Posts tagged Been

Google May Disclose When Search Results Have Been Censored Due To ‘Right To Be Forgotten’ by @mattsouthern

The Guardian reports today that Google is considering letting users know in the search results pages when search results have been removed due to the recent EU ‘right to be forgotten’ privacy ruling. Since the ruling by the European court of justice on May 13th, Google has received tens of thousands of requests from internet users to take down sensitive information. The Guardian says that “it is understood” Google is planning to flag censored search results. Google is planning to place an alert at the bottom of each page where it has removed links, similar to how Google alerts users […]

The post Google May Disclose When Search Results Have Been Censored Due To ‘Right To Be Forgotten’ by @mattsouthern appeared first on Search Engine Journal.

View full post on Search Engine Journal

No, Google Says There’s Been No Penguin Update

This morning, I noticed a lot of buzz around a possible Google Penguin update. The SEO space was noticing huge changes in the search results from perviously penalized sites, many that were impacted by the Google Penguin update. The Google Penguin algorithm targets sites trying to manipulate their…



Please visit Search Engine Land for the full article.

View full post on Search Engine Land: News & Info About SEO, PPC, SEM, Search Engines & Search Marketing

Bing Ads Intelligence: Microsoft’s Keyword Tool We’ve Been Waiting For by @Rocco_Zebra_Adv

Bing has always had a lot of room for improvement when it comes to keywords. The majority of advertisers preferred  to use Google’s keyword tool to build out campaigns in Bing because Bing’s tools were not user-friendly. This has a big disadvantage: the keyword lists were not customized to Bing’s unique search trends. Now, Bing has finally launched a solution called Bing Ads Intelligence. It is an add-on for your Excel that allows you to work on keyword researches for all of your accounts on Bing. Easy to Install Once you download and install the extension from Bing Ads, you will be able to open […]

The post Bing Ads Intelligence: Microsoft’s Keyword Tool We’ve Been Waiting For by @Rocco_Zebra_Adv appeared first on Search Engine Journal.

View full post on Search Engine Journal

Matt Cutts Explains How To Avoid Buying A Domain That Has Been Penalized By Google

Matt Cutts, Google’s head of search spam, answers a question about buying domains in his latest Webmaster Help […]

Author information

Matt Southern

Matt Southern is a marketing, communications and public relations professional. He provides strategic digital marketing services at an agency called Bureau in Ontario, Canada. He has a bachelors degree in communication and an unparalleled passion for helping businesses get their message out.

The post Matt Cutts Explains How To Avoid Buying A Domain That Has Been Penalized By Google appeared first on Search Engine Journal.

View full post on Search Engine Journal

Matt Cutts Explains How You Can Tell If Your Website Has Been Hit By A Particular Algorithm by @mattsouthern

Matt Cutts, Google’s head of search spam, answered a question about Google penalties in his latest Webmaster Help video where a user writes in to ask: How can you tell if your site is suffering from an algorithmic penalty, or you are simply being outgunned by better content? Although the user didn’t specifically ask about […]

Author information

Matt Southern

Matt Southern is a marketing, communications and public relations professional. He provides strategic digital marketing services at an agency called Bureau in Ontario, Canada. He has a bachelors degree in communication and an unparalleled passion for helping businesses get their message out.

The post Matt Cutts Explains How You Can Tell If Your Website Has Been Hit By A Particular Algorithm by @mattsouthern appeared first on Search Engine Journal.

View full post on Search Engine Journal

Negative SEO: Have Mercenaries Been Hired To Torpedo Your Search Rankings? – Forbes


Forbes
Negative SEO: Have Mercenaries Been Hired To Torpedo Your Search Rankings?
Forbes
Schemes like this, unfortunately, are an aspect of an emerging trend we're seeing when it comes to negative SEO. Campaigns like these are used to point thousands of poor-quality, spammy links at a competitors' website in an attempt to cause their

View full post on SEO – Google News

Google Give Tips For Identifying If Your Site Has Been Hacked, And How To Fix It by @mattsouthern

A post went up on Google’s official Webmaster Central Blog last night from a representative of the Search Quality Team providing tips for how to find out if your site has been hacked, as well as fix it and prevent future incidents. Since hacking is surprisingly common I felt it was important to pass along […]

Author information

Matt Southern

Matt Southern is a marketing, communications and public relations professional. He provides strategic digital marketing services at an agency called Bureau in Ontario, Canada. He has a bachelors degree in communication and an unparalleled passion for helping businesses get their message out.

The post Google Give Tips For Identifying If Your Site Has Been Hacked, And How To Fix It by @mattsouthern appeared first on Search Engine Journal.

View full post on Search Engine Journal

Has There Ever Been A Worse Time To Be In The Enterprise Hardware Business?

Technology journalist Robert Cringley thinks IBM is doomed because it just sold its Intel server business to Lenovo. On the contrary, this may be the clearest indication that IBM may thrive. After all, given the trend toward cloud and build-your-own-datacenters, has there ever been a worse time to be selling enterprise servers?

“An Act Of Desperation For IBM”

Let’s be clear. Every incumbent hardware company is under the gun as low-margin cloud businesses boom. Amazon puts every hardware company under pressure and is even causing fits for those trying to make a business of selling private cloud technology. 

Yet Robert Cringley, a longtime IBM critic, believes IBM “has sold the future to invest in the past,” referring to its mainframe business, which it retains. He goes on to suggest that, “little servers are the future of big computing” and that, “IBM needs to be a major supplier and a major player in this emerging market.”

Yes and no.

It seems clear that selling big hardware like mainframes is a dying business. Yes, enterprises will continue to buy it, but if the last few earnings calls from IBM, Oracle and their peers are any indication, big hardware is a difficult proposition in the age of cloud. 

Not that the big incumbents are giving up on big hardware. As reported by ReadWrite in November 2013, Oracle CEO Larry Ellison believes the future datacenter will include purpose-built, big hardware and low-end commodity servers, with the latter constituting the core of enterprise workloads. But that core will not powered by Oracle. Or IBM. Or any mega-vendor.

The problem is that these legacy server companies are not buying into that “purpose-built,” insanely expensive hardware, either. Hence, while CA Technologies may like to pretend that the mainframe is an integral part of the “data center of the future,” as a recent Wall Street Journal advertisement proposes, IT buyers aren’t buying.

Why Not Sell “Little” Servers?

If big hardware is struggling, why shouldn’t IBM, Oracle and other enterprise incumbents trade in commodity servers? In large part, they can’t. Not while being profitable anyway. 

The commodity server business has been further commoditized by the rise of white box server vendors and open-source datacenter initiatives like Facebook’s Open Compute project. As Accenture writes, “Facebook’s Open Compute Project is accelerating the adoption of infrastructure innovations by sharing those breakthroughs freely.” For incumbent server vendors, “freely” is the last thing they want to hear.

It may be on the verge of getting even worse. According to McKinsey & Company, in 2014 enterprises need to increase their emphasis on private cloud deployments:

Many large infrastructure functions are experiencing “cloud stall.” They have built an intriguing set of technology capabilities but are using it to host only a small fraction of their workloads. It may be that they cannot make the business case work due to migration costs, or that they have doubts about the new environment’s ability to support critical workloads, or that they cannot reconcile the cloud environment with existing sourcing arrangements. Over the next year, infrastructure organizations must shift from treating the private cloud as a technology innovation to treating it as an opportunity to evolve their operating model.

If this happens, and there are good reasons to believe enterprise developers will continue to skip the private cloud in favor of public cloud options like Amazon Web Services, it won’t serve enterprise hardware companies very well. With increasing interest in open datacenter designs, enterprises can  utilize private clouds with low-end, white box vendor servers rather than higher-cost, name-brand servers from the likes of IBM.

Which, presumably, is one big reason IBM sold its commodity server business.

The Future Of Hardware Is Software

Venture capitalist Marc Andreessen argues that “software is eating the world.” Along the way, it’s also eating hardware. At least, the fancy name-brand hardware that used to mint billions for IBM and its peers.

This is what Cringley misses. He blithely suggests of IBM that, “they are selling a lower-margin business where customer are actually buying to invest in a higher-margin business where customers aren’t buying.” This is true. But it doesn’t lead to his conclusion: “IBM needs to learn how to operate in a commodity market. IBM needs to become the lowest cost, highest volume producer of commodity servers.”

This is like suggesting that IBM needs to slit its right wrist instead of its left wrist. In either market, IBM is going to lose. The difference is that it can milk the high-margin, fading business for years as it tries to transform itself into a commodity cloud computing business. With the acquisition of Softlayer, it is well on its way, though the journey will be brutally painful.

Which, I suppose, is how I’d describe any company trying to make a living peddling hardware. Or cloud, for that matter. The cloud is compressing margins on all hardware businesses, even as Amazon forces would-be cloud competitors into a game of low-margin commodity cloud pricing. For hardware companies, it seems to be a lose-lose proposition. But it may be the only option they have.

View full post on ReadWrite

The Internet Of Things Has Been Hacked, And It’s Turning Nasty

Don’t say we didn’t warn you. Bad guys have already hijacked up to 100,000 devices in the Internet of Things and used them to launch malware attacks, Internet security firm Proofpoint said on Thursday. 

It’s apparently the first recorded large-scale Internet of Things hack. Proofpoint found that the compromised gadgets—which included everything from routers and smart televisions to at least one smart refrigerator—sent more than 750,000 malicious emails to targets between December 26, 2013 and January 6, 2014.

The hack came to light over the relatively quiet holiday period when a security researcher at Proofpoint noticed a spike in thousands of malicious messages sent from a range of IP addresses she didn’t recognize, David Knight, a Proofpoint executive in charge of information security products, told me in an interview.

Curious, she began pinging the devices and soon realized that they weren’t PCs, the usual platform for launching this sort of attack. Instead, many were otherwise unidentified devices running a standard version of Linux. Pinging one device brought up a login screen that : Welcome To Your Fridge. She typed in a default password—something like “admin” or “adminadmin,” Knight says—and suddenly had access to the heart of someone’s kitchen.

As the age of Smart Everything dawns, it’s also bringing online a host of largely unsecured smart devices like TVs, refrigerators and even toasters. Those devices are often trivial for knowledgeable hackers to compromise, opening new opportunities for malicious actions of various kinds—of which the malware attack Proofpoint identified may be among the mildest.

“Embedded operating systems deployed in firmware tend to be old, not patched very frequently, and there are known vulnerabilities to virtually all of them,” Knight said. Proofpoint’s investigation highlights how vulnerable connected devices are and how easy it is for hackers to take advantage of them. 

Hacking The Home

Craig Heffner, a security researcher that teaches a class on exploiting connected devices, told ReadWrite in December that his students are usually surprised by the lack of security in connected home devices.

“If you look at the vulnerabilities being published, they’re not sophisticated,” he said. “Usually, the vendor put a back door in the product and someone took advantage.” 

Worse, connected home devices often running on outdated software may be difficult or even impossible to patch. Security expert Bruce Schneier detailed the wild insecurities of the Internet of Things in a recent column for Wired:

[I]t’s often impossible to patch the software or upgrade the components to the latest version. Often, the complete source code isn’t available. Yes, they’ll have the source code to Linux and any other open-source components. But many of the device drivers and other components are just “binary blobs” — no source code at all. That’s the most pernicious part of the problem: No one can possibly patch code that’s just binary.

Malware isn’t the only thing people have to worry about. Knight said hackers could use compromised smart devices to launch distributed denial of service (DDoS) attacks aimed at knocking target Websites offline, mine bitcoins, or store stolen or otherwise illicit data.

Knight suggests the first step in protecting your gadgets is to change the default passwords. Beyond that, if you don’t need your device connected to the Internet, then don’t connect it.

“Don’t plug it in if you don’t plan to use it,” he said. “If you do put it on the Internet, try and make sure you put it behind your personal router and firewall in your environment.”

View full post on ReadWrite

Has SEO Been Reincarnated By Content Marketing? – Business 2 Community

Has SEO Been Reincarnated By Content Marketing?
Business 2 Community
Back then, many SEO experts would have told you to make the link building process as quick as possible. That's why profile links on forums and social media sites were so popular. So were high-PR blog posts that accepted links in their comments. And, if

View full post on SEO – Google News

Go to Top
Copyright © 1992-2015, DC2NET All rights reserved