Archive for the ‘Uncategorized’ Category

Google’s Future Innovations   4 comments

Lets take a look at what Google’s Future Innovations could be. Improved Image search: Google’s image search is already a popular product, streamlining the search results into a huge, borderless collection of images and speeding up indexing of images to lightning levels. It has also changed the display of a clicked-on image so that the site it comes from is more visible in the background than it used to be. This change to the user interface has brought webmasters who feature lots of images on their sites a greater click-through to the actual site. In the future, Google might make images a greater part of the search experience, following in Bing’s footsteps by featuring lots of beautiful, visual content. Google will have better filters so that you can search in a much more specific way. Google already has a little-known way of searching for images of faces only. (Simply add &imgtype=face to the URL after performing an image search.), extending this functionality to other categories such as living things (for example, plants only) and materials (for instance, wood only).

In-Video search: in-video search to Google Books, an extremely ambitious project that lets you search the text of
millions of offline books that Google has scanned. Like Google Books, video is an area that was hitherto unsearchable because there was no way to know what was inside a video without actually watching it. However, the technology to search videos has existed for a while now, and it is only a matter of time until Google releases an in-video search feature. Not only are the words of a video interesting to search through, but also the sound effects and music. Google currently employs song recognition in YouTube to prevent copyright violators but hasn’t given the public access to this tool.

Social Comments on search results:What was missing was the ability for friends (or at least trusted connections) to comment on the search results. Google’s main search product will undergo more and more personalization in the future.

Natural Language search: Typing keywords into a search box is something we all had to get used to. But technology seems to be going in the direction of making our lives more intuitive, hence the rise of touch screens and video games that respond to the motions of your body. Most people would agree that it would be great if your search engine understood you better. This is the sentiment behind natural language search, which attempts to return meaningful results in response to queries such as “What is the second fastest animal in the world?” Google wouldn’t do too well with that one because it would just register what / second / fastest / animal / world and return results about the cheetah, that mention how many seconds it takes for it to accelerate from 0 to 60 miles per hour. Technologists have been focused on natural language search for many years, and it is all but a certainty that it will make its debut on Google in the coming decade.

Big Budget Videoconferencing   Leave a comment

Videoconferencing is an increasingly viable communication tool for businesses of all sizes. However, there is no one-size-fits-all videoconferencing solution; the one that fits best depends on the size of a business, the nature of a business, and what a business wants to accomplish.

Larger businesses can opt for providing all employees with desktop videoconferencing capabilities, multiple room-based systems, one or more immersive telepresence systems, or some combination thereof. Whatever the configurations you choose, the muscle and might resides on the core of your network, in the IT closet.

Systems may include per-seat licenses for as many employees as necessary, each endpoint (a desktop or a room) equipped with the necessary cameras, microphones, and videoconferencing software. The addition of a bridge, which can handle anywhere from a dozen or so users up to hundreds of users, enables multi-way videoconferencing;  multiple bridges, which can be placed in various offices or branches, multiply the number of possible simultaneous users.

You can also add a recording box to the system, which allows you to record video conferences and stream content to dozens of users. With the addition of a dedicated streaming box, you can create a sort of corporate YouTube where thousands of users can access recorded content at once.

The crème de la crème solution is the immersive  telepresence system, which is essentially a room containing a video display wall, the ability to hold simultaneous calls between large groups of people, and the ability to call virtually any other videoconferencing system. Immersive telepresence is ideal for corporate training sessions, conducting  university classes online, and government applications.

You don’t need special bandwidth capabilities to run even the most elaborate system; the broadband Internet that most companies already have in place is sufficient.

The cost of a videoconferencing system varies widely. In general, however, the more functionality you add to a system, the higher the price. Instead of buying every component separately, it’s typical to buy everything you need as a package from a single vendor. However, many customers buy the displays—typically large-screen HDTVs—on their own, as it’s often more cost-effective that way.

Desktop endpoints cost in the neighborhood of $100 per seat, with rooms running anywhere from a few thousand to tens of thousands of dollars, depending on how elaborate a given room is. Bridges cost between about $25,000 up to a couple hundred thousand dollars, depending on how many simultaneous users they support. A recording box may cost around $25,000, and you can expect to pay approximately $75,000 for a streaming box. Immersive telepresence solutions run between about $150,000 to $500,000 per room, depending on the scale of a given installation and its amenities.

Smart TVs and Set-Top Boxes   Leave a comment

A relatively inexpensive, simple, and easy-to-install way to add more channels to your TV, set-top boxes vary in size,
shape, and content selection. They rely on your home Internet connection to stream media from Internet sources such
as Hulu, Netfl ix, YouTube, and many other video-on-demand channels. Consider them a supplement to your cable
subscription, rather than a replacement, since they won’t have much in the way of live TV programming.

Right now, Roku’s box leads the pack with a very broad channel selection, but since it doesn’t support DLNa, you can’t use it to access the mu sic, photos, or videos stored on your network’s PCs. Some other contenders in the fi eld, such as Western Digital’s WD TV Live series, do support DLNa.

If you’re already heavily invested in music and movies from the iTunes Store, go for an apple TV box—you’ll be able to
stream your existing iTunes content from your home network’s iTunes libraries. For both the versatility of a full Web
browser in your HDTV and a search feature that could cover your satellite-TV listings, locally stored recordings, and the
Web, grab a google TV set-top box like the Logitech Revue.

Also in this category are game consoles (PlayStation 3, Xbox 360, Wii) and Internet-connected Blu-ray players. While not dedicated Internet TV gadgets, they have Hulu Plus, Netflix, DLNa support, and other Internet-connected features.  Cost: $60 to $250 plus subscription fees (when applicable).
Advantages: Set-top boxes are very easy to set up and use, and they typically don’t cost very much. also, new services
tend to be added to the selection over time—the longer you own the box, the more content it should be able to deliver.
Disadvantages: Most set-top boxes don’t include a full Web browser, so you can’t always watch the videos you want,
especially if your favorite shows are found only at live streaming sites or from the TV networks. and, as noted, you don’t
have many options for streaming live TV with a set-top box.
Advanced tips: You can hack most set-top boxes, including the apple TV and the Roku, to add new features, channels,
and applications. For example, you can jailbreak your apple TV and install the XBMC media-center app to enable 1080p
video playback, which the stock apple TV doesn’t support.

The set-top boxes place in the future of smart TV is iffy at best. You can’t really do much besides watch the ported Web video. That may be okay for now, but we expect Web video to continue proliferating—and standard set-top boxes will struggle because they lack Web browsers.

While the Web video services that run on set-top boxes often add new channels, you have no guarantee that your settop
box developer will add the ones you want when you want them. But the boxes are relatively cheap, so buying a new one
every few years could be one way around that problem.

Apple TV and google TV have two different approaches to the set-top box. apple’s turns your TV into an extension of your iTunes Library—great if you own a bunch of other iOS devices, or if you prefer to pay the TV/movie rental fees over
a subscription fee. google’s offers many of the benefits of a home theater PC, such as a Web browser and (future) access
to apps via the android Market, without the expense or hassle of a full-blown media PC. also, the search function on google TV could radically change the way you watch television simply by making it far, far easier to fi nd what you want to watch.

However, even these forward-looking set-tops won’t get far unless the various networks and content providers open some doors for them. Hulu, for example, is currently blocking the google TV browser. all the same, the apple TV and google TV platforms are still in their formative period and may both be around long enough to see the day when content owners have come to accept the model these devices use for distributing video. We expect that these two set-tops will be the ones to watch over the next few years.

Smart TVs and Connected TVs   Leave a comment

How to browse the Web, run apps, play music and games— and most important, watch what you want, when you want it.

“Smart TV” is the new hot buzzword these days. Imagine, for a moment, that your HDTV combined the simplicity of the
normal TV-and-remote experience with the powerful search features and video-on-demand libraries you’re accustomed to on the Web. Toss in social networking, photo sharing, music, gaming, and a hundred kinds of Web content. That’s what
“smart TV” means. It means never needing to settle for anything less than having what you want to watch (or hear, or
play) running in big-screen glory right now, while you master the universe from the couch with your all-powerful remote.

Don’t let all the TV and tech companies out there fool you, however. You have many ways to make your existing TV
smarter, other than just buying a new connected TV with all the bells and whistles built in. You don’t have to purchase a
brand-new PC or yet another set-top box, either. and you don’t have to let your cable-TV subscription hold your eyeballs
(or your wallet) hostage with hundreds of channels you’ll never watch.

Connected TVs

Looking to buy a new HDTV? Choose the right TV—one that connects directly to the Internet—and you can enjoy loads of
Web features and apps without having to buy any add-ons or boxes. But choosing may not be easy: all the major TV manufacturers now have some package of Internet-connected features built into their midrange and high-end models.

In early Internet-connected TVs, packages included only a few additional “channels”—Netfl ix Instant Watch, YouTube, and a few video-rental services like amazon Instant Video, CinemaNow, and Vudu. Connected-television features have since advanced quickly.

New connected TV sets come packed with apps, games, and Internet video channels, often with options exclusive to the manufacturer.

Cost: You’ll have to pay for the television ($1000 to $2000 for midrange to high-end sets). The good news: You don’t necessarily have to pay a premium for an Internetconnected TV: Some manufacturers, such as Vizio, sell lowend models that are priced in the $750 to $830 range. The cost of an HDTV will generally de pend on the set’s size and on its panel technology (a 50-inch plasma set will cost more than a 50-inch LED one). and you won’t have to pay for access to the smart-TV service itself—just for the subscriptions to specifi c services such as Hulu Plus or Netfl ix, as well as the video-download rental fees.

Advantages: Connected TVs are simple and elegant. You can use your TV’s own remote, you don’t need to worry about
running extra power cords or audio/video cables as you do with a set-top box or a home theater PC, and many HDTV sets
include built-in Wi-Fi support (so you don’t even need to plug an ethernet cable into the back).

What’s more, newer TV sets often come with new remote controls that make it easier to use the Internet features. For
example, Lg’s Magic Motion remote is a gesture-oriented remote control similar to the Nintendo Wii controller (just
point the remote at the TV to move your cursor), which lets you more easily use the built-in Web browser of Lg sets.
Vizio’s high-end sets include a Bluetooth remote with a slideout keyboard to facilitate typing.

Disadvantages: Connected TVs aren’t particularly versatile. If your set-top box doesn’t have a channel you want, you can go buy a new one, but you won’t be able to do such a thing so easily with a big, expensive HDTV. also, if you’re big on live TV, you’ll still need your cable-TV subscription, as the Internet features are mostly on-demand video only.

Advanced tips: Most connected TVs include uSB ports and DLNa support (see the glossary on page 65), meaning that
you can watch your locally stored video, photos, and music from a uSB drive by plugging it straight into your TV or from
other PCs on your network—handy for the times when the video you want to watch is sitting on your PC in the den.

Future-proof? Yes—but only if you choose wisely. although early Internet features in HDTVs looked pitiful compared with what a standard set-top box could offer, the big players in the HDTV market (Lg, Panasonic, Samsung, Sony, and Vizio) are each looking to make their Web-connected TV sets your entertainment hub by adding new features, video channels, and even their own app stores. For example, Panasonic’s “Viera Connect” Internet features include Facebook, Skype, Twitter, and even downloadable games from gameloft in addition to a whole host of media-streaming services like
amazon Instant Video, Hulu Plus, Netfl ix, and Pandora.

Posted September 13, 2011 by Anoop George Joseph in Uncategorized

Mobile malware   Leave a comment

Smartphone malware isn’t yet as big a threat as you might think, but it’s coming. Here are some tips to help you avoid it.

Malicious software is leaping from PCs to cell phones, as malware makers target the platform in hopes of making a quick buck. Examples include the infected Droid Dream and Plankton Android apps. An infected app released into the
Android market can infect several thousand users’ phones before anyone discovers the presence of the malware.

In the DroidDream incident, several thousand people downloaded software infected with a Trojan horse that rooted their phone and sent data such as the user’s location and phone number to a remote server. That same day, Google killed the contaminated apps in the Android Market, wiped the apps from phones remotely, and issued an update to patch and repair the damage that the DroidDream Trojan horse had done.

Because of how Android apps are built, a malware writer can disassemble a popular app, repackage it with malware, and reupload it to the Android Market with a slightly different title.

Nevertheless, we’ve yet to see any mobile malware infestations or threats on the scale of desktop PC problems. Thus
far, all of the reported mobile malware incidents have been small, isolated outbreaks that malware fighters have patched  or identified within several hours of their appearance. According to Symantec, it’s still early in the smartphone malware game; and though the threat may seem overblown today, outbreaks are nevertheless very likely to increase in the future.

Threats to Watch Out For:
Malware makers favor Android because it is an open platform that allows users to load custom applications onto their devices. But other mobile gadgets are at risk of malware, too.

In its closed app ecosystem, Apple screens apps to ensure that they don’t contain objectionable content. But Apple does not check every bit in every app submitted to the App Store.

In July 2010, an app called Handy Light passed Apple’s screening process and appeared in the App Store. Though Handy Light looked like a simple flashlight app, it contained a hidden unofficial tethering function that let users treat their iPhones as cellular modems. Handy Light wasn’t malicious, but it showed that no vetting system is entirely safe. Most of the mobile malware we’ve encountered so far has taken the form of infected apps on the Android platform. For a phone to become infected, its user must install the compromised app; it isn’t vulnerable to drive-by downloads and other infection methods, as PCs are. That situation may change as malware makers begin to target other smartphone operating systems.

Ultimately, it’s up to users to make the right decisions when choosing where to download apps and which apps to install. In June of this year, McAfee Labs released a report stating that BUGS & FIXES alternative third-party app stores unofficial app markets not sanctioned by Google or Apple had more malware on average than the official markets. The Gemini trojan for Android, for example, was distributed exclusively through third-party app stores in China.

How to Protect Yourself
The safest course is to avoid apps that you’ve never heard of and to research apps and their publishers thoroughly before pressing the Download button. When you install an app, you’ll see a list of permissions for services that the app can access on your device. but an alarm clock app, say, probably shouldn’t need to access your contacts. If something
in the permissions screen looks fishy, just don’t download the app.

You should also be wary of what you click (or tap) while browsing the Web. In late June, mobile security company Lookout discovered malicious advertisements aimed at smartphone users and designed to trick them into installing infected apps. Some types of mobile antivirus software, like Lookout mobile Security, have features intended to protect you from phishing attacks like these.

If possible, install antivirus software on your phone. most big-name security companies like AVG, mcAfee, and Symantec have a downloadable mobile app for protecting your phone. besides guarding against malware, these apps have such features as the ability to lock and wipe your phone remotely. When you receive a new phone, it’s a good idea to install an antivirus program before you add any other apps. That way, your phone will be better protected against malware from the get-go.

At least for the moment, smartphone malware is relatively easy to avoid; but being aware that it exists is the first step toward protecting yourself and your data from falling victim to it.

Safe Ways to Pay Online   Leave a comment

WHO HAS YOUR private info? Who knows, given how common security breaches have become. And credit card information is one of the most common types of personal data we volunteer online. So what can you do to minimize credit card fraud? Well, you can’t stop the break-ins, but here are four ways to keep your funds out of the hands of the bad guys.

Disposable credit card numbers: Why share your 16-digit number with online merchants, particularly those you’ve never heard of? Many major banks let you create a unique, temporary card number for each online purchase.

For instance, ShopSafe (www.bankofamerica.com/shopsafe) is a free service for Bank of America Visa and MasterCard holders who bank online with the fi nancial giant. When you want to make a purchase online, you open a new browser window and sign in to your Bank of America account. Next, you follow the ShopSafe instructions to create a 16-digit credit card number, which you use on the vendor’s site in lieu of your regular number. (The vendor won’t know the difference.) The temporary number has its own expiration date and security code, and is valid at only one online vendor. You may reuse the number when you buy from that vendor again, however. Other institutions, including Citibank (www.citibank.com/us/cards) and EntroPay (fi nd.pcworld.com/71872), have similar services.

Even if you don’t use a disposable number, you’re protected from unauthorized credit card purchases. If someone uses
your card without your permission, your liability typically ends at the fi rst $50, according to the U.S. Federal Trade Commission (fi nd.pcworld.com/71873 ). And many card issuers now have zero-liability policies, where you won’t have to pay a penny.

Online payment services: The free Google Checkout service (checkout.google.com) stores your credit card details and doesn’t share your full card number with merchants. If a vendor accepts Google’s payment service, you can make a purchase simply by clicking the Google Checkout button on its site. Naturally, you’ll have to sign in to your Google account to complete a transaction. The venerable PayPal (www.paypal.com) is another option, and it won’t charge you a fee to buy stuff online. Both sites will reimburse any unauthorized purchases in full, as long as you report the fraud within 60 days.

Prepaid credit cards: Personal finances shaky? Can’t obtain a regular credit card? you still have online-shopping options, albeit pricey ones. usually you can get a Visa Prepaid card without a credit card or bank account (find.pcworld.com/71874). When you buy a prepaid card, you load it with the cash amount you want; as you buy stuff, the goods’ purchase total is deducted from the balance. Visa’s zero-liability policy applies to prepaid cards, as well. Just remember that these cards are often loaded with sneaky fees. A Western union Prepaid Visa Card  (www.westernunion.com), for instance, has a $10 “non-refundable activation fee” and a $5 “load fee.”

Secure cards: For additional protection online, consider services such as MasterCard secureCode (find.pcworld.
com/71877) and Verified by Visa (find.pcworld.com/71878). Both require you to enter a password to complete a transaction. The lists of participating vendors are short, but if you regularly buy, say, plane tickets on British Airways, using an extra layer of security could help throw potential fraudsters off your tracks.

One last important rule of thumb: Never use wire transfers. “it’s just like sending cash—once it’s gone, it’s gone.
you can’t get it back,” the FtC’s Consumer Alert site warns. the agency also points out that using cash equivalents,
including debit cards, personal checks, cashier’s checks, or money orders, to buy online is wise only if you’re familiar with the seller. Buying a $50 herbal supplement from a dubious siberian pharmacy? say nyet to cash.

Using any of these methods can help you significantly reduce the chances of being duped by a malicious seller or site hacker. Of course, even if you take steps to disguise your financial information, you should regularly check your
accounts to spot fraud more quickly. But with a little vigilance and extra effort, you can stay one step ahead of
cybercriminals.

International Social Media   Leave a comment

Many leading brands that are eager to get closer to customers have come to embrace Twitter, Facebook, blogs and other similar platforms as their primary vehicles for customer engagement and lead generation. In many cases,  domestic social media efforts have paid off in measurable, impressive returns on investment (ROI).

However, social media strategy becomes significantly more complicated when companies expand it to include multiple international markets. For all of its allure, social media is not a panacea for globalization needs. It can be a useful tool, but website owners who include social media as one aspect of a more complete, integrated campaign often see better results abroad than those who put all their localization efforts into tweets and Facebook updates.                                      Below are five facts that all Web businesses should know about international social media:

1.Social media is not effective in every market

There are some industries in which social media lives up to its promise for better business. In these markets, customers respond in droves to carefully crafted tweets, and they like and share Facebook posts, leading directly to increased conversion rates.
In other spaces, however, the impact of social media is nominal. In such cases, website owners must carefully consider the value of translating social media content for international audiences.

For internationally focused companies, social media activities can be time- and resourceintensive, since multilingual social media cannot be managed by machines alone. One hundred and forty characters in English, for example, do not neatly translate into Russian or German tweets. Human experts are required to oversee that process, as well as other
social media tasks, such as responding to wall posts on Facebook or answering messages on a blog.

Before retailers invest in these activities, they should consider its potential value and examine the predominant sources of their website traffic in various regions. They should look at the way they define conversion and find out what their conversion rates are. They must look at the effect of social media on their home market and seek out evidence that
might predict its impact abroad. Finally, businesses on the Web should determine whether they have the resources in place to manage localized social media on a global scale.

2. It can be easy and difficult at the same time

It seems so simple: Write a short blog post, send a pithy tweet, craft an irresistible Facebook missive, create a video for YouTube. These activities seem straightforward enough, and valuable, too, since the company retains control over a message that could go viral. Globalization, however, complicates matters.

Effective localization for international prospects requires more than plugging words into a machine that returns literal translations. This is certainly true for global websites, but the importance of connotation intensifies as communication gets more compact.

Twitter’s strict length parameters, for example, make every character choice a critical one. Translating for this kind of platform requires not only timesaving software solutions but seasoned human translators, as well. These experts are needed to choose the right words, as well as understand the cultural implications and potential reactions of the target markets.

Additionally, creating short, frequent content requires ongoing local support, since the expectation of social media is not a one-sided broadcast but an interactive conversation. For business owners that want a one-time invest investment
in international marketing that requires little follow-up effort, social media is not the best option.

3. If you want to go social abroad, hire locally

There is, of course, a reason for all of the hype around social media. When it is done well and prospects embrace it, social media marketing can pay off. This is not only true locally but also with international campaigns.

Online businesses that succeed in international social media marketing do so because they factor translation, international messaging, cultural norms, local news and localized search engine parameters into their strategies. They recognize that social media itself is not a marketing campaign; rather, they view it as an element of an integrated approach.

When websites look at the way all available media and mediums can function together to reach a goal, they capture a greater return on their efforts.

Those who succeed also recognize that social media outreach makes numerous demands, including the following:

-Writing fresh, relevant content on a frequent basis.

-Monitoring other blogs, tweets and posts in the market, and commenting regularly.

- Calling on a local voice to manage these tasks to ensure that language nuances and cultural practices ring true.

- Investing in a local marketing professional who can devote time to content creation and social media management.

4. Social media marketing works best when it is part of a complete campaign

When it comes to international outreach and localization, the real return on investment comes from a well-integrated campaign that potentially includes social media as one element. Other common elements include targeted pay-per-click ads tied to a comprehensive international search engine marketing (ISEM) campaign, culturally relevant landing pages for fast conversions, multilingual rich media, adapted banner ads and marketing, out-of-home advertising, experiential marketing with people on the ground, philanthropic community involvement and events like launch parties and networking functions.

Unfortunately, too many companies see that their website traffic is low and respond hastily with carelessly translated ads or machine translation that replicates their domestic blogs and churns them out in international markets. Both of these activities fail to achieve their overall marketing goals — building business globally, generating new leads and spreading awareness about products and services.

5.International search engine maketing:    

Before companies take on social media, they need to build a foundation to support their outreach to international markets. That foundation is not as flashy as Facebook, but it can be far more effective. Furthermore, ISEM enables
every effort that comes after it, increasing penetration in new markets.

ISEM starts with the careful creation of keywords. Literal translation does not work for keyword creation, as slang and local vernacular play a significant role in regional search practices. The next step involves research into local search engine preferences.

In most of the world, the results will all point to one engine: Google. However, in some countries such as China, a local search engine will dominate. In these cases, businesses must learn the algorithms of the local favorite and create the keywords, ad placements, website content and tags most likely to boost rankings.

It’s unlikely that any business can drive international prospects to its landing pages without an integrated marketing campaign. Social media alone cannot build business abroad. For example, a retailer who leads prospects to a landing page that is irrelevant to the ad they viewed sees the impact in lower conversion rates. If a website fails to use high-quality translation, its search engine results — as well as conversion rates — will fall. These problems are solved first by ISEM, and then by an integrated group of marketing efforts. While there is a lot of international excitement around social media, the business reality is that these mediums require resources and effort; they are not quick fixes or replacements for a missing strategy.
However, when international social media outreach is incorporated into a larger, more complete marketing campaign,
it can be an effective method for reaching new prospects around the world.

Posted September 5, 2011 by Anoop George Joseph in Uncategorized

Data Driven Blogging   Leave a comment

Maintaining a corporate blog has many business benefits; both for search engine optimization (SEO) and from a lead generation perspective:

-Publishing regular new content signals “freshness” and keeps search engines crawling your site on a regular basis.

-Blogging is a great way to rank for long-tail search queries and more informational queries for which sales pages are unlikely to rank; these queries often reveal a high degree of intent.

-Blogging fosters link-building because helpful, informative blog posts are more likely to attract natural editorial links than sales pages.

-Positioning yourself as an expert in your field builds industry authority, trust and the strength of your brand.

For these reasons and more, many companies have launched corporate blogs.
The most successful of them have large returning readerships (in addition to high
rankings) because they’re good at anticipating what their audience wants to read.
The best way to answer the question — what does your audience want? — is to use all the
data at your disposal to define your blog’s content and editorial calendar. This article will
outline a three-step strategy for using tools and analytics to build a steady stream of
content that will appeal to your readers and customers and help achieve high search
engine rankings.

1. Generating content ideas from keyword research                                                                                                                                    When launching a new blog with a topical focus, it’s a good idea to use keyword research tools to help create a framework of topics to cover. This foundational content will serve to establish your blog as an authoritative source of
information in the industry and on the chosen topic. For example: You own a kitchen supply company and have decided to launch a food blog. By researching food-related keywords, you can plan some of the basic topics your
writers will cover — this can also help define the major categories of your blog.

By researching “recipes,” you might notice a large volume of searches for “easy recipes”. This can be the focus of the new blog.

Drilling down further into that niche, outline some subcategories to tackle, such as:
• Easy chicken recipes
• Easy pasta recipes
• Easy dessert recipes
• Easy recipes for kids
• Easy Mexican recipes

Using simple keyword research, you have now established a focal point of the blog as well as generated several ideas to get started with and on which to focus optimization efforts. And, based on this research, you now know some of the topics most relevant to your target audience.

2. Using Keyword Referrals to Build Out the Editorial Calendar                                                                                                                                                                                                                       Once you’ve covered the basics on the blog, it’s time to start delving into analytics data to find more specific, long-tail keywords that are driving traffic to your website. This data is especially valuable because it’s private, personalized, and proprietary — these are real keywords that are bringing real people —customers and prospects — to your pages.

Go into your analytics application and look for referring keywords — the terms that people have entered into search engines that led them to your blog. You should find some interesting long-tail phrases that are relevant to your blog, but perhaps for which you haven’t yet created dedicated, targeted posts.

For example:
• How to make guacamole
• Easy recipe for chicken parmesan
• Quick birthday cake recipes

By tackling these phrases in new blog posts, you will capture more traffic in those niches from search engines, as well as provide even more specific, useful and link-ready content for your readers.

3. Using Traffic and Engagement Data to Optimize and Refine Your Strategies                                                            Don’t stop at using keyword tools and analytics data to inspire new blog posts. You can also use this data to go back and further optimize your existing blog content for search. Published posts are still valuable sources of new   traffic, links and leads even when they aren’t new. And, you can use your best-performing posts as models for creating new content that will have the most impact with your audience.

Here are some ways to use analytics data to optimize content and refine your direction:

• Check keyword reports for specific blog
posts — Are the keywords that are driving
traffic the ones that you optimized the page
for? Look for missed opportunities — are
there keyword variations you could go
back and include in the copy? Is your title
tag doing enough work?

• Pay attention to engagement, too —
Which blog posts have the most comments?
Which posts have low bounce rates or high
conversion and clickthrough rates? How
can you replicate those conditions?

• Look for patterns in your highest-traffic
and best-converting blog posts — Are
they how-to posts? Videos? What types of
posts get the most links? Do your readers
like longer posts or shorter posts? List-style
posts or articles? Learn from your own
mistakes as well as your own wins —
repeat what works and don’t waste time on
what doesn’t.

Social,Mobile and Email Marketing:Web technology and Softwares   Leave a comment

If social media is just reaching the tipping point as an important channel for retail marketers, the mobile channel has moved past that point and shows every sign of becoming more pivotal in the years to come. That has big implications
for e-mail marketing. A recent study revealed that 20% of marketing e-mails are opened on a mobile device. While
retailers are always glad to see their e-mail opened, the fact that consumers are reading marketing e-mail on the small
screens of mobile phones poses significant challenges. The most obvious is how to format e-mail so that it can be comfortably read on those smaller mobile screens. Some retailers create e-mail messages formatted specifically for mobile phones, which can be a time-consuming and expensive approach because there is no sure-fire way to tell whether a consumer will first view the message on her mobile phone or personal computer.

A more practical solution is to find a format that will ensure e-mail messages render properly on a mobile phone and a PC. The standard width for desktop e-mails is 600 pixels and the standard for smartphones is 300 pixels. Creating an e-mail that splits the difference to between 400 and 450 pixels is a good compromise.

No one can predict the device on which a consumer will view their e-mail, but e-mail marketers can create messages to be viewed on narrower screens, such as a mobile phone, that will look fine on a personal computer. The main thing to
remember is that most consumers perform e-mail triage on their phone, so there is no guarantee they will scroll to read the entire message. That means the most important information has to be above the fold.

Other tips for creating e-mails that can properly format on mobile phones include using blocky text links that are easier to see and push on a touch screen, and reducing and eliminating graphics embedded in the message. Retailers can also employ technology that automatically formats an e-mail message to the mobile device, such as an iPhone.

Formatting to mobile devices is a strategic challenge for e-mail marketers, but also a necessity because more consumers are opening their mail on their smartphone. It’s important that retailers take the time to understand this challenge to create a smoother e-mail marketing experience for mobile users.

E-mail marketing software offers retailers a choice of ready-made e-mail templates and the option of creating customized templates. Retailers can place logos and images in the e-mail. Retailers can monitor open rates, click-throughs and forwarded e-mails in real time and compare the results of current e-mail campaigns with previous campaigns.

While formatting e-mails for mobile phones imposes new requirements on retailers, they also have new opportunities
because consumers carry their mobile phones with them all the time, wherever they go.

Retailers seeking to capture new e-mail addresses should hang signs in their stores urging consumers to opt in to their e-mail lists by entering a mobile code or scanning a QR code to receive a discount coupon for that day’s purchase.
(A QR code is a two-dimensional bar code consumers can scan with their phone cameras to obtain information or link to a retailer’s web site.)

Once the consumer enters or scans the code, the retailer can immediately respond with a text message asking for the shopper’s e-mail address; upon receiving that address, the retailer can then send a welcome e-mail containing a scannable electronic coupon, along with other promotional information.

The same concept can be used in store by retailers to promote their mobile apps or a rewards program. When consumers are in the store they are already engaged with the retailer and are more receptive to e-mail marketing.

While text messaging can be a useful complement to e-mail marketing, especially for reaching mobile consumers, retailers must also keep in mind its drawbacks. For one thing, it costs considerably more than e-mail and it is harder to track whether the message has been opened.

Text messaging is great for time-sensitive campaigns, such as sending a reminder to consumers that opened an e-mail about a four-hour sale that only an hour is left, but we are not seeing widespread use of text messaging campaigns.

Some retailers send text messages to consumers whose location indicates they are close to one of the retailer’s stores. For example, the merchant can promote limited-time incentives to encourage a shopper to walk into a nearby store.

While the mobile channel and social media represents new and sexy ways to reach consumers through e-mail, retailers should not forget the fundamental blocking and tackling techniques that have made e-mail one of the most reliable forms of marketing.

Creating lifecycle campaigns that maintain steady contact with consumers is a core strategy. Starting with welcome
messages when a consumer opts in to a retailer’s e-mail list and continuing with birthday greetings, post-sale follow-up
and product care tips, there is no shortage of messages that can be sent to customers over the course of the relationship.

Lifecycle campaigns are set up according to specific triggers, so opportunities are not missed. Lifecycle messages speak directly to the consumer in very targeted and timely ways so the open rates tend to be in the 30% to 80% range, usually significantly higher than regular broadcast sends.

Another basic of e-mail marketing is to use images wisely. While images can sometimes slow downloads, a few wellplaced images can greatly enhance an e-mail’s effectiveness.  In terms of placement, images put off to one side allow for text and image to share the prime space above the fold. There has to be a good balance between HTML text and images so that consumers scanning their e-mail understand what you’re trying to convey—even with images off.

Personalization is another critical element of e-mail marketing, and one that offers even more potential today because consumers reveal more information about themselves via social networks. Retailers have more opportunities than ever to accumulate information about consumers to segment their e-mail marketing lists. Two key segments include their best customers, those that represent the greatest lifetime value, and evangelists, shoppers who are anxious to proclaim their appreciation of the retailer’s merchandise.

Thanking high-value customers and brand evangelists for their loyalty by offering exclusive deals or sneak previews of incoming merchandise speaks to them on a personal level and can significantly increase future open and click-through rates for a retailer’s e-mail.

Once the decision to segment the list is made, retailers need to decide how finely they want to slice and dice it. The goal is to identify segments that retailers know the most about, and express that knowledge in a way that creates a very personalized experience. The more personal the e-mail the better the response to it will be.

Better segmentation not only leads to higher open rates, it can open the door to more opportunities to communicate
with consumers through e-mail. “A lot of retailers don’t e-mail with enough frequency because they overlook opportunities to send an e-mail. Using customer intelligence applications can help them unearth new up-sell and cross-sell opportunities.

Customer intelligence is a segmentation practice based on consumer behavior. For example, a retailer of outdoor apparel and gear might want to reach out to customers that have purchased hiking boots in order to offer them related
accessories, such as socks, rain gear and water bottles. The retailer can filter out those consumers who purchased their boots at least six months ago, then segment by gender, in order to send out well-targeted e-mail offers that will not seem overly intrusive.

Customer intelligence used to be for identifying which customers not to (snail) mail to, but by reversing its use for e-mail, retailers can identify new opportunities to reach out to customers. Customer intelligence is bringing more of the discipline used in traditional direct marketing to e-mail.

One fundamental that should not be forgotten is the need to test all aspects of an e-mail campaign.  Everything from what’s in the subject line and its length to layout and timing of the message should be tested.  E-mail best practices evolve, so retailers need to constantly test to find out what is working now for their customers.

Create and Remember Strong Passwords   Leave a comment

We live in a password driven world, one in which 4 to 20 characters can unlock the door to accessing data, communicating with friends, and making online purchases. The problem is that passwords should be different everywhere you use them, making it quite difficult to remember them all. And, if a password is truly strong, it’s usually even tougher to remember. But follow the tips below and you can take total control of your terms for access.

Use Different Passwords Everywhere
Why would you do this when it’s so easy to just type “fido” at every password prompt? Here’s why: If “fido” gets cracked once, it means the person with that info now has access to all of your online accounts. A recent study by BitDefender showed that 75 percent of people use their e-mail password for Facebook, as well. If that’s also your Amazon or PayPal password, and the wrong person discovers it, say goodbye to
some funds, if not friends.

Remember To Change Passwords
You should change them often (okay, maybe not every day). Don’t share them. Don’t leave them out for others to see (no sticky notes!).  Actually, sorry, they should be mysterious. In other words, make your password a total mystery to others.

Avoid Common Password
If the word you use can be found in the dictionary, it’s not a strong password. If you use numbers or letters in the order
they appear on the keyboard (“1234” or “qwerty”), it’s not a strong password. If it’s the name of your relatives, your kids, or your pet, favorite team, or city of your birth, guess what—it’s not a strong password. If it’s your birthday, anniversary, date of graduation, even your car license-plate number, it’s not a strong password. It doesn’t matter if you follow this with another number. These are all things hackers would try first. They write programs to check these kinds
of passwords first, in fact.

Other terms to avoid: “god,” “money,” “love,” “monkey,” “letmein,” and for the love of all that’s techie, if you use “password” as your password, just sign off the Internet right now.

How to Build strength
To create a strong password, you should use a string of text that mixes numbers, letters that are both lowercase and uppercase, and special characters. It should be eight characters, preferably many more; a lot more. The characters should be random, and not follow from words, alphabetically, or from your keyboard layout. So how do you make such a password?

1) Spell a word backwards. (Example: Turn “New York” into “kroywen.”)
2) Use l33t speak: Substitute numbers for certain letters. (Example: Turn “kroywen” into “kr0yw3n.”)
3) Randomly throw in some capital letters. (Example: Turn “kr0yw3n” into “Kr0yw3n.”)
4) Don’t forget the special character. (Example: Turn “Kr0yw3n” into “Kr0yw3^.”)

You don’t have to go for the obvious and use “0” for “o,” or “@” for “a,” or “3” for “e,” either. As long as your replacement makes sense to you, that’s all that matters. A “^” for an “n” makes sense to me.

Password Creation Tricks
Choose something simple to remember as a password, but when you type it, place your fingers on the wrong keys—
maybe one key to the left or to the right. Then a password like “kroywen” becomes “jeitqwb” or “ltpuerm.” This is only going to work for non-perfectionist touch-typists. And skip this tip if you type passwords on your phone; you’ll only sprain a thumb trying to be inaccurate instead of letting the inaccuracy flow naturally.

Another option is to pick a pattern on the keyboard and type based on that. For example, a counter-clockwise spin around the letter “d” could result in “rewsxcvf.” Throw in some random caps and numbers to really lock it down.

Perhaps the easiest thing to remember is an acronym from a phrase of your choice. “We didn’t start the fire, it was always burning” becomes “wdstfiwab” based on the first letters of each word.

Remember, the longer the password, the stronger it is. Always. Something more than 15 characters is very difficult to remember, but it’ll be a breeze with a mnemonic.

Third-Party Passwords
If you don’t trust yourself to create an unbreakable password, there are plenty of tools that will make one for you. The PC Tools Secure Password Generator, for example, makes one based on your criteria: how long, include (or don’t) mixed case, numbers, punctuation, similar character replacement, etc. It even provides a phonetic pronunciation guide that you use as your mantra while typing the password, for example: MA7ApUp# is MIKE – ALPHA – seven – ALPHA – papa – UNIFORM – papa – hash.

Password Testing
If you’re worried that your password of choice isn’t strong enough, check it at How Secure is My Password?. The site will even tell you how long the average PC would take to crack it. For example, cracking “kroywen” would take 13 minutes, “kr0yw3n” would take about 2 hours, “Kr0yw3^” 15 days, and “MA7ApUp#” about 3 years.

You can tell from these results that more capital letters are better for strength and more characters (eight instead of seven) also make a huge difference. Adding a single capital letter to the end of “Kr0yw3^,” such as “Kr0yw3nZ,” boosts the crack time to 3 years. Throw another special character in (“Kr0yw3^Z!”) and it jumps to 237 years.

Password Tracking and Changes
It’s easy for me to say that you should use a strong password and then expect you to remember that messy non-word string of characters. But how dare You use a different password on every site you visit and account you own. That’s madness!

Or is it? Here’s a simple trick that would make your already steroid-strong password even more muscular, while individualizing it for each entry. Simply take the first three letters of the site or service you’re entering and append them to the beginning or end of your strong password. On Amazon, you’d have “Kr0yw3^AMA.” Your e-mail could be “Kr0yw3^EMA.” Facebook would be “Kr0yw3^FAC.” Notice I always use all caps for the appended letters, just to crank
up the security. This can work for banks, shopping, social networks, you name it. It’s like creating a thousand passwords you can remember easily.

Every few months, you should change all of your passwords—everywhere. Even if you made a password that would take a few centuries to hack, you might have shared it with a co-worker or boyfriend or girlfriend, right? What happens when they become ex-coworkers or an ex-BF or ex-GF? Yeah, you can probably guess.

You could change your base (“Kr0yw3^”), which might be easy if you based it on an acronym for a longer phrase. Or you could change the appended letters by moving them to the front or even the middle (“Kr0y- FACw3^” for  Facebook). Perhaps switch to the last three in the service name (“OOK” for Facebook.) You could even stick in the date of the change. It’s your call.

You’ l l be most annoyed when you encounter those select few sites that only let you have a short password of four, six,
or even eight characters. What might have seemed easy before is going to soon become a vexing problem when you
embrace the might of a strong personal password paradigm.

The Right Advice is Wrong
Some experts will tell you to do a couple of things that go against conventional password wisdom. And the reasons are simple: productivity.

For example, I read a recent treatise on why you should write down your passwords, especially if you actually go the distance and use a unique string of characters for every log-in. The amount of time you could lose trying to remember each password whenever you have to type it may not be worth it. Just try to keep the list somewhere that’s not readily accessible, such as in your wallet. A desk drawer at work is not optimal for keeping out snooping co-workers.

Related advice f rom a Microsof t researcher says that having multiple passwords is also not worth the effort, or, more
specifically, the indirect costs of the effort of tracking them all. That’s right, that big list of passwords I just said to put in your pocket? Maybe it’s not worth it.

Tools of the Password Trade
What about password managers and other methods of entry-like biometrics? Well, of course. We’ll round up some of those for you soon, but first go pick a strong password for backup, just in case.

Posted August 27, 2011 by Anoop George Joseph in Uncategorized

Follow

Get every new post delivered to your Inbox.

Join 918 other followers

%d bloggers like this: