(707) 268-8850    Get SUPPORT

Network Management Services Blog

Know Your Tech: A/B Testing

Know Your Tech: A/B Testing

A key component to effectively attracting your audience is to better understand their preferences. Even the most seemingly insignificant change, like changing the color of the buttons on your website, can have a major impact on how effective your materials are. Fortunately, through a process called A/B testing, observing the impact of these changes is somewhat straightforward.

A/B Testing, Defined
Running an A/B test is the process of comparing a single variable to deem which option, Option A or Option B, is the more effective of the two. The key to an effective A/B test is to only change one thing between the two test subjects - otherwise, you have no way of knowing exactly what it was that was the influential change.

A/B tests can be used to make a wide variety of choices, from something as simple as an adjustment to a call-to-action to a different layout to a particular page. In this case, Option A should be the way things currently are to serve as a control for the experiment, while Option B displays your proposed change. Each option is then presented to an equally-sized segment of your audience to deem which of the two is the more effective.

Setting Up an A/B Test
A/B testing can be used to make a vast number of decisions, as long as they are approached one at a time. As we said before, if multiple variables are involved in a single test, that test isn’t going to deliver reliable enough results to make any well-supported decisions. It is also worth mentioning that A/B testing tends to work better when comparing options for relatively minor changes, like calls-to-action or images included in an email or on a landing page, rather than big ones.

The first step will be to decide which variable you intend to test, followed by your determination of a metric to base your observations against. Does this change boost engagement? Increase the time spent on page? Improve your click-through rate?

Once this has been accomplished, you’re ready to state what your control option will be, and what your change will be after that. Your control group should be whatever you currently have in place, so you can accurately judge if a change would be an improvement or not. Then you need to settle on a sample size, or the number of recipients that will be a part of this test.

Not all changes will be accurately measured with a sample size alone. Some changes would be better left running until a statistically significant data sample has been collected. Speaking of statistical significance, you will also need to decide how significant your results have to be before a change is deemed to be worthwhile.

Running An A/B Test
There are two real keys to running a successful A/B test: first, you have to give it enough time to collect the data you’ll need to come to a conclusion, and second, both options need to be tested at the same time to prevent other variables from affecting your data. Of course, if the variable that your A/B test is evaluating is timing, this doesn’t apply so much.

In short, A/B testing is a relatively simple way to make sure that you’re having as large an impact on your audience as possible. Can you think of any times that you’ve done something similar to test out a proposed change? Tell us about it in the comments!

Hackers Target Major Sporting Events
Hackers Plus Artificial Intelligence Equals Big Tr...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Hosted Solutions Innovation Backup Mobile Devices VoIP Email Google Data Tech Term Outsourced IT Data Recovery IT Support Microsoft Cloud Computing Software IT Services Saving Money Internet of Things Internet Business Continuity Efficiency Hardware BDR Communications Communication Small Business Cybercrime Cybersecurity Smartphones Business Ransomware Disaster Recovery User Tips Android Artificial Intelligence Server Computers Avoiding Downtime Smartphone Save Money Windows How To Gadgets Browser Managed IT Alert Managed IT Services Network BYOD Computer Chrome Money Phishing Firewall Passwords Applications Productivity Business Intelligence Social Engineering Workplace Tips Law Enforcement Windows 10 Data Security Data Protection Miscellaneous Mobility Business Management Social Media Collaboration Vulnerability Mobile Device Management Two-factor Authentication Router Word VPN Facebook Connectivity Managed Service Provider Productivity Budget Flexibility Private Cloud Bandwidth Office 365 Telephone Systems Proactive IT Redundancy IT Support Upgrade Remote Monitoring Identity Theft Operating System Spam Virtualization Blockchain Document Management Compliance Managed Service Hacking Training Update Workers Infrastructure Unsupported Software Settings Physical Security Data Storage Automation Servers Data Breach Apps Virtual Assistant Sports Government Content Filtering Office Tips Microsoft Office Mobile Device Mobile Computing Google Drive Spam Blocking CES Big Data App Quick Tips Website Value Solid State Drive Holiday Public Cloud Encryption Employer-Employee Relationship Networking Password Data loss Content Management Paperless Office Bring Your Own Device Access Control Data storage OneNote Smart Tech Comparison Business Owner IT Management Unified Threat Management Information Technology Work/Life Balance Information Windows 10 Windows 7 Credit Cards File Sharing Wi-Fi IT Plan Analysis Internet exploMicrosoft Cast Human Resources Healthcare Recovery Patch Management Wireless Charging Regulations Nanotechnology Business Technology Downtime eWaste Wire Augmented Reality Fraud Frequently Asked Questions Practices Millennials Save Time Cortana Computer Fan Skype Current Events Storage Wireless Technology Wiring Office Computer Care Accountants Lifestyle Password Management Safety HaaS Advertising Staff Electronic Health Records IBM Scam Fiber-Optic User Error Root Cause Analysis Criminal Botnet webinar The Internet of Things Amazon Excel Hosted Computing Workforce Marketing Hacker Colocation FENG Password Manager Start Menu Knowledge HIPAA Camera Relocation Software Tips Samsung NIST Entertainment Charger Digital Signature Google Docs Emails Machine Learning Hiring/Firing Health Cables Flash Devices Telephone System Meetings Travel Conferencing Smart Office USB Amazon Web Services Tip of the week Inventory Telecommuting Computing Infrastructure Electronic Medical Records Business Mangement Mobile Network Congestion Addiction Humor IoT Cryptocurrency Data Warehousing Voice over Internet Protocol YouTube PDF Black Market Files Windows 10s Unified Communications Thought Leadership Data Management Reputation Internet Exlporer Apple Online Shopping Windows Server 2008 Remote Work Gmail Professional Services IT Consultant Cache Keyboard HBO Safe Mode Theft Sync Supercomputer Streaming Media MSP Hybrid Cloud Strategy Multi-Factor Security HVAC Customer End of Support Screen Mirroring Software as a Service Students Hosted Solution Hard Drives iPhone Emergency Evernote Authentication Monitor History CrashOverride Recycling Tools Leadership Wireless Internet Outlook SaaS Insurance Specifications Audit Google Apps Telephony Content Filter Legal Risk Management Remote Worker Cleaning Trending Netflix Education Enterprise Content Management Content Lithium-ion battery Computer Accessories Scalability Music Two Factor Authentication 5G Best Practice Politics Tech Support Audiobook Proactive Vendor Management WiFi Shadow IT Bluetooth Wearable Technology Assessment Twitter Virtual Reality Competition Remote Monitoring and Maintenance Customer Relationship Management Transportation Automobile Books Television IP Address Printers Fun Users Worker Commute Line of Business Webinar Customer Service Benefits Regulation Worker Instant Messaging Troubleshooting Public Computer Mobile Office Administration Domains Video Games Loyalty Smart Technology Wireless IT solutions Company Culture Battery Techology Rootkit How to Employer Employee Relationship Public Speaking Remote Computing Experience Search Presentation Managing Stress