Below are five reasons many Businesses fail in social media and how you can turn it around:
1. You have no plan. Social media is one tool in your marketing toolbox. Make sure you create your strategy BEFORE you try to implement one. Schedule time every morning and evening to devote to social media. 30 minutes in the morning and 30 minutes in the afternoon/evening. If you don’t have a plan – it will take you twice as long!
2. You don’t have great content. This is a biggie. If you’re finding it difficult to engage people through social media, then it may be a sign that you’re not giving them enough to engage with. It doesn’t matter how likable, charismatic or helpful you are, if you’re posting things of little interest, no one is going to care about the content OR your brand. Where to get good content?
3. You put the wrong person in charge. Social media is not something you can delegate 100% as a business owner. You can delegate some of it – but the personal interaction that makes social media work, has to come from you. Owners that tend to do well are the ones that are personable, humble, and that genuinely enjoy talking to people and being social. If that person is not you then you may have a difficult time attracting fans or followers. Consider hiring someone to help you, whether it’s an assistant or intern.
4. You’re not listening. There are two different kinds of businesses in social media. Those that listen, and those that pitch their business. Businesses who engage in the latter typically have a difficult time gaining traction. While you can definitely use social media to target new clients and pitch your products and services, you have to develop a relationship with your fans and followers first. Facebook Pages that succeed are the ones who are able to integrate personal interactions and also offer them something they’re actually interested in (i.e. community events, local school info, market stats, etc.) – and they do so on a consistent, daily basis. They can offer that info that because they’ve listened. That’s the power of social media
5. You’re just ‘dabbling’ with it. If you spent $5 on a newspaper ad and saw no return, you wouldn’t be surprised. However, we all know that most newspaper can run a lot more than this. If you spend nothing on social media, then you’re going to see the same return. And that’s where many businesses are right now – they’re ‘dabbling’ or ‘experimenting’ in social media, but they’re not dedicating any resources to it. They’re not investing their time to learn, to keep up with what’s new, and they’re not paying for tools that will help them monitor and benchmark what they’re doing. Just like with anyone else, the investment you put in is going to dictate the value you get out of it. Businesses who ‘dabble’, should expect to get dabbling results.
Wednesday, May 5, 2010
Friday, October 23, 2009
Email Hoaxes – What to look for!
The following information is courtesy of Debra Littlejohn Shinder from an article in TechRepublic.com.
We’re bombarded on an almost daily basis with news of new threats to our computer systems. Installing a good antivirus program and keeping it up to date isn’t enough; other forms of attack—from spyware that infects individual computers to denial of service attacks that bring down whole networks—are on the rise, too.
But along with all the reports of real threats, the Internet spawns numerous hoaxes: messages that warn of threats that aren’t real. The originators of these messages are sometimes just trying to be funny, but other times they instruct users to do things to protect against the fake threat that really will damage their data or render their computer unusable. Most people who pass on the hoaxes have good intentions, but forwarding copies of virus and attack warnings that haven’t been confirmed can do more harm than good. Of course, a number of hoax messages out there promise all sorts of good things. Alas, when they sound too good to be true, they probably are.
Here is a list to help raise their awareness of the scams you may encounter. You’ll be less likely to fall for a hoax and tie up your resources, and you may think twice before hitting that Forward button.
Good Times: The mother of all virus hoaxes
This virus warning, in various forms, has been making its way around the Internet since at least the mid-1990s. It supposed originated on America Online, and the warnings claimed that it was far more dangerous than other well-known (and real) viruses of that time, such as Michelangelo and Stoned. Some of the warning messages claimed only that Good Times would “erase” your hard disk. Others really went overboard, claiming that it would physically destroy the disk so it could never used again and could even damage your computer’s processor.
A virus can indeed cause all the files on your disk to be deleted or even destroy the partition information on a disk (a good example of this was the CIH virus). Viruses can also overwrite the flash BIOS on a computer, rendering it unusable. However, a virus can damage only software; it can’t physically damage a computer’s hardware.
The FCC says…
Hoax warnings often give themselves away by trying too hard. They’ll invoke the Federal Communications Commission (FCC) or some other government agency to make their warning sound credible. Others will make the warnings appear to come from Microsoft, Symantec, or some other large software company or include quotes from supposed “computer experts.” Still others claim that the virus warning was reported on CBS News or by the New York Times or some other reputable media outlet. (Sometimes this is even true; news outlets have occasionally been fooled into repeating hoax warnings.) Many hoaxes also make the claim “checked out by Snopes” (a popular Internet site for verifying the status of urban legends and hoaxes) even when Snopes itself lists them as a hoax.
Exploding the myth about exploding systems
Another clue that a warning is a hoax is that the claims of the virus’s destructiveness are just too incredible. For example, the Death Ray Virus warning is still seen occasionally; it claims that a virus called Death Ray causes home computers to “explode in a hellish blast of glass fragments and flames” and that some specified number of people have already been injured and millions risk their lives every day when they sit down at their computers. The virus is also described as not containing the usual markers that enable it to be identified. And rather than explain exactly how the virus causes this explosion, the hoax says only that “it’s an extremely complicated process.”
Beware the dreaded nth complexity infinite loop
Hoaxes also use technical-sounding jargon that is in fact meaningless. For instance, one variant of the Good Times hoax claimed that it destroyed the computer’s processor by setting it to “an nth complexity infinite loop.” Sounds impressive—and scary—except that there’s no such thing. Hoax warnings count on the fact that most of their recipients are not tech experts and won’t know the difference.
Not-so-sweet cookies
Cookies are small text files that some Web sites place on your hard disk, containing information such as user IDs, shopping cart information, and configuration preferences, so that when you visit the site again it “recognizes” you. Many hoax warnings have appeared claiming that a particular site or Internet service puts a cookie on your hard disk that will allow anyone to read “any of the information on your drive.” Hackers may be able to access and read the files on your system, but they don’t do it through cookies. Cookies are created by the Web site; they contain only information you’ve entered or that concerns your activities on the site (or in some cases, across multiple Web sites). Besides, a cookie that contained all the information on your disk would be an incredibly large file. Cookies do pose a privacy issue, but they don’t disseminate viruses or allow access to your entire hard disk.
A taxing dilemma
As April 15th approaches each year, we see a variation of a hoax that warns you not to send your tax returns electronically because there is an attacker who is intercepting all tax return files and “changing the current account indicated by the victim to the virus author’s account.” This will supposedly cause your refund check to go to the virus writer. According to the IRS Web site, more than 68 million Americans filed their tax returns electronically in 2005.There is no evidence of any tax returns or refunds being intercepted via the Internet as described by the message.
Don’t delete that “virus”
A popular ploy of more malicious virus hoaxers is a message describing a dangerous virus and telling you to search your hard disk for certain files and then delete them to get rid of the virus. The catch is that if you delete the files they tell you to delete, you’re actually deleting important system or application files and you’ll cause your system or some software functions to become unusable or unstable. A relatively harmless example of this is the hoax message that warns Hotmail users that a virus is being spread by MSN Messenger and is not detectable by McAfee or Norton. It includes instructions to delete the file jdbgmgr.exe. In fact, this is a file used by Microsoft developers (the Microsoft Debugger for Java).
Other hoax messages have instructed recipients to delete essential Windows files, rendering their systems unbootable. Never follow virus removal instructions contained in e-mail messages. If a virus is real and can’t be removed by antivirus software, the major AV vendor Web sites will contain instructions for manually removing it.
No free money
Sci-fi writer Robert A. Heinlein coined the acronym TANSTAAFL (pronounced “tan-stawful”), which stands for “There Ain’t No Such Thing As A Free Lunch.” Keep it in mind when you get one of the hundreds of hoax messages boasting of giveaways. One of the most famous ones claims that if you forward the message to other people, Bill Gates, Disney, or some other famous person or company will somehow know how many times you forwarded it and send you money for doing so. Even if some generous soul actually wanted to do this, there is no way they would be able to track your mail and know how many times you forwarded the message.
Variations on this scam include claims that Miller Brewing is giving away free beer, that Abercrombie & Fitch is giving away free clothing, that Coca-Cola is giving away cases of coke, that Dell is giving away free computers, that Nokia is giving away free phones, and so on. In each case, to get your free prize you have to forward the message to a specified number of people (often as high as 25,000).
Playing on your sympathy
Who can resist a request for help—especially when the person who needs help is a little kid? The same “dying child” scams have been floating around the Internet for years, but people still fall for them. They usually describe someone who has a fatal disease, has been the victim of a natural disaster or a terrible accident, or is otherwise in dire straits. Some of these scams ask you to send money; others ask you to send cards or e-mail messages. One variation claims to be from a child who is doing a school project to collect e-mail from as many states and countries as possible. Some, like the “free money” scams, ask you to forward the message to as many people as possible, claiming that some organization, such as the American Cancer Society or Microsoft, will donate money for each time the message is forwarded.
Some of these may start out as genuine situations, but they keep getting forwarded long after the person has died or the problem has been resolved.
State of fear
A particularly obnoxious type of scam message warns you of some sort of physical danger that doesn’t exist. These are often based on “urban legends,” such as the one that warns of people being abducted from bars and waking up the next morning with their kidneys missing, or the one that warns of a series of cases where victims heard a baby crying outside their door and opened it up, only to be attacked by a serial killer. These types of stories have been around since long before the Internet, but e-mail has given them new life.
A recent version claims that on a certain day, members of some street gang will have an initiation ritual in which prospective members must drive around at night with their headlights off and kill the first driver who flashes his/her lights to let them know.
These messages usually quote “police officials” or “FBI spokespersons” to lend credence to their claims.
Today’s hoax may be tomorrow’s reality
It would be irresponsible not to emphasize that virus writers, hackers, and attackers are coming up with something new literally every day. Some of the warnings that were hoaxes a few years ago have blossomed into real threats today. For instance, in the late 90s, there were messages going around the ‘Net warning that you could get a virus on your mobile phone. At the time, there were no viruses that infected mobile phones. But as phone technology has gotten more sophisticated and modern mobile phones run complex operating systems such as Windows Mobile and Symbian, they have become vulnerable to viruses. Another popular virus hoax in the early days of the Internet claimed you could infect your computer with a virus by simply reading an e-mail message. At that time, e-mail was plain text and you had to open an attachment to risk virus infection; with today’s HTML messages, it is indeed possible for code embedded in the HTML to infect your computer.
It’s even possible that some criminal may hear of some of the fear-mongering hoaxes and set out to commit “copycat” crimes. With your computer—and in the rest of your life—you should strive to strike a balance between cynicism and naivety, exercising caution but not believing everything you hear or read.
You can check out virus warnings you suspect of being hoaxes on the hoax pages maintained by Symantec, McAfee, and other AV vendors:
• http://www.symantec.com/avcenter/hoax.html
• http://vil.mcafee.com/hoax.asp
For non-virus messages, check with Snopes or Scambusters:
• http://www.snopes.com
• http://www.scambusters.org
We’re bombarded on an almost daily basis with news of new threats to our computer systems. Installing a good antivirus program and keeping it up to date isn’t enough; other forms of attack—from spyware that infects individual computers to denial of service attacks that bring down whole networks—are on the rise, too.
But along with all the reports of real threats, the Internet spawns numerous hoaxes: messages that warn of threats that aren’t real. The originators of these messages are sometimes just trying to be funny, but other times they instruct users to do things to protect against the fake threat that really will damage their data or render their computer unusable. Most people who pass on the hoaxes have good intentions, but forwarding copies of virus and attack warnings that haven’t been confirmed can do more harm than good. Of course, a number of hoax messages out there promise all sorts of good things. Alas, when they sound too good to be true, they probably are.
Here is a list to help raise their awareness of the scams you may encounter. You’ll be less likely to fall for a hoax and tie up your resources, and you may think twice before hitting that Forward button.
Good Times: The mother of all virus hoaxes
This virus warning, in various forms, has been making its way around the Internet since at least the mid-1990s. It supposed originated on America Online, and the warnings claimed that it was far more dangerous than other well-known (and real) viruses of that time, such as Michelangelo and Stoned. Some of the warning messages claimed only that Good Times would “erase” your hard disk. Others really went overboard, claiming that it would physically destroy the disk so it could never used again and could even damage your computer’s processor.
A virus can indeed cause all the files on your disk to be deleted or even destroy the partition information on a disk (a good example of this was the CIH virus). Viruses can also overwrite the flash BIOS on a computer, rendering it unusable. However, a virus can damage only software; it can’t physically damage a computer’s hardware.
The FCC says…
Hoax warnings often give themselves away by trying too hard. They’ll invoke the Federal Communications Commission (FCC) or some other government agency to make their warning sound credible. Others will make the warnings appear to come from Microsoft, Symantec, or some other large software company or include quotes from supposed “computer experts.” Still others claim that the virus warning was reported on CBS News or by the New York Times or some other reputable media outlet. (Sometimes this is even true; news outlets have occasionally been fooled into repeating hoax warnings.) Many hoaxes also make the claim “checked out by Snopes” (a popular Internet site for verifying the status of urban legends and hoaxes) even when Snopes itself lists them as a hoax.
Exploding the myth about exploding systems
Another clue that a warning is a hoax is that the claims of the virus’s destructiveness are just too incredible. For example, the Death Ray Virus warning is still seen occasionally; it claims that a virus called Death Ray causes home computers to “explode in a hellish blast of glass fragments and flames” and that some specified number of people have already been injured and millions risk their lives every day when they sit down at their computers. The virus is also described as not containing the usual markers that enable it to be identified. And rather than explain exactly how the virus causes this explosion, the hoax says only that “it’s an extremely complicated process.”
Beware the dreaded nth complexity infinite loop
Hoaxes also use technical-sounding jargon that is in fact meaningless. For instance, one variant of the Good Times hoax claimed that it destroyed the computer’s processor by setting it to “an nth complexity infinite loop.” Sounds impressive—and scary—except that there’s no such thing. Hoax warnings count on the fact that most of their recipients are not tech experts and won’t know the difference.
Not-so-sweet cookies
Cookies are small text files that some Web sites place on your hard disk, containing information such as user IDs, shopping cart information, and configuration preferences, so that when you visit the site again it “recognizes” you. Many hoax warnings have appeared claiming that a particular site or Internet service puts a cookie on your hard disk that will allow anyone to read “any of the information on your drive.” Hackers may be able to access and read the files on your system, but they don’t do it through cookies. Cookies are created by the Web site; they contain only information you’ve entered or that concerns your activities on the site (or in some cases, across multiple Web sites). Besides, a cookie that contained all the information on your disk would be an incredibly large file. Cookies do pose a privacy issue, but they don’t disseminate viruses or allow access to your entire hard disk.
A taxing dilemma
As April 15th approaches each year, we see a variation of a hoax that warns you not to send your tax returns electronically because there is an attacker who is intercepting all tax return files and “changing the current account indicated by the victim to the virus author’s account.” This will supposedly cause your refund check to go to the virus writer. According to the IRS Web site, more than 68 million Americans filed their tax returns electronically in 2005.There is no evidence of any tax returns or refunds being intercepted via the Internet as described by the message.
Don’t delete that “virus”
A popular ploy of more malicious virus hoaxers is a message describing a dangerous virus and telling you to search your hard disk for certain files and then delete them to get rid of the virus. The catch is that if you delete the files they tell you to delete, you’re actually deleting important system or application files and you’ll cause your system or some software functions to become unusable or unstable. A relatively harmless example of this is the hoax message that warns Hotmail users that a virus is being spread by MSN Messenger and is not detectable by McAfee or Norton. It includes instructions to delete the file jdbgmgr.exe. In fact, this is a file used by Microsoft developers (the Microsoft Debugger for Java).
Other hoax messages have instructed recipients to delete essential Windows files, rendering their systems unbootable. Never follow virus removal instructions contained in e-mail messages. If a virus is real and can’t be removed by antivirus software, the major AV vendor Web sites will contain instructions for manually removing it.
No free money
Sci-fi writer Robert A. Heinlein coined the acronym TANSTAAFL (pronounced “tan-stawful”), which stands for “There Ain’t No Such Thing As A Free Lunch.” Keep it in mind when you get one of the hundreds of hoax messages boasting of giveaways. One of the most famous ones claims that if you forward the message to other people, Bill Gates, Disney, or some other famous person or company will somehow know how many times you forwarded it and send you money for doing so. Even if some generous soul actually wanted to do this, there is no way they would be able to track your mail and know how many times you forwarded the message.
Variations on this scam include claims that Miller Brewing is giving away free beer, that Abercrombie & Fitch is giving away free clothing, that Coca-Cola is giving away cases of coke, that Dell is giving away free computers, that Nokia is giving away free phones, and so on. In each case, to get your free prize you have to forward the message to a specified number of people (often as high as 25,000).
Playing on your sympathy
Who can resist a request for help—especially when the person who needs help is a little kid? The same “dying child” scams have been floating around the Internet for years, but people still fall for them. They usually describe someone who has a fatal disease, has been the victim of a natural disaster or a terrible accident, or is otherwise in dire straits. Some of these scams ask you to send money; others ask you to send cards or e-mail messages. One variation claims to be from a child who is doing a school project to collect e-mail from as many states and countries as possible. Some, like the “free money” scams, ask you to forward the message to as many people as possible, claiming that some organization, such as the American Cancer Society or Microsoft, will donate money for each time the message is forwarded.
Some of these may start out as genuine situations, but they keep getting forwarded long after the person has died or the problem has been resolved.
State of fear
A particularly obnoxious type of scam message warns you of some sort of physical danger that doesn’t exist. These are often based on “urban legends,” such as the one that warns of people being abducted from bars and waking up the next morning with their kidneys missing, or the one that warns of a series of cases where victims heard a baby crying outside their door and opened it up, only to be attacked by a serial killer. These types of stories have been around since long before the Internet, but e-mail has given them new life.
A recent version claims that on a certain day, members of some street gang will have an initiation ritual in which prospective members must drive around at night with their headlights off and kill the first driver who flashes his/her lights to let them know.
These messages usually quote “police officials” or “FBI spokespersons” to lend credence to their claims.
Today’s hoax may be tomorrow’s reality
It would be irresponsible not to emphasize that virus writers, hackers, and attackers are coming up with something new literally every day. Some of the warnings that were hoaxes a few years ago have blossomed into real threats today. For instance, in the late 90s, there were messages going around the ‘Net warning that you could get a virus on your mobile phone. At the time, there were no viruses that infected mobile phones. But as phone technology has gotten more sophisticated and modern mobile phones run complex operating systems such as Windows Mobile and Symbian, they have become vulnerable to viruses. Another popular virus hoax in the early days of the Internet claimed you could infect your computer with a virus by simply reading an e-mail message. At that time, e-mail was plain text and you had to open an attachment to risk virus infection; with today’s HTML messages, it is indeed possible for code embedded in the HTML to infect your computer.
It’s even possible that some criminal may hear of some of the fear-mongering hoaxes and set out to commit “copycat” crimes. With your computer—and in the rest of your life—you should strive to strike a balance between cynicism and naivety, exercising caution but not believing everything you hear or read.
You can check out virus warnings you suspect of being hoaxes on the hoax pages maintained by Symantec, McAfee, and other AV vendors:
• http://www.symantec.com/avcenter/hoax.html
• http://vil.mcafee.com/hoax.asp
For non-virus messages, check with Snopes or Scambusters:
• http://www.snopes.com
• http://www.scambusters.org
Tuesday, August 25, 2009
Small Businesses and Blogging
Rick Burnes at Hubspot posted an interesting article recently titled: Study Shows Small Businesses That Blog Get 55% More Website Visitors. He looked at data from their customers and found those that blogged got 55% more visitors, 97% more inbound links, and 434% more indexed pages.
Why are website visitors important? Because the more visitors your site has the more people to convert to leads and sales for your business.
Why are inbound links important? Because they signal authority to search engines, thus increasing your chances of getting found in those search engines.
Why are indexed pages important? The more pages you have on your site, the more chances you have of getting found in search engines.
He was careful not to say the blogging caused the better visitor, link, and indexed page results. It’s a correlation. It is possible the organizations that blog are also on average bigger or better at other forms of online marketing.
But its more evidence that blogging is one of the best ways to increase visitors to your website. And apart from your time, it’s free.
As a small business do you blog? If not, why not? Let us know!
Why are website visitors important? Because the more visitors your site has the more people to convert to leads and sales for your business.
Why are inbound links important? Because they signal authority to search engines, thus increasing your chances of getting found in those search engines.
Why are indexed pages important? The more pages you have on your site, the more chances you have of getting found in search engines.
He was careful not to say the blogging caused the better visitor, link, and indexed page results. It’s a correlation. It is possible the organizations that blog are also on average bigger or better at other forms of online marketing.
But its more evidence that blogging is one of the best ways to increase visitors to your website. And apart from your time, it’s free.
As a small business do you blog? If not, why not? Let us know!
Labels:
blogging,
COMPACT 2 Technologies Beaufort SC,
SMM
Tuesday, June 16, 2009
Mobile Internet will grow dramatically despite economic downturn
According to recent consumer surveys in Europe and the US, mobile data usage is expected to increase during the next 2 years despite the current economic downturn. The research, conducted in the five larger Western European countries and the United States analysed 10 mobile data services. It reveals that more than half of the approximately 200 million mobile data users in those countries expect to increase use in the next two years.
More significantly, according to the research more than 25% of the millions of consumers who do not use mobile data services today intend to start using them shortly. This is significant not only to the large mobile services providers but to all businesses in general.
Is your company ready to address this new wave of mobile data users? Do you have a marketing plan to address this market? Is your web site mobile device friendly? If you answered no to these questions visit us at www.compact2.com or contact us at Solutions@Compact2.com so we can discuss how we may be able to help your business succeed.
More significantly, according to the research more than 25% of the millions of consumers who do not use mobile data services today intend to start using them shortly. This is significant not only to the large mobile services providers but to all businesses in general.
Is your company ready to address this new wave of mobile data users? Do you have a marketing plan to address this market? Is your web site mobile device friendly? If you answered no to these questions visit us at www.compact2.com or contact us at Solutions@Compact2.com so we can discuss how we may be able to help your business succeed.
Friday, May 8, 2009
Do you use Social Media sites in your business
Twitter, Facebook, LinkedIn and blogs are the "new" marketing stategy for a lot of businesses these days. Do you use these in marketing your business?
A recent study found that respondents report that the #1 benefit of social media marketing is gaining attention for the business, or “the all-important eyeball.” The majority of marketers say they have undertaken social media activities for this reason and they appear to be paying off: Some 81% of all marketers indicate that their social media efforts have generated exposure for their businesses. Improving traffic and growing marketing lists is the second major benefit, according to the study, followed by building new partnerships. At least two in three participants found that increased traffic occurred with as little as 6 hours a week invested in social media marketing, while those who have been doing this for years reported better results. Owners of small businesses (2 - 100 employees) are more likely than others to report benefits.
The study also found more than half of participants reported that a major benefit of social media marketing is the resultant rise in search engine rankings that often comes with increased efforts. Improved search engine rankings were most prevalent among those who’ve been using social media for years, with nearly 80% reporting a rise.
Though about one in two found social media generated qualified leads, only about one in three said social media marketing helped close business, though this percentage was higher (61.6%) among those who had been using social media for longer periods of time.
In terms of reducing overall marketing expenses, a significant percentage of participants strongly agree that marketing costs dropped when social media marketing was implemented. Sole proprietors were more likely than others to see reductions in marketing costs when using social media marketing.
So are you going to jump on the "bandwagon"? Give us your thoughts
A recent study found that respondents report that the #1 benefit of social media marketing is gaining attention for the business, or “the all-important eyeball.” The majority of marketers say they have undertaken social media activities for this reason and they appear to be paying off: Some 81% of all marketers indicate that their social media efforts have generated exposure for their businesses. Improving traffic and growing marketing lists is the second major benefit, according to the study, followed by building new partnerships. At least two in three participants found that increased traffic occurred with as little as 6 hours a week invested in social media marketing, while those who have been doing this for years reported better results. Owners of small businesses (2 - 100 employees) are more likely than others to report benefits.
The study also found more than half of participants reported that a major benefit of social media marketing is the resultant rise in search engine rankings that often comes with increased efforts. Improved search engine rankings were most prevalent among those who’ve been using social media for years, with nearly 80% reporting a rise.
Though about one in two found social media generated qualified leads, only about one in three said social media marketing helped close business, though this percentage was higher (61.6%) among those who had been using social media for longer periods of time.
In terms of reducing overall marketing expenses, a significant percentage of participants strongly agree that marketing costs dropped when social media marketing was implemented. Sole proprietors were more likely than others to see reductions in marketing costs when using social media marketing.
So are you going to jump on the "bandwagon"? Give us your thoughts
COMPACT 2 Technologies has moved
COMPACT 2 Techologies recently moved our main office to Beaufort SC. We will continue to serve our many customers in the upstate of S.C. as well as our other customers around the country, just from beautiful Beaufort by the Sea. Please visit us at http://www.compact2.com
Subscribe to:
Posts (Atom)