(707) 268-8850    Get SUPPORT

Network Management Services Blog

Know Your Tech: A/B Testing

Know Your Tech: A/B Testing

A key component to effectively attracting your audience is to better understand their preferences. Even the most seemingly insignificant change, like changing the color of the buttons on your website, can have a major impact on how effective your materials are. Fortunately, through a process called A/B testing, observing the impact of these changes is somewhat straightforward.

A/B Testing, Defined
Running an A/B test is the process of comparing a single variable to deem which option, Option A or Option B, is the more effective of the two. The key to an effective A/B test is to only change one thing between the two test subjects - otherwise, you have no way of knowing exactly what it was that was the influential change.

A/B tests can be used to make a wide variety of choices, from something as simple as an adjustment to a call-to-action to a different layout to a particular page. In this case, Option A should be the way things currently are to serve as a control for the experiment, while Option B displays your proposed change. Each option is then presented to an equally-sized segment of your audience to deem which of the two is the more effective.

Setting Up an A/B Test
A/B testing can be used to make a vast number of decisions, as long as they are approached one at a time. As we said before, if multiple variables are involved in a single test, that test isn’t going to deliver reliable enough results to make any well-supported decisions. It is also worth mentioning that A/B testing tends to work better when comparing options for relatively minor changes, like calls-to-action or images included in an email or on a landing page, rather than big ones.

The first step will be to decide which variable you intend to test, followed by your determination of a metric to base your observations against. Does this change boost engagement? Increase the time spent on page? Improve your click-through rate?

Once this has been accomplished, you’re ready to state what your control option will be, and what your change will be after that. Your control group should be whatever you currently have in place, so you can accurately judge if a change would be an improvement or not. Then you need to settle on a sample size, or the number of recipients that will be a part of this test.

Not all changes will be accurately measured with a sample size alone. Some changes would be better left running until a statistically significant data sample has been collected. Speaking of statistical significance, you will also need to decide how significant your results have to be before a change is deemed to be worthwhile.

Running An A/B Test
There are two real keys to running a successful A/B test: first, you have to give it enough time to collect the data you’ll need to come to a conclusion, and second, both options need to be tested at the same time to prevent other variables from affecting your data. Of course, if the variable that your A/B test is evaluating is timing, this doesn’t apply so much.

In short, A/B testing is a relatively simple way to make sure that you’re having as large an impact on your audience as possible. Can you think of any times that you’ve done something similar to test out a proposed change? Tell us about it in the comments!

Hackers Target Major Sporting Events
Hackers Plus Artificial Intelligence Equals Big Tr...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, April 18 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Mobile Devices VoIP Innovation Backup Hosted Solutions Email Google Outsourced IT Data Tech Term Data Recovery IT Support Internet of Things Internet Microsoft Cloud Computing IT Services Software Saving Money Hardware BDR Business Continuity Efficiency Communications Communication Small Business Cybersecurity Ransomware Smartphones Business Cybercrime Disaster Recovery Android Artificial Intelligence User Tips Server Managed IT Services Managed IT Smartphone Windows Alert Gadgets How To Browser Network Avoiding Downtime Save Money Computers Mobile Device Management Money Vulnerability Workplace Tips Two-factor Authentication Chrome Computer Mobility Phishing Passwords Firewall Law Enforcement Social Engineering Collaboration Productivity Router BYOD Business Intelligence Miscellaneous Data Security Data Protection Windows 10 Applications Business Management Social Media VPN Flexibility Compliance Managed Service Provider Telephone Systems Connectivity Private Cloud Word Productivity Budget Document Management Bandwidth Remote Monitoring Operating System Office 365 Virtualization Facebook Proactive IT Upgrade IT Support Identity Theft Redundancy Blockchain Spam Comparison Mobile Device Windows 10 OneNote Credit Cards Analysis IT Management Physical Security App Wi-Fi Windows 7 Automation Government Training Workers Solid State Drive Infrastructure Holiday IT Plan Google Drive Password Settings Update Business Owner Apps Data Breach Information Sports File Sharing Quick Tips Information Technology Content Filtering Unsupported Software Public Cloud Work/Life Balance Microsoft Office Servers Employer-Employee Relationship Data Storage Managed Service CES Mobile Computing Big Data Data storage Website Spam Blocking Encryption Value Networking Content Management Paperless Office Access Control Virtual Assistant Smart Tech Bring Your Own Device Office Tips Unified Threat Management Data loss Hacking Emergency HBO Telephone System Recycling Wireless Internet HIPAA Professional Services Insurance Google Apps Content Filter Office Entertainment Leadership Sync Cortana SaaS Multi-Factor Security Cryptocurrency Wireless Charging Nanotechnology Advertising Human Resources Healthcare USB Cleaning Screen Mirroring Netflix Software as a Service Patch Management Outlook Specifications eWaste Wire CrashOverride Tools Fraud Practices User Error Safe Mode Storage Relocation Audit Augmented Reality Telephony Accountants Colocation PDF Black Market Trending Fiber-Optic Data Management Wireless Technology Current Events Regulations MSP Staff Hiring/Firing Electronic Health Records Health Computer Care Cast HVAC Scam Safety Frequently Asked Questions Millennials Criminal Keyboard IBM Downtime Amazon Hosted Computing Password Manager Humor The Internet of Things Computer Fan webinar Skype Computing Infrastructure Marketing Hacker Lifestyle Cables Devices Knowledge Remote Worker Digital Signature Machine Learning Files Hosted Solution Samsung Enterprise Content Management Excel Workforce Smart Office Apple Charger Root Cause Analysis Emails Botnet Amazon Web Services Inventory Reputation Internet Exlporer Business Technology Business Mangement Addiction Legal Risk Management FENG Conferencing Start Menu IoT Education Software Tips Unified Communications Thought Leadership Hybrid Cloud Electronic Medical Records Network Congestion Flash Wiring YouTube Recovery Google Docs Password Management Save Time Tip of the week Telecommuting Hard Drives iPhone Meetings Travel Online Shopping Customer End of Support Gmail Cache Mobile Monitor History Theft Streaming Media HaaS Windows 10s IT Consultant Camera Strategy Data Warehousing Voice over Internet Protocol NIST Internet exploMicrosoft Supercomputer Windows Server 2008 Remote Work Students Evernote Authentication Rootkit Virtual Reality Public Speaking Employer Employee Relationship Printers Managing Stress Automobile Presentation Line of Business Lithium-ion battery Regulation Worker Commute Computer Accessories Two Factor Authentication 5G Instant Messaging Troubleshooting Tech Support Video Games Vendor Management Fun Twitter Bluetooth Battery Assessment Techology How to WiFi Competition Transportation Remote Computing Experience Customer Relationship Management Administration Books IP Address Television Content Users Benefits Proactive Scalability Music Customer Service Webinar Public Computer Search Best Practice Politics Worker Mobile Office Audiobook Domains Company Culture Shadow IT Loyalty Smart Technology Wireless Remote Monitoring and Maintenance Wearable Technology IT solutions