How to make TK on content and not screw it up
TK is always a sore subject, no matter what area we talk about. Based on my personal experience, I can note that 90% of clients from small and medium-sized businesses…

Continue reading →

Types of engaging social media content
By engaging (communicative) content, I mean content that encourages users to communicate. These can be posts that enhance communication on the group’s wall (in the comments) or suggest subscribers to…

Continue reading →

5 mistakes that will drown your SMM
Sonia Simone is a content marketer, co-founder of Rainmaker Digital, a digital marketing studio. Sonya started as a “traditional” marketer, developed courses for small businesses, and tested online since 1989.…

Continue reading →

main points

Destination of proxies and NAT

A proxy server is designed to mediate between a workstation and a worldwide network.

The proxy computer passes user requests through itself and then returns the results received from Inetrnet. This is a kind of “trustee”, contributing to the simultaneous access of all machines on the local network to the Internet. At the same time, the administrator setting up the grid is relieved of the need to assign a separate IP address to each individual point, build a complex routing scheme, and contact the provider for an additional (usually paid) service. Continue reading

Child Safety Online

Many users, even the most experienced, sometimes do not suspect that having protected themselves, they forget about their own children. They forget, especially when creating different accounts in the OS for themselves and for the child, that children require attention even at the computer and they still cannot and do not want to take care of their own protection. And this task is being placed on our shoulders.

Immediately determine what threats the Internet poses for a child. They can be divided into two categories: threats associated with games and threats associated with paging. With the second, everything is clear, advertisements and pornography, pop-ups and the calculation of children’s naivety. Games carry risks of a different kind – abnormal social adaptation and the study of indecent words, and not only that. Continue reading

How Instagram Algorithm Actually Works

The happy times of the chronological tape, which everyone loved so much, Instagram representatives sent to the past because of two simple facts:

– 70% of the content from the profiles that the user subscribed to, he simply skipped due to the fact that there were too many posts.

– The user also missed 50% of posts from friends, due to a previous reason.

Therefore, an algorithm appeared that began to decide for us what is interesting, what is relevant and what should be in our feeds. I’m really happy.

But thanks to the implementation of the algorithm, users now see 90% of posts from his friends and Continue reading

You need a content strategy, not a Facebook strategy
Recently it became known that after six months of testing, Facebook is finally launching Graph Search, a new search engine. So far we are talking only about the USA, but…

...

How to make materials visual
Visualization extends narrative and increases reader engagement. When the text is supplemented by a photograph, infographic or gif, the reader does not have time to get bored, hangs on the…

...

How to increase the level of involvement in social networks
Interesting pages in this case are an additional “entry point”. If you are in the top 5, then attract additional traffic and subscribers. And for free. That is why VKontakte…

...

Child Safety Online
Many users, even the most experienced, sometimes do not suspect that having protected themselves, they forget about their own children. They forget, especially when creating different accounts in the OS…

...