Acknowledgments |
|
xiii | |
About the CD |
|
xv | |
Introduction |
|
xvii | |
Part One Fun & Fundamentals: Control What You Can |
|
|
Chapter One Thinking It Through |
|
|
2 | (18) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (3) |
|
|
9 | (2) |
|
Meeting Tomorrow's Customer |
|
|
11 | (4) |
|
What It Takes: A Woman Who Can't Hear "No" |
|
|
15 | (3) |
|
|
18 | (1) |
|
|
18 | (2) |
|
Chapter Two Developing a Business Plan |
|
|
20 | (32) |
|
|
22 | (1) |
|
|
22 | (2) |
|
Planning Affordable Market Research |
|
|
24 | (5) |
|
How to Find Your Best Customer |
|
|
25 | (2) |
|
Consider Your Product Price Tag |
|
|
27 | (2) |
|
Choosing a Business Structure |
|
|
29 | (7) |
|
|
30 | (1) |
|
DBA, or Doing Business As |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (2) |
|
Limited Liability Corporation (LLC) |
|
|
36 | (1) |
|
Guidelines for Creating Your Plan |
|
|
36 | (5) |
|
|
40 | (1) |
|
Doing It with Office: Online Business Plan Templates |
|
|
41 | (8) |
|
|
42 | (2) |
|
Doing Your Homework in Word |
|
|
44 | (1) |
|
|
45 | (3) |
|
A Few Extras: More Tips for Your Professional Documents |
|
|
48 | (1) |
|
|
49 | (3) |
|
Chapter Three How to Find Backing |
|
|
52 | (24) |
|
|
54 | (10) |
|
|
54 | (2) |
|
Preparing for the Unexpected |
|
|
56 | (2) |
|
|
58 | (2) |
|
Tapping Family, Friends, and Generous Relatives |
|
|
60 | (2) |
|
Bootstrapping-Lean and Mean Financing |
|
|
62 | (2) |
|
|
64 | (3) |
|
|
66 | (1) |
|
Loans and Venture Capitalists |
|
|
67 | (7) |
|
Working with a Commercial Bank |
|
|
67 | (3) |
|
Factoring or Commercial Finance Companies |
|
|
70 | (1) |
|
Government Loans and Programs |
|
|
70 | (3) |
|
Accessing Venture Capital |
|
|
73 | (1) |
|
|
74 | (2) |
|
Chapter Four Self-Preservation |
|
|
76 | (24) |
|
Investigating Licenses and Permits |
|
|
78 | (3) |
|
Applying for a Federal Taxpayer ID |
|
|
80 | (1) |
|
Finding Insurance and Reassurance |
|
|
81 | (5) |
|
|
81 | (1) |
|
What Is Business Insurance? |
|
|
82 | (1) |
|
|
83 | (1) |
|
Reviewing Life Insurance Needs |
|
|
84 | (1) |
|
Protecting Your Home Business |
|
|
85 | (1) |
|
Renting Space and Signing Leases |
|
|
86 | (2) |
|
|
87 | (1) |
|
Tackling Contract Concerns |
|
|
88 | (1) |
|
|
89 | (2) |
|
|
91 | (2) |
|
Creating the Right impression |
|
|
93 | (2) |
|
Forming an Advisory Board |
|
|
95 | (2) |
|
|
97 | (3) |
Part Two Profit and Loss: Getting the Facts on Figures |
|
|
Chapter Five Follow the Money |
|
|
100 | (26) |
|
|
103 | (3) |
|
Choosing the Cash Method or the Accrual Method |
|
|
103 | (2) |
|
|
105 | (1) |
|
Preparing Financial Statements: The Balance Sheet and the Income Statement |
|
|
106 | (2) |
|
Using a Chart of Accounts |
|
|
108 | (6) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
112 | (2) |
|
|
114 | (1) |
|
|
114 | (2) |
|
Preparing and Managing a Budget |
|
|
116 | (5) |
|
|
121 | (2) |
|
|
123 | (1) |
|
|
124 | (2) |
|
|
126 | (18) |
|
Tax Strategies for Major Business Expenses |
|
|
128 | (3) |
|
|
129 | (2) |
|
How to Interview a Tax Pro |
|
|
131 | (3) |
|
Secrets Tax Pros Never Share |
|
|
134 | (2) |
|
Frequent Tax and Bookkeeping Mistakes |
|
|
136 | (2) |
|
Travel Expense Deduction Strategies |
|
|
138 | (2) |
|
When a PC at Home Isn't a Home PC |
|
|
140 | (3) |
|
|
143 | (1) |
|
Chapter Seven By the Numbers: Analyzing Your Business with Excel |
|
|
144 | (38) |
|
Excel Training and Assistance |
|
|
146 | (1) |
|
What Data Should I Collect? |
|
|
147 | (1) |
|
"What If I...?": Tools for Analyzing Common Business Questions |
|
|
148 | (17) |
|
Knowing What You Need to Meet Your Goals: Using the Goal Seek Command |
|
|
149 | (5) |
|
A Little Change Can Make a Difference: Sensitivity Analysis with Data Tables |
|
|
154 | (7) |
|
Managing Business Scenarios |
|
|
161 | (4) |
|
Spotting Trends: Sorting, Filtering, and Charting Information |
|
|
165 | (8) |
|
Sorting to See Groups and Patterns |
|
|
166 | (1) |
|
Filtering Information to View Selected Records |
|
|
167 | (4) |
|
|
171 | (2) |
|
Slicing and Dicing Your Business Data: Why You Should Use a PivotTable |
|
|
173 | (5) |
|
Two Important Excel Functions |
|
|
178 | (2) |
|
|
180 | (2) |
Part Three Makes and Models: How to Stand Out in a Crowd |
|
|
Chapter Eight Branding Basics |
|
|
182 | (26) |
|
Developing Brand Personality |
|
|
184 | (2) |
|
|
184 | (2) |
|
What Is the Mission of Your Business? |
|
|
186 | (2) |
|
Focusing on Your Point of Difference (POD) |
|
|
188 | (2) |
|
Finding the Right Image: Logos and Icons |
|
|
190 | (2) |
|
Mastering Your Domains: Two Steps for Building a Presence on the Web |
|
|
192 | (6) |
|
Domain name registration scams |
|
|
194 | (2) |
|
|
196 | (1) |
|
|
196 | (2) |
|
|
198 | (1) |
|
Protecting Your Intellectual Property: Trademarks, Copyrights, and Patents |
|
|
199 | (7) |
|
|
201 | (3) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (2) |
|
Chapter Nine Crafting Your Message |
|
|
208 | (36) |
|
Disciplined Messaging and the Seamless Sell |
|
|
210 | (2) |
|
|
211 | (1) |
|
Developing a Marketing Strategy |
|
|
212 | (1) |
|
Selling Benefits, Not Features |
|
|
213 | (3) |
|
Making Messages Work Across Channels |
|
|
216 | (1) |
|
Marketing Return on Investment (ROI) |
|
|
217 | (3) |
|
Calculate the NPV of your marketing |
|
|
218 | (2) |
|
Low-Cost, High-Impact Marketing Ideas |
|
|
220 | (16) |
|
Consider marketing with a cause |
|
|
224 | (10) |
|
|
234 | (2) |
|
|
236 | (6) |
|
|
242 | (2) |
|
Chapter Ten Go to Market with Publisher, Make a Pitch with PowerPoint |
|
|
244 | (42) |
|
Business Communications and Microsoft Publisher |
|
|
246 | (23) |
|
|
247 | (7) |
|
Don't forget your Web host |
|
|
254 | (10) |
|
Publisher doesn't provide a shopping cart Stay on message |
|
|
264 | (1) |
|
Saving Publisher 2003 files for earlier versions of Publisher |
|
|
265 | |
|
|
259 | (10) |
|
The Pitch and the Presentation: Using Microsoft PowerPoint 2003 |
|
|
269 | (15) |
|
|
210 | (63) |
|
|
273 | (11) |
|
|
284 | (2) |
Part Four Connect and Conquer: Building the Company |
|
|
Chapter Eleven The Customer Comes First |
|
|
286 | (20) |
|
Identifying Your Best Customers: The 80/20 Rule |
|
|
288 | (6) |
|
Creating a Customer Database |
|
|
289 | (2) |
|
Leveraging Customer Intelligence |
|
|
291 | (3) |
|
Rewarding Return Customers |
|
|
294 | (5) |
|
Timing Your Marketing Message |
|
|
296 | (2) |
|
When Good Customers Go Bad |
|
|
298 | (1) |
|
Protecting Customer Trust and Privacy |
|
|
299 | (2) |
|
Understanding When to Expand |
|
|
301 | (2) |
|
Planning for Growing Pains |
|
|
302 | (1) |
|
Forging Strategic Alliances |
|
|
303 | (2) |
|
|
305 | (1) |
|
Chapter 12 Managing Customer Contacts: Business Contact Manager |
|
|
306 | (40) |
|
Understanding What Business Contact Manager (BCM) Can Do |
|
|
309 | (4) |
|
BCM doesn't work with Exchange |
|
|
310 | (2) |
|
More assistance for using BCM |
|
|
312 | (1) |
|
Installing and Running BCM |
|
|
313 | (4) |
|
BCM installation locations |
|
|
314 | (3) |
|
Working with Business Contacts |
|
|
317 | (4) |
|
|
317 | (4) |
|
Creating and Using Accounts |
|
|
321 | (3) |
|
The useful Account History list |
|
|
322 | (2) |
|
Creating and Using Opportunities |
|
|
324 | (3) |
|
|
326 | (1) |
|
|
327 | (2) |
|
View the history of an item |
|
|
329 | (1) |
|
|
329 | (1) |
|
|
330 | (6) |
|
|
334 | (2) |
|
Importing and Exporting Information |
|
|
336 | (5) |
|
What's the Default Quantity field? |
|
|
339 | (2) |
|
|
341 | (3) |
|
Keep your backup copies in a safe place |
|
|
342 | (1) |
|
Remove a database associated with the current profile |
|
|
343 | (1) |
|
|
344 | (2) |
Part Five Gurus, Guides, and Staff: Employment Dos and Don'ts |
|
|
Chapter Thirteen Hiring and Firing |
|
|
346 | (32) |
|
|
348 | (3) |
|
|
345 | (5) |
|
Hiring for Next-Level Growth |
|
|
350 | (1) |
|
|
351 | (2) |
|
Conducting Interviews and Background Checks |
|
|
353 | (4) |
|
Find Out Who You're Really Hiring |
|
|
355 | (1) |
|
Consider Professional Screening |
|
|
356 | (1) |
|
Recruiting the 21st-Century Team |
|
|
357 | (10) |
|
Be Careful About Hiring Friends |
|
|
360 | (1) |
|
Why Drafting a Company Handbook Is a Smart Use of Precious Time |
|
|
361 | (6) |
|
Figuring Out How Much to Pay |
|
|
367 | (3) |
|
Providing Benefits You Can Afford |
|
|
370 | (4) |
|
|
|
Deciding When to Call It Quits |
|
|
374 | (2) |
|
|
376 | (2) |
|
Chapter Fourteen Managing Like a Coach |
|
|
378 | (26) |
|
|
380 | |
|
Delegating: Dos and Don'ts |
|
|
358 | (26) |
|
Making Employees Feel Valued |
|
|
384 | (2) |
|
Saying Thanks with Low-Cost Rewards |
|
|
385 | (1) |
|
|
386 | (4) |
|
|
387 | (2) |
|
Tough Love and Accountability |
|
|
389 | (1) |
|
|
390 | (5) |
|
|
392 | (3) |
|
Managing the New Work Force |
|
|
395 | (4) |
|
Getting Return on Investment (ROI) from On-Staff Telecommuters |
|
|
395 | (2) |
|
Harnessing the Power of Free Agents |
|
|
397 | (2) |
|
|
399 | (5) |
Part Six The Electronic Desk, The Digital Business |
|
|
Chapter Fifteen The Outlook Is Bright: E-Mail and Your Business |
|
|
404 | (38) |
|
|
406 | (1) |
|
E-Mail Decisions: What Do You and Your Business Need? |
|
|
407 | (1) |
|
|
407 | (3) |
|
E-mail signatures as a simple marketing tool |
|
|
410 | (1) |
|
Separate personal and business e-mail |
|
|
411 | (1) |
|
Implementing Small Business Server |
|
|
412 | (6) |
|
Online Training and Assistance for Outlook |
|
|
412 | (1) |
|
E-Mail Security and Protecting E-Mail Data |
|
|
413 | (5) |
|
|
418 | (6) |
|
Taking Care of the Messages You Need and Those You Don't |
|
|
421 | (3) |
|
|
424 | (10) |
|
|
434 | (5) |
|
Simple E-Mail Marketing: Adding a Signature |
|
|
435 | (3) |
|
Scheduling Appointments and Tasks |
|
|
438 | (1) |
|
Synchronizing Outlook and a PocketPC |
|
|
439 | (3) |
|
|
|
Chapter Sixteen Small Business Networks and Servers |
|
|
442 | (16) |
|
Determining Needs and Available Choices |
|
|
444 | (5) |
|
|
444 | (1) |
|
Determining Service Types and |
|
|
445 | (2) |
|
Planning Your Local Area Network (LAN) |
|
|
447 | (2) |
|
|
449 | (2) |
|
|
449 | (1) |
|
|
450 | (1) |
|
|
451 | (1) |
|
|
451 | (1) |
|
Choosing Networking Equipment |
|
|
451 | (7) |
|
Routers and Hubs and Servers, Oh My! |
|
|
452 | (4) |
|
Enabling Mobile Computing |
|
|
456 | (1) |
|
|
457 | (1) |
|
|
457 | (1) |
|
Chapter Seventeen Computer Security Basics |
|
|
458 | (20) |
|
Considering Access Requirements |
|
|
460 | (7) |
|
|
460 | (1) |
|
|
461 | (6) |
|
Planning Physical Security |
|
|
467 | (2) |
|
|
468 | (1) |
|
Guarding Against Data Loss |
|
|
468 | (1) |
|
|
469 | (3) |
|
Developing a Backup Strategy |
|
|
469 | (1) |
|
Implementing a Backup Plan |
|
|
470 | (2) |
|
Protecting Against Viruses |
|
|
472 | (2) |
|
Choosing an Antivirus Program |
|
|
473 | (1) |
|
Maintaining Virus Protection |
|
|
474 | (1) |
|
Choosing and Using Firewalls |
|
|
474 | (1) |
|
Dealing with Spyware and Adware |
|
|
475 | (1) |
|
|
476 | (2) |
Index |
|
478 | |