SlideShare a Scribd company logo
1
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person is strictly prohibited.
Reachable3.0
TrainingManual-Lists
May2014
2
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited.
TABLE OF CONTENTS
1. Reachable Lists
2. How do I create a list?
3. How can I add targets to a list?
4. Can I edit my lists?
5. Will I get notified of changes to my lists?
3
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person is strictly prohibited.
REACHABLE LIST
4
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited.
REACHABLE LISTS
ListscomplementstheReachfunctionby
automatingtheprocessofsearchingfor
multiplepeopleandcompanies. Users
cancreatelistsinseveralwaysandlet
Reachablelookforpathsandalertusers
thatgoodpathshavebeenfound.
Thebasicstepsare:
1. CreatealistanduploadanexternalCSVfileto
populateit,
2. Createalistandpopulateitfromwithinthe
Reachabledatabasefromavarietyofplacesin
theapplication.
3. Gettingalertsindicatingactivityinthelist (e.g.
betterpathsnowfound)
4. Managinglists
5
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person is strictly prohibited.
CREATINGALIST
6
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited.
CREATING A LIST
Reachableallowsyoutocreateliststo
trackpeopleorcompaniesyouwantto
reach.Therearetwowaysinwhichyou
cancreatealistinReachable.
1. Createnew:thisisanewlist,whichyoucan
populatewithpeopleorcompaniesfromwithin
Reachable.
2. UploadExisting:youcanalsouploadalist
createdoutsideReachableasaCSVfileinto
Reachable.
TYPES OF LISTS
7
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited.
CREATING A LIST
Tocreateanewlist,followthesteps
below;
1. Click+Addalist:
2. SelectCreatenew
3. Enteranameforyourlistandselectwhether
itisatargetlistofpeopleorcompanies
4. ClickCreatenew. Thiswilldisplayyourlist
andyoucanstartaddingtargetstoyourlist
CREATE NEW
8
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited.
CREATING A LIST
Tocreateanewlist,followthesteps
below;
1. Click+Addalist:
2. SelectUploadexisting
3. Selectwhetheryourtargetlistisalistofpeople
orcompanies
4. EnsureyouruploadedCSVfilehasthe
appropriatecolumnheadingslabeled
5. ClickBrowseforfileandselectyourlist.
6. ThelistwillloadandReachablewilltryto
matchyourtargetstoourDatabaseand
provideyouwiththebestconnectionpath.This
maytakeafewminutestocomplete.
UPLOAD EXISTING
9
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person is strictly prohibited.
ADDING TARGETS TOALIST
10
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited.
ADDING TARGETS TO A LIST
Onceyou’vecreatedalist,youcan
continuetoaddpeopleorcompaniestoit.
Therearethreewaysinwhichyoucan
addpeopleandcompaniestoanexisting
list.
1. YouarelookingatanEmployeeListina
CompanyProfile. Youcanselectpeoplein
bulkandaddthemtoalist.
2. YouarelookingatPersonorCompany
ProfileorPath. YoucanclickAddtoaList.
3. YouareinyourListDirectoryandhave
openedaListpage. YoucanusetheSearch
featureonthatpagetosearchtheReachable
databaseandaddnamesyoufindtoalist.
WHERE TO ADD
11
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited.
ADDING TARGETS TO A LIST
Youcanselectspecificemployeesfrom
ourEmployeeListtabandaddthemtoa
List:
1. FromtheCompanyprofilepages,select
EmployeeList.Thiswilldisplayalistofthetop
currentemployeesinthecompany
2. Ifyouarelookingforaspecificperson,select
Searchandbegintypingthefirstorlastname
oftheperson,oratitle,suchasMarketing.
3. Selecttheindividualsyouwanttoaddtoyour
listusingthecheckboxestotheleftofthe
name
4. ThenselectAddSelectiontoListandselect
thelistyouwanttoaddthetargetsto,orCreate
aNewListfromthatwindow.
ADDING FROM THE EMPLOYEE LIST TAB
12
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited.
ADDING TARGETS TO A LIST
Toaddapersonorcompanytoyourlist
whileyou’reonapathorprofileofsuch
personorcompanyfollowthesesteps:
1. EachPathandProfilePagehasanAddtoList
tabonthenavigationpanel. Clickthattab
whenyouwishtoaddthatpersonorcompany
toaList.
2. TheAddtoListpanelwillopen.
3. Selectthelistyouwishtoaddthetargetto,or
selectCreatenewlisttocreateanewlistfor
yourtargettobeaddedto
ADDING FROM A PATH OR PROFILE
13
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited.
ADDING TARGETS TO A LIST
Toaddapersonorcompanytoyourlist
whileyou’reinthelist,followthesesteps;
1. SelectAddPerson(orAddCompany)
2. Typethenameofthepersonorcompany
withinthesearchbox(includecompanyname
forapersontohelpnarrowyoursearch)
3. ClickAddtoList
4. Alistofmatchingpeopleorcompanieswill
display.Clickontheoneyouwishtoadd.
5. Yourtargetwillthendisplayonthelistand
Reachablewillrunapathforyou.
ADDING FROM A LIST PAGE
14
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person is strictly prohibited.
EDITING LISTS
15
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited.
EDITING LISTS
Onceyou’vecreatedalist,youcanalways
updateitby:
1. Editingthenameofalist
2. Deletingalist
3. Deletingapersonorcompanyfromalist
4. ManagingthelistscoveredbyyourReachable
Digest
5. AddingNotestoalist,ortoanypersonor
companyinalist
6. Copyormovepeopleandcompaniestoor
fromdifferentlists
7. Settingthepriorityofpeopleorcompaniesina
list
KEEPING IT SIMPLE
16
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited.
EDITING LISTS
DeletingaList
1. ClickEditinthesubnavigation
2. SelecttheCheckboxnexttoeachlistyou
wanttodelete.Reachabledefaultlistsarenot
editable.
3. ClickDeleteinthesubnavigation
4. SelectDonewhenyouaredonedeletingyour
lists.
EditingaListName
1. ClickEditinthesubnavigation
2. Placeyourcursorinthetextboxofthelist
nameyouwishtoedit
3. MakeyourchangesandselectDonewhen
youarefinished
EDITING LIST ATTRIBUTES
17
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited.
EDITING LISTS
DeletingPeopleorCompaniesfromaList
1. ClickEditinthesubnavigation
2. SelecttheCheckboxnexttoeachpersonor
companyyouwanttodelete
3. ClickDeleteinthesubnavigation
4. SelectDonewhenyouarefinishedtoclose
theeditoptions
EDITING LIST ATTRIBUTES
18
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited.
EDITING LISTS
Notes
1. ClickontheNoteIcontotherightofthelistto
opentheNoteswindow
2. Placeyourcursorinthenotesareatostart
typingyournote
3. ClickSavetosaveyournoteorDeleteto
removeitentirely
ReachableDigest
1. ToggletheOn/Offvaluetotherightofthelist
nameunderReachableDigestwillremove
yourlistalertsoraddthemtoyourDigest
EDITING LIST ATTRIBUTES
19
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited.
EDITING LISTS
CopyorMoveTargettoAnotherList
1. ClickEditinthesubnavigation
2. SelecttheCheckboxnexttoeachpersonor
companyyouwanttocopyormovetoanother
list
3. SelectCopyToorMoveTo
4. Awindowwilldisplayshowingyouthelists
available
5. Selectthelistyouwishtomoveorcopythe
targetsto
6. SelectDonewhenyouarefinishedtoclose
theeditoptions
EDITING LIST ATTRIBUTES
20
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited.
EDITING LISTS
Notes
1. ClickontheNoteIcontotherightofthe
personorcompanywillopentheNotes
window
2. Placeyourcursorinthenotesareatostart
typingyournote
3. ClickSavetosaveyournoteorDeleteto
removeitentirelyfromthatpersonorcompany
SettingTargetPriorities
1. ToggletheHI//MED/LOWvaluetotheright
ofthetargetnameunderPrioritywillallowsyou
tomanagethelistbetterbysortingthose
targetswiththehighestpriority
EDITING LIST ATTRIBUTES
21
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person is strictly prohibited.
REACHABLE DIGESTANDALERTS
22
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited.
DIGEST & ALERTS
Eachnight,Reachablerecalculatesyourbestpath
scorestoyourLists’targets. Anynoteworthy
changesinyourabilitytoreachyourtargetsis
markedasanAlertontheReachableDigest,
whichyouwillreceivebyemail. Thesealerts
include:
1. NewTopScore:Thisalertindicatesthata
targetonaListhasanewBestPath
2. NewTop10:Thisalertindicatesthatthetop
10Pathstoatargethavechanged.
3. NewlyReachable:Thisalertindicatesthata
targetinyourlisthasachievedascorethatis
highenoughthatismeritsattention(wesay
thatthepersonisnow“reachable”)
KEEPING YOU ON TOP OF YOUR LIST
23
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited.
DIGEST & ALERTS
Belowarethestepstoeitherincludeor
excludeListsfromyourDailyDigest;
1. ToggletheOnvaluetoOff ontheListofLists
page orfromthesubnavigationmenufrom
withinthelisttoexcludethatlistfromtheDigest
2. ToggletheOffvaluetoOntoadditback
INCLUDING/EXCLUDING LISTS FROM DIGEST
24
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited.
DIGEST & ALERTS
Bydefault,youwillreceiveDigestemailsona
weeklybasis,althoughyouhavetheabilityto
changethefrequencytodailybyfollowingthe
stepsbelow;
1. ClickonMEfromthetopnavigationarea
2. SelectSettingsfromtheleftnavigationarea
3. IntheAlertssection,select thefrequencyof
yourchoice
DIGEST FREQUENCY
25
(c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person is strictly prohibited.
NEEDADDITIONALHELP?
SUPPORT@REACHABLE.COM

More Related Content

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
Marius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
Expeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Reachable 3.0 training manual for lists

  • 1. 1 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person is strictly prohibited. Reachable3.0 TrainingManual-Lists May2014
  • 2. 2 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited. TABLE OF CONTENTS 1. Reachable Lists 2. How do I create a list? 3. How can I add targets to a list? 4. Can I edit my lists? 5. Will I get notified of changes to my lists?
  • 3. 3 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person is strictly prohibited. REACHABLE LIST
  • 4. 4 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited. REACHABLE LISTS ListscomplementstheReachfunctionby automatingtheprocessofsearchingfor multiplepeopleandcompanies. Users cancreatelistsinseveralwaysandlet Reachablelookforpathsandalertusers thatgoodpathshavebeenfound. Thebasicstepsare: 1. CreatealistanduploadanexternalCSVfileto populateit, 2. Createalistandpopulateitfromwithinthe Reachabledatabasefromavarietyofplacesin theapplication. 3. Gettingalertsindicatingactivityinthelist (e.g. betterpathsnowfound) 4. Managinglists
  • 5. 5 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person is strictly prohibited. CREATINGALIST
  • 6. 6 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited. CREATING A LIST Reachableallowsyoutocreateliststo trackpeopleorcompaniesyouwantto reach.Therearetwowaysinwhichyou cancreatealistinReachable. 1. Createnew:thisisanewlist,whichyoucan populatewithpeopleorcompaniesfromwithin Reachable. 2. UploadExisting:youcanalsouploadalist createdoutsideReachableasaCSVfileinto Reachable. TYPES OF LISTS
  • 7. 7 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited. CREATING A LIST Tocreateanewlist,followthesteps below; 1. Click+Addalist: 2. SelectCreatenew 3. Enteranameforyourlistandselectwhether itisatargetlistofpeopleorcompanies 4. ClickCreatenew. Thiswilldisplayyourlist andyoucanstartaddingtargetstoyourlist CREATE NEW
  • 8. 8 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited. CREATING A LIST Tocreateanewlist,followthesteps below; 1. Click+Addalist: 2. SelectUploadexisting 3. Selectwhetheryourtargetlistisalistofpeople orcompanies 4. EnsureyouruploadedCSVfilehasthe appropriatecolumnheadingslabeled 5. ClickBrowseforfileandselectyourlist. 6. ThelistwillloadandReachablewilltryto matchyourtargetstoourDatabaseand provideyouwiththebestconnectionpath.This maytakeafewminutestocomplete. UPLOAD EXISTING
  • 9. 9 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person is strictly prohibited. ADDING TARGETS TOALIST
  • 10. 10 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited. ADDING TARGETS TO A LIST Onceyou’vecreatedalist,youcan continuetoaddpeopleorcompaniestoit. Therearethreewaysinwhichyoucan addpeopleandcompaniestoanexisting list. 1. YouarelookingatanEmployeeListina CompanyProfile. Youcanselectpeoplein bulkandaddthemtoalist. 2. YouarelookingatPersonorCompany ProfileorPath. YoucanclickAddtoaList. 3. YouareinyourListDirectoryandhave openedaListpage. YoucanusetheSearch featureonthatpagetosearchtheReachable databaseandaddnamesyoufindtoalist. WHERE TO ADD
  • 11. 11 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited. ADDING TARGETS TO A LIST Youcanselectspecificemployeesfrom ourEmployeeListtabandaddthemtoa List: 1. FromtheCompanyprofilepages,select EmployeeList.Thiswilldisplayalistofthetop currentemployeesinthecompany 2. Ifyouarelookingforaspecificperson,select Searchandbegintypingthefirstorlastname oftheperson,oratitle,suchasMarketing. 3. Selecttheindividualsyouwanttoaddtoyour listusingthecheckboxestotheleftofthe name 4. ThenselectAddSelectiontoListandselect thelistyouwanttoaddthetargetsto,orCreate aNewListfromthatwindow. ADDING FROM THE EMPLOYEE LIST TAB
  • 12. 12 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited. ADDING TARGETS TO A LIST Toaddapersonorcompanytoyourlist whileyou’reonapathorprofileofsuch personorcompanyfollowthesesteps: 1. EachPathandProfilePagehasanAddtoList tabonthenavigationpanel. Clickthattab whenyouwishtoaddthatpersonorcompany toaList. 2. TheAddtoListpanelwillopen. 3. Selectthelistyouwishtoaddthetargetto,or selectCreatenewlisttocreateanewlistfor yourtargettobeaddedto ADDING FROM A PATH OR PROFILE
  • 13. 13 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited. ADDING TARGETS TO A LIST Toaddapersonorcompanytoyourlist whileyou’reinthelist,followthesesteps; 1. SelectAddPerson(orAddCompany) 2. Typethenameofthepersonorcompany withinthesearchbox(includecompanyname forapersontohelpnarrowyoursearch) 3. ClickAddtoList 4. Alistofmatchingpeopleorcompanieswill display.Clickontheoneyouwishtoadd. 5. Yourtargetwillthendisplayonthelistand Reachablewillrunapathforyou. ADDING FROM A LIST PAGE
  • 14. 14 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person is strictly prohibited. EDITING LISTS
  • 15. 15 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited. EDITING LISTS Onceyou’vecreatedalist,youcanalways updateitby: 1. Editingthenameofalist 2. Deletingalist 3. Deletingapersonorcompanyfromalist 4. ManagingthelistscoveredbyyourReachable Digest 5. AddingNotestoalist,ortoanypersonor companyinalist 6. Copyormovepeopleandcompaniestoor fromdifferentlists 7. Settingthepriorityofpeopleorcompaniesina list KEEPING IT SIMPLE
  • 16. 16 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited. EDITING LISTS DeletingaList 1. ClickEditinthesubnavigation 2. SelecttheCheckboxnexttoeachlistyou wanttodelete.Reachabledefaultlistsarenot editable. 3. ClickDeleteinthesubnavigation 4. SelectDonewhenyouaredonedeletingyour lists. EditingaListName 1. ClickEditinthesubnavigation 2. Placeyourcursorinthetextboxofthelist nameyouwishtoedit 3. MakeyourchangesandselectDonewhen youarefinished EDITING LIST ATTRIBUTES
  • 17. 17 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited. EDITING LISTS DeletingPeopleorCompaniesfromaList 1. ClickEditinthesubnavigation 2. SelecttheCheckboxnexttoeachpersonor companyyouwanttodelete 3. ClickDeleteinthesubnavigation 4. SelectDonewhenyouarefinishedtoclose theeditoptions EDITING LIST ATTRIBUTES
  • 18. 18 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited. EDITING LISTS Notes 1. ClickontheNoteIcontotherightofthelistto opentheNoteswindow 2. Placeyourcursorinthenotesareatostart typingyournote 3. ClickSavetosaveyournoteorDeleteto removeitentirely ReachableDigest 1. ToggletheOn/Offvaluetotherightofthelist nameunderReachableDigestwillremove yourlistalertsoraddthemtoyourDigest EDITING LIST ATTRIBUTES
  • 19. 19 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited. EDITING LISTS CopyorMoveTargettoAnotherList 1. ClickEditinthesubnavigation 2. SelecttheCheckboxnexttoeachpersonor companyyouwanttocopyormovetoanother list 3. SelectCopyToorMoveTo 4. Awindowwilldisplayshowingyouthelists available 5. Selectthelistyouwishtomoveorcopythe targetsto 6. SelectDonewhenyouarefinishedtoclose theeditoptions EDITING LIST ATTRIBUTES
  • 20. 20 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited. EDITING LISTS Notes 1. ClickontheNoteIcontotherightofthe personorcompanywillopentheNotes window 2. Placeyourcursorinthenotesareatostart typingyournote 3. ClickSavetosaveyournoteorDeleteto removeitentirelyfromthatpersonorcompany SettingTargetPriorities 1. ToggletheHI//MED/LOWvaluetotheright ofthetargetnameunderPrioritywillallowsyou tomanagethelistbetterbysortingthose targetswiththehighestpriority EDITING LIST ATTRIBUTES
  • 21. 21 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person is strictly prohibited. REACHABLE DIGESTANDALERTS
  • 22. 22 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited. DIGEST & ALERTS Eachnight,Reachablerecalculatesyourbestpath scorestoyourLists’targets. Anynoteworthy changesinyourabilitytoreachyourtargetsis markedasanAlertontheReachableDigest, whichyouwillreceivebyemail. Thesealerts include: 1. NewTopScore:Thisalertindicatesthata targetonaListhasanewBestPath 2. NewTop10:Thisalertindicatesthatthetop 10Pathstoatargethavechanged. 3. NewlyReachable:Thisalertindicatesthata targetinyourlisthasachievedascorethatis highenoughthatismeritsattention(wesay thatthepersonisnow“reachable”) KEEPING YOU ON TOP OF YOUR LIST
  • 23. 23 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited. DIGEST & ALERTS Belowarethestepstoeitherincludeor excludeListsfromyourDailyDigest; 1. ToggletheOnvaluetoOff ontheListofLists page orfromthesubnavigationmenufrom withinthelisttoexcludethatlistfromtheDigest 2. ToggletheOffvaluetoOntoadditback INCLUDING/EXCLUDING LISTS FROM DIGEST
  • 24. 24 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person or entity is strictly prohibited. DIGEST & ALERTS Bydefault,youwillreceiveDigestemailsona weeklybasis,althoughyouhavetheabilityto changethefrequencytodailybyfollowingthe stepsbelow; 1. ClickonMEfromthetopnavigationarea 2. SelectSettingsfromtheleftnavigationarea 3. IntheAlertssection,select thefrequencyof yourchoice DIGEST FREQUENCY
  • 25. 25 (c) 2014 Reachable, Inc., Proprietary and Confidential, Any distribution in any format to any person is strictly prohibited. NEEDADDITIONALHELP? SUPPORT@REACHABLE.COM