window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Know Your Tech: A/B Testing

Know Your Tech: A/B Testing

A key component to effectively attracting your audience is to better understand their preferences. Even the most seemingly insignificant change, like changing the color of the buttons on your website, can have a major impact on how effective your materials are. Fortunately, through a process called A/B testing, observing the impact of these changes is somewhat straightforward.

A/B Testing, Defined
Running an A/B test is the process of comparing a single variable to deem which option, Option A or Option B, is the more effective of the two. The key to an effective A/B test is to only change one thing between the two test subjects - otherwise, you have no way of knowing exactly what it was that was the influential change.

A/B tests can be used to make a wide variety of choices, from something as simple as an adjustment to a call-to-action to a different layout to a particular page. In this case, Option A should be the way things currently are to serve as a control for the experiment, while Option B displays your proposed change. Each option is then presented to an equally-sized segment of your audience to deem which of the two is the more effective.

Setting Up an A/B Test
A/B testing can be used to make a vast number of decisions, as long as they are approached one at a time. As we said before, if multiple variables are involved in a single test, that test isn’t going to deliver reliable enough results to make any well-supported decisions. It is also worth mentioning that A/B testing tends to work better when comparing options for relatively minor changes, like calls-to-action or images included in an email or on a landing page, rather than big ones.

The first step will be to decide which variable you intend to test, followed by your determination of a metric to base your observations against. Does this change boost engagement? Increase the time spent on page? Improve your click-through rate?

Once this has been accomplished, you’re ready to state what your control option will be, and what your change will be after that. Your control group should be whatever you currently have in place, so you can accurately judge if a change would be an improvement or not. Then you need to settle on a sample size, or the number of recipients that will be a part of this test.

Not all changes will be accurately measured with a sample size alone. Some changes would be better left running until a statistically significant data sample has been collected. Speaking of statistical significance, you will also need to decide how significant your results have to be before a change is deemed to be worthwhile.

Running An A/B Test
There are two real keys to running a successful A/B test: first, you have to give it enough time to collect the data you’ll need to come to a conclusion, and second, both options need to be tested at the same time to prevent other variables from affecting your data. Of course, if the variable that your A/B test is evaluating is timing, this doesn’t apply so much.

In short, A/B testing is a relatively simple way to make sure that you’re having as large an impact on your audience as possible. Can you think of any times that you’ve done something similar to test out a proposed change? Tell us about it in the comments!

Hackers Target Major Sporting Events
Hackers Plus Artificial Intelligence Equals Big Tr...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, January 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Cloud Best Practices Business Computing Privacy Managed IT Services Data Backup Hackers Hosted Solutions Malware Data Recovery Mobile Devices VoIP Email Data Google Outsourced IT Tech Term Innovation User Tips Internet Microsoft Internet of Things Backup Hardware Business Continuity Cloud Computing Business BDR Software Communications IT Services Saving Money Cybersecurity Communication Efficiency Ransomware Smartphones Productivity Smartphone IT Support Managed IT Services Small Business Router Cybercrime Disaster Recovery Android Artificial Intelligence IT Support Network Applications Windows 10 Browser Chrome Workplace Tips Computer Business Management Gadgets Phishing Law Enforcement Managed IT How To Avoiding Downtime Spam Data Protection Mobile Device Management Virtualization Two-factor Authentication Holiday Information Mobility Server Word Money Mobile Device Collaboration Business Intelligence Windows BYOD Access Control Blockchain Save Money Office 365 Data Security Computers Social Media Remote Monitoring App Voice over Internet Protocol Facebook Software as a Service Automation Telephone Systems Wi-Fi Connectivity Proactive IT Passwords Identity Theft Bandwidth Document Management Encryption Apps Machine Learning Productivity Managed Service Servers Alert Compliance Vulnerability Settings Firewall Training Social Engineering Analysis Miscellaneous Upgrade IT Management Redundancy Telephone System Employer-Employee Relationship Data Breach Infrastructure Google Drive VPN IT Plan Spam Blocking Flexibility Windows 7 Solid State Drive Business Owner Comparison Information Technology Password Education Bring Your Own Device Unsupported Software Private Cloud Value Operating System Telephony File Sharing Data Storage CES Sports Keyboard Update Unified Threat Management Work/Life Balance Content Management Hacker Credit Cards Networking Workers Budget Microsoft Office Botnet Big Data Paperless Office Fraud Virtual Assistant OneNote Smart Tech Website Data loss Scam Mobile Computing Google Docs Human Resources HaaS Smartwatch Emails Hacking eWaste Wireless Internet Windows Server 2008 Telecommuting Warranty Instant Messaging Insurance Cryptocurrency Screen Mirroring Social Conferencing Worker Commute Content Filter HBO E-Commerce HIPAA Wireless Professional Services Battery Fiber-Optic Nanotechnology Windows 10 Line of Business Samsung Legal Entertainment Staff Healthcare Sync Amazon Web Services Search Engine Network Congestion Safe Mode Cast Charger Criminal Wire Remote Work Printer Downtime USB Practices Vendor Password Manager Storage Outlook Hard Drives Camera Computer Fan Remote Computing Accountants HVAC Tools IT Consultant Cables Multi-Factor Security MSP Digital Signature Electronic Health Records Online Shopping Bing Electronic Medical Records Hosted Computing Augmented Reality Government Computing Infrastructure Data Management Regulations Mouse Recovery Display Business Mangement Frequently Asked Questions Specifications FENG Wireless Technology Enterprise Content Management Root Cause Analysis Leadership Unified Communications Devices Software Tips Trending Public Cloud Remote Worker Windows 10s Skype Evernote Help Desk Inventory The Internet of Things Netflix Marketing Smart Office Cortana Administrator Business Technology Security Cameras Save Time Gmail Addiction Excel Millennials Virtual Private Network IoT Password Management Meetings Patch Management Theft Thought Leadership Physical Security Managed Service Provider Lifestyle Wiring SaaS Risk Management Strategy YouTube Start Menu Wireless Charging Shortcuts Data Warehousing WiFi End of Support Proactive Cleaning Flash Microchip Current Events Recycling Users Cache Tip of the week Workforce Project Management NIST Travel webinar Virtual Reality Google Apps Streaming Media PDF GDPR Audit Mobile Health Office Tips eCommerce Content Filtering Authentication Remote Monitoring and Maintenance Computer Care Students Technology Tips Amazon Knowledge Black Market Vendor Management CrashOverride Wearable Technology Domains Bluetooth Transportation Assessment Video Games Managing Stress Files Books Advertising Office Colocation Regulation Webinar Automobile How to Public Speaking Benefits Television Presentation History Search Best Practice Lithium-ion battery Relocation IT solutions Troubleshooting Worker Smart Technology Twitter Tech Support Printers Public Computer Scalability 5G Techology Emergency IBM Loyalty Safety Humor Internet Exlporer Shadow IT Hosted Solution Rootkit Experience User Error Employer Employee Relationship Customer Relationship Management Hybrid Cloud Competition Content IP Address Employee/Employer Relationship Hiring/Firing Music Computer Accessories Customer Service Politics Company Culture Fun Internet exploMicrosoft Audiobook Mobile Office Quick Tips Utility Computing Two Factor Authentication

Mobile? Grab this Article!

QR-Code dieser Seite