This presentation is mostly about mobile working life style of an entrepreneur and how to use tools, resources, virtual offices, co-working space and technology.
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
The Mobile Entrepreneur Part 2
1. 3. Code of Ethics
• Impact your reputation.
• Avoid behaviors that harm you image
and how you are perceived by customers,
partners or people in general.
• Demonstrates multicultural awareness
and business culture.
2. TELEPHONE: THE FIRST IMPRESSION
- It is important to answer the telephone by the second ring.
- Give a proper greeting.
- It is your responsibility to return a call promptly after receiving word
of a missed call.
- Smile when talking.
- Do not cover the phone during the call.
- Try not to put the other person on hold..
3. RING TONE
- Think about what the ringtone says
about you.
- If you are embarrassed by your
ringtone in certain situations (trains,
office, when you're visiting your
mother), then you almost certainly
have made the wrong choice.
Choose a different ringtone.
5. SUGGESTIONS FOR USING THE PHONE
- Do not make calls to people from inappropriate places; a call from a bathroom is
very unpleasant.
- Bluetooth headsets are great in the car (they are safe and legal).
- If you are expecting an important call when meeting someone socially, explain at
the outset that you will have to take the call, and apologize in advance. Otherwise,
apologize and retire somewhere private to make or receive the call.
6. SUGGESTIONS USING THE PHONE
- Isolate yourself from noise or distracGons that might
interfere with your conversaGon..
- Avoid talking publicly about inGmate issues, using foul
language or being rude.
- During the call avoid having anything in your mouth that
hinders communicaGon (cigare_es, candy, gum, drinks, etc..).
- Although you may have a smartphone, it can be beneficial to
have a small notebook and pen to take notes.
7. BASIC CODE OF CONDUCT FOR TEXT MESSA
- Short messages and instant messaging.
- Do not cancel an appointment with a text message.
- Formal written communication should never be
replaced by a text message.
- Never send a condolence message by text.
- Avoid using confusing language and abbreviated text
as the recipient may not understand. (lol, omg, rofl)
- You can omit conventional greetings and farewells.
8. 4. HUMAN RESOURCE MANAGEMENT
- Remote monitoring
- Distant work teams
- Virtual Meetings and Video Conferences
- Economic and energy savings
9. TIME DESK
REMOTE MONITORING
Helps you:
- Find and eliminate the waste of Gme
- Understand what is happening at work
- Track your projects to bill customers
- Fully automaGc - no data entry
- Available for Windows, Mac, Linux, Android & iPhone
-www.desk[me.com
10. 5. Virtual Meetings & VideoConferencing
Virtual meetings take place over
the Internet, where individuals,
partners or employees attend
through their computer without
physically traveling to the meeting.
11. VIRTUAL MEETING PROTOCOL
- The first thing to understand when conducGng a virtual meeGng is that it is not
really a virtual meeGng at all.
- The meeGng is real, the acGvity is real, and the importance of the results are real.
- This is a real mee[ng that happens to take place in a virtual environment.
- Consider the processes that take place:
o Before meeGng
o During the meeGng
o AXer the meeGng.
12. BEFORE THE MEETING:
The place to conduct the meeting.
1. Technology? Does everyone have the necessary resources?
2. Who are the participants and how will they be invited?
3. What time will the meeting be, and are there participants in different time zones?
4. What language will be spoken during the meeting?
5. Do you make and answer questions during the meeting, or after?
6. What materials will participants need? How will they be sent? Email? Fax?
Overnight Delivery?
13. DURING THE MEETING
1. Try to call or arrive a few minutes early.
2. Introduce all participants.
3. Follow the agenda.
4. Be accurate, use examples to ensure understanding, recap and
summarize.
5. Refer to the slide number or page number if you are using a
presentation previously sent.
6. Direct questions to each participant instead of saying "Are there any
questions?"
7. Listen to the views of all participants.
14. AFTER THE MEETING
1. The meeting does not end as soon as participants hang up or log off.
2. Sending notes shortly after the meeting helps ensure that everyone has the
same understanding of what happened and what will happen next.
3. Well documented decisions and action items with clear deadlines help
people understand how to proceed once they have been disconnected or
dismissed from the meeting.
4. Considering that people may be located in different time zones, the more
you can help people to be successful, the more willing and able they will be
to attend future meetings and take on additional responsibilities.
15. ADVANTAGES OF VIDEO CONFERENCIN
AND VIRTUAL MEETINGS
• Economic
• Time-saving
• Maximize resources
• Improved quality of life
16. ADVANTAGES OF VIDEO CONFERENCING AN
VIRTUAL MEETINGS
The use of videoconferencing is an efficient and dynamic communication that
goes beyond the traditional voice call. It incorporates much richer visual
communications and participation.
17. Applica[ons and Services
3G Video Conferencing
- Offers the possibility to partners, employees or users to initiate and / or
participate in videoconference from any location.
- Videoconferencing 3G multimedia communications ubiquity allows "face to
face" communication and a more effective exchange of information, it increases
productivity, and helps resolve issues quickly, including questions and doubts.
- Excellent visual collaboration system for global sales meetings, job interviews
or for the promotional launch of a product or service.
18. 3G Mobile Phone Video Conference
Requirements
- The 3G Phone or Aircard
- Built-in Camera
- Data Plan
- Video Conferencing Client
20. Basic Computer Security Methods
- Limit computer access to "safe" users.
- Peripherals can block any "unsafe" activity.
- Firewall and antivirus software.
21. Security
- What is cyber security?
- What are the risks?
- What can you do?
22. What can you do?
- Hacker, attacker, or intruder
- Malicious code
- Vulnerability
23. The Internet is Public
- It’s accessible and contains a wealth of information
- Has become a popular resource for communicating, for researching
topics, and for finding information about people
- You are not really anonymous when you are online
- Once online, you can be accessed by a world of strangers…and
remember, you have no idea what they might do with that information.
24. Guidelines when publishing
informa[on on the Internet
- View the internet as a novel, not a diary
- Be careful what you advertise
- Realize that you can't take it back
- Before you publish something on the Internet, determine
what value it provides and consider the implications of
having the information available to the public - forever!
25. Why do you need a password?
- Choose a good password (numbers & letters).
- Don't use passwords that are based on personal information.
- Don't use words that can be found in any dictionary of any language.
- Develop a mnemonic for remembering complex passwords.
- Use both lowercase and capital letters.
- Use a combination of letters, numbers, and special characters.
- Use passphrases when you can.
- Use different passwords on different systems.
26. Why do you need a password?
-
-
-
-
-
How to protect your password.
Minimize the access other people have to your information.
Lock your computer when you are away.
Disconnect your computer from the Internet when you aren't using it.
Evaluate your security settings often.
27. What other steps can you take?
- Protect your computer against power surges and brief
outages.
- Back up all of your data.
28. 7. BRANDING
A company or a person with a strong business identity and
a good position in the market will be a steady source of
income and safe in the long term - reputation, good name,
identity.
29. Professional Image
- Tools that can make a difference in your market:
o The Mission, Vision and Values of your company
o The value of your word
o Business cards and other advertising
o Design and layout of your website
o Virtual Offices
o Social Network
30. THE WHY AND THE VALUE OF VIRTUAL OFFICE
BACKGROUND
- Entrepreneurs who work alone are increasing every day
- Currently 58% of small business owners work from home
- More attractive for women entrepreneurs
- Companies can make some fixed infrastructure costs, variable and dependent
on the number of employees
31. 8. VIRTUAL OFFICES
- A company requires between 200 and 250 sq ft
of office space per employee.
-Every day more people are working remotely.
-How much is spent on a simple change of
address for your office?
-Change of address (business cards, stationery,
stamps, TIME) can be expensive
- A virtual office can save money.
32. CO-WORKING
Co-working (co-work) allows freelancers, entrepreneurs and SBs from
different sectors to share workspace, both physical and virtual, to develop
their professional projects independently, while encouraging joint projects.
33. CO-WORKING BENEFITS
RESULTS OF A RECENT SURVEY ON VIRTUAL OFFICES OR Co-
working SPACES:
- 92% of respondents said their social circle had increased significantly.
- 80% said their business had grown its network.
- Reported a 75% increase in productivity.
- 86% said that their isolation has decreased.
- 96% of respondents said that community is an important value among
members in their co-working space.
- 74% of people know all or many of the names of their companions in
the co-working space.
34. Responses to the quesGon
"What do you like most about your
virtual office?"
81% said they liked the people
61% said their virtual office was the best place to work
46% said that price was the most important element
68% said they had no plans to leave their work area
17% said they would stay for at least one year
35. SOCIAL PLATFORMS
- Social platforms are increasingly used by companies.
- Review profiles of prospective employees, customers or partners
- Facebook and Twitter let you get a sense of the environment,
friendships, tastes and interests of the candidates.
- For this reason, we must be careful with the information we share
in these social spaces and properly handle privacy settings.
- Check the privacy settings on Social Media
- Create a personal profile and avoid mixing other professional
information
- Browse search results of our names in Google