Improve seller productivity with a sales cadence

Improve seller productivity with a sales cadence

This article is contributed. See the original author and article here.

In sales, planning is everything. Without a plan, a sales rep might give up too easily on a prospect or appear too aggressive. A potential customer might forget about a proposal or become annoyed by too-frequent contacts. Creating a step-by-step plan for how to follow up with prospects in each stage of the sales process is the basis for a sales cadence. Microsoft Dynamics 365 Sales tools help you create, manage, and scale customized sales cadences across your organization.

The top salespeople have a well-crafted plan to get their desired results, whether they are demonstrating a product or following up with leads. A successful plan, or sales cadence, involves knowing where your prospects are in the buyer’s journey and understanding how to reach them the right way, with the right message, at the right time to move them to the next step.

If you fail to plan, you are planning to fail.

A modern proverb

In this post, you’ll learn:

  • What a sales cadence is
  • What to consider when designing a sales cadence
  • What an effective sales cadence looks like
  • How Dynamics 365 Sales can help you build a sales cadence

What is a sales cadence?

A sales cadence is a detailed plan to connect with prospects and close deals. A sales cadence includes a prescribed sequence of activities, like reaching out on LinkedIn, sending emails, making calls, sharing case studies, arranging meetings, and sending text messages, which happen at specified intervals.

An effective sales cadence improves the efficiency of sales reps. A sales cadence guides sellers on which prospects to connect with, what communication channel to use, and what information to share at each touchpoint. This structured approach reduces guesswork and aims to grow the sales pipeline and conversion rate.

Managers create a sales cadence to guide sales reps in handling different types of prospects and sales scenarios. For example, one cadence could be used for inbound inquiry leads, and another cadence could be used for upcoming renewals.

As organizations mature, they can evolve their cadences to adapt to specific geographies, industries, companies, languages, and other parameters.

A strong sales cadence library also helps you scale your sales organization. Automated sales cadences ease the onboarding process for sellers as you grow, building in best practices and sequencing their activities.

How to design a sales cadence

When you design your sales cadences, consider these five elements:

  • Prospects: It all starts with knowing your potential customers. What challenges or obstacles do they have? Why are they looking for a solution? What platforms do they use? What constraints do they contend with? What are their skills? Who is the decision maker?
  • Communication channel:Reach out to prospects using the right channel, such as email, a phone call, messaging apps, or LinkedIn.
  • Wait time: Consider a strategic delay between subsequent steps. You don’t want to be too soon or too late in your follow-ups.
  • Attempts: Understand the optimal number of touchpoints to establish contact and build a relationship.
  • Messaging:Use the right messaging, content, tone, and personalization to engage with prospects.

It’s important to note that creating an effective plan is not a one-time process. It takes time and iteration to fine-tune your sales cadences.

Example: A sales cadence for inbound inquiries

Here’s an example of a sales cadence for responding to inbound inquiries.

  • Target: Leads that have reached out through your website or other channels.
  • Purpose: Focus on and respond to high-priority inquiries to improve your conversion rate.
  • Description: By responding immediately and through multiple channels, you are more likely to achieve a higher conversion rate. Since responding within the first hour increases your chance to close the deal by seven times, start with an automated email response, then follow up with a phone call. Connect on a social platform like LinkedIn. Finally, send an email that provides relevant information about your product or services.

Example of a sequence created to support a sales cadence for handling inbound inquiries.

Create a sales cadence with sequence designer

The sales accelerator capability in Dynamics 365 Sales helps sellers spend less time searching for the best next customer to reach out to. Design and build your sales cadences in the sequence designer. Sales accelerator gathers information from multiple sources to build a strong and prioritized pipeline, offers context, and surfaces recommendations throughout each step in the sequence, speeding the sales process.

To create a sequence, you go to the Sales Insights settings area and open the Sequences page. For more details, check out the documentation: Create and activate a sequence.

You can use the sequence designer to configure sequences of activities for specific prospects, leads, opportunities, contacts, and so on, applying different strategies depending on priority. For example, leads of lower priority might have more automated email steps, whereas leads from your targeted accounts might have more personalized touchpoints.

As in the example sales cadence shown earlier, sequences can include multiple activities, with wait times between activities as needed. You can branch activities based on the response, such as if an email is opened or a reply is received. Using sales accelerator’s tight integration with LinkedIn, you can even send LinkedIn InMail or create a connect request as part of your sales cadence.

Options available when adding steps to a sequence in Sales accelerator

Next steps

A good sales cadence is a necessary to improve seller productivity, increase conversion rates, and close more deals. As we adjust to virtual ways of working, digitizing sales becomes a priority for most organizations. To get started, use sales accelerator in Dynamics 365 Sales to set up a sales cadence for the most common scenarios faced by the sales team.

To start building your own sequences in Dynamics 365 Sales, visit the documentation: Manage sequences. If you use a custom app, also refer to this section of the FAQ page for sales accelerator: How to add work list site map to your custom app.

Access to sales accelerator has now been made easier: new and existing customers using Dynamics 365 Sales (excluding Dynamics 365 Sales Professional) will now see sales accelerator and sequences available for quick setup. Read the documentation to learn more about setting up digital selling capabilities.

The post Improve seller productivity with a sales cadence appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Catch new episodes of Unpacking Endpoint Management in 2022

Catch new episodes of Unpacking Endpoint Management in 2022

This article is contributed. See the original author and article here.

Last March, my colleague Danny Guillory and I embarked on an idea based on your feedback—a targeted and interactive web series focused on “real talk” around unified endpoint management. We wanted it to be open to everyone and reasonably transparent. We wanted to foster a live community event where we could not only bring on guests from Microsoft engineering teams, but also (more importantly) engage with you directly through live Q&A!


So far, the level of engagement has been amazing. You’ve asked questions and we’ve tried our best to provide answers or find answers when we couldn’t. We’ve been listening to your feedback (really appreciate it!) and taking your ideas to the product teams developing Microsoft Endpoint Manager. Now we continue our monthly web series in 2022 and are innovating the show further by:



  • Bringing in customers and industry professionals to share their experiences and best practices around Endpoint Manager (capital “E”, capital “M”) and endpoint management.

  • Expanding the platforms through which you can consume the show (podcast option, anyone?)

  • Opening up the ability for you to post questions one week in advance of each show so you can make sure your questions get in.

  • Exploring new topics as well as revisiting previous topics with more proven and recommended practices alongside out-of-the-box thinking and ideas around innovating endpoint management.


And so, Unpacking Endpoint Management continues—the first Friday of each month—in 2022 here on the Tech Community! Our next episode will be this Friday, February 4th at 8:00 AM Pacific Time!


Remember to follow Wheaton’s Law and keep it civil. And finally, don’t forget to bookmark https://aka.ms/UnpackingEndpointManagement for a list of future episodes! In addition, you can find a list of previous episodes – now on demand – including the now-famous “Policy Pizza Party” premiere episode.


Have an idea for a future episode? Drop us a comment below!


SteveThomasGLADIATOR_0-1643736039341.png


 

FBI Releases PIN on Potential Cyber Activities During the 2022 Beijing Winter Olympics and Paralympics

This article is contributed. See the original author and article here.

The Federal Bureau of Investigation (FBI) has released a Private Industry Notification (PIN) to warn entities associated with the February 2022 Beijing Winter Olympics and March 2022 Paralympics that malicious cyber actors could use a broad range of cyber activities to disrupt these events. These activities include distributed denial-of-service attacks, ransomware, malware, social engineering, data theft or leaks, phishing campaigns, disinformation campaigns, and insider threats. Additionally, the FBI PIN warns Olympic participants and travelers of potential threats associated with mobile applications developed by untrusted vendors. The FBI urges all athletes to keep their personal cell phone at home and use a temporary phone while attending the events.

CISA encourages all travelers to the 2022 Beijing Winter Olympics and Paralympics to review FBI PIN: Potential for Malicious Cyber Activities to Disrupt the 2022 Beijing Winter Olympics and Paralympics and apply the recommendations.

Samba Releases Security Updates

Samba Releases Security Updates

This article is contributed. See the original author and article here.

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

SSL

Secure .gov websites use HTTPS

A lock (lock icon) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Identity theft can happen to anyone

Identity theft can happen to anyone

This article was originally posted by the FTC. See the original article here.

It’s the second day of Identity Theft Awareness Week and today we’re talking about steps that can help reduce your risk of identity theft.

Many of us access our online accounts — credit cards, investments, insurance, or checking and savings accounts — nearly every day. In our digital world, bits of our personal information are everywhere. Identity thieves know this and look for ways — both high-tech, like lifting our passwords, or low-tech, like stealing our mail — to get their hands on our money and personal information.

Since identity theft can happen to anyone, here are some ways to keep your money and personal information safe.

  • Protect documents that have personal information. Keep things with personal information — think financial records or Social Security and Medicare cards — in a safe place. Shred them before you throw them away. If you get statements with personal information in the mail, take your mail out of the mailbox as soon as you can.
  • Don’t share your Social Security number with someone who contacts YOU. While some organizations might need your Social Security number to identify you, they won’t call, email, or text you to ask for it. So if someone contacts you, asks you for your Social Security number, and says they’re from the IRS, your bank, or your employer — it’s a scam.
  • Protect your information online and on your phone. If you’re logging in to an online account, use a strong password. Add multi-factor authentication for accounts that offer it. Multi-factor authentication makes it harder for scammers to log in to your accounts if they do get your username and password.
  • Review your bills. Charges for things you didn’t buy, or an unexpected bill, could be a sign of identity theft.

Remember to check out the free events and webinars each day of Identity Theft Awareness Week. And if you think someone has been using your personal information to open accounts, buy things, or file taxes, report it and get recovery help at IdentityTheft.gov.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

HDInsight Kafka Cluster Sizing

This article is contributed. See the original author and article here.



The most accurate way to model your use case is to simulate the load you expect on your own hardware. You can do this using the load generation tools that ship with Kafka


 


However, if you want to size a cluster without simulation, a very simple rule could be to size the cluster based on the amount of disk-space required (which can be computed from the estimated rate at which you get data times the required data retention period).


A slightly more sophisticated estimation can be done based on network and disk throughput requirements. To make this estimation, let’s plan for a use case with the following characteristics:



  • W – MB/sec of data that will be written

  • R – Replication factor

  • C – Number of consumer groups, that is the number of readers for each write


Kafka is mostly limited by the disk and network throughput.


The volume of writing expected is W * R (that is, each replica writes each message). Data is read by replicas as part of the internal cluster replication and also by consumers. Because every replicas but the master read each write, the read volume of replication is (R-1) * W. In addition each of the C consumers reads each write, so there will be a read volume of C * W. This gives the following:



  • Writes: W * R

  • Reads: (R+C- 1) * W


An easy way to model the real consumer lagging is to assume a number of lagging readers you to budget for. To model this, let’s call the number of lagging readers L. A very pessimistic assumption would be that L = R + C -1, that is that all consumers are lagging all the time. A more realistic assumption might be to assume no more than two consumers are lagging at any given time.


Based on this, we can calculate our cluster-wide I/O requirements:



  • Disk Throughput (Read + Write): W * R + L * W

  • Network Read Throughput: (R + C -1) * W

  • Network Write Throughput: W * R


Deciding Number of Disks


In HDInsight Kafka cluster you can choose the number of disks (only) during the cluster creation. The number varies based on VM SKU, the size of each disk is 1 TB.


eg : For E8aV4, once can attach up to 16 disks where as for D12V2 its 8.


 


Deciding Number of Brokers/Workers


If the selected VM  have a 1 Gigabit Ethernet card with full duplex, then that would give 125 MB/sec read and 125 MB/sec write. Likewise you can calculate the total read-write capacity per machine.  Once we know the total requirements, as well as what is provided by one machine, you can divide to get the total number of machines needed.


 


Note : This gives a machine count running at maximum capacity, assuming no overhead for network protocols, as well as perfect balance of data and load. Since there is protocol overhead as well as imbalance, you want to have at least 2x this ideal capacity to ensure sufficient capacity.



Dynamics 365 composable approach enables rapid deployment of a supply chain control tower

Dynamics 365 composable approach enables rapid deployment of a supply chain control tower

This article is contributed. See the original author and article here.

Delays, constraints, and disruptions are frequent challenges for global supply chains. And they are costly. According to Gartner 70 percent of supply chain leaders report that they have been constantly responding to disruptions since 2019.1 Supply chain professionals have long understood that the earlier potential disruptions and constraints are identified, the more successful the measures to adapt and overcome them can be. So, the question becomes, how do we identify disruptions and constraints at the earliest possible opportunity? The answer is real-time, end-to-end visibility across the supply chain, which is precisely what supply chain control towers provide.

While the benefits of supply chain control towers are easily understood, many organizations continue to struggle to make control towers a reality. The composable approach of Microsoft Dynamics 365 is changing this situation however, and providing organizations a path to rapid deployment of supply chain control towers. This article explains the composable approach and why it is an essential ingredient for success in supply chain control tower initiatives.

Learn more in our on-demand webinar: How to rapidly deploy a supply chain control tower with a composable approach.

The future leans towards composable solutions

The future of business applications is composable. We can see this in reports from analyst firms such as Gartner, who predict that “by 2023 organizations, that have adopted a composable approach will outpace their competition by 80 percent.”2 But, what is a composable approach? Before we delve into the composable approach and what makes it different, let’s briefly explore the evolution of enterprise resource planning (ERP) solutions as this will help us understand why composability is key to achieving end-to-end visibility.

The challenge of achieving end-to-end visibility

In the past, ERP systems were sold as one massive application. This meant that they were expensive and difficult to change. As these applications matured, vendors looked for ways to give customers greater flexibility. To provide this flexibility, business functions, like sales and supply chain, were increasingly offered as modular components such as customer relationships management (CRM) systems, warehouse management systems (WMS), transportation management systems (TMS), and supply chain management (SCM) systems. While modularity did provide flexibility, the flexibility itself created other problems, as we discuss next.

The main issue is that once business functions could select the components that best suited their needs, such as CRM or WMS, replacement and implementation of these systems often took place at different times, and systems were often from different vendors. Also, due to the possible differences in maturity levels and solution architectures of these disparate systems, they required time-consuming and expensive custom development to achieve end-to-end integration across the enterprise. And after integration, end-to-end performance was often plagued by latency, synchronization, and data unification issues. This is the situation where many companies find themselves today and it is the primary reason that achieving real-time end-to-end visibility of the supply chain has been so elusive.

Microservices are composable

Technology vendors began offering business solutions assembled application experiences built on microservices architectures in the continuing drive to improve customer applications. Whereas in the past, a specific business function, like warehouse or sales, would select the right system for their needs, such as CRM or WMS, businesses can now choose solutions tailored to individual workloads. For example, a simple order management workload could be composed by bringing together order orchestration, fulfillment, and inventory.

These microservices, such as real-time inventory and fulfillment, not only provide greater flexibility, but because they easily connect to other microservice applications and utilize API-driven messaging, data and actions can be pulled and pushed between different systemsdecreasing latency, improving synchronization, and enabling real-time end-to-end visibility in the process. This is why a composable approach makes the rapid deployment of a supply chain control tower possible.

Our vision

Gartner predicts that by 2026, 80 percent of companies will suffer significant value loss due to failure to merge their digital supply twin and control tower initiatives.3 We agree. And, our solutions help companies avoid this outcome by providing a composable approach that makes merging these initiatives possible.

At Microsoft, we see supply chain control towers as a shared service process that can be composed from a mix of supply chain workloads. For example, a supply chain control tower and digital twin can be built using Dynamics 365 Supply Chain Management, Dynamics 365 Intelligent Order Management, Dynamics 365 Supply Chain Insightspreview together with Microsoft Power Platform, and our growing digital supply chain applications ecosystem.

Microsoft Digital Supply Chain Control Tower

Dynamics 365 Intelligent Order Management is often a great place to start when building a supply chain control tower in a retail, distribution, or direct-to-consumer (DTC) manufacturing business. This is because Dynamics 365 Intelligent Order Management is built on a microservice architecture that includes rules-based order orchestration and fulfillment, real-time inventory, and AI. As such, it is step-forward to the composable approach that allows companies to achieve the real-time end-to-end visibility of a supply chain control tower. The composability of the solution also means that organizations can get up running quickly and maximize the benefit of existing investments through easy integration with existing legacy ERP systems.

What’s next

Supply chain control towers that include Dynamics 365 Intelligent Order Management positions organizations to respond faster and more intelligently to disruptions and opportunities. Dynamics 365 Intelligent Order Management works seamlessly with any ERP and CRM system. It is also a stand-alone application that allows customers to start their control tower initiative without dependencies on other Dynamics 365 solutions. It integrates seamlessly with many market-leading API-enabled applications, using our out-of-the-box pre-built connectors to order intake sources, tax calculation, and third-party logistics partners ecosystem. Moreover, it automates and optimizes fulfillment using AI and real-time omnichannel inventory data. Supply chain and commerce professionals can proactively overcome disruptions through quickly order flows reconfigurations with drag and drop actions in a low-code/no-code interface. And by enabling them with all these capabilities, help them accelerate their order management digital transformation and turn order fulfillment into a competitive advantage.

Learn more in the on-demand webinar: How to rapidly deploy a supply chain control Tower with a Composable Approach.


Sources:

  1. Gartner, Hype Cycle for Supply Chain Strategy 2021, September 14, 2021.
  2. Gartner, Composable Commerce Must Be Adopted for the Future of Applications, June 18, 2020.
  3. Gartner, Predicts 2022: Supply Chain Technology, November 17, 2021.

GARTNER is the registered trademark and service mark of Gartner Inc., and/or its affiliates in the U.S. and internationally and has been used herein with permission. All rights reserved.

The post Dynamics 365 composable approach enables rapid deployment of a supply chain control tower appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Are you ready for National Consumer Protection Week 2022?

Are you ready for National Consumer Protection Week 2022?

This article was originally posted by the FTC. See the original article here.

It’s almost February and you know what that means…it’s getting close to National Consumer Protection Week (NCPW)! This year, NCPW is March 6-12, 2022, so now’s the time to jump into planning.

NCPW is the time of year when government agencies, consumer protection groups, and people like you work together to help remind your family, friends, and neighbors of their consumer rights and avoid frauds and scams. Want to join in? Here are some ideas:

  • Help your family, friends and community avoid scams. Order free materials to share in English or Spanish. Order by February 7th to ensure delivery by NCPW.
  • Plan a virtual consumer protection event. Find ideas at ftc.gov/ncpw for how to get involved.
  • Share resources on COVID-19 scams. Share ways to avoid these scams, from COVID tests to vaccine scams. Check out ftc.gov/coronavirus/scams for free resources, including one-page handouts and graphics to share on social media.
  • Visit ftc.gov/ncpw for even more resources.

We’ll be back next month to tell you more about the virtual events we have planned for NCPW. See you then.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Welcome to Identity Theft Awareness Week 2022

Welcome to Identity Theft Awareness Week 2022

This article was originally posted by the FTC. See the original article here.

Today we’re kicking off Identity Theft Awareness Week 2022. Identity thieves have been busier than ever during the pandemic, with scammers and identity thieves after people’s information to apply for credit, unemployment benefits, file taxes, buy things, or get medical services. But there are some things you can do to protect yourself, and this week, you’ll learn how.

 

Each day this week, we’ll cover topics from the steps you can take to protect your personal information, to what to know about credit freezes and fraud alerts. Follow along with these alerts to help keep your money and personal information safe from scammers.

 

But wait, there’s more! This week, tune into free webinars, podcasts, and other events to hear experts discussing how to spot, protect against, and recover from identity theft. There’s something for everyone — including some events that spotlight resources for active duty service members, veterans, and older adults.

Start by joining a Facebook Live discussion at 3 p.m. ET today: Impersonator Scams & Identity Theft. You’ll hear from experts from the FTC and AARP’s Fraud Watch Network about impersonators who pretend to be from the government or well-known businesses, how they try to steal your information, and how to spot and stop them.

For details on the week’s webinars, podcasts, and Facebook Live programs, as well as how to participate, visit Identity Theft Awareness Week 2022. Then join us on Friday, when we’ll wrap up with a Twitter chat discussing identity theft trends, advice on spotting and avoiding identity theft, and how to recover.

Learn more about identity theft at ftc.gov/idtheft. And, if identity theft happens to you or someone you know, visit IdentityTheft.gov to report it and get a personalized recovery plan.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Experiencing Data Access Issue in Azure portal for Log Analytics – 01/30 – Resolved

This article is contributed. See the original author and article here.

Final Update: Sunday, 30 January 2022 15:00 UTC

We’ve confirmed that all systems are back to normal with no customer impact as of 01/30, 14:25 UTC. Our logs show the incident started on 01/30, 13:25 UTC and that during the 1 hour that it took to resolve the issue some of customers using Azure Log Analytics or Azure Sentinel might have experienced delayed or missed Log Search Alerts and issues accessing data in West US2 region.
  • Root Cause: The failure was due one of our backend service was unhealthy.
  • Incident Timeline: 1 Hour  – 01/30, 13:25 UTC through 01/30, 14:25 UTC
We understand that customers rely on Azure Log Analytics or Azure Sentinel as a critical service and apologize for any impact this incident caused.

-Sai Kumar