass, big banks, the financial sector began its own experiments with blockchains. In 2015, some of the largest financial institutions in the world, including JP Morgan, the Bank of England, and the Depository Trust & Clearing Corporation (DTCC), announced that they would collaborate on open source blockchain software under the name Hyperledger. Several pieces of software have been released under the Hyperledger umbrella, including Sawtooth, created by Intel for building custom blockchains.
The industry is already experimenting with using blockchains to make security trades more efficient. Nasdaq OMX, the company behind the Nasdaq stock exchange, began allowing private companies to use blockchains to manage shares in 2015, starting with a company called Chain. Similarly, the Australian Securities Exchange announced a deal to use blockchain technology from a Goldman Sachs-backed startup called Digital Asset Holdings to power the post-trade processes of Australia’s equity market.
The Future of Blockchain
Despite the blockchain hype—and many experiments—there’s still no "killer app" for the technology beyond currency speculation. And while auditors might like the idea of immutable records, as a society we don't always want records to be permanent.
Blockchain proponents admit that it could take a while for the technology to catch on. After all, the internet's foundational technologies were created in the 1960s, but it took decades for the internet to become ubiquitous.
That said, the idea could eventually show up in lots of places. For example, your digital identity could be tied to a token on a blockchain. You could then use that token to log in to apps, open bank accounts, apply for jobs, or prove that your emails or social-media messages are really from you. Future social networks might be built on connected smart contracts that show your posts only to certain people or enable people who create popular content to be paid in cryptocurrencies. Perhaps the most radical idea is using blockchains to handle voting. The team behind the open source project Soverign built a platform that organizations, companies, and even governments can already use to gather votes on a blockchain.
Advocates believe blockchains can help automate many tasks now handled by lawyers or other professionals. For example, your will might be stored in a blockchain. Or perhaps your will could be a smart contract that will automatically dole out your money to your heirs. Or maybe blockchains will replace notaries.
It's also entirely possible that blockchains will evolve into something completely different. Many of the financial industry's experiments involve "private" blockchains that run on servers within a single company and selected partners. In contrast, anyone can run bitcoin or Ethereum software on their computer and view all of the transactions recorded on the networks’ respective blockchains. But big companies prefer to keep their data in the hands of a few employees, partners, and perhaps regulators.
Bitcoin proved that it’s possible to build an online service that operates outside the control of any one company or organization. The task for blockchain advocates now is proving that that’s actually a good thing.
Dean Bubley (@disruptivedean)
How will the changing shape of telecoms transform the way we work? Dean Bubley, an analyst and futurist specialising in technology and telecoms, looks at the impact of this evolution
It’s 7am. Sam’s voice assistant outlines his schedule while he gets ready for the day, answering his questions. He’s giving a presentation to an international team of co-workers in several different time zones, to discuss a new product.
On the way to the office space that his voice assistant booked in advance, he listens to relevant edited highlights of the previous conference call, compiled by an AI-based semantic analysis of the recording.
He presents his talk using an advanced conference and collaboration tool, which provides real-time translation for some of his colleagues. His public-speaking coach, listening in via the app, suggests he slows down for better emphasis.
After the presentation, he locates his taxi, using the ‘speak to the driver’ function of his cab app, which allows him to find where he is parked without revealing his phone number. The company’s fully networked karaoke party, which is taking place simultaneously across several different time zones, will have to wait.
The future is almost here
This vision of the future isn’t as distant as we may think. The need for remote communication is greater than ever and the technology we use is evolving at a rapid pace. Skype, WhatsApp Voice and even business-grade systems that incorporate messaging and conference functions are just the start.
The days of Person A calling Person B on a traditional phone, via a standard phone number – and just hoping Person B will answer – are limited. New call formats are becoming possible, including apps that announce both the caller’s name and why they are calling. Some have a whisper mode, where a three-way call is set up, but one person is excluded from a leg of the conversation. A sales director listening in might tell a rookie agent to close the deal – now! – without the customer hearing. A future whisperer might even be an AI, prompting humans to ask particular questions next, based on machine-learning models of behaviour and successful calls.
This means more flexibility in the way voice applications are designed. Different elements of a traditional call can be deconstructed – timing, identity, signalling, and purpose – then built up again in novel ways. We will see more use of voice-processing as well – perhaps for recording, analytics or even real-time translation between languages or dialects.
Another trend is for application-embedded voice. This eliminates the need for the user to dial a number separately, or flip between the app and the keypad on a mobile phone. We see the start of this already with sales applications such as ZenDesk, which provides cloud-based customer-support and contact centres, and Salesforce, one of the largest cloud-based sale automation platforms. Both use tight integration with various voice-calling systems, as well as messaging and other interaction channels. Increasingly we will also see it more generally. Voice calls or conferences (or speech recognition) will be seamlessly designed into a flowing user experience.
An inventory-management app might automatically set up calls between warehouse and delivery driver. A travel-industry tool could see what the customer was doing before requesting assistance: “I see you were trying to change seats on your flight to Boston – can I assist you?”
This will also mirror changing working patterns. Much of the new gig economy is heavily software-driven – and needs integrated communications. Part-time customer-support agents may work from home (remaining ‘fully mobile’ thanks to their smartphone). They will increasingly need ways to blend status dashboards with voice or video functions.
Internet of Things
We will also experience more voice communications that are not tied to a phone – as we know it. While we’re already used to walkie-talkies or intercom systems, the future is going to be more diverse as companies adopt Internet of Things solutions with communications capabilities.
This might include a ‘speak to an engineer’ button on a malfunctioning coffee machine. Augmented-reality (AR) headsets in industrial facilities might have a distant expert watching a video feed, putting a virtual pointer into a technician’s vision, with the spoken instruction to “tighten this bolt”. And we may find business versions of virtual assistants, such as Amazon Alexa or Google Now, built into anything from the heating controls to the meeting-room whiteboard.
A common theme here is the use of cloud-based communications. Many of the most useful voice-related functions will be provided by third parties. Various so-called cPaaS (communications platform-as-a-service) providers already cater to developers wanting to voice-enable their applications.
These developments will refresh and revitalise the use of voice communication – taking it from clunky one-dimensional phone calls to a much broader set of applications, experiences and business models. Companies will need to communicate with their employees and customers on their terms and with their preferred tools. At one level, it may mean an end to unsolicited voice spam. Conversely, it may also make sales and support functions more effective, as well as internal company processes.
Big or small, influencer or newcomer, everyone looking to get more followers and more likes on social media—more engagement, period—seeks out strategies that work.
And what works with a platform of 11 million followers tends to work for platforms with 100, too.
Social media is a moving ocean of posts, images, tools, ideas, and content that flows at a fast pace. You can find success by building your own social media strategy and keeping it fluid by checking and rechecking what’s working.
I’ve had the chance to check and recheck dozens of different social media strategies in managing a social media platform of 11 million. How do I do everything that I do? And what do I do, specifically? Well, I’d love to share the details with you!
My network of 11 million
I’ve had the privilege to assist Guy Kawasaki, chief evangelist at Canva and former evangelist at Apple, on his social media marketing, and I’ve worked on building a social media following for myself.
I manage a huge social media platform across Twitter, Facebook, Instagram, LinkedIn, Pinterest, and Google+. I started at zero on all my accounts, just like you, and I’m not a celebrity or household name. This is how I’ve worked to build a great social platform – and you can too!
What I manage:
Total: an audience of 11.5 million people
I’ve had the opportunity to take the skills and tricks I’ve learned along the way, managing my own social media platform and applying it to Guy’s social media and for clients we work with, and implement them in some exciting ways. Fortunately, a lot of the strategies have worked! And if things aren’t working, I find a different way to do them.
What is social strategy?
Your social strategy is the plan that’s going to make your social media work.
It’s a combination of content creation, content curation, creativity, and organization.
Random acts of social media won’t do a darn thing to help people find you or to be known for a topic area. To build your authority in your niche, you need to create a solid social strategy that will help people find out who you are, what you do, and most importantly how you can help them.
Answer these questions before you begin the work on your social strategy:
Let’s use the Buffer blog as an example since their wildly popular blog helped put them on the technology tool map. (Here’s a look back at the blog in late 2013.)
Socialnomics.com spawned from Erik Qualman’s #1 bestselling book of the same title published in 2009. It's mission is to keep you in-the-know on the latest biz and buzz of tech. Think statistics, studies, stories, and surprises.
I thought it would be interesting to show the original video from 2013 alongside the latest 2018 version. I will leave you to draw your own conclusions and where we will be in the next 5 years.
Because of your efforts Socialnomics has been able to reach over 25 million and growing. Thank you for the continued support.
Socialnomics #1 2013
Socialnomics #8 2018
Facebook mistakes. Your small business has made them. Whether it’s an unintentional post or an inappropriate comment, mistakes will happen.
Especially in an environment where content is being shared at lightning speed.
However, some of the worst Facebook mistakes are the ones that often go unnoticed. They’re the missed opportunities. The chance for increased engagement, interaction and shares.
While Facebook continues to change the rules, you must make the most of every opportunity. No matter if it’s missing content, a lack of strategy or an obsolete bio, mistakes are made and prospects lost.
So, what mistakes are you making and how can you fix them?
Here are some of the top Facebook mistakes small businesses make and what you should do instead.
1. Not Completing “About” Info
2. Posting Only One Type of Content
3. Not Using Facebook Insights
4. Cover Photo