At different stages of business analytics, a huge amount of data is processed and depending on the requirement of the type of analysis, there are 5 types of analytics – Descriptive, Diagnostic, Predictive, Prescriptive and cognitive analytics. Whether you rely on one or all of these types of analytics, you can get an answer that […]
SOSTAC® marketing plans [infographic] Applying PR Smith's SOSTAC® planning to digital marketing SOSTAC® is a marketing planning model, originally developed by PR Smith in the 1990s to help.
This marketing project management guide gives a detailed walkthrough for organizing your marketing projects and getting the most out of your team.
Struggling to make your first online sale? Our 30-day marketing checklist to help new entrepreneurs to make their first sale.
The OSI reference model, as shown under, is developed by International Standards Organization (ISO) as a step towards international standardization of the protocols used in the networking. · The model is called OSI (Open System Interconnection) because it deals with connecting open systems that is, systems that are open for communication with other systems. · OSI Defines: - How network device contact each other, if they have different language, How they communicate each other? · OSI is not a physical model; rather it is a set of guidelines that application developer can use to create application that run on network. It also provides framework for creating and implementing networking standards, devices, internetworking scheme. · O.S.I Has 7 Layer, divided into 2 groups. · The Layer 4-3-2-1 layer defines how data is transmitted end-to-end. · The Layer 7-6-5 defines how the application within one station will communicate with each other. Responsible for application communication between hosts. · Layers are as under: o A layer should be created where a different level of abstraction is needed. o Each layer should perform a well defined function. o The function of each layer should be chosen with an eye towards defining internationally standardized protocols. o The layer boundaries should be chosen to minimize the information flow across the interfaces. o The number of layers should be large enough that distinct functions need not be thrown together in the same layer out of necessity. (1) Physical Layer: · The physical layer of the OSI model establishes the physical characteristics of the network such as the type of cable, connectors, and the length of the cable. · This layer also defines the electrical characteristics of the signals used to transmit the data. The electrical characteristics include signal voltage swing and duration of voltages. · The physical layer transmits the binary data (bits) as electrical or optical signals depending on medium. · This layer is concern with the following: o Physical characteristics of interface and medium: This layer defines the characteristics of the interface between the devices and the transmission medium. o Representation of bits: Data of this layer consists of a stream of bits without any interpretation. They must be encoded into signals (electronics or optical), which is defined by the physical medium. o Data rates: The number of bits sent each second, is also defined b the physical layer. o Line configuration: They physical layer is concerned with the connection of device to the medium. It can be Point-to-Point or Multipoint Configuration. o Transmission Mode: The physical layer also defined the direction of transmission between two devices (Simplex, Half-Duplex or Full-Duplex). (2) Data Link Layer: · The data link layer defines how the signal will be placed. · In this layer, the data frames are broken down into individual bits that can be translated into electronic signals and sent over network. On the receiving end the bits are reassembled into frames for processing by upper levels. · If an acknowledgement is expected and not received, the frame will be resent. · Error and corrupt data detection and correction is also performed at the data link layer · The data link layer transforms the physical layer, a raw transmission facility, to a reliable link and is responsible for node-to-node delivery. Function: Framing, Combine Packets into Bytes And bytes into Frame o Framing: the data link layer divides the stream of bits received from the network layer into manageable data units called frames. o Physical Addressing: If frames are to be distributed to different systems on the network, the data link layer adds a header to the frame to define the physical address of the sender and receiver of the frame. o Flow control: If the rate at which the data are absorbed by the receiver is less than the rate produced in the sender, the data link layer imposes the flow control mechanism to prevent overwhelming the receiver. o Error control: The data link layer adds reliability to the physical layer by adding mechanisms to detect and retransmit damaged or lost frames. It uses the mechanism to prevent duplication of frames. Error control is normally achieved through a trailer added to the end of the frame. o Access control: When two or more devices are connected to the same link, data link layer protocols are necessary to determine which device has control over the link at any given time. (3) Network Layer: The network layer is primarily concerned with addressing and routing. Logical addresses or IP addresses are translated into physical addresses or machine addresses for transmission at the network layer. On the receiving side, the translation process is reversed. The network layer also determines the route from the source to the destination computer to deliver packets. Routes are determined based on packet addresses and network conditions. Traffic control measures are also implemented at the network layer. If 2 systems are connected in the same network, there is no need for the network layer. Function: Routing, Provides Logical addressing which router used for path determination o Logical Addressing: The physical addressing implemented by the data link layer handles the addressing problem locally. If packet passes the network boundary, it needs another addressing system to help distinguish the source and destination system. o Routing: When independent networks or links are connected together to create internetwork, the connecting device (router or gateway) route the packets to their final destination. This is one more mechanism provided by this layer. (4) Transport Layer: The transport layer is responsible for the control of flow and ensuring that messages are delivered error free source -to-destination (end-to-end). On the originating side, messages are packaged for efficient transmission and assigned a tracking number. On the receiving side, the packets are reassembled, checked for errors, and acknowledged. The transport layer performs error handling by ensuring that all data is received in the proper sequence without errors. If there are errors the data is retransmitted. · This layer ensures that the whole message arrives intact and in order, overseeing both error control and flow control at the source-to-destination level. · For security purpose, this layer may create a connection between the two end ports, a logical path between source and destination. Function: End-to-End Connection, Perform error correction before retransmit o Service -point addressing: Computer runs several programs at the same time. So this layer is responsible for delivering data to specific process (port) of computer. It contains service-point address (port address) and therefore, network layer gets each packet to the correct computer on correct network. Segmentation and Reassembly: A message is divided into transmittable segments, each segment containing sequence number, which enables layer to reassembling the message correctly upon arriving at the destination and can identify those packets which are lost during the transmission. o Connection control: The transport layer can be either connection or connection oriented. A connection-less transport layer treats each segment as an independent packet and delivers it to the transport layer at the destination machine. Whereas connection oriented transport layer makes a connection with the transport layer at the destination machine first before delivering the packet. o Error control: This layer is more concern with end -to-end control rather than single link control of data link layer. The receiving transport layer makes sure that the entire message arrives without error. Error correction is usually achieved through retransmission. (5) Session Layer: · The session layer is responsible for establishing, managing, and terminating a connection called session. · A session is an exchange of messages between computers. Logon, name recognition and security functions occur while establishing a session. · Managing the session involves synchronization of user tasks and messages. · Synchronization involves the use of checkpoints in the data stream. In the event of a failure, only the data from the last checkpoint has to be resent. Function: Keeps different application data separate, Dialog control, Synchronization o Dialog control: The session layer allows two systems to enter into a dialog. It allows the communication between two processes to take place either in half-duplex or full duplex. o Synchronization: This layer allows a process to add check points into a stream of data. (6) Presentation Layer: · This layer is concern with the syntax and semantics of the information exchanged between 2 systems. The presentation layer is concerned with translating, interpreting, and converting the data from various formats. · Data is compressed for transmission and uncompressed on receipt in this layer. Encryption techniques are also implemented at the presentation layer. The redirector operates at the presentation layer by redirecting I/O operations across networks. · Function: Present Data, Handles Processing Such as Encryption, Compression and Translation Services o Translation: Information should be changed to bit streams before being transmitted. Because different computers us e different encoding system, the presentation layer is responsible for interoperability between these different encoding methods. o Encryption: To carry sensitive information, a system must be able to assure privacy. Transformation is carried out at this layer. o Compression: Data compression reduces the number of bits to be transmitted. It is highly required when transmitting data of text, audio and video. (7) Application Layer: · This layer provides the operational system with direct access to the network services. · It also provides an interface so that Application (Web Browser) that are running on the local machine can access the network services. So It enables user or software to access the network. · It provides user interfaces and support for services such as electronic mail, remote file access and transfer, shared database management, and other types of distributed information services. o Network Virtual Terminal: A network virtual terminal is a software version of a physical terminal and allows a user to log on to a remote host. o File Transfer and Access Management: This application allows a user to access files in a remote computer. o E-Mail Service: This application provides the basis for email forwarding and storage. o Directory Service: This application provides distributed database source and access for global information about various objects and services. Summary of Layers · Physical Layer: To transmit bits over a medium. · Data Link Layer: To organize bits into frames; to provide node-to-node delivery. · Network Layer: To move packets from source to destination; to provide internetworking. · Transport Layer: To provide reliable end-to-end message delivery and error recovery. · Session Layer: To establish, manage and terminate sessions. · Presentation Layer: To translate, encrypt, and compress data. · Application Layer: To allow access to network resources.
This article discusses the 3 Wheels of Reputation Management which are Listings, Review Sites & Social Media.
Using the Gallery Walk instructional strategy to teach important classroom routines & structures Teaching Duration: 1-3 class periods What is a GALLERY WALK? A gallery walk is a kinesthetic strategy that help students learn information. It closely resembles the idea of a jig
The inbound marketing process An infographic showing how to plan and manage inbound marketing I'm a big fan of the inbound marketing model, sometimes incorrectly referred to by the.
The 40 elements of value sellers need to understand.
A few months ago I created the Periodic Table of Content Marketing, to provide a handy – and hopefully helpful – cut-out-and-keep guide for content…
Ciphr blog – our latest news and articles
In just five steps, anyone can create a strategic marketing plan. This guide walks you through the process and gives you handy tips along the way.
I've put together a little diagram which conveys how I view the digital ecosystem as well as the various path(s) and process(es) that businesses must tread to see returns from the creative and technological assets they are developing. So much of this is hybrid, holistic in nature that it requires breaking through monoline, siloed trains of thought. Ultimately strategy, design, and technology cannot be separated. They exist as part of a continuum of activities that create value for a business. To the extent that we can blur the lines, do those things that maybe we're not used to doing, and see the world through new sets of colored lenses, I think we'll produce more engaging and meaningful experiences on the web and on mobile, and we'll ultimately create significant shareholder value along the way. [Some tips: Start on the left and work your way over. Notice trajectories, adjacent shapes, the external context, and which paths would be linear or potentially which would be circular. Leave me feedback! This is a rough first draft.]
Your pitch deck will become the single most valuable communications tool to use with external audiences of all types - Learn more here!
For market segmentation, we need to consider two kinds of shoppers. New customers. And continuing customers. Here, we study customer acquisition strategies.
If you do decide to take the route into management, it's important to consider the implications that this move includes in order to do the best job.
You’ve got to start with the customer experience and work backwards to the technology. It starts with what incredible benefits can we give to the customer. Where can we take the customer? Steve Jo…
An in-depth guide on the best types of content to create for each of the buyer’s journey stages, including examples of how to use each most effectively.
Internet marketing and advertising solutions can give the desired output result, if properly implemented with respect to your promotional tactics. In simple language, traffic is directly proportional to the rate of change of promotions and method...
Getting web traffic is hard. Why? There are over 1 billion websites. You also need to convert traffic to sales. Here are some digital marketing tips to help
Any company needs strategic goals, however, on most strategy maps the focus is on operational objectives that can rarely result into sustainable profitability.
Use a free competitive analysis template to consider and capture details of the marketing landscape in which your business exists, so you can improve your marketing decisions.
10 hele fijne infographics met praktische tips voor je website, de inzet van social media, je blog en e-mailmarketing. Lees ze!
One business that has mastered the art of neuromarketing is Spotify. Ever noticed how their playlists seem to read your mood?
A total of 12 of the largest tech giants come from the United States, while eight hail from China. All other countries combine for zero.
Any self-respecting marketing professional or small business owner running their own marketing are always on the lookout for new tools to help them streamline their work.
OKR vs KPI - What is the definition of the two? What are the differences? And what are the joint strengths of both concepts when being combined? Learn more »
Developing your own brand archetype is the basis for your brand identity. Here’s how to use them to develop your brand and build brand loyalty.
The billionaire tech entrepreneur offers his best advice from hiring passionate employees to never hiring a PR firm.
The term “marketing mix” was coined in the early 1950s by Neil Borden in his American Marketing Association presidential address. This is one of the preliminary knowledge every marketer…
What are the steps needed to succeed in social media marketing? Learn 9 easy steps to developing a winning social media marketing plan and transform your game.
Check out these seven steps to better utilize digital tools to innovate in your company.
Win customers with efficient, scaled, personalized outreach across marketing, sales, and service.
SOSTAC® marketing plans [infographic] Applying PR Smith's SOSTAC® planning to digital marketing SOSTAC® is a marketing planning model, originally developed by PR Smith in the 1990s to help.