Sendible is a social media analytics and message management dashboard. It allows you to:
Keep track of social media, email and SMS campaigns
Keep up with significant RSS feeds at a glance
Organize yourself with a calendar
Manage team members and other users
Schedule messages and manage your online reputation
…all from one simple platform.
Its many benefits include saving you time and reducing the confusion of managing multiple platforms and users. We reviewed many social media analytics and management platforms over the past few years. This one works best for us and our clients. So instead of a traditional review, we will actually walk you through the process of setting up so that you can try Sendible for yourself. Since there is a free trial there is no risk in checking it out for yourself. That’s what we did.
Step 1: Start the Process
Signing up is easy and there’s a “risk-free” thirty-day trial. Click on the sign up link in the top right menu bar.
A selection of plans at varying prices will immediately open up.
Read through the features provided with each plan, then click on the green “Start Trial” button for the particular plan that appeals to your needs. (Don’t worry – you don’t have to part with your credit card details until the end of your free trial.)
If none of the plans quite fits your needs, contact a Sendible sales representative at 1-315-623-4480 to see if you can work out a custom plan.
Step 2. Complete Your Information
Once you’ve selected a plan and clicked on the green “Start Trial” button for that particular plan, you’ll be asked to provide your personal information. Go ahead and enter your name and contact information.
(Be sure to select the correct time zone for your region.)
Next, choose a username and password.
What You Need to Know about Cancelling or Upgrading
If you decide you need a lighter or heavier plan than the one you signed up for, you will not be stuck with the type of account you signed up with – upgrading to any paid plan is acceptable.
Once you do upgrade, you will be billed for the first month immediately via your credit card (payment is always one month in advance).
You can also upgrade or downgrade at any time – the change and new charge will take effect on your new billing cycle.
If you decide to cancel, you can do so at any time within your trial period. The date your free trial ends is displayed right underneath the black “Start Free Trial” button.
Log into Sendible
Select “My Account”
Cancellation is immediate and your account information is erased. (It is not recoverable, so make sure you really want to do this.)
Step 3. Setting Up Your Account
Once you have selected the black “Start Free Trial” button, you will be asked to set up your profile. You will notice straight away that your company name and URL have already been pre-populated in the Textarea boxes for you.
You then have the choice of allowing Sendible to automatically begin searching social networks and web content for mentions of your business. If you don’t wish Sendible to begin this process right now, ignore the black “Continue” button and select the “Do this later” link.
Check your email inbox for Sendible’s Activation letter. You can activate immediately via the “Activate your account” button at the end of the letter or continue with setting up your social networks and activate your account next time you log in.
Step 4. Adding Your Social Networks
If you’ve allowed Sendible to search for your networks, it will walk you through an easy set-up process for all your social networks.
You’ll see a screen straight away asking you to add your Twitter account.
Select the black “Continue to…” button to be taken to an authorization page, where you will click on the “Authorize app” button.
The moment you’ve done this, you will see a message on your screen for a few seconds letting you know the process is in progress.
When it has added Twitter to your profile, you will see the next social network set up screen; in this case, Facebook.
Select the black “Continue to Facebook” button.
As with Twitter, you’ll be taken to the log-in page. Enter your Facebook username and password.
Once you’ve done this, you’ll be asked to authorize the Sendible app. Be sure to select exactly who to display Sendible posts to by using the drop-down menu under the default “Public” button.
Once you’ve selected your preferred Sendible/Facebook privacy setting, click on the “Go to App” button in the top-right corner.
You’ll be taken to another page asking you to allow Sendible to take various actions on your behalf in Facebook. Click on “Allow” to give permission for all actions.
If you don’t want to give permission for a particular action, simply click on the “X” to the right of that action description, and select “Don’t allow” from the drop-down menu.
Once you’ve clicked on the “Allow” button, Sendible will also prompt you to add your Facebook Pages, plus select Pages you like; all from your “Pages I admin…” drop-down menu.
Step 5. Adding Your Blog
Once you’ve added your social networks, Sendible will ask you to add your blog. Your first action will be to select your blogging platform from the drop-down menu.
Once you’ve selected your blogging platform, add your log-in details.
Step 6. Checking Your Summary
You’re almost there. Sendible will now display a summary of all the social networks, pages, platforms and sites it has added.
You can now continue on to your Dashboard.
Step 7. Getting to Know Your Dashboard
This is where all the magic happens. Note that you can compose messages in an area that looks very like a WordPress blog “Add Post” area, with very similar formatting options.
On the left-hand vertical menu, you’ll find your feeds, calendar, and message monitoring and handling. You’ll also be able to check the buzz about you and your brand, as well as assign tasks to your team. (Less expensive packages will not have all these options.)
The best way to learn all about these options is to play around with them and start using them: But before you get to that stage, one last thing you’ll need to do is set up your Profile.
Click on the “My Profile” horizontal tab in the upper right hand corner.
This opens to a page that lets you edit your personal details (#1), subscriptions and other categories (#2).
When you click on the tab for each category, these expand further, allowing you to take the following actions:
Contact Details – In addition to the usual contact information such as company address, mobile number and website URL, this category also allows you to add a short bio
Picture/Logo – Allows you to browser your computer and insert a 150 X 150 pixel headshot
Time Settings – Allows you to not only edit your local time zone, but toggle between a 12-hour or a 24-hour clock
Preferences – Allows you to switch between toggle view and list view, turn inline help tips on or off, preschedule automatic messages, pause scheduled messages, manage privacy and more
Group Posting – Allows you to designate Sendible messages to either be published to your groups or sent as drafts
Url Shortening – Allows you to provide the password and key for your favorite url shortener, which you select from a drop-down list. (If you don’t use url shortening, simply leave all the fields blank.)
Images – Allows you to select from Twitter, TwitPic or yFrog image shorteners
Location – Allows you to enter your exact street address for Sendible’s location-based services to use. (They promise it won’t be shared with any third parties!)
Remote API Key – You can give your API key to third-party websites and applications, allowing them to interact on your behalf with Sendible. Security-wise, this is a preferred alternative to giving other sites your password
When you’ve adjusted these categories to your satisfaction, be sure to press the “Save” button!
Step 8. Add/Edit Services
Finally, if you access the “Add Services” tab in your top-left horizontal menu, you can also add bookmarks and other sites you regularly use, streams, blogs, brand and review monitoring and a whole host of other tools. (Simply select the services you want and “add” them.)
This is only just the beginning of your journey with Sendible, but already you will have seen how easy it is to get started. You’re well on your way to eliminating the clutter and confusion of multiple login details and folders while dancing between different platforms and sites.
Sendible makes it easy for you to manage all your communication and monitoring in one easy Dashboard. When you are ready, you can try it for free today.
10/01/12 by Alex Tran | Blog | Comments Off on How to Add a Yahoo Signature Image
This video explains how to add a Yahoo signature image with a clickable link. Note that the video explains how to add the image to your Yahoo signature using the new Yahoo email interface. The directions for the Yahoo Classic email interface is different.
Keeping your business secure isn’t something you do just once. Instead, it’s a series of habits you develop that allow you to secure your business continually against potential threats that arise.
One of the most important things for online security is constant vigilance. If you start off with really good security habits but let the slide after a few months, new vulnerabilities will appear that intruders can take advantage of.
So how do you keep your business secure? This is what you need to do – On a weekly, monthly and quarterly basis.
Weekly Security Checklist
[ ] Check your server logs for intrusions
Check your server log for port scans, unusual activity or logins by unauthorized users.
[ ] Update your anti-virus and anti-spyware software
Have these installed on all company PCs, including personal computers and laptops.
[ ] Scan your PCs for Trojans, malware and other viruses
Regular scanning will prevent the majority of malware and trojan related issues.
[ ] Check for patches on your server software
Your server software is one of the most important pieces of software. Update or patch it the
moment any new updates are released.
[ ] Check for patches and updates on all software, including plugins & themes
Often time’s attackers get in through vulnerabilities in plugins, themes and other outside extensions. Check for updates on these to make sure they can’t get in through these back doors. Many systems, like WordPress for example, allow you to check for updates on all your plugins in one screen.
[ ] Check for OS updates on your personal computer
If Windows or Mac OS is indicating that you should update your operating system, do so.
[ ] Make a Dropbox, Google Drive or similar type of backup of your PC
These should be running in the background at all times backing up all your most important data.
Monthly Security Checklist
[ ] Check your customer emails for reports of phishing attempts
If you’re under a phishing attack, often time’s a large number of your customers will receive bogus emails at once. If you start hearing about such an attack, you may want to send an email out to your customers letting them know about what’s going on.
[ ] Check computer security blogs and newsgroups for updates on recent exploits
Especially check for any new worms, trojans, malware, viruses or exploits that target your specific software, server version or configuration.
[ ] Make a digital backup of your company’s most vital data
Automated services can make this backup process easy. Make sure you don’t transmit highly sensitive data unencrypted, or store unencrypted sensitive data on other people’s servers.
This should be done immediately after an account goes inactive. However, it’s still good to get in the habit of scanning for inactive accounts every month. If inactive accounts are left in place, they have become footholds for intruders to use to gain more information and access.
[ ] Check for updates on your browser
Browsers can get hacked too. If there are updates on Chrome, Firefox or Internet Explorer, update them as soon as possible.
[ ] Background check any new employees
Often time’s intrusions come not from the outside, but from employees. Check to make sure your employees don’t have dubious histories before allowing them access.
[ ] Check your firewalls.
If any ports were opened for any applications no longer in use, close them.
Quarterly Security Checklist
[ ] Change your wireless passwords
This is especially important, as just about anyone who’s been in your office in the last quarter will have access to these passwords.
[ ] Change your passwords on all accounts
This includes both personal accounts and business accounts.
[ ] Check your file permissions
Check the permissions on the files on your server.
[ ] Check all forms and scripts for possible MySQL inject attacks and scripts-against-the-server
This is best done when writing the scripts in the first place. However, it still pays to double check, especially if you have new scripts that interact with old ones.
[ ] Make a hard copy backup of all your most vital data
If possible, store the data off-site to protect against disasters.
[ ] Check the auto-run programs that start up every time you boot your computer
Viruses and spyware often hide out in the auto-run menus. They want to boot up every time your computer starts.
[ ] Update your Gmail or other webmail’s account recovery options
If you have an old phone number on your 2-step verification, or if your backup email address is wrong, update those settings.
04/16/12 by Alex Tran | Blog | Comments Off on How Instagram Android and Apple Works
Instagram is a cool free photo sharing service and app that works with Apple iOS and Android. It allows you to take photos that are reminiscent of Polaroid pictures with some unique lighting effect. You can share photos with friends on Instagram and post them to other social media sites. They boast of 15 million users and with its recent acquisition by Facebook, it’s expected those numbers will continue to grow.
The Instagram app is demonstrated below using an iPhone. Instagram Android works the same way.
Step 1: Download the App from your App store
Search for “Instagram” in the Apple or Android store and download it.
Step 2: Open Your App and Sign Up
When you first open the app, you’ll be invited to sign up for an account. Click “Okay” and then you can either sign up for an account or if you already have one, you can choose the “Login” option at the bottom of the screen.
To create your account, you need to add your email address, choose a username and add a password. You can also add your phone number and upload a picture of yourself. Just choose a photo from your device or take a new picture if you prefer. Click “Done” at the top right when you’re finished.
Step 2: Push Notifications or Not?
At this point, the app will ask you if you want push notifications. This means you’ll be notified whenever someone adds you as a friend, comments or likes one of your photos.
If you choose “OK” and then later want to turn it off or modify the specific settings, it’s easy to do. Just click the icon on the bottom right of the app that looks like this:
Then select “Edit Profile”.
At the bottom of this screen, you’ll see “Push Notifications”
Here you can choose which notifications you receive and who can send them to you.
Step 3: Find and Add Friends
Now you’ll be invited to find your friends and add them on Instagram.
You can search the contacts and your device and invite them personally. You can also see which of your Facebook and Twitter friends are on Instagram and start following them. And finally, you can simply search for someone to see if they are on Instagram.
Adding friends is optional and you can skip this for now, if you prefer. Instagram allows you to post your photos to Facebook, Twitter and other social media sites, so you can come back and grow your friends list later if you’d rather.
Click “Next” in the top right corner when you’re done adding friends or if you want to skip this step.
If you’re not sure who to follow, you can select some people from Instagram’s popular user list:
Step 4: Start Taking Pictures
Now comes the fun part, taking and sharing pictures. You can do this by choosing the little camera icon at the bottom of the screen.
You can start taking photos as you normally would with your device or you can choose photos already on your device. To work with a photo on your device, click the photo icon on the bottom left of the screen that looks like this:
In our example, we’ve taken a photo and are going to work with that. When you take your picture, you’ll see you have a number of different lighting options. Here’s a screenshot below of most of those options.
Choose whichever one you’d like and you can click the green checkbox when you’re done. The app will save the picture onto your camera.
You can also add or remove the frame on your picture if you prefer by clicking the frame icon at the top left of the app screen.
You can also create a blurred effect with the drop icon at the top as well.
When you tap on the drop icon, you’ll see options on how the blur will appear on the photo. The round blur has been chosen below.
Now you can also add a caption to your photo and add your location, if you’d like.
Step 5: Photo Sharing
As mentioned earlier, you can share your photos on social media as well, but you need to configure your settings and give the Instagram app permission to do that.
Once you’ve configured the sites you want, you need to click the green “Share” button to send the photo to the sites you want.
We’re choosing to share on Facebook. Once we click “Share”, we add a description and then click the blue check mark to send it to Facebook.
The picture is then automatically added to Facebook, where your friends there can comment, like and share your photo too.
Step 6: Interacting on Instagram
Instagram also has useful interaction capabilities and there are always great photos to look at. You always have the option to “Like”, comment on or Tweet a photo that you see.
At the bottom of each photo, you’ll see “Like” and “Comment”. Just tap the like and it will show that you liked this photo. You can also go back and see all your likes later, so it’s like making a little collection of photos for yourself.
Commenting is pretty straightforward too. Just click the “Comment” icon as shown above. Then leave your message:
You’ll also notice another icon to the right of the comment option that looks like this:
This allows you to flag any inappropriate photo or Tweet it on Twitter.
Instagram is a fun tool for sharing your photos and helps you create some very attractive photos with your device, even if you’re not a great photographer. Get on and start sharing!
Digital Marketing Agency ADPublishing.org, LLC Extends Healthcare Client Base with UCSF Medical Center and Expands Service Offerings in 2012
Pleasanton, CA – January 31, 2012 – Digital marketing agency, www.ADPublishing.org is pleased to announce that they have been engaged by UCSF Medical Center, Department of Psychiatry, to develop an Internet, mobile and social media marketing and branding campaign. AD Publishing will develop for the department new, graphically rich and content engaging website and social media platforms as well as implement a comprehensive marketing campaign across the digital landscape of PCs, Macs, tablets and cell phones.
In addition, to UCSF Medical Center, AD Publishing has also added several new clients in the healthcare industry, including: medical doctors, chiropractors, and acupuncturists. “We not only have the domain knowledge, but also the critical mass to outperform in this space,” said David Chan of AD Publishing. “With our extensive service offerings and our dedicated, highly skilled team, we are confident that we can help any size healthcare practitioner, whether a sole proprietor or a medical institution.”
AD Publishing’s expanded services offerings include: an online support ticketing system, 800 number phone support, and a proprietary training website. All of these services have been designed to ensure the best possible support for our clients. In addition to post-support procedures, AD Publishing also provides extensive pre-development support in the form of online project management, meetings and continual tracking of development process.
Finally, AD Publishing has developed a very compelling pricing model for the sole practitioner in order to help them jump start their practice without breaking the bank.
To learn more about AD Publishing, please visit us at www.adpublishing.org or call us at 877.886.8766.
01/01/12 by Alex Tran | Feature | Comments Off on IaaS, PaaS, SaaS, and Other Cloud Computing Buzz Words For Dummies
As you contemplate using cloud computing architecture this year, there are certain lingo you need to know. As with any new and innovative technology, buzzwords abound and cloud computing is no different. Most folks have heard about it but few know they are actually using it every day. Even fewer know there is much more to the cloud than Google Docs or Gmail. It’s easy to get lost in all the hype and misinformation going around so here is a list of buzzwords explained about cloud computing to help you sort out what is all the rage these days.
Infrastructure as a Service (IaaS)
IaaS is what started it all. IT departments were looking for ways to lower their data center costs because every time they needed to add more processing power for their applications, it was very expensive and time-consuming to implement. Third-party vendors were aware of these issues and began to offer computing infrastructures for rent. This way, IT shops would not have to hassle with physical machines, data center floor space, cooling requirements and physical security. They would simply rent what they needed from someone else.
IaaS has evolved significantly since its inception with players such as Amazon, Rackspace, Microsoft, GoGrid and others. Each offers something unique but in the end the core services are storage, operating systems, network components such as firewalls and load balancers, and the capability to provision and monitor these resources.
Platform as a Service (PaaS)
PaaS was born out of the need to provide a consistent and inexpensive platform with which to develop enterprise applications upon. It combines IaaS with software and tools so developers can have the freedom to build innovative web applications and services offered entirely over the Internet.
By using PaaS, IT shops no longer struggle with all the environments required to develop applications, such as testing and quality assurance infrastructures. They simply provision these resources via cloud management tools and deploy their applications to them. If a mistake is made, environments can be deleted and the developer can start over easily, all with little downtime.
Software as a Service (SaaS)
Often used interchangeably with PaaS, SaaS is actually a subset of PaaS, providing an on-demand delivery model for applications that are accessed over the Internet using a web browser. Typical applications include customer relationship management (CRM), content management and collaboration apps found in most medium to large enterprises.
Other familiar SaaS applications the general public uses everyday are Gmail, Google Docs, Amazon, WordPress, The Weather Channel, etc. All of these apps use the cloud to store data and expose services that developers can use to integrate features and functions into their own applications, resulting in innovative apps at a much lower cost than if they were built from scratch.
This term is used to describe a whole slew of cloud computing buzzwords such as architecture, hosting and services. It simply means that there is a single application running on a server and multiple clients, or tenants) are able to use the app as if they were the only one using it.
This is a giant leap forward from the days where a vendor would use many instances of the same application and each client would have their own instance. A multi-tenant application drastically reduces computing resources and makes upgrades and ongoing maintenance much easier on everyone.
A public cloud is a set of resources offered by a vendor that provides data storage and applications to the public over the Internet. Some resources are free such as Google Docs while others charge by how much you use them. Information is not really public per se, just publically available to subscribers and is usually accessed with a username and password.
A private cloud is a set of resources that are typically behind a firewall, such as in a corporation. These resources are available in a limited fashion because of information sensitivity or corporate security policy. An example of a private computing cloud is a Human Resource application that might provision some server computing power on-demand (IaaS), use some software components (SaaS) and a proprietary database that only the HR app is allowed to use.
A web service is a component of software that provides a standards-based interface to a function exposed by an application. In other words, it lets a user have access to part of an application that normally would never be available to use. For example, if you want to display the current temperature in your city on your website, you can use a web service from a weather provider to get the temperature. This way, you do not have to provide a weather station in the area you want the temperature for.
Even More Buzzwords
There are many more cloud computing architecture buzzwords and new ones seem to be invented every day. This list covers the major ones that should allow you to hang with cloud computing crowd. Consider yourself armed and dangerous now and your boss will be impressed with your new-found wisdom.