window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Know Your Tech: A/B Testing

Know Your Tech: A/B Testing

A key component to effectively attracting your audience is to better understand their preferences. Even the most seemingly insignificant change, like changing the color of the buttons on your website, can have a major impact on how effective your materials are. Fortunately, through a process called A/B testing, observing the impact of these changes is somewhat straightforward.

A/B Testing, Defined
Running an A/B test is the process of comparing a single variable to deem which option, Option A or Option B, is the more effective of the two. The key to an effective A/B test is to only change one thing between the two test subjects - otherwise, you have no way of knowing exactly what it was that was the influential change.

A/B tests can be used to make a wide variety of choices, from something as simple as an adjustment to a call-to-action to a different layout to a particular page. In this case, Option A should be the way things currently are to serve as a control for the experiment, while Option B displays your proposed change. Each option is then presented to an equally-sized segment of your audience to deem which of the two is the more effective.

Setting Up an A/B Test
A/B testing can be used to make a vast number of decisions, as long as they are approached one at a time. As we said before, if multiple variables are involved in a single test, that test isn’t going to deliver reliable enough results to make any well-supported decisions. It is also worth mentioning that A/B testing tends to work better when comparing options for relatively minor changes, like calls-to-action or images included in an email or on a landing page, rather than big ones.

The first step will be to decide which variable you intend to test, followed by your determination of a metric to base your observations against. Does this change boost engagement? Increase the time spent on page? Improve your click-through rate?

Once this has been accomplished, you’re ready to state what your control option will be, and what your change will be after that. Your control group should be whatever you currently have in place, so you can accurately judge if a change would be an improvement or not. Then you need to settle on a sample size, or the number of recipients that will be a part of this test.

Not all changes will be accurately measured with a sample size alone. Some changes would be better left running until a statistically significant data sample has been collected. Speaking of statistical significance, you will also need to decide how significant your results have to be before a change is deemed to be worthwhile.

Running An A/B Test
There are two real keys to running a successful A/B test: first, you have to give it enough time to collect the data you’ll need to come to a conclusion, and second, both options need to be tested at the same time to prevent other variables from affecting your data. Of course, if the variable that your A/B test is evaluating is timing, this doesn’t apply so much.

In short, A/B testing is a relatively simple way to make sure that you’re having as large an impact on your audience as possible. Can you think of any times that you’ve done something similar to test out a proposed change? Tell us about it in the comments!

Hackers Target Major Sporting Events
Hackers Plus Artificial Intelligence Equals Big Tr...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, April 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Network Security Technology Best Practices Cloud Business Computing Privacy Data Backup Hosted Solutions Managed IT Services Hackers Malware Data Recovery Email Productivity Mobile Devices Internet VoIP Data User Tips Google Outsourced IT Communications Innovation Internet of Things Tech Term Microsoft Cloud Computing IT Services Backup Cybersecurity Hardware Software Efficiency Business Continuity Artificial Intelligence Workplace Tips BDR Saving Money Business Smartphones Business Management Communication Small Business Android Ransomware IT Support Smartphone Managed IT Services IT Support Network Windows 10 Phishing Router Cybercrime Disaster Recovery Chrome Gadgets Browser Collaboration Applications Training Law Enforcement Managed IT How To Encryption Server Computer Mobile Device Windows Data Security Save Money Computers Office 365 Avoiding Downtime Data Protection Information Social Media Spam Virtualization Mobile Device Management Proactive IT Word Holiday Two-factor Authentication Mobility Money Access Control Business Intelligence Passwords Blockchain BYOD Firewall Social Engineering IT Management Redundancy Miscellaneous Upgrade Connectivity Remote Monitoring Voice over Internet Protocol App File Sharing Automation Software as a Service Facebook Machine Learning Operating System Bandwidth Private Cloud Managed Service Telephone Systems Identity Theft Business Technology Education Wi-Fi Paperless Office Servers Document Management Alert Apps Analysis Vulnerability Productivity Settings Compliance OneNote Telephone System Data loss Budget Microsoft Office Cryptocurrency Infrastructure Mobile Computing VPN Big Data Google Docs Staff Healthcare Health Data Breach Users Scam Website Employer-Employee Relationship Google Drive IT Plan Spam Blocking CES Sports Windows 7 Flexibility Display Solid State Drive Comparison Wireless Information Technology Unsupported Software Value Password Telephony Data Storage Remote Computing Content Management Business Owner Virtual Private Network Bring Your Own Device Augmented Reality Networking Update Keyboard Unified Threat Management Credit Cards Virtual Assistant Meetings Botnet Workers Manufacturing Smart Tech Work/Life Balance Hacker Human Resources Fraud Save Time End of Support Smartwatch Travel Risk Management eWaste Wireless Internet Warranty Biometric Security Tip of the week Workforce Patch Management Insurance Social Mobile Content Filter webinar E-Commerce Database Audit Fiber-Optic Nanotechnology Knowledge PDF Line of Business File Versioning Computer Care Office Tips Search Engine Amazon Safe Mode Employee Screen Mirroring Criminal Wire Vendor Management Emails Technology Tips Quick Tips Printer OLED Windows Server 2008 Telecommuting Virtual Reality Practices HaaS Vendor Professional Services Password Manager Storage Conferencing Camera HBO Black Market Content Filtering Accountants HVAC Hacking Cables Network Congestion MSP Multiple Versions Instant Messaging Digital Signature Electronic Health Records Samsung Bing Sync Amazon Web Services Hosted Computing Downtime Digital Signage Cast HIPAA Charger Mouse Remote Work Worker Commute Tools Legal Entertainment Business Mangement Distribution Outlook Battery Enterprise Content Management Computer Fan Online Shopping Windows 10 Unified Communications Devices Electronic Medical Records IT Consultant Hard Drives Remote Worker Restore Data Multi-Factor Security USB Help Desk Inventory Google Search Government Smart Office Administrator Regulations Computing Infrastructure Security Cameras Root Cause Analysis Gmail Addiction Logistics Frequently Asked Questions Specifications IoT Password Management FENG Skype Evernote Data Management Theft Thought Leadership Leadership Wiring Backup and Disaster Recovery Software Tips Trending Recovery Strategy YouTube Windows 10s Shortcuts Public Cloud Proactive Net Neutrality Netflix Microchip Employee/Employer Relationship Recycling Cache Cortana Project Management Excel Millennials Wireless Technology 5G NIST Start Menu Wireless Charging Google Apps Streaming Media GDPR Cryptomining Physical Security Lifestyle SaaS eCommerce The Internet of Things Authentication Current Events Managed Service Provider Remote Monitoring and Maintenance ISP Data Warehousing WiFi Marketing Students Cleaning Flash Content Customer Relationship Management Computer Accessories Hiring/Firing Competition Managing Stress Two Factor Authentication Music IP Address CrashOverride Fun Internet exploMicrosoft Regulation Politics Audiobook Customer Service Bluetooth Analytics Assessment Wearable Technology Mobile Office Files Advertising Video Games Webinar Office Transportation Domains Colocation Twitter Printers Books Television Automobile How to History Search IT solutions Relocation Benefits Public Speaking Best Practice Worker Presentation Public Computer Troubleshooting Lithium-ion battery Loyalty Techology Scalability Humor Smart Technology Internet Exlporer Tech Support Rootkit Emergency IBM Employer Employee Relationship Shadow IT Hosted Solution Safety Company Culture User Error Hybrid Cloud Experience Utility Computing

Mobile? Grab this Article!

QR-Code dieser Seite