Thursday, January 23, 2014

Participation Inequality

Participation Inequality (Jacob Neilsen)
In most online communities, 90% of users are lurker who never contribute, 9% of users contribute a little, and 1% of users account for almost all the actions that occur within the online community.

What is the 1% Rule?  (Charles Arthur)
It is an emerging rule of thumb that suggests that if you get a group of 100 people online, then only one individual will actually create content, ten individuals will interact (commenting or offering improvements) and the other 89 people will just view the community.

What Marketers Are Missing About the New Lurker Demographic (Jack Holt)
Twitter is making a strong play to encourage its social "lurkers" to get involved--that is, the 40 percent of users who have an active account(s), but fail to tweet.

Wednesday, January 15, 2014

Browser Extensions

10 Best Chrome Extensions to Install in 2014
Users looking for a cleaner, faster, and simpler web browser have switched over to Google Chrome since September of 2008. The Chrome extensions install within a few seconds, and enhances your web surfing experience. Click on the link for a full list of the top 10 extensions to install on your Google Chrome in 2014. 

If you use a lot of tabs when you work on your computer, then TabCloud is one of the most important extensions. It can sync your browser tabs across computers so that you can save and restore different window sessions on any of your machines later. 


This extension goes along with "Paying Attention"--it helps you focus on your work. If you notice yourself wasting your time and getting distracted, you can set a time limit for websites (Facebook, Twitter) and the extension will automatically block it after the set time limit.


This extension splits you Chrome windows into two, which provides better readability, and you do not need to toggle in between tabs anymore. 

20 Things about Browser Extensions
Learn about browser extensions; how to install and synchronize your browsers; your privacy; malware, phishing and security risks; IP addresses, and validating identities online.