In the old economy you wanted "value" from all of your vendors, right? In the old economy, we all said we wanted value, but did we really mean it? Now, more than ever, I am finding that many small businesses are looking for better ways to do business with vendors. Seemingly for the first time, I am seeing innovative thinking applied to every aspect of small business, including the purchasing process.
What specific change precipitated us all to take a second look at value? In our industry, I believe massive layoffs at larger companies changed the overall value of their products and services. I have not concluded if the value change was intentional. Would you intentionally "layoff" a valuable asset? Regardless of the strategy, I believe in most cases value declined, while the cost of the product remained the same. (That leads me to believe: the results were strategic and intentional - the bottom line staying the same and/or increasing was the ultimate goal) Have you found that you are receiving less service, doing more work, and yet the costs remained the same? If you lead an organization or run a small business, have you started asking questions like: How does this organization become more valuable? What is stopping us from setting the standard of becoming the most valuable ________ (fill in the blank of your product or service)? Georgia Business Net's vision is to be your LAST Phone & Internet Solution Provider. If we are going to be the LAST, we had better be valuable. I hope that with this vision that we have inherently woven the idea of maximum value into our business culture. There is certainly room for us to improve, however I think we are on the right track. I hope some of my vendors are listening to this! Will they take this information and use it? Will you?
Like many small businesses, there is a customer service gap we fill as your Telecom and Internet vendor. Roles we play like purchasing agent, your turnkey solution provider, your project manager aren't new to our business model. Ten years ago those roles weren't nearly as valuable as they are today. Why? Much to my disbelief, those key roles with our competitors and some of our vendors were some of the first subjected to downsizing. Change is awesome, and all of these changes have led to great innovation and opportunity. I hope your company is taking advantage and seizing the current "gap" opportunities. Maybe I lack logical reasoning, but if you layoff the value, won't your results include a less valuable bottom line?
Thursday, June 24, 2010
Saturday, April 17, 2010
Not Another Social Media is Awesome Article
Why don't you make it remarkable? Why don't you make it meaningful? Whether your vision is for marketing or for actually building relationships, those questions lead to characteristics that will help your social media efforts be more visible and appreciated. Just a hunch here, but I bet those questions could help in the real world too. I'm not an early adopter by computer geek standards, but I do qualify when compared to the general population. However, I was not an early adopter to social media - Facebook, Twitter, etc. Nevertheless, we started dipping our toe into the social media pool last year. Wow, just like many other environments in life, there is noise, spam, and junk mail that have taken on new faces. I understand why. Social media is a low cost way of advertising. Now, I love innovation - especially disruptive innovation! Can you guess my favorite innovative tool of late? The Facebook Filtering tools! I am very grateful for all the relationships I have in life (and in my virtual social media life). However, I never put all my friends on one giant conference call, and expect them to all talk at the same time. Think about that phone call in reverse. I am speaking to all my friends from all areas of life at once. What subject matter interests them all simultaneously? I could not provide value to all of them for very long. I am thankful for filtering tools in email, in spam, in the form of Caller ID, but I digress. My brief and humble words for you today, have a plan for your social media efforts. The plan should be to provide value to your potential followers, friends, and customers. Remember, the filter exists, and your audience will tune you out if your message is too loud, too often, or meaningless. Before you post, run your own mental filter first and decide if the post is meaningful. Value is ESPECIALLY important if you choose to interconnect and redistribute your content and comments across several mediums. Proceed with caution when using Feedburner, Twitterfeed, and other tools that redistribute your posts everywhere instantly. Think about the users that are following you or that you want following you. If they are devoted long time followers, most likely they subscribe to all your feeds. If you choose to interconnect all feeds and post the same material across all platforms - they will stop listening. Too loud or too often is not an initial problem on startup efforts, however it is a rule of thumb that you shouldn't forget as time passes by. Social media is awesome, but only if you choose to make it awesome. Once a follower filters you out for being too loud or boring, odds are you will never get them back.
Tuesday, April 13, 2010
Stay Alert: Facebook Dangers
While it is very common for your friends to write on your wall, "You've got to see this!” - be aware that not all Facebook content is safe for your PC. We have seen an increase in virus activity on Facebook in recent months. Most of the viruses have similar characteristics including a pop up window that won't go away, advertising for pc repair, and locking up altogether.
Here are a couple of items to watch for to try to prevent an infection:
- If you see:
- An external web address or link that you do not recognize...
- What should you do?
- Don't Click!
- Especially a very long cryptic looking web address (a.k.a URL)
- Don't Click!
- What should you do?
- An external web address or link that you do not recognize...
- If you see:
- Not so tech savvy Great Aunt Myrtle has sent you some "awesome web cam shots"
- What should you do?
- Do I have to say it?
- Don't Click!
- Even if it is not a virus, Myrtle and a web cam does not sound like a good idea.
- Don't Click!
- Do I have to say it?
- What should you do?
- Not so tech savvy Great Aunt Myrtle has sent you some "awesome web cam shots"
A cautious eye, always suspicious for malice and fraud, will save you from wasting time and money on PC repairs.
Tuesday, April 6, 2010
Did you know...SIP Trunks?
A SIP trunk is a phone call routed over Internet Protocol using VoIP technology. A SIP trunk can be thought of as a traditional phone line replacement. However, it can be much more. Only recently has the flexibility of SIP trunks started to gain momentum with small and medium size businesses. The delivery of the call is the key to the quality of the call; see our previous article to learn more. The flexibility inherently presents its own set of challenges as you, the business owner, set out to purchase a SIP trunk. Why would you buy? What would you buy? A multifaceted buying process is required to take full advantage of all the features. I utilize a checklist to view it from the following perspectives:
The central question is - How will the ___________ see, use, and benefit from this technology change?
The central question is - How will the ___________ see, use, and benefit from this technology change?
- And then I fill in the blank:
- End User: receptionist, salesperson, call center, my customer...
- I.T. Staff
- Business Owner & CFO
- Efficient Use of product, therefore moving towards a cost savings
- Overbuying is eliminated
- Features that aid in higher productivity are put in place
- Evaluations & Metrics are available to enable constant evaluation of needs and new requirements.
- Costly Forklift Upgrades are avoided
Thursday, March 11, 2010
Small Business Advice: Efficiency Tip of the Day
At every level of life and small business, the details can slow us down. None of us have the time to dig into every aspect of our business to discover the advanced warning signals to prevent problems. What if there was a quick litmus test that would send off early warning signals of business problems? This recent article, by Dan and Chip Heath, tells the story of an unlikely character developing a litmus test for his business. Your small business success story will one day be filled with the details that didn't slow you down. Take time each day to figure out what the most important details are for your life and your business.
Over the past year, I've enjoyed the Heath Brothers various columns and their best selling book. If you would like to learn more about them, click here. In a world full of massive amounts of information, they are standing out... which is the premise of their first book.
Over the past year, I've enjoyed the Heath Brothers various columns and their best selling book. If you would like to learn more about them, click here. In a world full of massive amounts of information, they are standing out... which is the premise of their first book.
Influence: The Best the Internet has to Offer
My recent conversations with friends have centered around the "best" items on the Internet. Stating the obvious... we are truly in the Information Age. Hey Mr. Huxley, it is a Brave New World, but not quite like the one you envisioned - not yet at least - not ever, I hope. We have so much to choose from. Who has time to sift through all of this information? Whether you acknowledge it or not, you have some influence among those close to you. My advice to you... Use your influence. Tell everyone about the best the Internet has to offer or the best customer service you have received in awhile. We are all dying to know about the best things in life. Why? So we can all find the good stuff quickly. Life's too short to be slowed down with the not-so-good stuff.
Technorati has a list of the best blogs on the Internet based upon various statistics, but nothing beats a good friend's recommendation. These mathematical rankings never quite work, just ask anyone that follows college football about the BCS standings. I think only one blog that I read is in the Technorati 100. For the record, I really appreciate the information received from the 10 or 20 less popular blogs that gain my regular attention.
Here's to happier more efficient browsing.
Technorati has a list of the best blogs on the Internet based upon various statistics, but nothing beats a good friend's recommendation. These mathematical rankings never quite work, just ask anyone that follows college football about the BCS standings. I think only one blog that I read is in the Technorati 100. For the record, I really appreciate the information received from the 10 or 20 less popular blogs that gain my regular attention.
Here's to happier more efficient browsing.
Friday, March 5, 2010
1 Quick & Easy Security Tip for Today
A brief discussion about "Two-Step Authentication" and your small business network.
Every additional layer of security reduces the risk of unauthorized access, and adding a second method of authenticating business network users may be a great way to deter inappropriate activities. For very secure enterprise environments, this would require a key fob or some external hardware attached to a laptop in addition to a user-id and password. While this method is very secure, it is costly to implement and few businesses choose to do so. However, nothing is stopping us from being creative and implementing two sets of authentication methods for various aspects of business. Let's look at a simple wireless network in a small retail environment. A consumer grade wireless router & access-point can easily implement a form of two step authentication. Consider enabling the wireless encryption protocol. When encryption is enabled, not only is it harder to gain access to the network, scrambling part of your transmission path is now an added benefit. Many small businesses take advantage of this simple encryption method, but few take the second step of authentication to significantly reduce the probability of a network intrusion. Media Access Control (MAC) Address filtering is another deterrent method available on consumer grade routers. This will help restrict wireless access to only those users or devices you authorize. These addresses are uniquely assigned to each network device manufactured. If a MAC address isn't on your router's list, access is denied. We certainly don't claim that this method is 100% secure. If you are in a industry where security policies are regulated, we don't recommend consumer grade wireless routers as a solution. Consult a professional! Review your industry's requirements or recommendations, and if you have any questions - feel free to call our local support team for help. 706-823-2115.
At Georgia Business Net, we want to be your LAST Telephone & Internet Solution Provider. The Client Relationship means everything to us! We feature Local & Long Distance Telephone Service, High Speed Internet, Next Generation Phone Systems, a local Data Center, and much more.
Every additional layer of security reduces the risk of unauthorized access, and adding a second method of authenticating business network users may be a great way to deter inappropriate activities. For very secure enterprise environments, this would require a key fob or some external hardware attached to a laptop in addition to a user-id and password. While this method is very secure, it is costly to implement and few businesses choose to do so. However, nothing is stopping us from being creative and implementing two sets of authentication methods for various aspects of business. Let's look at a simple wireless network in a small retail environment. A consumer grade wireless router & access-point can easily implement a form of two step authentication. Consider enabling the wireless encryption protocol. When encryption is enabled, not only is it harder to gain access to the network, scrambling part of your transmission path is now an added benefit. Many small businesses take advantage of this simple encryption method, but few take the second step of authentication to significantly reduce the probability of a network intrusion. Media Access Control (MAC) Address filtering is another deterrent method available on consumer grade routers. This will help restrict wireless access to only those users or devices you authorize. These addresses are uniquely assigned to each network device manufactured. If a MAC address isn't on your router's list, access is denied. We certainly don't claim that this method is 100% secure. If you are in a industry where security policies are regulated, we don't recommend consumer grade wireless routers as a solution. Consult a professional! Review your industry's requirements or recommendations, and if you have any questions - feel free to call our local support team for help. 706-823-2115.
At Georgia Business Net, we want to be your LAST Telephone & Internet Solution Provider. The Client Relationship means everything to us! We feature Local & Long Distance Telephone Service, High Speed Internet, Next Generation Phone Systems, a local Data Center, and much more.
Subscribe to:
Posts (Atom)