An SEO Checklist

Article Courtesy by Google Page Rank.net

Posted on this blog by Afzal Khan

Search engine optimization is on every webmaster's mind these days. Achieving a favorable ranking for the right keywords can mean a steady stream of targeted traffic to your site, and all for free - that's hard to beat. The key to high search engine rankings is structuring your website correctly, including plenty of content that is relevant to your keywords, and making sure your website is spider-friendly. You can use this checklist to make sure all of your Web pages can be found, indexed and ranked correctly:

Your website is themed. Your site deals with an identifiable theme which is obvious from the text on the home page and reinforced by all the other pages on your site. In other words, all the individual Web pages relate to each other and deal with various aspects of some central theme. The text on your home page should state clearly what that theme is and what your website is about, and the other pages should reinforce that.

Your Web pages have enough high quality, relevant content. Spiders come to your website looking for content. If a page doesn't have much content, or the content doesn't appear closely related to the page's title and your website's theme, the page probably won't be indexed or if it is indexed it won't rank well. Search engines love quality content and lots of it - content is what Web searchers are looking for and search engines try to provide.

Your website's navigational structure is relatively flat. You don't want important pages to be too "deep" within your website, meaning it takes several clicks to get there from the home page. Search engines typically index the home page first, then gradually index other pages on a site over time. Many spiders are programmed to only go three layers deep - if some of your important content is buried deeper than that, it may never be found and indexed at all.

You've created a unique "Title" tag for each page. The title is one of the most important aspects of any Web page from an SEO standpoint, especially for Google (which is the most important search engine to optimize for). Don't use a generic title for all your pages, use the keywords your targeting for that page and keep it brief but descriptive.

You use the "Description" meta tag. Contains a highly descriptive sentence about the content and purpose of your page, and contains your most important keyword phrase early in the sentence. Not all of the search engines will display this "canned" description when they list the page in search results, but many of them will, so it's worth getting it right. Check out our Webmaster Tools for an easy way to create great meta tags.

You use the "Keywords" meta tag. As with the meta tag description, not every search engine will use the keywords meta tag. But some will use it and none will penalize you for having it. Also, having a short list of the keywords you're targeting will help you write appropriate content for each page. The keyword tage should contain your targeted keyword phrase and common variations, common misspellings and related terms. Make sure your keywords relate closely to the page content and tie into the overall theme of your site.

Your keywords are included in the visible page content, preferably high up on the page. You have to achieve a balance here - you want to include keyword phrases (and variations) a number of times within your text, but not so many times that you appear to be guilty of "keyword stuffing". The trick is to work the keywords into the text so that it reads as naturally as possible for your site visitors. Remember, you can incorporate keywords into any Web page element that is potentially viewable by site visitors - header text, link text and titles, table captions, the "Alt" attribute of the image tag, the "title" attribute of the link tag, etc.

Every page of your website can be reached by search engine spiders. This is critical - if your pages can't be found, they can't be indexed and included in search results, let alone rank well. Search engines use spiders to explore your website and index the pages, so every page must be accessible by following text links. If pages require a password to view, are generated by a script in response to a query, or have a long and complicated URL, spiders may not be able to read them. You need to have simple text links to the pages you want indexed.

You've included a site map. Unless your site is very small, it's a good idea to create a site map with text links that you link to the site map from your home page. In addition to a link, include descriptive text for containing the relevant keywords for each page.

You link to your most important pages from other pages on your site. Internal links help determine page rank since they show which pages of your site are most important. The more links you have to have to a page, relative to other pages on your site, the more importance search engines will assign to it.

You use keywords in your link text. When you create a text link to another page on your site, use that page's targeted keywords as the text for the link (inside the anchor tags that create the link). Make it as descriptive as possible. For example, a link that says "Premium Customized Widgets" is much better than one that says simply "Product Page", and indicates to search engine spiders what that linked page is about.

Your site doesn't use frames. If possible, don't use frames on any page you want to get indexed by search engines. If you feel you simply must use frames for a page, then also make use of the "noframes" HTML tags to provide alternative text that spiders can read (and make that text descriptive rather than just a notice that "This site uses frames etc. etc.").

You don't use automatic page redirects. Don't make any pages automatically redirect the visitor to another page (the exception is a page you've deleted for good - in which case you should use a "301 redirect", a permanent redirect which is acceptable to search engines).

Your important content is in plain text and not contained in images. Search engine spiders can't "read" content in JPEG, GIF, or PNG files. If you really feel that using an image rather than text is crucial to your design, at least put the same text in the image's "Alt" tag (or in the "title" tag if you're using the image as a hyperlink).

Your important content is not contained in Flash files. Flash is a wonderful technology, but unfortunately spiders don't have the required "plugin" to view Flash files. As a result, Flash content is mostly inaccessible to search engine spiders. Some can find and follow hyperlinks within the Flash file, but unless those links lead to pages with readable HTML content this won't help you much. Don't create all-Flash pages for any content you want to get indexed - instead, put that content in the HTML portion of the page.

Links and keywords are not hidden inside JavaScript code. If your links use JavaScript to direct the user to the appropriate page (for instance, a drop-down list) or important content is contained within JavaScript code (when it's displayed dynamically using DHTML, for instance) search engine spiders won't be able to "see" it. You can, however, use the "noscript" HTML tags to provide an alternative that can be read by spiders.

You've optimized every important page of your website individually. Don't stop at your home page. Take the trouble to optimize any page which has a reasonable chance of being indexed by the major search engines, targeting appropriate keywords for each. If you face a lot of competition it may be nearly impossible to get a top ranking for your home page, but you can still get a lot of search engine traffic to your site from other pages which are focused on very specific keyword phrases.

You didn't duplicate content. Each page of your site should have unique content that distinguishes it from every other page on your site. Duplicating content or having pages that are only slightly different might be seen as "search engine spamming" (trying to manipulate search engine results).

You provide linking instructions for those who want to link to your site. Somewhere on your site state your policies about other people linking to your site and provide the wording you'd like them to use in their link. You want to encourage other people to link to your site, preferably using link text and a description that reflect the keywords for that page. For their convenience provide the ready-made HTML code for the link - not everyone will use it, but most often they will use your preferred text as a courtesy as long as it is truly descriptive of your site and doesn't contain "marketing hype".

You provide linking instructions for those who want to link to your site. Somewhere on your site state your policies about other people linking to your site and provide the wording you'd like them to use in their link. You want to encourage other people to link to your site, preferably using link text and a description that reflect the keywords for that page. For their convenience provide the ready-made HTML code for the link - not everyone will use it, but many will use your preferred text as a courtesy as long as it doesn't contain "marketing hype".

Important hyperlinks are plain text links and not image links or image maps. Text links are better from an SEO standpoint than image links, as spiders can't read text from an image file. If you feel you really must use a graphic as a link, at least include a text description which (including the relevant keywords) by using the "title" attribute of the link tag.

Your website is free of coding errors and broken links. HTML coding errors and non-working links can keep search engine spiders from correctly reading and indexing your pages. For that reason, it's a good idea to use a Web page validation utility to check your HTML code to make sure it's error-free.

Search Engine Ratings

Posted on this blog by Afzal Khan

Hitwise uses a combination of anonymous web surfing data provided by ISPs in various countries and its own panel-based measurements to determine which sites are most popular on the web. The data encompasses the surfing activities of 25 million people, worldwide.

The chart below shows the share of all visits made to both search and directory sites, as classified by Hitwise, by US web surfers during July 2005. "Domain" shows the core domain of the service involved.

The pie chart generated by comScore Media Metrix Search Engine Ratings also favors Google above all other search engines:


Data taken from Search Engine Watch.

12 Tips to help build the foundation for a new SEO career

By John Alexander
Posted on this blog By Afzal Khan

TIP 1. Set your focus on your clients success.

Stop focusing on sales and start focusing on your client's success! Do all that you can do to make them successful. Pour all of your talents into making their projects work. So many folks I talk to can never stop thinking about
where they will make their next sale, instead of working on delivering results to the clients they ALREADY have. In so doing, you establish "lifetime" residuals.

Make your client successful and they will literally become part of YOUR sales team.

TIP 2. A difference in your performance is a difference in your profits.

If you are NOT up to speed, you better catch up fast. Truely a difference in your performance is a difference in your profits! If you are not up to speed on solid SEO marketing techniques and methods, start learning now. Take a course or study at a live workshop but however you do it, get your SEO skills up to speed so you can genuinely help get your customers results. If you can show them a strategy that really puts dollars in their pocket, they'll put dollars in YOUR pocket!

TIP 3. Have confidence in your own strategies and explore profit sharing.

How's your batting average with profit sharing? Don't be afraid to explore this one! If your skills are medium to above average, why not share in the profits yourself? I am referring to offering someone a vertical deal. This would be a deal where you own part of the company in return for making it successful with your SEO skills.
Don't brush this off. There are some exceptional deals to be had if you start thinking laterally.

TIP 4. Don't forget community and charitable work.
When's the last time you helped promote a charitable work at NO cost. Build a site and promote it for the literacy council or the Easter Seals Society or your local Rotary Group or your Chamber of Commerce.

Don't forget that this work can OFTEN open unusual and even surprising doors. Help make others successful and you will NOT fail. Many important leaders within your local community will be serving on these committees right next to you!
This is a great way to network and meet new people and help the cause too.

TIP 5. Work on Relationship building and position yourself for success to come.

Watch the latest SEO trends and position yourself to quickly take advantage. The study and practice of SEO has been extraordinary. A few years ago, I never dreamed that my study of optimization would lead to the Internet lifestyle. As a result of our work, we enjoy wonderful repeat business and client loyalty.

If you have not been enjoying good profits, a rewarding lifestyle and being appreciated by your clients, then you need to consider a plan of action.

Tip 6. Set your course of action and get started.

Consider taking a live hands-on SEO workshop which can kick-start your professional SEO career in just a few days of hands-on training. Or if you cannot travel, consider taking an Online SEO Training Course.

Tip 7. Choose which voices you choose to listen to carefully.

You MUST be able to "deliver" and make a difference. Do whatever it takes to get your SEO skills and lateral thinking skills up to speed. In business there are many voices offering free advice. You need to choose carefully who you will listen to.

Tip 8. Run a balanced business.

Are you charging for what your services are worth? There are some folks who charge steeply and don't even know how to get the results. For goodness sakes, if you're good at what you do, make sure you are charging well for your services. You DESERVE fair reward if you're helping other business owners to prosper.
(Some folks are afraid to charge for their work)

Note: The ones that charge steeply but DON'T deliver may make a few dollars initially, but they won't enjoy the customer loyalty, the referral business, and the repeat business that you do, and they won't have a "customer for life" like you will.

Tip 9. Don't forget to recognize and be thankful for the progress you've made.

Yes, this is extremely important. How else can you truly measure your progress unless you benchmark along the way. Be sure to benchmark your victories but even more important, celebrate your CLIENTS' VICTORIES too! After all, you helped bring them about.

Tip 10. Give something back to your community (with gladness).

Look for opportunities to help others who genuinely need help and avoid those who are only after your talents to exploit them. (Trust me, when your SEO talents and success stories increase, you'll have strangers coming out of the woodwork to take you to dinner and wine you and dine you and pick your brain). Proceed with wisdom.

Tip 11. You must be willing to change and take action!

Performing the way you perform now has delivered a certain result. Maybe you're happy with that result. If you're happy with this result, carry on exactly the same way and you should get very similar results. However, if you are NOT happy with your results now, then you must change the way you do things.

Some people go all their life complaining that they would like a better career
or a better position in life and yet they continue taking the same actions and
getting the same results year after year.

Think of it like this...
Same action = same result
Different action = new results

Tip 12. Surround yourself with the high quailty people!

Without a doubt, your SEO interests and abilities will make way for many new working relationships. Be sure to carefully choose the people you want to work with. Look for those with whom you can share synergies and be very observant of
the skills and abilities within the others that surround you. No single person can operate as effectively as a group of people that work as a team. Learn to choose the right people to work with and recognize the latent strengths and talents
that will sometimes be present but initially hidden within the group. Build to your ultimate potential by choosing wisely, encouraging one another and recognizing the talent in one another.

Is a career in SEO right for you?

Are you ready to take your SEO career to the next step?

We would be delighted to meet with you personally and teach you exactly how
search engines work. The beauty of learning new SEO skills, is that it puts you
back into the position of having the power to choose and make your own choices.


About John Alexander
john@searchengineworkshops.com
John Alexander is Co-director of Training at Search Engine Workshops offering live, SEO Workshops with partner Robin Nobles as well as online search engine marketing courses through Online Web Training. John is author of an e-book called Wordtracker Magic and co-author of the Totally Non-Technical Guide for A Successful Web Site. John is also an official member of the customer support team at Wordtracker.com.

Black Worm Hits India hard.

Black Worm Hits India hard.
Posted By Afzal Khan
January 30, 2006

It has been observed that the Black Worm also known as W32.Vb.i or W32.Nayem.E has been actively spreading in India since last two weeks now. It’s a mass-mailing worm that also spread using remote shares. After a long gap there has been an outbreak kind of situation as this worm was successful in spreading all over the globe within few hours when it first appeared over the Internet. The reason why the worm was so successful in spreading all over is just because it spreads by creating a mime encoded compressed executable with a different extension (.HQX, .BHX), which didn’t had any kind of header to classify the file. As a result the mail gateway scanners were not able to decode the attachment and scan the infected files. This is why the worm got skipped even though the mail severs have updated anti-virus scan engines. Many of the leading AntiVirus software’s had to do some changes to their scan engine to make the scanners decode the file and scan for the infected attachment.

AntiVirus Quick Heal form India was the first anti-virus to detect this worm when it first hit the net according to the report generated and published by PC-Wallet Magazine, Germany. According to PC-Wallet, Germany the worm was first caught and detected on 16th January 2006 at 10:00 (GMT) by Quick Heal AntiVirus. For more details on outbreak response time of various other anti-virus software’s world wide check at:
http://www.pcmag.com/article2/0,1895,1916880,00.asp

According to US based LURHQ the leading provider of Threat and Vulnerability Management services this worm has hit hard to countries like India, Italy and Peru with high number of infection rates. Among it India is the hardest hit country by far in terms of overall infection rate till today. Live statistics of infection rate per country can be found on their web site at http://www.lurhq.com/blackworm-stats.html
This worm attaches itself to e-mail messages as an executable file with various different names and occasionally this worm compresses itself by ZIP and encodes the compressed file by mime encoding and then attaches the encoded file to the e-mail messages.

The worm has several network spreading routines. One of them enumerates all available shares, then reads the values of the registry key where personal documents and recently opened files are stored. It copies itself to such folders by the file name with executable extension of the same name as the document in that folder. The worm also copies itself to network shares with the same name. This worm once active first tries to delete the popularly known international anti-virus folders (e.g. Norton AntiVirus, McAfee, Trend etc.)

This worm has a dangerous payload, it will delete all the documents, worksheets, presentations, database files and compressed backup files from the system on every 3rd day of the month. This is very serious payload considering that the worm has spread all over India and the first payload day of 3rd February is arriving very soon. We recommend all our users to have their AntiVirus updated, up and running. All the Quick Heal users are already protected from this worm from day one.

For computer users not having Quick Heal we have a special Black Worm removing tool freely available from our website http://www.quickheal.co.in/public/alerts/i-worm.VB_Bi.asp
More Information
Black Worm Analysis
Free removal tool for Black Worm

Open federation for Google Talk

By Mike Jazayeri, Product Manager, Google Talk

We've just announced open federation for the Google Talk service. What does that mean, you might be wondering. No, it has nothing to do with Star Trek. "Open federation" is technical jargon for when people on different services can talk to each other. For example, email is a federated system. You might have a .edu address and I have a Gmail address, but you and I can still exchange email. The same for the phone: there's nothing that prevents Cingular users from talking to Sprint users.

Unfortunately, this is not the case with many IM and Internet voice calling services today. You can only talk to people on the particular service you have an account on (so you need an account on every service to talk to everybody, which is pretty cumbersome). With open federation, you get to choose your service provider and you can talk to people on any other federated service (and vice versa).

In addition to the Google Talk service, many other companies, universities, and corporations support open federation today. This means you can now talk to millions of users around the world all with a single account on the service provider of your choice.

We think this is pretty exciting -- though perhaps not as exciting as something Star Trek-related -- and we hope it will bring us one step closer to making IM and Internet voice calling as ubiquitous as email.

Google Teams with Motorola for Mobile Search

Source:-PromotionWorld.com

Motorola, Inc. and Google Inc. announced a global alliance to enable users easy access to Google on Motorola handsets.

Motorola will integrate a Google icon onto select devices so that users can connect directly to Google anytime, anywhere at the click of a button. These mass-market, Internet-optimized handsets will be distributed from early 2006 to select Motorola customers worldwide.

"Many of our customers have been asking for mobile devices integrated with their consumers' favorite online search services. By featuring Google on Motorola handsets for those customers, we are making it easier for consumers to connect to the information they need when they need it," said Scott Durchslag, Corporate Vice President and General Manager of Global xProducts for Motorola's Mobile Device business.

"Access to information is imperative for people on-the-go. Whether checking the local weather or locating the restaurant of their choice, consumers today require personalized search services that are tailored to their needs," said Nikesh Arora, vice president, European Operations, Google Inc.

Motorola handsets with the Google icon are expected to be available to consumers starting in Q1 of 2006.

Motorola is a Fortune 100 global communications leader that provides seamless mobility products and solutions across broadband, embedded systems and wireless networks. In your home, auto, workplace and all spaces in between, seamless mobility means you can reach the people, things and information you need on the go.

Seamless mobility harnesses the power of technology convergence and enables smarter, faster, cost-effective and flexible communication. Motorola had sales of US $31.3 billion in 2004.

Google's innovative search technologies connect millions of people around the world with information every day.

Spam, What is it Good for, Absolutely Nothing!

by Jay B Stockman

Over time, unless the growth of spam isn\'t stopped, it will destroy the usefulness and effectiveness of email as a communication tool.

Unsolicited Commercial Email (UCE), or spam has reached epidemic proportions, and continues to grow. According to American Online, of the estimated 30 million email messages each day, about 30% on average was unsolicited commercial email. As a result of its very low marginal costs, spam has become extremely prolific. Regardless of how many emails are sent out, the spammers\' costs are low, and constant. With numbers like these, there is a tremendous burden shifted to the Internet Service Provider (ISP) to process and store that amount of data. Huge volumes of this junk may undoubtedly contribute to many of the access, speed, and reliability problems suffered by many ISPs. Further, many large ISPs have experienced major system outages as the result of massive junk email campaigns. Spam is an issue about consent, not content. Regardless of whether the UCE message is an advertisement, porn, or a winning lottery notice, the content is irrelevant. If the message was sent unsolicited, and in bulk then the message is spam.

This junk e-mail is more than just annoying; it costs Internet users, and Internet-based businesses millions, even billions, per year. When a spammer sends an email message to a million people, it is carried by numerous electronic systems on route to its destination. The systems in between are bearing the burden of carrying advertisements, and other unsolicited junk for the spammer. The number of spams sent out each day is truly overwhelming, and each one must be handled efficiently, and expeditiously by many systems. There is no justification for forcing third parties to bear the load of unsolicited advertising. Ultimately, these costs are passed on to YOU, the consumer.

Spam originates in one of two ways, it is sent directly by the spammer from and under their control, or via illegal third party exploitation such as open proxies or open relays. Spammers get your address in a variety of ways. If you sign up for, and provide your email address, these seemingly friendly sites can turn around and sell your email to advertisers. Additionally, if you have your email address on a Web page, it is easy for unscrupulous advertisers to \"harvest\" it, and add you to their lists.

There are ways to reduce the number of spam messages, however it is presently impossible to stop them all. Spam filters, are software applications that redirect emails based on the presence of certain common phrases, or words. These automated measures are prone to being defeated by clever spammers. Additionally, there is a risk of important emails being deleted as spam. In 2003, Congress passed a sweeping law, CAN-SPAM act of 2003, which basically prohibits the use of deceptive subject lines and false headers in all emails. Additionally, the FTC is authorized (but not required) to establish a do-not-email registry. The CAN-SPAM Act took effect on January 1, 2004.

Spam is based on theft of service; it wastes time, money, and other resources. Spam can and will overwhelm your electronic mail box if it isn\'t fought. Over time, unless the growth of spam isn\'t stopped, it will destroy the usefulness and effectiveness of email as a communication tool.

Google Explains Why 'Failure' Search Leads To Bush



As the Justice Department and Google continue to butt heads, the search engine is going to lengths to show it’s not politically biased in any way. But not everyone agrees with Google.

When you go to google.com, do a search for “miserable failure.” The top page that comes up is the official White House biography of President George W. Bush. That result has prompted complaints against Google by conservative users. They assume it reflects a political bias by the search engine.

Truth is, though, that it’s a result of something called “Googlebombing.” Here’s how it works: Google’s search results are generated by computer programs that rank Web pages in large part by examining the number and relative popularity of the sites that link to them.

In this case, a number of webmasters are using the phrase “miserable failure” to describe and then link to President Bush’s Web site. Thus, the leader of the free world has been “Googlebombed.”

It’s by no means the first time this has happened in some form or fashion, either as a political statement or just a prank. But in this case, the search engine has taken the unusual step of responding to a Googlebomb.

In a statement, they say, “We don't condone the practice of googlebombing, but we're also reluctant to alter our results by hand in order to prevent such items from showing up. Pranks like this may be distracting to some, but they don't affect the overall quality of our search service, whose objectivity, as always, remains the core of our mission.”

Given that, it probably won’t be long before conservative webmasters and bloggers respond with a Googlebomb of their own.

In case you’re wondering, the same thing happens when you search for “miserable failure” on Yahoo! Some are also now referring to Googlebombing as cyber-graffiti.

Mobile Term - Glossary

API

Application Programmers Interface
An interface between a software and an application allowing the application to use some functionality of the software. Used by programmers who write applications that can interact with other applications.

ASCII

American Standard Code for Information Interchange
This standard was established to achieve compatibility between various types of data processing equipment. ASCII is the common code for microcomputer equipment. It is used to describe numbers, letters, and the most common special characters. Languages such as Chinese, Japanese and Korean, however, use also many different characters. To illustrate those types of scripts you need Unicode.

CAPI

Common Application Programming Interface
CAPI is an application programming interface standard that is used to access ISDN (see ISDN) equipment. When an application wants to communicate with an ISDN card it sends a standard series of commands to the card. These commands form the CAPI standard and give developers and users a chance to use a well-defined mechanism for communications over ISDN lines without being forced to adjust to hardware idiosyncrasies.

CIMD

Computer Interface to Message Distribution
A special protocol for sending and receiving SMS messages using the large customer accounts of the network operators.

COM

COMmunication ports
Communication Port is the name of a serial communications port in DOS systems. DOS supports four serial ports:COM1, COM2, COM3 and COM4.

DDE

Dynamic Data Exchange
DDE is an interprocess communication system built into the Macintosh, Windows and OS/2 operating systems. DDE enables two running applications to share the same data. So, if you have a file that is connected to another document over DDE and you change that file, all documents or files communicating with the altered file will be updated accordingly.

Dual Band

European Telecommunications Standards Institute
Dual Band cell phones can work on networks that operate on different frequency bands. This is especially useful if you travel between areas covered by different networks, for example GSM 900 and GSM 1800.

EDGE

Enhanced Data Rates for Global Evolution
EDGE is a technology that gives GSMA and TDMA similar capacity to handle services for the third generation of mobile telephony. EDGE was developed to enable the transmission of large amounts of data at a high speed of 384 kilobits per second. EDGE is also referred to as E-GPRS (abbreviation for Enhanced GPRS).

EMS

Enhanced Messaging Service
is based on SMS. You can receive and send messages that include pixel pictures and animations, ring tones, sound effects and formatted text as long as you own an EMS-capable mobile phone. Phones that are not EMS capable will only display the unformatted text.

EPOC

EPOC is an operating system for mobile communication devices, like e.g. PDAs. It was developed by Symbian, a joint-venture with Ericsson, Matsushita, Motorola, Nokia and Psion.

ERMES

European Radio Messaging System
ERMES is a pan-European wide area paging network working in Europe, the Middle East and Asia.

ETSI

European Telecommunications Standards Institute
The European standardization body for telecommunications. ETSI is a non-profit making organisation whose mission is to produce the telecommunications standards that will be used for decades to come throughout Europe and beyond. ETSI was founded in 1988 by the members of the CEPT. ETSI promotes the world-wide standardization process whenever possible. Its Work Programme is based on, and co-ordinated with, the activities of international standardization bodies, mainly the ITU-T and the ITU-R.

GPRS

General Package Radio Service
GPRS is a standard for wireless communications which runs at speeds up to 150 kilobits per second. The current GSM (see GSM) systems only reach 9,6 kilobits. GPRS, which supports a wide range of bandwidths is an efficient use of limited bandwidth and is particularly suited for sending and receiving small bursts of data, such as e-mail and Web browsing, as well as large volumes of data.

GSM

Global System for Mobile Communication
Originally developed as a pan-European standard for digital mobile telephony in 1991. GSM today is one of the leading digital cellular systems available in more than 100 countries. GSM uses narrowband TDMA, which allows eight simultaneous calls on the same radio frequency. GSM reaches a speed of 9.600 BIT/s and can thus not be used for bandwidth applications.

GSM 1800
also known as DCS 1800 or PCN, GSM 1800 is a digital network working on a frequency of 1800 MHz. It is used in Europe, Asia-Pacific and Australia.

GSM 1900
also known as PCS 1900, GSM 1900 is a digital network working on a frequency of 1900 MHz. It is used in the US and Canada and is scheduled for parts of Latin America and Africa.

GSM 900
GSM 900, or just GSM, is the world’s most widely used digital network (see general explanation for GSM)

GUI

Graphical User Interface
A GUI allows users to navigate and interact with information on their computer screen by using a mouse to point, click, and drag icons and other data around on the screen, instead of typing in words and phrases.

HSCSD

High Speed Circuit Switched Data
HSCSD is a circuit-linked technology for higher transmission speeds, up to 57 kilobits per second, primarily in GSM systems.

HTTP

Hypertext Transfer Protocol
A protocol used on the Internet by web browsers to transport text and graphics. It is focuses on grabbing a page at a time, rather setting up a session.

Intranet

The Intranet is a network based on TCP/IP protocols (an internet) belonging to an organization, usually a corporation, accessible only by the organization's members, employees, or others with authorization An Intranet's Web sites look and act just like any other Web sites, but the firewall surrounding an Intranet fends off unauthorized access.

IP

Internet Protocol
IP belongs to the TCP/IP protocol family, an acknowledged industrial standard for communication between open systems. The Internet Protocol defines how information travels between systems across the Internet.

IP address

The IP address is the identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. For example, 1.160.10.240 could be an IP address. Within an isolated network, you can assign IP addresses at random as long as each one is unique. However, connecting a private network to the Internet requires using registered IP addresses (called Internet addresses) to avoid duplicates.

IPX/SPX

Internet Package Exchange/Sequenced Package Exchange
IPX and SPX are transfer protocols in a novell network. IPX is a datagram protocol used for connectionless communication. SPX is a transport layer protocol (layer 4 of the OSI (Open Systems Interconnections) model). The SPX layer sits on top of the IPX layer (layer 3) and provides connection-oriented services between two nodes on the network. SPX is used primarily by client/server applications. Whereas the IPX protocol is similar to IP, SPX is similar to TCP. Together, therefore, IPX/SPX provides connection services similar to TCP/IP.

ISDN

Integrated Services Digital Network
ISDN is a public, digital telecommunications network, that offers high speed transmission of voice, data and video through existing fixed line infrastructure. Most ISDN lines offered by telephone companies give you two lines at once, called B channels. You can use one line for voice and the other for data, or you can use both lines for data to give you data rates of 128 Kbps, three times the data rate provided by today's fastest modems.

JMS

Java Message Service
An API that supports messaging between computers in a network. JMS is a specification that defines the Java language interface to a messaging service and a means for exchanging XML-based transactions.

LAN

Local Area Network
LAN is a small data network covering a limited area, such as within a building or group of buildings. Upon connecting one LAN to other LANs over any distance via telephone lines and radio waves a system of LANs called WAN can be established.

MMS

Multimedia Messaging Services
MMS is a further development of the EMS standard. Besides graphics and pictures an MMS-message can also include audio- and video clips. MMS-messages can be sent between mobile devices as well as from mobile devices to e-mail recipients. Including animations and videos such a message will be much longer than the currently common 160 characters per text message.

MO

Mobile originated
MO denotes the capability of the GSM system to send a message from a mobile phone via a Service Center and to provide information to the mobile phone about the delivery or failure of that message.

Modem

Abbreviation of Modular/Demodular
The modem converts digital computer signals into analog form for transmission over analog telephone systems

Mobile Phone Network

A mobile phone network or system consists of a network of cells. Each cell is served by a radio base station from where calls are forwarded to and received from mobile phones by wireless radio signals.

MT

Mobile Terminated
MT marks the capability of the GSM system to send a message from the Service Center to a mobile device where the message is either received, or, if the recipient device is unavailable, stored for later delivery.

NOVELL

US manufacturer of the common network system Novell Netware. Netware has been a corporate standard for building LANs for more than a decade.

ODBC

Open Database Connectivity
ODBC is an “open database connection”, a standard database access method developed by Microsoft. ODBC allows access to any data from any application, regardless of which database management system is handling the data.

Operator

An operator is a company that operates a telephone network, for example D1, Vodaphone or AT&T.

OTA

Over the Air
The method used to remotely manage applications on a subscriber handset.

Paging

Paging is a single direction radio service for alerting subscribers and leaving messages.

PCMCIA

Personal Computer Memory Card International Association
PCMCIA is an international organization consisting of some 500 companies that has developed a standard for small credit card sized devices, called PC cards. There are three different types of PCMCIA cards, each with the same rectangular size (85.6 by 54 millimeters) but different widths.

PCS

Personal Communication System
PCS is the collective term for American mobile telephone services in the 1900 MHz frequency band.

PDA

Personal Digital Assistant
A hand-held computer such as a PocketPC.

PIN

PIN is a code used for all GSM-based phones to establish authorized access to certain functions or information. In general the PIN code will be delivered together with your subscription.

PING

Packet Internet Groper
PING is a utility to determine whether a specific IP address is accessible. It works by sending a packet to the specified address and waiting for a reply. PING is used primarily to troubleshoot Internet connections. There are many freeware and shareware PING utilities available for personal computers.

POP3

Post-Office-Protocol
POP3 is a protocol used to retrieve e-mail from a mail server. For sending electronic messages SMTP is used.

PSTN

Public Switched Telephone Network
The public, analogue telephone (dialing) network.

ROAMING

International roaming means that you can use networks other than your own when traveling abroad. To allow international roaming, there has to be an according agreement between the network operators in question.

SDK

Software Developer’s Kit
Application software tools and specifications provided by a software manufacturer. An SDK enables computer application developers to create programs, plugins, or add-on enhancements that will work with a certain piece of software.

Service Provider

A service provider is a company that provides services and subscriptions to telephone, mobile phone and Internet users.

SIM

Subscriber Identity Module
A SIM card is a small printed circuit board that has to be inserted in any GSM-based cell phone when subscribing. It includes subscriber details, security information and the personal directory of numbers.

Smart Messaging

Smart Messaging is a concept developed by Nokia for sending and receiving ring tones, picture messages, operator logos, business cards, calendar requests, and Internet settings over the Short Message Service (SMS). Using special characters in the beginning of the SMS the receiving mobile phone identifies the respective type of message.

SMPP

Short Message Peer to Peer
SMPP is a communication protocol for sending and receiving short text messages, mainly used for corporate and high volume SMSC links.

SMS

Short Message Service
SMS is a currently very popular data service within GSM-networks. With SMS it is possible to send and receive short messages of up to 160 characters to and from mobile phones via the network operators' message center (SMSC).

SMSC

Short Message Service Center
A SMSC regulates the message transfer to and from the according mobile phones in GSM-networks. This includes not only short text messages but also fax, voice- or e-mails. The SMSC delivers the messages, temporarily stores them in case the respective recipient is currently not available and takes care of charging. There is at least one SMSC per network.

SMTP

Simple Mail Transfer Protocol
SMTP is a standard protocol for handling the transfer of e-mails across the Internet.

SQL

Structured Query Language
The international standard database language used in updating, querying and managing relational databases. It can be used to sort, retrieve and filter data extracted from a database.

TAP

Telecator Alphanumeric Protocol
TAP is the currently most common communication protocol for short messages besides UCP. It is mainly used with public modem- and ISDN-access (e.g. D1 or E-Plus).

TAPI

Telephony Application Programming Interface
TAPI is an application programming interface (API) for connecting a PC running under Windows to telephone services. TAPI was introduced in 1993 as the result of joint development by Microsoft and Intel. The standard supports connections by individual computers as well as LAN connections serving many computers. Within each connection type, TAPI defines standards for simple call control and for manipulating call content.

TCP/IP

Transmission Control Protocol over Internet Protocol
TCP/IP is a suite of network protocols used to connect hosts on the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP.

UCP

Universal Computer Protocol
UCP is a communication protocol for SMS-messages, that are sent via modem- or ISDN-access or so-called large customer accounts.

UMTS

Universal Mobile Telephone System
UMTS is the name for the third generation mobile telephone standard in Europe, standardized by ETSI (see ETSI). UMTS will deliver broadband information at speeds up to 2 MBIT/s. Besides voice and data, UMTS will deliver audio and video to wireless devices anywhere in the world through fixed, wireless and satellite systems.

Unicode

Unicode is an international standard used to encode text for computer processing. It is a subset of UCS. Unicode's design is based on the simplicity and consistency of ASCII, but goes far beyond ASCII's limited ability to encode only the Latin alphabet. Unicode provides the capacity to encode all of the characters used for the major written languages of the world. To accommodate the many thousands of characters used in international text, Unicode uses a 16-bit code-set that provides codes for more than 65'000 characters. To keep character coding simple and efficient, Unicode assigns each character a unique 16-bit value, and does not use complex modes or escape codes.

Unix

UNIX is a computer operating system that is designed to be used by many people at the same time and that has TCP/IP built-in. It is a quite common operating system for servers on the Internet.

VAS

Value-added services
Value-added services provide additional "value" to users of mobile GSM infrastructure, e.g. in form of mobile games, logos and ringtones (mobile entertainment)

Visual Basic

Visual Basic is a programming language and environment developed by Microsoft and based on the BASIC language. Visual Basic was one of the first products to provide a graphical programming environment and a paint metaphor for developing user interfaces.

VBA

Visual Basic for Applications
Is the abbreviation for „Visual Basic for Applications“. By integrating VBA into ones own software applications it is possible to authorize third party persons to extend the respective program by a number of features.

VSMSC

Virtual SMSC
Extended version of a direct link to the SMSC (see SMSC) of a network operator where the user receives his own number for a SMS message center. The VSMSC allows establishing and managing of closed user groups and the use of reverse-billing (user pays incoming as well as outgoing messages over his VSMSC).

WAN

Wide Area Network
A computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more LAN. Computers connected to a wide-area network are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites. The largest WAN in existence is the Internet.

WIN32 API

Windows 32 Application Programming Interface
WIN32 API is a 32-bit programming interface under Windows.

WAP

Wireless Application Protocol
WAP is a free, unlicensed protocol for wireless communications that makes it possible to create advanced telecommunications services and to access Internet pages from a mobile phone. WAP is supported by all operating systems.

X.25

This is a synchronous protocol used by computers to talk to the world wide network of data communication computers. X.25 also refers to the global network of computers, Datapac in Canada, Tymnet and TELNET in the USA, Transpac in France etc. In most countries you can tap into this net with a local phone call. This is a separate, more regulated network than the Internet.

XML

Extensible Markup Language
XML has been developed to improve the functionality of the Web and to compensate the disadvantages of HTML by providing more adaptable and flexible information identification. It is not a fixed format like HTML, therefore the term extensible. XML is a "meta-language" which lets you design your own markup language no matter how many different types of documents you have. It is not just for Web pages. XML can also be used to store any kind of structured information and much more. Because of its rapid distribution and the increased support of software industry it provides a secure investment.

Keyword Advice - on keyword research and identification, keyword placement

By Thomson Chemmanoor Website: http://www.website-promotion-expert.com


Keyword Identification is one of the most important part in a SEO
process. Keywords are the doors and windows for search engine
traffic. Surfers and information seekers through out the world use
internet via keyword to find information on any products or
services. These set of keyword phrases are vital for your search
engine placement.

Keyword Identification is the first step while creating your content
for your site. Identify keyword related to your niche topics should
be the first priority while creating web content. The quality of
these keywords is critical for a good ranking in search engines.
Researching the right keywords for your website should be the key,
so that when people perform a search for a particular keyword phrase
they will be able to find your site. So how do you do that will be
the questions in everybody's mind. I have categories this article
into 3 phrases like keyword research or keyword identification,
keyword selection, keyword placement, keyword density, keyword
ranking and keyword marketing.

Before I would go further I would like to discuss about building
your website for your business you should focus on certain other SEO
strategies like clean navigation, a search engine friendly website
architecture so that search engine spiders or robots can easily
gather information from your website.

Once your site structure is done it is time to create the content
for the site, which is the crucial part and where they keyword
research, keyword density comes into play. If you follow these steps
which I have mentioned below it is sure that your website can enjoy
a higher ranking in search engines.


Step 1
Keyword Identification or keyword research:- This should be first
step while building your content, because your content will be build
around with the keyword and phrases which has been identified at
this stage. Which is very critical and if not done correctly you
won't achieve the desired results. There are different ways to
identify how people search on the web.
1) Think about what keyword would you chooses while you search for
certain products or services. Think from the customer point of view
and not from search engine or SEO point of view. Collect and write
it down. I suggest using a spreadsheet so that it will help you in
the stages as well.
2) The other way is you can ask your own customers or friends that
how do they search on the net to find that particular products or
services. Usually all people think differently and might not use the
same keyword phrase to find that product or services. Collect them
and store it.
3) Keyword suggestion tools. There are 100's of tools on the web
some of them are free and other charge a fee. I suggest using
Overture keyword tool and Google keyword tool (free) and
wordtracker (paid). Type in your keyword and phrases into these
tools you will find 100's of keywords for that particular products
or services is been search on the web every month. Also it will show
how many times that words are been searched on the internet. Tools
like wordtracker will help you to find that how many times these
keywords are been searched and how much competition is there for
that particular keyword phrases. If you focus on high searched
keyword it would be hard for your website to rank well because of
competition. So always choose a keywords that is less competitive,
so that you website will rank well for that particular keyword
phrase on the search engine results.
4) The other way is if you have already had a website online check
its web log and gather that keywords which helps people to find your
site. This will help for existing website to recreate the content.

After these steps are done use your spreadsheet to determine the
keywords It is ideal to have more keywords rather than focusing on a
few words. In that spreadsheet matches the following keyword in
terms like how many times the keywords are searched and how much
competition is that keyword facing on the web. As I said before
always choose less competitive keywords. Once these stage is over
start constructing your website content with the identified

keywords.

Step 2 Keyword placement:-Placing the keyword is very crucial,
because if the keywords are not place properly the search engine
spiders will have a difficult time in identify and storing
information from your web pages. You most important keyword should
appear on the title of the page at least once which all search
engine given relevancy. Next the same or related keyword should be
there on the heading of the page. Also use a related keyword while
starting a paragraph and through out the web page evenly. The
density factor is discussed below.

Step 2
Keyword density:- Search engine robots are very intelligent spiders
they can determine while some tries to cheat them. Some webmasters
and SEO experts use keyword spamming or keyword dumping which is
ethical for a good search engine optimization. If search engine
spiders indexes a web pages it determine who much times that
keywords has been used on a particular web page. So Keyword density
is important. An ideal density would be anything between 10-15 %
keyword densities on the page. Also use keywords which are related
to that phrase so that it gets relevancy for that web page.For
example When I search for a keyword "dog supplies" I found 100 of
related terms which like "dog supplies online" "dog supply store"
etc so think and figure out keywords which are more related to that
topic. Also Sprinkle the keywords phrases right across the web page
and not concentrate at a certain place.


At this stage you website content should be ready keep in mind with
the 3 top priority factors. This will determine your website success
or failure in search engine. The next stage is keyword marketing.

Keyword marketing:- Some of the techniques you will use as a off
site factor rather than on the side, because it affects only the
marketing process. As you all know all search engines give links
more relevancies in the algorithm. So after your keyword
identification, density and placement are over you should focus on
marketing your site. Like site submission, article submission, link
popularity while all these techniques are for increasing inbound
links to your site. So you would be using your anchor text for
creating a link pointing to your site. So here is where keyword
marketing comes to play. You should use your key important phrase in
these anchor text also mix up your related keywords. Keyword
marketing is also vital for Pay per click marketing where keyword is
the king. So gather keywords related to your business and use it
widely in your PPC campaign. Pay per click industry is solely
depends on keyword marketing. If you website want the maximum ROI
(return of Investment) you will have to apply the maximum keywords
while bidding your keywords. For example your website visibility
will increase if you choose maximum keyword for your Pay per click
marketing.

The bottom-line is to gain a high ranking in search engine use
keyword which is related to your business on your onsite and offsite
website marketing. Keyword is the king when it comes to content and
content is the king when it comes to Search Engine Marketing.