Showing posts with label Case Studies. Show all posts
Showing posts with label Case Studies. Show all posts

Thursday, October 18, 2012

Facebook Promoted Posts is FAKE: CASE STUDY

If there’s one thing guaranteed to get Facebook page owners riled up, it’s a change to theEdgerank algorithm. This month complaints have been springing from every corner of the world’s largest social network about the latest tweaks (and frankly, why should I be any different?).
Over the past weeks I’ve been watching our page reach figures fall... and fall... and fall... with Facebook’s latest changes putting severe limitations on the amount of organic content that we can serve to our followers.
I try to make sure the Econsultancy page follows the moving best practice goalposts, so in order to understand the situation and try to arrest the decline, I decided to try out a series of promotions to gauge their effectiveness. 
Before I go any further, a caveat: This is obviously a limited test. I’m being careful with the company credit card at this point, so I simply wanted to judge how different kinds of promotions reach people, and see how effective Facebook’s promoted posts targeting is.
Here I’ve tried a couple of different types of post and wanted to see how much bang I’d get for a small investment. 
If you are running ads regularly then please do add your comments on this below, it would be great to find out more about how the changes have affected your campaigns recently.

IMPACT ON ORGANIC REACH

First of all, let’s look at how our organic reach figures have changed recently.
Here’s a few of our posts from before the change:
http://assets.econsultancy.com/images/resized/0002/4674/1-blog-full.jpg
When Facebook began providing reach figures we routinely reached between 2,000 and 4,000 people, per post(at the time, our page had around 7,500 total ‘Likes’).
For Full Story Visit SEO SMM SMO

Saturday, January 21, 2012

A case study on Unified Threat Management Systems - Guide to UTMs | UTMs fully explained

Hi folks..this time I will be exploring the Unified Threat Management systems and comparing multiple Comparison of Unified Threat Management Products – The guide to Unified Threat Management systems (UTMs)UTM products in the same. I would recommend you to read my previous posts on Unified threat Management systems to understand it fully -
for your convenience, I have created a pdf and have uploaded it to scribd and slideshare. You can read my full report below..

Stay gold..

Rishabh Dangwal

Wednesday, January 4, 2012

How To Install Junos In GNS3 : Juniper Virtual Simulator


Click here to see the Qemu Installation

After spending 3 continuous late nights; Finally I am able to install JUNOS on my PC. The procedure is bit cumbersome but not impossible. I had faced lot of issues during installation but where there is will there is way. Now next step is to integrate with GNS3. I am preparing document for the installation process with all the snap shots. Sooner will upload it.

Monday, November 14, 2011

A Brief Introduction To E-Reputation - By Chintan Gurjar


Introduction: whatever the people do and not do on the internet makes an online reputation of them on the internet world. The Internet is a robust collection of information and data. It is more important, that how you react on a particular situation and what is your impact and contribution in a particular matter within the internet. It creates reputation, which is more beneficial for the business success of your organization, whether it is small or big.
Define E-Reputation:
E-reputation is generally identified as a professional presence in the online market. It includes every single small & big activity on the internet executed by you. Activities may be in a form of blogging. Social networking, website maintenance and, etc. People also compare your online reputation with other successful personalities of the internet that is of your field, and they are your competitor. Social media sites play an essential role in E-Reputation. Mostly, Facebook, Google+, Twitter, LinkedIn and Foursquare come in that. The reason is that, among from all. These social-networking sites have a large amount of users.

Issues faced in E-Reputation:
There are some common problems or the issues which are faced by some people on the internet. Sometimes their image or photos of profile picture and other photos are used by others without their permission. Personal information might be leaked or disclosure by someone on the internet. So safety and security of your data and information at your side is more important in such cases. Always make negative impact on online. Because negative impact may be influenced or quoted by someone else,and it may also happen that your negative impact or action can cause some reaction towards you.
Tips To Get Rid from This Type Of Issues:
If someone has uploaded your photo, and if he or she is your friend, then ask them kindly to remove it with the proper reason or the reason of impact. Kindly check the security of your digital gadgets and all internet email ids and accounts so that any attacker doesn't hack your information. You should be aware that you do not disclosure your personal information on the internet anywhere. In blogging and article posting, always write articles in your own words. No copy parallelism should be there in your article. Check other blogs and all social-networking sites to make sure that if anyone is quoting about your saying.
Why is it important to consider E-Reputation?
In Real life, no one cares a bit about what others think of you, but this scenario is more valuable in a digital world. Compare to your real life, there are numbers of people in the world, who are interested in your life, in your online activities. It is said that more than 70% recruiters, searches employees for their company online. If your E-Reputation is good, then you will be optimized from all other employees, and you may get the job or a particular task. Compare to Job's portals it is surveyed that 50% of recruiters find their employees from the social-networking websites. Person's behavior on the internet is more important. Abusing in social media is not good for his or her E-Reputation. It is surveyed that 5% out of 100% companies have fired their employees due to abusing in media directly or indirectly. E-Reputation is more important in a success of your business. It can be appreciated by geeks and tech pundits, on the other side it can also be commented or influenced by people who don't like you or your business. Last but not the list you reputation are in your hand. Do not let people allow making your reputation.
If you Like My Post You Can Add Me On

Wednesday, September 14, 2011

What is SSL VPN Technology & How it Works: Basics of UTM & Corporate Security

A while back I gave training on UTM devices and Security Issues with Amarjit Singh at Tulip Telecom , here are the slides of the session. It was an enjoyable session with emphasis on security awareness and discussing network security as a whole, and how we can protect them by deploying UTM devices and configuring them for maximum security. You can also read my previous posts on Unified Threat management Systems if you haven't read them already -

  1. Unified Threat Management Systems Explained
  2. Unified Threat Management Systems - Single User vs Multi User
  3. Comparison of Unified Threat Management Products

Corporate Security Issues and countering them using Unified Threat Management Systems and SSL VPN



As usual , the presentation is uploaded at Slideshare and Scribd...Hope you enjoy it.