How Nine University’s KT V.I.P. Taught An Old Dog New Tricks
I’ve been in the retail business for 40 years now. Over the course of several decades, I’ve had the good fortune of building up my father’s once small antique business into the now largest independent furniture retailer in our 4-county region (with 2 stores comprising a total of 50,000 sq ft and 20 employees!) Now you’re probably thinking, where does Amazon FBA and Nine University come in?
I first heard about Amazon FBA from my son Kyle when he opened his business back in December 2018. I’ll admit it – I was skeptical at first. That is, until he showed me around Nine University’s KT V.I.P program and how it all worked. If there’s something you learn in any business, it’s that first impressions matter and I was impressed. Fast forward to investing in the course in January 2019.
I would say that what most impressed me is how all the content is laid out. KT V.I.P. doesn’t on skimp on content (there are over 300+ videos). From the smallest things like signing up for a seller account to optimizing a full-on Facebook ad campaign, every module includes an overall explainer so you understand the bigger picture and then breaks it down to the exact actions you need to take with clear step by step visuals. All the videos feature either Kale or Taylor or both (the founders of Nine University) which makes the whole experience feel all the more personal and catered to you.
In the months since investing in KT V.I.P., I’ve been impressed with how they continue to improve the course, always adding new hacks and features as Amazon FBA changes. The KT V.I.P. Facebook community and the daily live streams are a huge help as well. Included in your course are daily livestreams where you can ask any question in real time and bi-weekly coaching sessions with a 6-figure FBA seller. From what I’ve experienced, this is a very active and helpful community – a huge added value.
My Results After a Few Months on Nine University’s KT V.I.P.
Coming from a retail brick and mortar background, there was a big learning curve. However, business is business and some things never change: you need to negotiate and buy product to make a great presentation, advertise it and fulfill the order. But as I’ve learned with KT V.I.P, Amazon FBA is its own universe. There have been a lot of late nights negotiating with someone in China, setting up online programs for product selection, PPC advertising optimization and accounting for taxes. Everything is different.
During this learning curve, I’ve experienced some adversity. For example, I’ve had my site suppressed a couple different times because a picture needed to be changed or a description needed a comma. I’ve had to learn new things like setting up variations via a flat file. But I learned early on in my other business that as frustrating is it is at the time, it will only make you smarter, stronger and better. It’s worth the frustration.
In my first month, I applied all my KT V.I.P. learnings so far and reached $3500 in sales and just hit $4600 for my last 30 days. I have added a variation and have two more variations in production now.
My goal is to continue to grow this business to 6 figures a month. My wife and I love to travel and the nice thing about this is that I can run it from a laptop anywhere in the world.
I would love to continue to grow this and step back from my day to day duties at my furniture operations, as my sons are doing a great job. I then could work on this project while we travel or spend time with our boys and their families. With the help of Nine University and KT V.I.P.,I can see this becoming my new reality. To learn more for yourself, I highly recommend giving their testimonials and free online training video a chance HERE.
6 Unexpected Security Concerns, and How to Prepare
As powerful as the Internet is right now, it’s impossible to even imagine where it will go over the next years and beyond. But, as fast as security protection continues to improve, hackers seem to improve even more quickly. Everything from new devices to apps…
Your Business Needs These 13 Digital Security Solutions – Here’s How To Get The Most Out Of Each
How would you characterize your organization’s digital security posture? If you’re not sure how to answer this question, or perhaps would prefer not to answer it at all, you’re not alone. Countless decision-makers, from uber-competent CTOs and CISOs to CEOs and COOs who couldn’t code…
Louisiana And Oklahoma Introduce Digital Identification To Prevent Fake ID Use
Digital ID in Louisiana Utilizing digital IDs has been a commonly broached topic for a while now. Although most states are only either deliberating their helpfulness or in the utmost initial stages, Louisiana has moved forward. The primary introduction of this technology was done back…
ScanGuard Review – Here is What You Should Know
Doesn’t it sound good and satisfying to have a goop-performing antivirus that is reliable enough? Yes, it is. For that reason, you need to be extra careful when you are in search of a good antivirus. Put all the necessary factors into consideration so that…
The Emerging Need for Social Media Security
By the time you’ve finished reading this sentence, nearly 700 passwords have been stolen from social media accounts across the world. Social media security breaches have the potential to cause up to $6 trillion in cybercrime damages by 2021, up from $3 billion in costs…
- 3D Printing
- App Dev
- Artificial Intelligence
- Arts and Entertainment
- Big Data
- Blockchain Tech
- Business Technology
- Car Technology
- Cloud Computing
- Cloud Storage
- Computer and Technology
- Conference Calling
- Coupons and Deals
- Cyber Security
- Dark Left 1
- Data Center
- Data Recovery
- Digital Arena
- Digital Marketing
- Edu Tech
- Email Marketing
- Google Glass
- Guides and Tutorials
- Health and Fitness
- Home Improvement
- Home Security
- Internet and Businesses Online
- Internet Marketing
- IT Careers
- Mobile Apps
- Mobile Security
- New Tech
- Online Shopping
- Project Management
- Reference and Education
- Reputation Management
- Sales & Marketing
- Shopping and Product reviews
- Small Business
- Social Media
- Tech Trends
- Technical Support
- Technology in Education
- Tips & Tricks
- Tips And Tricks
- Video Conferencing
- Virtual Reality
- Wearable Technology
- Web Design
- Web Development
- Web Hosting
The Difference Between Apple iPhone 11 Pro and iPhone XS’s Camera and Night Mode.
If you are not used to iPhone 11 Pro, you might conclude it’s an iPhone XS. But when you inspect the two phones well, you will spot the difference. Apple has modified the photography software. This is so to give photos a more natural look….
The Evolution Of iGaming
You’ve probably already heard that iGaming has taken over the typical gaming techniques. What we started as Mario and counterstrike has now leaped to Gta5 and online casinos. This Evolution of iGaming was foreseeable, and it was understood that once more people know about digital…
3 Ways to Prepare For Cyber Security Risks That Employees Must Know
In a world where everything is much easier to do via mobile, app, or device, technology is not going to slow down. We’re all guilty of potentially owning more than one device, whether that is our personal phones, work phones, tablets or fitness trackers. All…
Non-Negotiable Elements For Your Business IT Security Plan
In 2019, having a business IT security plan is more important than ever. An IT security plan is the first line of defense you have for protecting your business – and your clients – against cybercriminals. Cybercriminals include hackers, who frequently obtain personal information with…
Businesses Need To Be Proactive When It Comes To Cyber Security
For business of any size, making sure they are not only compliant with security regulations but continually improving and adjusting the measures they have in place is vital. Quite often the factor which determines how a business approaches cyber security is the mindset of the…
How To Become A Cyber Security Analyst
What is Cyber Security? Cyber security is the practice of protecting a system or network from digital attacks. These attacks are generally aimed to retrieve or destroy sensitive information and it is a serious threat to all the organizations. Who is A Cyber Security Analyst…