Search what do you want in this blog!

Custom Search

Wednesday, October 13, 2010

Network security related business enterprises-stop gap measure to help you protect your network

Translate Request has too much data
Parameter name: request
Translate Request has too much data
Parameter name: request

Today's business networks consist of numerous remote access connections from employees and outsourcing firms. Too often, the inherent security risks arising from these connections outside the network are overlooked. Continuous improvements have been made that can enhance security in today's network infrastructure; taking particular focus on the users accessing the network externally and monitoring access end- points are critical for businesses to protect their digital assets.

Installing the correct software for the specific needs of your IT infrastructure is essential to having the best security protection possible. Many companies install "off the shelf" security software and assume they are protected. Unfortunately, that is not the case due to the nature of today's network threats. Threats are diverse in nature, including the usual spam, spyware, viruses, trojans, worms, and the occasional possibility that a hacker has targeted your servers.

The proper security solution for your organization will neutralize virtually all of these threats to your network. Too often, with only a software package installed, network administrators spend a lot of their time at the perimeter of the network defending its integrity by manually fending off attacks and then manually patching the security breach.

Paying network administrators to defend the integrity of your network is an expensive proposition - much more so than installing the proper security solution that your network requires. Network administrators have many other responsibilities that need their attention. Part of their job is to make your business operate more efficiently - they can't focus on this if they have to manually defend the network infrastructure all the time.

Another threat that must be considered is the threat occurring from within the perimeter, in other words, an employee. Sensitive proprietary information is most often stolen by someone on the payroll. A proper network security solution must guard against these kinds of attacks also. Network administrators definitely have their role in this area by creating security policies and strictly enforcing them.

A smart strategy to give your network the protection it needs against the various security threats is a layered security approach. Layered security is a customized approach to your network's specific requirements utilizing both hardware and software solutions. Once the hardware and software is working simultaneously to protect your company, both are able to instantaneously update their capabilities to handle the latest in security threats.

Security software can be configured to update multiple times a day if the need be; hardware updates usually consist of firmware upgrades and an update wizard much like that present within the software application.

All-in-one Security Suites A multi-pronged strategy should be implemented to combat the multiple sources of security threats in today's corporate networks. Too often, the sources of these threats are overlapping with Trojans arriving in spam or spyware hidden within a software installation. Combating these threats requires the use of firewalls, anti-spyware, malware and anti-spam protection.

Recently, the trend in the software industry has been to combine these previously separate security applications into an all-encompassing security suite. Security applications standard on corporate networks are integrating into security suites that focus on a common goal. These security suites contain antivirus, anti-spyware, anti-spam, and firewall protection all packaged together in one application. Searching out the best stand-alone applications in each security risk category is still an option, but no longer a necessity.

The all-in-one security suite will save a company money in reduced software purchasing costs and time with the ease of integrated management of the various threat sources.

Trusted Platform Module (TPM) A TPM is a standard developed by the Trusted Computing Group defining hardware specifications that generate encryption keys. TPM chips not only guard against intrusion attempts and software attacks but also physical theft of the device containing the chip. TPM chips work as a compliment to user authentication to enhance the authentication process.

Authentication describes all processes involved in determining whether a user granted access to the corporate network is, in fact, who that user claims to be. Authentication is most often granted through use of a password, but other techniques involve biometrics that uniquely identify a user by identifying a unique trait no other person has such as a fingerprint or characteristics of the eye cornea.

Today, TPM chips are often integrated into standard desktop and laptop motherboards. Intel began integrating TPM chips into its motherboards in 2003, as did other motherboard manufactures. Whether or not a motherboard has this chip will be contained within the specifications of that motherboard.

These chips encrypt data on the local level, providing enhanced security at a remote location such as the WiFi hotspot full of innocent looking computer-users who may be bored hackers with malicious intent. Microsoft's Ultimate and Enterprise versions of the Vista Operating System utilize this technology within the BitLocker Drive Encryption feature.

While Vista does provide support for TPM technology, the chips are not dependent upon any platform to function.

TPM has the same functionality on Linux as it does within the Windows operating system. There are even specifications from Trusted Computing Group for mobile devices such as PDAs and cell phones.

To use TPM enhanced security, network users only need to download the security policy to their desktop machine and run a setup wizard that will create a set of encryption keys for that computer. Following these simple steps significantly improves security for the remote computer user.

Admission Based on User Identity Establishing a user's identity depends upon successfully passing the authentication processes. As previously mentioned user authentication can involve much more than a user name and password. Besides the emerging biometrics technology for user authentication, smart cards and security tokens are another method that enhances the user name/password authentication process.

The use of smart cards or security tokens adds a hardware layer requirement to the authentication process. This creates a two-tier security requirement, one a secret password and the other a hardware requirement that the secure system must recognize before granting access.

Tokens and smart cards operate in essentially the same fashion but have a different appearance. Tokens take on the appearance of a flash drive and connection through a USB port while smart cards require special hardware, a smart card reader, that connects to the desktop or laptop computer. Smart cards often take on the appearance of an identification badge and may contain a photo of the employee.

However authentication is verified, once this happens a user should be granted access through a secure virtual network (VLAN) connection. A VLAN establishes connections to the remote user as if that person was a part of the internal network and allows for all VLAN users to be grouped together within distinct security policies.

Remote users connecting through a VLAN should only have access to essential network resources and how those resources can be copied or modified should be carefully monitored.

Specifications established by the Institute of Electrical and Electronics Engineers (IEEE) have resulted in what is known as the secure VLAN (S-VLAN) architecture. Also commonly referred to as tag-based VLAN, the standard is known as 802.1q. It enhances VLAN security by adding an extra tag within media access control (MAC) addresses that identify network adapter hardware within a network. This method will prevent unidentified MAC addresses from accessing the network.

Network Segmentation This concept, working hand-in-hand with VLAN connections, determines what resources a user can access remotely using policy enforcement points (PEPs) to enforce the security policy throughout the network segments. Furthermore, the VLAN, or S-VLAN, can be treated as a separate segment with its own PEP requirements.

PEP works with a user's authentication to enforce the network security policy. All users connecting to the network must be guaranteed by the PEP that they meet the security policy requirements contained within the PEP. The PEP determines what network resources a user can access, and how these resources can be modified.

The PEP for VLAN connections should be enhanced from what the same user can do with the resources internally. This can be accomplished through network segmentation simply be defining the VLAN connections as a separate segment and enforcing a uniform security policy across that segment. Defining a policy in this manner can also define what internal network segments the client can access from a remote location.

Keeping VLAN connections as a separate segment also isolates security breaches to that segment if one were to occur. This keeps the security breach from spreading throughout the corporate network. Enhancing network security even further, a VLAN segment could be handled by it's own virtualized environment, thus isolating all remote connections within the corporate network.

Centralized Security Policy Management Technology hardware and software targeting the different facets of security threats create multiple software platforms that all must be separately managed. If done incorrectly, this can create a daunting task for network administration and can increase staffing costs due to the increased time requirements to manage the technologies (whether they be hardware and/or software).

Integrated security software suites centralize the security policy by combining all security threat attacks into one application, thus requiring only one management console for administration purposes.

Depending on the type of business you're in a security policy should be used corporate-wide that is all-encompassing for the entire network. Administrators and management can define the security policy separately, but one overriding definition of the policy needs to be maintained so that it is uniform across the corporate network. This ensures there are no other security procedures working against the centralized policy and limiting what the policy was defined to implement.

Not only does a centralized security policy become easier to manage, but it also reduces strain on network resources. Multiple security policies defined by different applications focusing on one security threat can aggregately hog much more bandwidth than a centralized security policy contained within an all-encompassing security suite. With all the threats coming from the Web, ease of management and application is essential to maintaining any corporate security policy.

Frequently asked Questions:

1. I trust my employees. Why should I enhance network security?

Even the most trusted employees can pose a risk of a network security breach. It is important that employees follow established company security standards. Enhancing security will guard against lapsing employees and the occasional disgruntled employee seeking to cause damage to the network.

2. Do these innovations really create a secure environment for remote access?

Yes they do. These enhancements not only greatly enhance a secure VLAN connection but they also use widely accepted standards that are often integrated into common hardware and software. It's there, your company only needs to start using the technology.

3. My company is happy with using separate software, that way each application can focus on a separate security threat. Why should I consider an all-in-one security suite?

Many of the popular software applications commonly used by businesses have expanded their focus to identify all security threats. This includes solutions from both software and hardware appliance technology manufacturers. Many of these firms saw the need to consolidate security early on and purchased smaller software firms to gain that knowledge their firm was lacking. A security suite at the application level, will make management much easier and your IT staff will thank you for it.

4. Do I need to add a hardware requirement to the authentication process?

Requiring the use of security tokens or smart cards should be considered for employees accessing the company network from a remote site. Particularly if that employee needs to access sensitive company information while on the road, a simple flash drive secure token prevents a thief from accessing that sensitive data on a stolen laptop.

5. With all this concern about WiFi hotspots should employees be required not to use these locations to connect to the company network?

WiFi hotspots have sprung up nationwide and present the easiest method for your remote employees to access the Internet. Unfortunately, hotspots can also be full of bored, unemployed hackers who have nothing better to do than find a way to intercept a busy employee's transmissions at the next table. That's not to say employees on the road should avoid hotspots. That would severely limit them from accessing the network at all. With technologies like S-VLAN and secure authentication in place, a business can implement technologies to reduce threats both now and in the future.

Implementing the latest network security technologies is a high priority for IT Management. In today's network environment with many users accessing your digital assets remotely, it's critical to get your network security correct during the planning phase of the integration process.

Obviously, it should be noted that most large companies have multiple operating systems running (Windows, Mac O/S, etc) and that for many of these companies all-in-one security suites face certain challenges in a mixed operating system environment.

That is why I stress that you consider having layered security (both hardware and software) and don't simply rely on software applications to protect your digital assets. As technology changes so do the opportunities for security breaches.

As these security threats become more sophisticated, hardware and software developers will continue to innovate and it's essential businesses keep up with, and implement these technologies.







Read More......

Monetizing social networks

Translate Request has too much data
Parameter name: request
Translate Request has too much data
Parameter name: request

Social Networks are the key to viral grow and monetization of your business on the Web. To understand why, it is important we understand the work of David Reed. Reed's Law in its simplest terms, states that the value of large networks, particularly social networks, can actually scale exponentially with the size of the network. The justification for this claim resonates with the large number of possible sub-groups among the network. As network benefits grow based on the combinations of these sub-groups and the total number of many-to-many possible connections, we move beyond the one-to-one possibilities contemplated in Metcalf's Law, thus the value of the network increases as does the growth in the networks second derivative. For those of you not versed in Calculus, the first derivative is the rate of change; the second derivative is the rate of change of the rate of change. The second derivative is key to understanding how our monetization efforts are progressing, it provides us a benchmark. When a network is reaching a point of diminishing returns (the point at which the second derivative slows) it is an early indicator that problems are on the horizon. Very little has been written on this topic, but I can assure you that a company's ability to monetize any particular network or sub-component of a network is directly proportional to the applicable underlining second derivative.

Suppose your firm's revenue model is based on advertising and on average, you made a penny a click in the early years, but as your network reached critical mass you were able to drive your revenue incrementally to .05 cents a click. As your network's second derivative slows and reaches an inflection point (the point in which the second derivative turns negative), It is clear your average revenue per click will trend back down toward the .01 cent level as you experience the pain of the Negative Network Effect. In order to continue to increase the value of your network, you must find new ways to monetize your network, reigniting the positive network effect. So how do we design a business model that maximizes the network effect? Let's take a look at the process.

Monetizing Network Effects on the Web ideally requires a dynamic Web 2.0 business model with multiple revenue streams, significant growth potential, and the strong balance of revenue, expense, and capital outlay. In order to maximize your Return on Investment (ROI), you must understand the interdependencies of revenues, costs, and capital investment on your Network Model. First, let's examine some of the most common Web 2.0 revenue models.

Advertising based - Perhaps the most successful and popular business model. Well know companies like Google and Yahoo give away search and sell a wide variety of advertising options to monetize their networks.

Subscription based - Very successful model where users pay a fixed fee at regular intervals. Fees can vary by type of account such as basic or premium service level or by options such as advertising or no advertising, etc.

Syndication or Licensing - A growing model as technologies such as RSS feeds (Real Simple Syndication) and content distributors grow. The user typical pays a fee to use or resell the product. The fee charged is often driven by the type of user, i.e. non-profit, business, individual, etc.

Unit based - The user simply pays a unit price for your product or services. If you buy a book or CD on Amazon, you are making a unit based purchase.

Transaction fee -This model has the user pay a fixed fee per transaction or a percentage of the sale. If you selling anything on Amazon or eBay, you will pay a percentage transaction fee based on the sales price.

Revenue Share - A popular model when distributing items requiring large inventories like DVDs, CDs, etc. In this model, the distributor may pay the content originator a small upfront fee and then share a percentage of the actual product sales. This model helps keep the initial acquisition costs low and allows time for your network to develop and reach critical mass.

Cross-network - A new and innovative model that involves strategies such as freemiums and n-sided networks. Freemium is a term that was coined by the combining of the words Free and Premium. The idea is to give something away and acquire a lot of clients or users, then offer premium value added services to monetize this base. The concept has been used extremely effectively by firms such as Adobe, Flickr, LoopNet, MySpace, and many others. Cross-network strategies simply target complimentary but different user bases. The classic example is the demand for gaming software titles when new gaming hardware platforms are released.

Now that we know how we can generate our revenues, we must understand our Critical Cost Drivers (CCD) and how these CCD will respond as our network expands. For each cost driver, we must understand the nature of the cost- is the cost fixed, semi-fixed, variable, one-time, or recurring in nature. This understanding allows us to construct a Cost of Support (CoS) model. The CoS model identifies the relationship of each of our costs to a base unit of revenue growth in relation to a fixed, but sliding network point. The fixed network point continuously moves as your revenues move along a J-curve or similar benchmark. The J-curve is typically most appropriate as businesses initially start to spend significant money on personnel, infrastructure, inventory, systems, and marketing during the start up phase. As your network starts to grow, revenues expand in relation to costs and the curve starts to decline at a slower pace, then flatten, and eventually start to climb. Understanding these interrelationships will assist you in maximizing your networks ROI.

Once we have identified our sources of revenues, our cost, and the relationships of our underlying costs to those revenues, we must model the appropriate J-curve to ensure our CoS model is accurate. In order to do this, we start by taking a look at our revenue positioning strategy. The typical strategies include one or more of the following:

o Loss Leader - Your network utilizes multiple streams of income that individually are not all profitable, but the losers drive traffic and subsequent purchases of other profitable products and services.

o Single Product or Service - Your network relies on a single revenue stream derived by one product or service.

o Multiple Product or Service - Your network receives multiple revenues from at least two products or services.

o Interdependent Product or Service - Your network promotes one set of products or services to drive demand from another set of products or services.

Your revenue positioning strategy will dictate your anticipated timing of revenues and thus the necessary underling CoS structure. Armed with this knowledge, we can adjust our modeling based on our revenue tracking metrics. These metrics may be things like average revenue per search query, average revenue per page view, average revenue per subscriber, or some similar metric. I have simplified this for ease of communication, but in actual application, we must use complex algorithms to differentiate the "life-time" value of different types of network participants, users, or customers. These calculations are based on the relationships between the numbers and type of network members and their interaction as frequent contributors, active members, influencers, etc., it stands to reason for instance, that an active blogger offers significantly more life-time value than an inactive member. Also, a particular user's distance from an already established high life-time value user can significantly impact the value of that individual user. When I am referring to distance from one user to another, I am really talking about degrees of separation. In the late1960s, Stanley Milgram investigate what became coined "small world phenomenon." He conducted an experiment were he attempted to find connections or links between people by asked random individuals in Nebraska to deliver letters to particular individuals in Massachusetts. The basic rules were to give the letter to someone you knew who in return would give it to someone they knew and so on and so on with the objective being to get the letter delivered with the fewest connections.

Through numerous tests, Milgram found that, on average, it took five or six connections to get each letter delivered. This study provided the basis of the theory of "six degrees of separation." In the past, the initiator likely would not know anyone past the first or second connection, but with our online connections, we literally can jump the network and direct connect to the targeted party, via our existing network relationship. Analyzing and understanding these relationships and degrees or distance from our highest life-time valued is critical to maximizing the monetization of your network. As you can see, the monetization of networks is a complex task, part science, part art, part trial and error. However, by applying these fundamental strategies to your business, you greatly increase the odds of maximizing your network ROI.







Read More......

Social networking-can assist your company going?

Translate Request has too much data
Parameter name: request
Translate Request has too much data
Parameter name: request

Twitter. Facebook. YouTube. If I said these words to you years ago you would have looked at me like I was crazy! The aforementioned are websites used to fuel the social networking phenomenon. In case you are not aware of how social networking sites function, people use these sites to form associations with others that share the same personal or professional interests. Millions of people are using these sites to keep in touch with their families and friends.

Now companies are jumping on the bandwagon and incorporating social networking sites into their marketing campaigns. Although, social networking is relatively new, it is gaining status as a new way for companies to effectively market their products and services because of the following:  


  Interactive
  Cost effective
  Ability to market 24/7

Interactive

The main purpose of a marketing campaign is to promote your product or service to your target market. What better way to reach your target market than on their own turf? Years ago the typical marketing campaign would have consisted of direct mail, print advertising, and if you could afford it TV or radio ads. One thing all of the aforementioned mediums fail to do is to encourage participation.

Social networking sites enable you to instantaneously connect with your target market and receive feedback regarding your product and service. Regardless of what social networking site your company decides to join, all of them will enable you to foster a closer relationship with your customers-the degree in which this is accomplished rests solely upon your company. Consumers are already doing what they intended to do on these-connect with family and friends-you (companies) are the new kid on the block so it is up to you how you want others to perceive your brand.

An organization's objectives for how to incorporate social networking into their marketing campaigns often differ.   For example, Beth Bridges, Membership Director of Clovis Chamber of Commerce states that, "Our objective in using social networking is to create a trusted community and to increase awareness of their events within the community. We also use social networking sites to have more personal interaction with members who we might not see at regular networking activities and reach more of the younger business owners in the community who are using social media much more extensively to promote themselves and their businesses." 

It is a safe bet that the majority of companies that are new to social networking may be tempted to mention their product every five minutes on these sites-it is in your best interest not to do so. I realize that many organizations's main objective for using social networking sites is to promote their product. I am not telling you to abandon your objective-just alter the method in how you choose to do so.

People use products and services for different reasons and you will never know any of them if you do not take the time to foster a relationship with your target market. Many have been conditioned into thinking that companies could care less about their customers so it is up to your company to prove them wrong. Those who successfully do will reap the benefit of loyal customers. These customers will then share your product or service with their family and friends. It is more effective if you let your target market promote your product for you.

Word of mouth continues to be an important factor in whether consumers and businesses purchase a product or service. Many people consult with family and friends before purchasing a product or service they have never used. People are always asking others for advice on products and services on Twitter. Not too long ago, I went on Twitter to get feedback on software I was considering purchasing and got a response within seconds. This person not only commented about the software I was considering purchasing but recommended alternative software that was cheaper and more robust. Everyone desires to feel confident about the purchases that they make and although they may conduct some research of a product or service (i.e. Consumer Reports) it does not carry as much weight as family or friends.

Cultivating a relationship will enable you to stay ahead of the competition-provided you are listening to your target market. Social networking sites allow you the ability to gauge if you are effectively promoting your product or service to your target market. Based upon conversations in the forums you have the ability to find out what needs are not being met and create a service to meet that need. Social networking enables you to discover opportunities.

For example, you own a coffee shop near a college campus and have established an account on a social networking site. Students are complaining about not having a place to study during final exams and how they love your coffee because it not only tastes great, but helps them stay awake. How could you use this information? A savvy marketer would find out when final exams take place and expand their hours in order to meet the needs of their customers. It is a win-win situation for all involved. The students have a place to study while drinking your excellent coffee and you have the opportunity to increase your profits while further developing your customers' loyalty to your coffee shop. This opportunity was brought to you by social networking. If your company had not taken the time to interact with your target market using social networking sites your company would have missed out on a golden opportunity to fulfill a need not being met by other coffee shops.

Armed with the knowledge of who you are trying to target, you will be able to determine which of the most popular social networking sites your target market will be found chatting with their family and friends. Although all social networking sites enable you to be interactive, the degree to which you are able to do so is based upon the application you choose. Some of the most popular sites companies are using to advertise their product are as follows:

-Twitter: This is an online micro blog website that integrates with your computer, cell phone and other online social networking sites. Twitter simply asks you, "What are you doing?" You are able to share your thoughts (also known as "tweets") provided they are under 140 character restriction. People can choose to "follow" you based upon your tweets.

-Facebook: This website allows users to create customized profiles sharing information, photos, videos etc. and has applications that are designed specifically to their site. Facebook users can see only the profiles of confirmed friends and the people in their networks. Friends can look at each others pages and comment on their "wall" (this is a spot where comments can be viewed by others.

-MySpace: This website allows you to stay in touch with friends and meet new people. You have the ability to add new friends based upon the information posted on your space.

-YouTube: A popular site that allows users to upload and store videos to be shared for private or public viewing.

-Brazen Careerist: An online site comprised of Generation-Y (ages18 to 30) that displays blogs written by the community that generates thought provoking discussions.

All of the aforementioned sites will enable you to interact with your target market. Some companies make the mistake of becoming apart of as many social networking sites as possible. As with all things in life-quality will always win out over quantity. Meaning, it is better to invest your time building your relationship with your target market on fewer social networking sites if it means that you are able to truly listen to what is being said and share your industry expertise with those on the site. Joining numerous social networking communities and contributing nothing to them will leave people with the impression that your only there to promote your name and could care less about getting to know them-an impression no business can afford to leave.

Cost effective

Companies are always looking to save money and often zero in on marketing expenses (which is the wrong move to make, but that's another article!). Social networking can be implemented into your organization's marketing campaign because it is free. There is absolutely no reason why companies should not be incorporating social networking into their campaigns. The only investment required from companies is their time. After all if you are not willing to learn more about your target market and how using your product or service benefits them-then why should they (your target market) buy your brand?

Social networking sites save time and are cost effective for both companies and their customers. Companies can use social networking sites to gain instantaneous feedback regarding product launches. You can gauge the success of your launch based upon the comments you see shared online. Some companies are even starting to handle their customer complaints on social networking sites. This is a great medium to handle your complaints. People want their issues resolved accurately and quickly-what better way to do so than on their terms? Your customers are more at ease because they are doing something they already enjoy networking with those who share similar interests, family, friends, etc. It is more expensive for companies to attract customers than to retain them, so it is imperative that companies maintain a delicate balance.

Twitter is one of the most popular social networking sites for businesses. Zappos, the world's largest online shoe retailer, is an excellent example of how companies should use social networking sites. Zappos is constantly being recognized for providing quality customer service. Tony Hsieh, CEO of Zappos, along with his employees use Twitter to interact with customers, handle service issues and monitoring comments being made about their company. Comcast and Dell also have customer service people on Twitter who search for and address complaints online. Companies are always searching for fast, accurate, and cost effective methods used to monitor their brand and social networking sites enable you to accomplish these goals.

Ability to market 24/7

In today's fast paced world there are many people who do not log online during "normal" business hours. In fact, many times people log on these sites during unconventional business hours to connect with family and friends (i.e. friends and family overseas). Social networking sites enable you to continuously market your product or service even when you are not online. The time you have spent in cultivating your relationship with your target market will be evident. Companies who have built great relationships with their customers can rest assure that their customers will continue to "spread the word" about your product or service when your not online.

The aforementioned reasons demonstrate why social networking is an effective marketing technique. Some companies feel that social networking is even more effective than "traditional" marketing techniques (i.e. print advertising, direct mail, etc.).  Holly Homer, Founder and Editor of BurbMom.net which is a website for moms in the North Dallas/Fort Worth area rely solely on social networking sites. "We started out with an advertising budget of zero.  I wanted to see how far we could get by just doing free things. Our website has been online for 3 months and last month we had over 4800 hits-over 60% of those were local.  One hundred local moms have joined our online social network.  We have not spent a dime on advertising. I really don't think we could have accomplished this much in this short of time through traditional advertising with money."

Bridges said, "Social networking is absolutely more effective in reaching people who are using social media than the traditional tools-they are going to pay more attention to a message, email, or posting from you if you have established a relationship with them. By following you (or linking to you, joining your group, etc.) they are asking you to keep them informed, unlike a random postcard mailing or newspaper ad."

Companies cannot afford to dismiss social networking just because it is a relatively new marketing technique. Companies that do not engage in social networking are missing out on opportunities to interact with their customers while simultaneously saving money. Social networking requires your organization's time and energy to cultivate relationships with your target market that will go along way in fostering loyalty to your brand. In today's economy, social networking is the one investment you can expect to see a return.







Read More......

Tuesday, October 12, 2010

ISO network management Model

Error in deserializing body of reply message for operation 'Translate'. The maximum string content length quota (8192) has been exceeded while reading XML data. This quota may be increased by changing the MaxStringContentLength property on the XmlDictionaryReaderQuotas object used when creating the XML reader. Line 1, position 9499.
Error in deserializing body of reply message for operation 'Translate'. The maximum string content length quota (8192) has been exceeded while reading XML data. This quota may be increased by changing the MaxStringContentLength property on the XmlDictionaryReaderQuotas object used when creating the XML reader. Line 2, position 12583.

The rumor on how Disney uses Network Management. When the temperature rises on the park grounds at Disneyland all the prices of the beverage vending machines automatically goes up by 10% to fully capitalize on consumer demand. I believe that is an old Information Technology rumor to explain how network management works... at least I hope it is a rumor.

Why Network Management is important.

More and more organizations depend on their networks. Business' the depend heavily on the status of their networks must have network management tools as they grow. If a network dependent business such as ebay, Google, Yahoo and many others go down for even a few minutes, they can loose literally hundreds of thousands of dollars in sales and even a small piece of their customer's confidence which could in turn affect the value of their stock. When every second of network time counts the system must be monitored continuously. The most cost effective way to do this is to use an automated network management tool.

Network Management Standards

The International Organization for Standards (ISO) addresses the five major functional area of the Network Management Model as performance management, accounting management, configuration management, fault management and security management.

Performance Management

Performance management is monitoring, assessing, and adjusting the available bandwidth and network resource usage in order make a network run more efficiently. Performance management is a very important part of the network management model particularly to the business and/or organization that wants to streamline their network's performance. SolarWinds is a great tool for performance management.

Accounting Management

Accounting management monitors and assesses the usage of data and/or resources for the purpose of billing. This aspect of the network management is by Internet Service Providers to bill customers for the resources they use.

Configuration Management

The configuration side of network management is for tracking the hardware and software versions on the network to identify their effects on the network's operation. An example of this is Microsoft's System Management Server (SMS) which has the capability to monitor, manage and track every piece of software and hardware on a given network.

Fault Management

Fault Management is what most people think of when they think of network management. The purpose of this area of network management is to detect, log and alert the system administrators of problems that might effect the systems operations.

Security Management

Security Management deals with controlling access to resources and even alerting the proper authorities when certain resources are accessed. In the same way that a network manager can be paged or emailed when a resource goes down, network management systems can be used to send messages when certain files, servers or routers is accesses. Intrusion detection systems such as Symantec's Intruder Alert have this security management capability.

There are many products that support some or even all of these areas of network management. What most network management systems have in common is their use of protocols such as Simple Network Management Protocols (SNMP), SNMPv3, and Common Management Information Protocol (CMIP). There are a variety of Network Management tools ranging from Intuit's Network Management Software to IBM's Tivoli, Fidelia's Helix to AdventNet. Maybe your network management solution does not include a system that increases vending machine prices as the heat rises, but you can definitely find what you need among these and other excellent tools on the market.

References:

Cisco. Network Management Basics. Cisco.com. Feb 2002

http://www.cisco.com/

RFC 1157. Simple Network Management Protocol.

http://www.faqs.org/rfcs/rfc1157.html

Wikipedia. Network Management. Wikipedia.org.

http://en.wikipedia.org/wiki/Network_management

ITPRC. Network Management. Itprc.com

http://www.itprc.com/nms.htm







Read More......

Why most financial professionals just don't get it when it comes to social networking

Translate Request has too much data
Parameter name: request
Translate Request has too much data
Parameter name: request

Four Key Reasons Most Financial Professionals Don't "Get It" When It Comes To Social Networking

Most of the Financial Professionals I have talked to seem to be saying the same thing: "I really don't get this social networking thing". Well if you don't get it, my strong suggestion is...YOU BETTER GET IT!

Why? Because there are two things we know to be true:

1. PEOPLE TALK

2. WE KNOW EXACTLY WHERE THEY ARE TALKING THESE DAYS

All you have to do is take a look at these eye-opening growth statistics and you can clearly see why this new opportunity for your business simply cannot be overlooked or ignored:


Facebook has over 300 Million users, and about 600,000 join every day

50% of Facebook users are online every single day
The two fastest growing segments are people ages 35 to 55 and women ages 50 and older

LinkedIn, MySpace, and Twitter have over 150 Million users
Twitter's growth rate is currently over 750%

IT JUST MAKES SENSE:

If you take a look at the business relationships you treasure the most, they mainly consist of your family, friends, loved ones, co-workers and many other people who directly or indirectly support the growth of your business. The truth is that one of the key ingredients to a successful business is the ability to build and maintain high-quality, meaningful, and credible relationships with their clients and within their community. I'm sure this sounds familiar, because THIS IS THE ESSENCE OF SOCIAL NETWORKING!

WHAT'S IN IT FOR YOU AND YOUR BUSINESS?

If used properly, social networking becomes an excellent supplemental marketing strategy, serving as the perfect complement to your existing business plan. The reason why is because it is an extremely low-cost way to expose yourself and your business to the most popular places on the Internet, which directly connects you to the various communities, organizations, and groups that you care about.

From what I can conclude, there are essentially five key benefits:

1. Increase your business exposure and visibility

2. Improve your reputation and credibility

3. Increase brand identity and recognition

4. Enhance awareness of your products or services

5. Provide the opportunity to build a network of people and see this network exponentially growth...because PEOPLE TALK are constantly hearing from and talking about YOU

NOW FOR THE BAD NEWS:

Many studies, including ones in which I have personally conducted, prove that most financial professionals simply don't have what they need to be truly successful in Social Networking, and I have broken all of these details that should hopefully help each of us:

FOUR KEY REASONS MOST FINANCIAL PROFESSIONALS MAY NEVER REALLY "GET IT"

1. DESIRE:


Most financial professionals enjoy doing key things in their spare time that they are passionate about, such as their careers, hobbies, family, faith, sports, traveling, or whatever makes them genuinely happy.
Surveys show that Social Networking is at the bottom of this list of passions.
Most professionals today lack the time, skills, and most importantly, the inclination (or that "burning desire") to build, cultivate, and maintain a successful social network...particularly on an ongoing basis. In other words, this is not something most financial professionals "choose to do", but rather they feel like the "have to do it".
Every Social Network expert will tell you that success is largely driven in social networking through your ability to constantly offer new, valuable, and useful information and ideas. In fact, this is by far, their biggest challenge in working with their clients, since most don't have enough content and materials to continuously educate your social networks.
The reality is that most financial professionals are not gifted or skilled writers or editors, not only for their own industry, but particularly in designing pieces that fit well within the guidelines and purposes of social networks
Also, most financial professionals are not familiar with exactly what to write about, what topics to write about, how often to write about new topics, and how often to submit this information to these networks.
2. TECHNOLOGY:


Studies prove that most professionals who are 40 years old or older are at a big disadvantage, mainly because we didn't grow up in the "computer era". Therefore, we were never afforded the luxury of growing up in their early years to capitalize on the advent of the Internet and the every-growing capabilities of computers and technology.
The reason this makes this particularly challenging for most financial professionals is because most social experts will tell you Social Networking requires at least 10-15 hours of work each week, along with the aforementioned high level of computer and Internet skills.
Purchasing and maintaining all of this technology and computer equipment can be very expensive, as it almost always includes things like training, software, security, database backup, tech support, etc.
There is a never-ending need and requirement to ensure you are constantly staying updated on the newest and most innovative state-of-the-art technologies, which can also add to additional time, expenses, and training.
These social networks are growing exponentially in size and complexity. In fact, today there are over 70 Social Networking websites. This poses two big challenges:
1. It makes it much more difficult to keep up with all of the latest technologies associated with each social network, like blogging, tweeting, uploading, scanning, managing databases, navigating software, keyword tagging, search engine optimization, filtering spam and viruses, and much more.

2. It becomes vitally important that you know which of these Social Networks are worthwhile for you and your business, and which ones are not a good fit. This is an extremely important, and yet often overlooked, point about the number of social networks you belong to.


Many financial professional think they need to be involved in "as many of these networks as possible so they can get the most exposure" when it fact, the reality is the most important focus should be on the quality of these social networks...and NOT the quantity"!
3. INTEGRATION:


If you can believe this, even though most of us have heard of Facebook, Twitter, LinkedIn, and maybe a few others, there are approximately 70 different Social Networking websites today...and growing by leaps and bounds!
The good news is that this has brought about many new strategies and cutting-edge technologies that are specifically designed to help integrate and coordinate these social networks...which essentially allows them all to be able to "talk to each other", and share information. This is being made available because it helps to minimize your efforts to send a message out to multiple networks, and also attempts to eliminate mass-duplication of content.
The bad news is that, with the exception of a tiny minority, most financial professionals are simply not interested (or capable) of investing the time, training, resources, to keep pace with all these new tools.
The other harsh reality is that most financial professionals simply don't have the time, desire, and/or the quick and easy access to keep up with all of these new tools that can help them coordinate their efforts among this wide range of social networks.
One thing we know for sure is that one of the most critical ingredients to Social Networking success is making sure each of your multiple networks are working in harmony together, saying the same message at the same time. Given the current and future levels of growth in these networks and technology, this dramatically decreases the probability that financial professionals are likely to create the best possible results from these social networks unless they are all simultaneously working together.
4. TIME


The truth is Financial Professionals are not any different from other professionals. They too have a huge struggle to find that "perfect" balance between their everyday life events such as their career, marriage, friends, social events, kids and their multiple events, health and fitness, hobbies, sports, email, etc.
Today's difficult economic environment has clearly played a big factor in making it even more challenging for Financial Professionals to find that "proper" balance in our lives between family, work, and other "life events". These restrictions even further limit our ability to set aside a few hours each day to work on these social networks.
The harsh reality is that Social Networking requires a serious and dedicated effort and many hours of your personal time every day as a result of these sophisticated networks, technologies, and constant communication with a large number of changing people.
Among some of the extremely time-consuming Social Networking tasks are: regularly writing emails/blogs/tweets/updates, constantly creating target marketing campaigns, joining a large number of groups and networks, contributing regular and valuable information to these groups and networks, learning how to adapt to unique groups of people, regularly researching and provide new and current content, closely monitoring and managing an increasing group of friends or followers, working in harmony with the many different social networks, keeping up-to-date with the newest and most innovative technologies, etc.
IS EVERY FINANCIAL PROFESSIONAL DOOMED FOR SOCIAL NETWORKING FAILURE?

Of course not! However, unless you are one of the rare few financial professionals with an extensive background in technology, a vast array, access, and the ability to keep updated with the newest and most innovative technology tools and resources, an extensive understanding of all these 70+ social networks, and which one is right for you, a large amount of free time, and a burning passion to become a social networking expert, your best bet is to choose one of two routes:

1. Set your expectations low, work at often as you can, and just have fun.

2. An alternative is to seek the help of the wide array of social networking companies who can help do the large majority of this for you. This frees up much of your time, gives you the ability to maximize your results and efficiencies, and can also dramatically expand your social network and business opportunities.

MY PERSONAL SOCIAL NETWORKING STORY:

I decided to take advantage of the second option above. I hired a professional company who does this for a small monthly fee. Like many of you, I am busy and cheap, so my focus was on paying a small monthly cost, having NO long-term commitment, and having almost all of the work done for me. And so far, I have been extremely pleased with the professional support and progress I have made!

Granted I've only been doing this for about two months now, but if you look at the number of connections I have made, the people I have been introduced to or connected with, and the people that have contacted me, it is truly amazing. Other benefits include joining multiple networks of people and groups, "branding" my name/firm/products/services, and also developing partnerships and relationships that are extremely valuable.

HOW DID I FIND THE "RIGHT" PROFESSIONAL HELP?

I performed extensive research on what types of professional Social Networking Companies are out there today, and who are among the industry leaders. I looked at everything including cost, contractual commitments, what would be required on my part, and what could I expect. I finally chose a company when I saw an impressive interview with their President on Fox News who worked as a Business Coach and Social Media Specialist for major celebrities and corporations for over 25 years..

I strongly suggest if you decide to seek professional help that, like I was, you do some extensive research on your own. With the geometric growth potentials that lie ahead in this great new business opportunity, this is an extremely important decision. Or, in an effort to save you valuable time, I am happy to provide each of you the findings of my results, the company I am currently using, as well as several companies I would also suggest you look into, and which I feel comfortable recommending. So by all means, please don't hesitate to call or email me if I can help in any way.

I hope I was able to help you see why most Financial Professionals not only "don't get it", but even if they think they do, it is very unlikely they are "getting the most out of it". And if you go back and reread everything I talked about above, it should be very easy to understand why most financial professionals are simply not cut out for this kind of stuff...for a wide variety of reasons.

I can honestly tell you that for me personally, this whole Social Networking world has opened my eyes to a new way of growing my business that has extended far beyond my wildest dreams. And the truth is, just a few months ago I really "didn't get it" at all.

So the morale of the story is this; most financial professionals are just like me. They don't really "get" how social networking TRULY works, they probably never will, and their best bet is to work with a professional. As the saying goes, you get what you pay for.







Read More......

Top 10 affiliate and CPA network

Translate Request has too much data
Parameter name: request
Translate Request has too much data
Parameter name: request

Affiliate Networks are a great way for website owners and content producers to monetize their work with related products and services. With literally hundreds of affiliate networks in existence, it can be an arduous task to stay in the loop about the network options with their respective pros and cons. We've picked our favorite 22 affiliate networks; included in this list is a little something for everyone. From the beginner affiliate marketer to the Fortune 500 company, these affiliate networks have the tools, campaigns, and integrity that other networks continue to strive for. Here they are, in alphabetical order:  

Affiliate.com 

Affiliate.com is a Media Breakaway, LLC company who has been involved in the affiliate marketing arena since 2001. With value added services that include domain registration, email list management, and website hosting, Affiliate.com has proven they are one of the leading affiliate networks. Affiliates are paid on a net 15 basis, and advertisers can place offers on their network with no setup fees. Affiliate.com's blog is the place to check out their new offers and company announcements. Their website home page lists all of their social network profiles so potential affiliates and advertisers can follow them too.

Buy.at

Buy.at has been a pioneer in affiliate marketing since 2002 when it was launched by Perfiliate Technologies. They were then acquired by AOL in 2008 and have become part of the Platform-A department of AOL, and are a business unit of AOL's Advertising.com. Buy.at is the second largest affiliate in the UK, and has been aggressively expanding their offerings into the U.S. Buy.at has many well known advertisers including Ticketmaster, The New York Times Store, Discount Tire, Speedo, and TurboTax to name a few. Buy.at offers a customizable reporting dashboard to publishers, and pays affiliates monthly. Advertisers and affiliates alike enjoy the added level of transparency that Buy.at has become known for.

ClickBooth

ClickBooth is an industry award winning CPA network with many exclusive advertisers. With over 5 years experience in affiliate marketing, ClickBooth has become the premiere network for over 20,000 publishers and brands like Blockbuster, ADT, Dish Network, America Online, and VistaPrint. With a continuing effort to ensure the quality of affiliates and advertisers, ClickBooth has maintained a superior level of network compliance within their network. The ClickBooth Blog features even more info about the company, contests, and links to the major social sites so you can easily connect with them.

Commission Junction  

Commission Junction is one of the largest affiliate networks in the world, and they work with some power-house companies like Yahoo, Home Depot, HP, Apple Store, Dell, Staples, Buy.com, E Harmony, and Expedia. CJ has a pioneered many affiliate resources which have been adopted by many other networks. Among those resources is CJU, an area of the CJ website dedicated to educating CJ publishers about affiliate marketing's best practices. CJ was also one of the first affiliate networks to make public internal performance metrics (like EPCs or Earnings per Click) for both publishers and advertisers, enabling both groups to make better decisions about their campaigns.

CrispAds  

CrispAds is the affiliate network arm of Intela, a performance-based marketing company with offices in the U.S. and UK. They feature a "blog advertising network," which has allowed bloggers to sign up and earn revenue in a format that is designed for bloggers. Some of CrispAds advertiser brands include Visa, DirectBuy, Gerber, and Toyota. Their blog is the best way to stay current on new campaigns and special announcements.

CX Digital Media  

CX Digital Media, formerly IncentaClick, is an affiliate network based out of Toronto, Canada. CX Digital Media works with advertisers like Netflix, DirectTV, U.S. Army, FreeCreditReport.com, and FlyCell. The blog has details about their current affiliate bonuses and promotions, as well as links to their social profile pages. CX Digital Media has an agency component designed to work with traditional advertising agencies for online media buys.

DirectAgents  

DirectAgents is an interactive marketing agency from New York specializing in affiliate and search marketing, lead generation, and media buying. Some of their high profile advertising clients include Experian, Scholastic, SnapFish, Terminix, and TruGreen. DirectAgents has been presented with numerous awards, including the Inc 5000 for fastest growing companies. The DirectAgents Blog is a very active affiliate blog, with posting occurring almost daily, and is the best source for media mentions and company events.

FluxAds  

FluxAds is a CPA network that takes a hands-on approach by matching up affiliates with offers that match the demographic of their audience. The FluxAds website even has a live web cam where visitors to the website gain a visual insight into the daily activities of the FluxAds team. Their blog is full of quick tips, conference reminders, and has the links to their company's social profiles. They have been actively posting content on their blog since January 2009.

Google Affiliate Network

The Google Affiliate Network is a relatively new player on the scene but has quickly become one of the primary destinations for both advertisers and affiliates.It is one of the more strict networks for allowing publishers to sign up without the proper verification; they take a close look at publisher websites and promotion methods prior to account approval. The Google Affiliate Network hosts their blog on Blogspot. They frequently blog about new laws that affect affiliates and system maintenance schedules, and they have a section for GAN frequently asked questions.

Hydra  

Hydra Network is one of the most popular CPA networks and has won numerous awards including Inc 500 Fastest Growing (2007, 2008), and 2009 Internet Advertising Competition Award for Outstanding Achievement in Internet Advertising. Hydra features many exclusive campaigns that can only be found on their network, as well as offers that can be incentivized. Hydra's affiliate dashboard is very well laid out, making it easy to access reports, campaigns, and account settings.

LeadFlash

LeadFlash is a CPA network and is one of the largest players in the cash advance/payday loan vertical. More recently LeadFlash has moved into the home loan modification, debt, and automotive loan verticals as they continue to host some of the highest paying CPA offers on any network. The LeadFlash affiliate dashboard is one of the most simple and easy to use dashboards of any CPA network. Finding the category of offer to promote and integrating it into your website or email campaign is very intuitive. LeadFlash is located in Florida and employs nearly 50 people.

LeadPile  

LeadPile is one of the largest lead aggregators and they feature one of the most diverse selections of lead types for both affiliates and lead buyers. Through their custom forms, LeadPile reports that over the last 30 days they have served 61 different lead types. LeadPile has a few different options for affiliates; they can send traffic to a LeadPile web property, embed a form on their own website, or HTTP and XML post directly into a LeadPile server. Their demo videos clearly explain and illustrate many of the CPA lead concepts and decrease the learning curve when starting to work with them for the first time. The LeadPile blog has current company news and lead-gen tips for their affiliates.

LeadPoint

LeadPoint is a lead network founded in 2004 in Los Angeles offering services for both lead buyers and sellers. With many lead types, LeadPoint has services for voice leads, custom forms, and other creative solutions for lead delivery. The LeadPoint Blog is a great resource for all topics pertaining to lead generation and links to their social profiles. LeadPoint also has a UK arm of business that works with many of the same verticals as their U.S. counterpart.

LinkConnector  

LinkConnector is an affiliate network which launched in 2004. Their client list includes JC Whitney, MyLife, American Muscle, WordTracker, PR Web, and Monster Learning Network. LinkConnector's platform features some great benefits, including an affiliate widget builder and a linking technology that allows for affiliates to link directly to the advertiser's site while still maintaining a high level of tracking. The LinkConnector home page also has links to their Facebook and Twitter profiles so you can quickly connect.

LinkShare  

LinkShare is one of the largest Affiliate Networks and boasts one of the most impressive client portfolios. Advertisers include AT&T, iTunes, Delta, CompUSA, Enterprise, FootLocker, GNC, Hotwire, Macy's, McAfee, PetSmart, Toshiba, WalMart, and Zales, to name a few. LinkShare's affiliate platform features an exclusive CPA area called "Lead Advantage," where publishers gain access to high performing lead offers. LinkShare was founded in 2006 and has offices in both the U.S. and Europe.

NeverBlue

NeverBlue is a lead generation affiliate network headquartered in Victoria, British Columbia. It began business in 2004 and is a subsidiary company of Vertrue Inc. NeverBlue's advertisers include GameFly, MindSpark, PerfectMatch.com, and CellFish. The NeverBlue blog gives potential affiliates some insight into the corporate culture of their company, and offers some helpful tips to affiliates. Their "meet the team" pages are filled with fun facts about the people who work there.

PartnerWeekly

PartnerWeekly is the largest full-service player in the cash advance/payday loan space today. That didn't happen by accident. Their philosophy of continuous improvement makes being sensitive to affiliate needs a way of life. Today, that means offers that convert extremely well, and that generate industry-leading ROI. Tomorrow, that means a dedication by the company to diversification within other non cash verticals. More choice. More opportunity for profit. Business relationships, and how to make them great, is a PartnerWeekly mantra. That starts with the best offers. An unmatched capability to customize them. Supported by world-class customer service from experienced affiliate managers, and real-time communication tools to maximize business results. PartnerWeekly is a business unit of Selling Source LLC, which earned its place in 2008 at #68 on the Inc 500 list. That didn't happen by accident either.

PepperJam  

PepperJam was founded in 1999 by internet marketing expert Kris Jones and has successfully integrated several core services to their affiliate network side of business. Among those value added services are search, media buying, and design services. The PepperJam was recognized by Inc Magazine as one of the fastest growing companies in the U.S. Their blog announces new campaigns on their network, company events, and links to a few of their social profiles.

ShareaSale  

ShareaSale is an affiliate network with over 2000 merchants and numerous awards. Their website features a preview of all merchants that they work with so potential affiliates can search by category, allowing easy look-ups of relevant campaigns. Merchants to ShareaSale have a minimal network access fee and a very competitive pricing structure. The ShareaSale Blog is the prime source for company info and events.

Share Results

Share Results is an affiliate software and network with merchants that include PhotoBucket, Nero, eLearners, and PlanningFamily.com. Founded in 2002 by Nicky Senyard, Share Results is known for, among other things, the high level of transparency the network provides to both its affiliates and merchants. Share Results features multiple campaign types like CPA, CPL, referral, and rev share, and they make their affiliate payouts monthly via wire, check, or PayPal. The Share Results Blog is packed with great affiliate information and video interviews with industry professionals.

Tribal Fusion

The Tribal Fusion network serves over 20 billion impressions per month reaching over 230 million users. Clients include Classmates.com, Morpheus Media, Beyond Interactive, PowWeb, and Artifact Software. Tribal Fusion has a very handy "channels" page which compares some of their network metrics with some competitors. Potential clients are also able to drill-down the category that their site fits in and see landscape of Tribal Fusion's reach within that vertical.

Zanox

Zanoxis a leading affiliate network with advertisers that include Jamster, 1&1, ZoneAlarm, GameOn, and FerrariStore.com, Amazon, Lycos, Procter & Gamble, Citibank, among others. The Zanox blog features a live cam of their office in addition to links to their Facebook Group, company Twitter account, Flickr photos, and their iGoogle gadget. Zanox works with over a million affiliates in over 190 countries and offers direct support in about 30 countries.







Read More......

Monday, October 11, 2010

Networking-how effective are you?

Error in deserializing body of reply message for operation 'Translate'. The maximum string content length quota (8192) has been exceeded while reading XML data. This quota may be increased by changing the MaxStringContentLength property on the XmlDictionaryReaderQuotas object used when creating the XML reader. Line 1, position 9108.
Error in deserializing body of reply message for operation 'Translate'. The maximum string content length quota (8192) has been exceeded while reading XML data. This quota may be increased by changing the MaxStringContentLength property on the XmlDictionaryReaderQuotas object used when creating the XML reader. Line 2, position 13950.

Let's face it, you are not necessarily going to find your next job via a headhunter or in the newspaper (though I am not saying that it never happens this way, it is just more difficult to do so).  The best jobs are often not advertised.  Most likely, you are going to find your next opportunity via a network you have created - a network of friends, colleagues, and acquaintances - who have access to companies and know about opportunities that you couldn't find out about any other way.  Or, if you did find out about an opportunity through a newspaper want ad - you likely have a better chance of getting noticed among the many resumes received when you are introduced through a network connection.  However, networks can help in ways other than helping you find a new job.  Your network can be a sounding board to help you solve a particularly difficult problem. They can help you further develop an idea or concept you have and can assist you in understanding market trends and help keep you updated on current business topics.

(Social) Networking Tools and Groups

There are some great tools available for social networking.  One popular tool is LinkedIn.  LinkedIn is a great way to keep in touch with individuals you have worked with before or know from college.  It is also a valuable method for sharing your expertise and knowledge in discussion groups and/or responding to questions from others on LinkedIn ("Answers").  LinkedIn enables you to expand your network and meet others by asking for introductions from your current connections to others to which they are connected.

Twitter is another tool for networking.  Through Twitter you can share information with others and learn from them.  With Twitter you don't need to have a prior relationship or know someone in order to follow them.   This enables you to reach individuals you may not otherwise ever have the opportunity to reach.  Specific topics of interest on Twitter, such as #projectmanager or #leadership, enable you to connect globally with others who share your specific interests. 

There are other groups you can likely find to participate in with like-minded people.  For example, I belong to the Employee Engagement Network. This is a global group of individuals who are interested in and involved in employee engagement.   Another group I belong to is Business Exchange. BusinessWeek's Business Exchange allows users to create business-focused topics and share information with other business-focused users who are interested in the same topics.

I'm sure you know of other networking tools and/or groups that you have found of value - please share in the Comments field below.

Networking Events and Conferences

Attending networking events is another way to meet others.  You can find professional networking events in nearly every city.  These events are sometimes focused on a specific topic or group such as for marketing specialists or individuals who are unemployed and job searching.  In addition, conferences offer the opportunity for building your network also.  For example, PMI® Global Congress is a great conference to attend to network with other project managers and increase your skills and knowledge around project management-focused topics. Most conferences provide networking sessions during lunch or in the evenings - another great way to meet others, make connections and share information!

Networking isn't Easy! It's Work!

Networking does not come easy to many people - you have to work at it.  You can't just expect someone who you met once to recommend you for an opportunity or to share information with you unless you work on maintaining and building the relationship with that person.  The ability to nurture relationships is a key component of building and maintaining an effective network.  Also key is remembering that networking is bi-directional.   Your network is just not a group of people who are there to help you find your next opportunity or introduce you to someone who may have a job for you.  Basically, they are not there only for when you need them. These are individuals you need to be actively interested in and involved with - people you want to keep in touch with and share information with. You need to devote time to your network on a regular basis.  Bottom line - don't just contact your network when you are in desperate need for help.  Keep in touch with them regularly and be interested in what they have going on themselves - not just what they can do for you.

For example, let's assume that someone in your network is interested in coaching others.  Maybe you just came across an article on the benefits of hiring coaches.  Why not share this article with that individual?  Include a short note that the individual may find the attached article of interest.  Ask them how they are doing in finding coaching opportunities.  Maybe someone else in your network is already a coach - connect these two individuals.  They have a lot in common!  Or maybe someone in your network just moved to a new position in their company or took a new job - send them a note to congratulate them on their new opportunity.   I regularly share white papers, articles, and interesting books I have read with my network

Broaden your network. Don't just network with others in your specific industry.  Networking outside your specific job function or your specific industry is a more creative approach and helps you to gain a broader perspective on the opportunities available and on business in general.  What you learn from others in your network can help you grow professionally and personally. 

Ask for help in building your network.  Your network members can introduce you to others.  For example, if you are interested in understanding more about the manufacturing industry, ask individuals in your current network if they have any connections in that specific industry.  Ask them to make an introduction for you.  Similarly, if someone in your network mentions that they are interested in a specific industry or company, and you have a contact in that area - offer to make an introduction.  By sharing your resources, you become a valuable partner in the network and help you broaden your network.   

What are your networking stories - the good, the bad and the ugly?

What has worked for you?

How has a network helped you develop professionally?

Resources - Harvard Business Review Articles on Networking

The following can be found online at: http://hbr.harvardbusiness.org/.

Harvard Business Review, 2008: Start Networking Right Away (Even If You Hate It)

Harvard Business Review, 2006: How Leaders Create and Use Networks

Harvard Business Review, 2005: How To Build Your Network







Read More......

Network events are a waste of time

Translate Request has too much data
Parameter name: request
Translate Request has too much data
Parameter name: request

...UNLESS you have learned the collaborative etiquette of networking!

Hmmm. Got your attention didn't I? I suppose all networking is good, however, what brings the most productive long-term benefit to both parties is the manner in which the relationship is built.

What is the collaborative etiquette of networking?

Collaborative, n.

1. The act of working together; united labor.

2. To work together, especially in a joint intellectual effort.

Etiquette, n.

1. The practices and forms prescribed by social convention or by authority.

2. The customs or rules governing behavior regarded as correct or acceptable in social or official life

So, collaborative etiquette is: The act of working together within the practice of mutually beneficial social convention. Put another way, it is networking in a way that subscribes to the idea that networking is about using your creative talents to help others achieve their goals as you cultivate a network of people strategically positioned to support you in your goals... expecting nothing in return. Collaborative etiquette is the lubrication that makes things run smoothly. Without it, you may permanently alienate others.

And yet another way... it's practicing the "Go Giver" mentality not the "give to get" mentality. In other words, the "give to get" mentality is giving with an expectation of receiving something from the person you gave to. Not good. This is a set-up for disappointment because that is not the way it usually works. When you give it "always" comes back to you but not always from the person you contributed to.

Keep your expectations in check. Remember, unfulfilled expectations always cause problems. If you don't get what you expect, you get disappointed. Disappointment leads to resentment, frustration and upsets. Having expectations is a luxury you cannot afford in networking.

I am disgusted with the "meet" market mass hysteria that seems to follow very large networking events. And... nothing irritates me more than having a "Networking Nancy" or a "Networking Ned" shove a business card in hand and say, "What do you do?" and before I can answer, they interrupt with their unsolicited pitch without waiting to see if I care. Like they care? It doesn't feel like it. Like I care? Hardly. No one cares about your opportunity until they know how much you care.

Hysteria, n.

1. Behavior exhibiting excessive or uncontrollable emotion, such as fear or panic.

Fear or panic, eh? Seems to me to fit the profile of a networking newbie or someone who flat doesn't understand the collaborative etiquette of networking. The fear may come from their concern about business not being so good or that they feel they must work really hard to meet as many people as they can to help them or they will fail. They don't know that in networking we are there to stir up a collaborative relationship where we truly help each other.

Building trust comes way before giving a sales spiel.

Collaboration is the key to increased networking efficiency. Did you get that? Collaboration! That means to work together! Collaboration is a recursive process where two or more people or organizations work together toward common goals. There is another key... working together!

IMPORTANT: Networking is about helping each other. It is a two-way street!

Before me stands someone who is desperate to get business - coming from fear - rather than take the time it takes to develop a long-lasting relationship.

Desperate, n.

1. One desperate or hopeless.

Another irritant is having an MLMer (multi-level or network marketer) try to recruit me into their fold without telling me hardly anything about their scheme where I can make $20,000 a month. It seems to me that it should be this way: help someone understand and like the product by being a user of the product and much later... introduce them to a way that they might make a few extra dollars in their spare time. I know how it works because at one point in my life I was a very successful MLMer. Networking events are not about recruiting. If you are someone who does this, you will soon get a reputation as a networking pest and your networking opportunities will soon evaporate.

Sometimes I want to scream, "Stop trying to sell me. I don't even know you and you certainly have no clue about what my motivation is for being here!"

My friend, Jim Rohn once said, "The more you know, the less you need to say." Sometimes is is wise to just keep your mouth shut and let the other person blab on about whatever it is they do. Then excuse yourself politely and move on to meet someone else.

Be clear. Networking is using your creative talents to help others achieve their goals as you cultivate a network of people strategically positioned to support you in your goals... expecting nothing in return! And if a business lead grows from conversation with another networker that is the bonus! Not the intent.

At a networking event what comes first?

1. Small Talk

No serious banter about "your" business. It is get acquainted time. Introduce yourself then ask, "What do you do?" Show an interest in others. Establish eye contact, then raise a non-threatening small-talk topic. The purpose of small talk is to break the ice, build rapport and gain trust. Do you both "click?" Without rapport, there is no foundation to develop a long-term relationship. Offer a firm handshake. Wear a name tag on the right side of your jacket or dress.

"You can make more friends in two months by becoming interested in other people, than you can in two years by trying to get other people interested in you." - Dale Carnegie

Observe and listen. Listening is the heart of communication. Target the person's interests. Be mentally engaged in what the other person is saying. Interact with positive observations and questions about how you might help them. Look for a keyword or phrase that is in some way related to the topic that you would like to discuss with this person. Ask relevant questions and avoid wasting his or her time. Determine what the person believes he or she needs related to you, then link yourself to their needs. Offer to help if you think you can contribute. Never be afraid to take initiative. Be pleasant, respectful and polite.

Avoid any type of sarcasm or negativity. Offer no, "Business is bad" talk. Keep the conversation positive. Insert positive reinforcement into the conversation. Make good eye contact. Be relaxed and confident. Respect their personal space. Easy on the business cards (see #2). Never be afraid to ask for help. Most people are flattered to be asked for assistance, tips and advice.

"Be careful of receiving counsel from unproductive or toxic people-they don't follow their own advice. Healthy people will not join in your sorrow-they will show you a brighter vision!" - Steven Connor

Maintain focus on the one you are talking with. It is rude to be looking over their shoulder to see who else would be your next likely victim. It should only take a few minutes of small talk to help you make the right choice about whether this is someone you want to follow-up with.

"People who listen well are so memorable because they make us feel special when we are face-to-face. These smart and savvy communicators do not allow themselves to be distracted by phones, buzzing text messages or Blackberrys. They don't walk into a party, a meeting or a memorial wearing a Bluetooth. They are "in the moment" not waiting for someone, anyone -- to call, text, IM or twitter in the next moment. And we love them for that." - Susan RoAne

Postpone further discussions if the person wants to get down to business right away and there are others present. Exchanges business cards and set an appointment to consider the matter in greater depth. You must carefully consider who you choose to connect with. For the people you do reject, show respect by offering alternatives. Perhaps someone else in your network could help them.

2. Exchange Business Cards... MAYBE!

I seldom offer my business card to someone I would rather not do business with. If they ask, I will oblige. Make business card exchanges meaningful. Only exchange cards with someone when it will be of benefit to both of you. "Hello, my name is Boring Bobby, have a card" doesn't work.

Demonstrate that you have common sense. Send the appropriate message to others in order to avoid misunderstandings and foster trust. If you want to pursue the relationship say so and follow up. If not say, "Please excuse me, I have enjoyed speaking with you." Smile and move on.

3. Don't butt in!

If you see several people talking and you would like to join them, approach with sensitivity. Stand quietly several feet away for a second or two. If there is a break in the conversation or if someone in the group happens to look your way -- use your good judgment -- and take a step forward and introduce yourself. If that doesn't happen, exit immediately with "excuse me." It should be clear that they choose not to invite anyone else into the conversation.

4. Butt Out!

There is always one Boring Bobby or Boring Betty at every large networking event. These are the people you want to get away from as soon as possible. Say, "I would like to grab a Pepsi. Feel free to mingle with others." Or... offer to introduce them to someone else, then make the introductions and as they begin to chat with each other, politely excuse yourself. People like this are a challenge. Never feel obliged to suffer through their monotony at a networking event.

5. Keep your word!

Follow through on your promises. Never, I repeat, never offer anything unless you plan to follow through.

6. Follow up! - Promptly

Think of creative ways to keep in touch. Thank people for leads, tips and ideas even if their suggestions don't work out; your contacts will appreciate the follow-up. E-mail and a phone call are okay but a face-to-face connection with someone you want to know better is best. Practice appropriate persistence and be sensitive to time constraints.

My guess would be that the biggest percentage of people who attend large networking events have had little, if any, training on how to network correctly. They are not even aware of the simple slip-ups that can cascade into full-blown avoidance by others in the network. They are thinking: "Sell, sell, sell." Wrong!

They mostly see it as an opportunity to collect business leads. By the way, working the room does not mean meeting as many people as you can and collecting the most business cards. A poor approach to networking can have a devastating effect however an effective approach using collaborative etiquette can open countless doors and opportunities.

At a recent networking event I stopped at the name tag table and asked to speak with the person who was hosting the event. The young women behind the table immediately looked around the room, spotted the host and said, "Come with me. I'll introduce you to her." That's class.

Why is effective networking so important? Because networking isn't just a great idea anymore; networking is an essential and long-term component of developing and maintaining long-term business relationships. The basics of effective networking are easy to learn, but as with most professional skills, they must be practiced and perfected in order to be effective.

So... are we clear? Networking is NOT about selling or collecting business cards. It's about building relationships. Always remember, successful networking is based on giving more than you take.

Never assume that those within your network share your religious, political, or social beliefs. It is best to stay away from these topics.

You would be wise to create a 5 to 10 second "elevator speech" for a large event. One that briefly describes what you do. At smaller events you will often be asked to introduce yourself and a 30-second connection (some call it an "elevator speech") would be more appropriate.

If you are unclear about what networking is about get help before you damage your reputation and become someone others avoid when they see you coming. (You know people like that, don't you?) Don't become one of them. Hire a coach. It is important to learn the ropes from someone who knows the ropes.

The proper application of collaborative etiquette in networking will empower you to build and nurture your own network. Make a commitment to put these powerful guidelines into action and you'll be attracting a vast number of new team members and business partners into your network. Put to use the guidelines of collaborative etiquette to your networking opportunities and before long the contacts will be coming to you, instead of the other way around.

Commitment, n.

1 an agreement or pledge to do something in the future; the state or an instance of being obligated or emotionally impelled

The quality of relationships you build in networking are far superior to the quantity of friends you make.

"These lasting, mutually beneficial business relationships begin with projecting an outstanding impression, but are sustained through trust and the investment of time and effort to help others." - Aviva Shiff, co-founder of Spark Training & Coaching Associates







Read More......

Search what do you want in this blog!

Custom Search
 

© Networking-Smart