Breaking Myths about Human decision making: AIDAR approach

Breaking Myths about Human decision making: AIDAR approach

AIDA is a basic acronym that was formulated quite a while back as an indication of four phases of the deals process.
It is, in present day terms, a decently oversimplified model. This does not imply that it is no more of worth; it basically implies that it is not the entire story. How the money adds up is that it is helpful to utilize it as an agenda and rule, yet not as the main agenda or rule.

Consideration / Attention

Initially stand out just enough to be noticed. Without consideration, you can barely convince them of anything. You can get consideration from various perspectives -a decent path is to astonish them.

When you are conversing with them, the initial couple of seconds are vital as they will listen most then and quickly choose whether you are worth giving further consideration. Don’t squander these valuable minutes on comforts, get the other individual’s consideration quickly.
It is by and large better to open with something that pulls them towards you as opposed to something that startles them (as this may push them away).

Great openers address their issues and start with, for example,

Is it true that you are noticing…?

Would you be able to see…?

Awful openers provide for them something to question, exhibit your lack of regard, or simply bore them to tears, and may start with, for example,

I’ve got recently the thing you want…?

I simply dropped by with the goal that I might…?
I was just pondered whether you could…?


When you have their consideration, support that consideration by getting the other individual intrigued.

You can get enthusiasm by:
Listening to them discuss their issues.

·         Letting them know things that influence their issues.
·         Exhibiting things, instead of simply telling.
·         Getting them engrossed.
Watch out for the weariness variable. You may have the capacity to get somebody intrigued, yet you can’t hope to keep their consideration for ever. In the event that you need to return some time or another, you ought to abandon them needing more, at any rate of your organization.
Desire /Want

When they are intrigued by you and what you need to say, then next step is to make a longing in them for what you need them to do. They can perceive that they have a need, yet this is not fancy. Craving is an inspiration to act and leads towards the following stage.

Longing is similar to a flame, and can be stoked by numerous routines, for example,

Revealing to them how the thing to be fancied won’t be accessible for long (Scarcity rule).
Demonstrating how other individuals sanction of the thing and have gained it for themselves. Revealing to them how what you bring to the table will take care of some of their issues.


This is the enchantment stage when they make a move on their cravings and really purchase the item or consent to your suggestions. The scariest point is the place you request the deal or ask them whether they really do concur completely with you.

Listen to the signs they are sending! Is it true that they are getting some information about when you can convey or what after-deals help you give? Compress the issue you are understanding for them and how what you are proposing, tackles that issue.

Utilize the suitable shutting procedure, for example, choices (‘do you need web designing or the content creation?) or presupposition (‘what time might we meet next week?’).


So start out today, because you never know what tomorrow holds. Let the difference within exhibit.

Technology is the new Addiction.

Technology is the new Addiction.
Any sufficiently advanced technology is equivalent to magic. – Arthur C. Clarke

What is Technology? Is it a helping hand for us? Or is it a substitute meant to replace us in future?
Technology according to us is a very vast term, where even a simple tool/machine like a hand fan is known to be a part of innovation and a big tool like Artificial Intelligence is also studied with equal relevance.
Technology or should we say ease of getting things done has become a part of our DNA. Today, a new born baby within few months, learns to operate an iPad or an iPhone. There used to be a time when young children used to learn how to operate a normal kid’s toy and probably failed at it.
It seems as if today’s generation has some sort of coding embedded in their DNA which enables them to start operating any gadget at an early age.
With advancement in technology, today almost everything is possible. Maximum of the things have been automated and with AI being developed so rigorously, in the future we wouldn’t need Humans to do our work. Everything would be automated.
Cars have become self-aware (Google Self Drive Car), anything you want can be printed in 3D with help of 3D Printers, any color you like can be scanned and picked up to draw or write. Nothing seems impossible in today’s world.


Despite using science and technology to better our lives, we are the real slaves to technology. We indulge in the need to always have something electronic in our hands – a tool that connects us to the Internet, our games or to our social networks. We’re bypassing the real world to get a digital quick-fix; our work, play and plans for stress release seem to depend on a broadband connection.
Now, fast forward this situation to a decade from now. You see adults sitting around a table in a Wi-Fi-enabled café. Chances are they are not going to be talking to each other, not in the real world at least. At home, fights and arguments will occur a lot more often between spouses due to a lack of communication, and it’s not going to get any better when this generation has kids of their own.
This is the whole point of technology.  It creates an appetite for immortality on the one hand.  It threatens universal extinction on the other. Technology is lust removed from nature. The real danger is not that computers will begin to think like men, but that men will begin to think like computers. Still, we feel that, end of the day human touch or interaction is very important. Future may have 100 different robots for 100 different things but the feeling of a human next to you can never be replaced.

Come to think of it, all of this is already happening right now.
Technology has slowly eased its way into our lives and formed glass walls between individuals who can communicate with each other but instead chose not to.
So, in the end we just hope that computer/robots/gadgets replace humans only for work and gives us more time to be with each other.

To know more visit us at
Like us at

Data confidentiality!

Say, Information privacy!

As people, we have a tendency to trust even in the scarcest of the point of interest. Ensuring secured delicate information is the final objective of very nearly all the IT firms with efforts to establish safety. Two major objectives for ensuring delicate information are to evade fraud and to ensure protection.
The uncalled for revelation of touchy information can likewise cause mischief and shame to understudies, personnel, and staff, and possibly hurt the notoriety of the Institute. Hence, it is further bolstering everybody’s good fortune to guarantee that delicate information is ensured.

1. Information security is MUST and MAJOR
Information security is essential to all business operations at Atomants. All current and new business and information courses of action ought to incorporate an information security audit to make certain that atomants information is protected from misfortune and secured against unapproved access.
2. Arrange ahead
We make plans to survey our information security status and arrangements and make routine procedures to get to, handle and store the information securely and document unneeded information. Verification of associates is done timely.
3. Realize what information we have
The principal venture to secure registering is to comprehend what information we have and what levels of assurance are obliged to keep the information both classified and sheltered from misfortune.
4. Scale down the information
Keep just the information we require for routine current business, securely document or annihilate more established information, and expel it from all machines and different gadgets (advanced mobile phones, laptops, blaze drives, and outer hard plates).
5. Bolt up!
Physical security is the way to protected and secret registering. All the passwords on the planet won’t recover the so called smart phone if the machine itself is stolen. Move down the information to a safe place in the occasion of misfortune.

Get to know security better, contact us at or visit