Do-It-Yourself Search Engine Optimization – Part 1: Keyword Optimization
The first step in a search engine optimization campaign is to choose your keywords or keyphrases for each of your web pages. Keywords are the terms that search engine users type in the search box to conduct a query. The right keywords are those that:
Web Service-Oriented Architecture – The Best Solution to Business Integration
How do you unlock the value of the information your organization manages? Business integration is the key technique in unlocking this information. Business integration is the single biggest issue for end-users, and therefore, for the IT industry. Recent Gartner research in this area has highlighted the importance of “service-oriented architectures” in solving the business integration issue. There is a growing realization that integration is best solved using a service-oriented architecture.
RedHat and USB devices
I started to use RedHat 7.3. Although it has come a long way and I really like how all the Linux Distributions are turning out, RedHat 7.3 makes me mad for only a few reasons:
SQL Server 2000 Table Hints
As you advance in your skills as a Transact-SQL developer or SQL Server database administrator there will come a time when you need to override SQL Server’s locking scheme and force a particular range of locks on a table. Transact-SQL provides you with a set of table-level locking hints that you can use with SELECT, INSERT, UPDATE, and DELETE statements to tell SQL Server how you want it to lock the table by overriding any other system-wide or transactional isolation level.
SEO Corner – Hiding Content from the Search Engines
Question: We have recently inserted an “encryption code” in our home page at http://www.imagelair.com to keep most from viewing our source code (meta tags/keywords). The code works fine, but we noticed that our stats program reflected that about half of the hits to the default page every hit the “encrypt” page (our home page now).
My question is this. Will the search engines index our encrypted home page and Web site when it must go through the default page first, which has the encryption?
Home -N- Linens Site Review
The deadline for reviews of the Home -N- Linens site has passed, and it’s time to take a look at the results. Here’s what DevWebPro readers had to say about the Home -N- Linens site.
Home -N- Linens Site Review – Misleading Elements
Here are my impressions that came from first glance and more thorough looking through. If my thoughts can help in improving the site I shall be happy.
Home -N- Linens Site Review – Short Comments
Not everyone writes a long review – here are the short comments from the Home -N- Linens site review.
Sniffing with Net::Cap to stealthily managing iptables rules remotely, Part 1
In our saga that began several weeks ago, we’re trying to create a firewall setup that allows no inbound access by default that can be modified remotely to allow a small window of inbound SSH connectivity. Remember that this machine must have no inbound TCP ports accessible to pass muster with the Windows-biased IT administrators, yet we want to allow inbound SSH dynamically when needed.[1]
On Topic
A few concepts in Perl 6 are strange at first sight. They seem hard to understand, but it’s only because they’re new and different. They aren’t deep mystical concepts known only to Tibetan lamas. Anyone can understand them, but it helps to start with a common-sense explanation.