Song of the Week

Mac DeMarco – On the Level

Advertisements

Module 11 Search Engine Optimization

SEO is short for search engine optimization which is a methodology of strategies, techniques and tactics used to increase the amount of visitors to website by yielding a high-ranking placement in the search results page of a search engine like Google, Bing, Yahoo etc.  Most internet users do not click through multiple pages of search results, so where a website is listed under the results is crucial for directing more people to a specific site.  Search engine optimization makes sure that a website is accessible to a search engine and increases the chance that the site will be found.  One of the features of a SEO is called a keywords.  From an Info graphic provided from the module, “Keywords. Primary and secondary keywords are selected to focus page content and drive traffic.  Keywords are chosen based on relevance, search volume and competition.”

From what I’ve read on SEO help guides, the content is very important in utilizing a SEO to its full potential.  For my website that is making accessible quality content with internal link architecture.  Another feature I wish to implement is keyword targeting, that is making sure whatever search engine the user is using they can find the content they’re looking for through titles, keywords, alt lags, URLs and phrase selection.   The last way I want my site to utilize SEO is through Link building.  “Incoming links can help promote your site, drive traffic and increase page rank.”  I will link my website to websites through the use of my blog and other forums with similar content to my own.

There are some downfalls to SEO, however they are mostly technical like duplicate content.  From a CIO article on SEOs, “Almost all of the SEO professionals we queried cited duplicate content as a top technical concern. Simply put, duplicate content is any content that is ‘appreciably similar’or exactly the same as content that resides on your site.”  Another problem can be shady link building.  Unnatural, spam-like and irrelevant backlinks can cause your site to take a hit in the rankings.  From the same article, “Backlinks today should be done at a natural pace, should be diverse and varied and look and appear natural.”

Module 10 Web Hosting and Domain Registration

A domain name system, or DNS, is a naming system for giving addresses to web servers and web pages. Domain names are used to identify one or more IP addresses, the domain name microsoft.com represents around 12 IP addresses.  URLs use domain names to identify specific web pages.  The domain name locates any entity on the internet.  One of the most used domain registrar websites and web hosting is GoDaddy.com.  From their website, “GoDaddy powers the world’s largest cloud platform dedicated to small, independent ventures. With more than 16 million customers worldwide and more than 70 million domain names under management, GoDaddy is the place people come to name their idea, build a professional website, attract customers and manage their work.”

Since the website I’m creating for class is content based around me, I looked up jacobestes.com on Whois.  Turns out it is already registered under godaddy.com with the name server being Domaincontrol.com, and the experation date is the 4th of October this year.  So, it looks like they bought the domain name simply to keep it under their control and not let anyone use it.  I also looked up jakeestes.com and that domain name is taken as well by tucowsdomains.com.  They are a wholesaler of domain names and other internet services to isps and web hosting companies, they bought the domain name to sell it.

Personally, I would not buy a domain name unless I desperately need it simply because of how expensive the listings I saw on Whois are.  I would also use a free web hosting service similar to the one we use in class because free is all I can afford.

Module 9 Security & Privacy

Everything on the internet is at risk for being hacked and having important information stolen.  With the rise of internet usage over the past decade, everyone is online in some way whether its a simple social media page for one person or the website for a multi-million dollar company.  All of these websites could potentially be hacked without the necessary precautions such as firewalls to defend against attacks, and have vital information stolen.  A firewall, one of the most used defense against hacks, builds a blockade between an internal network that is assumed to be secure and trusted, and another network, usually an external network, such as the Internet.

This threat and invasion of privacy could definitely have an effect on my field and possibly every field. From the module resource What does your Internet Profile say about you, “In the digital, always-connected age there is the real possibility that the things we share or experience will follow us relentlessly throughout our whole lives, with possible implications on the jobs or financial services open to us in years to come. Society has never been in a position before where our thoughts and beliefs are matters of public record, easily found and collated with the most basic search tools. ‘This will be the first generation of humans to have an indelible record’ writes Google chairman Eric Schmidt.”

Privacy is often thought of in two ways—something is either private or public. According to the general rule, if something occurs in a public place, it is not private.  Let’s say an embarrassing moment happened to a person in public and someone recorded it on their smartphone.  If that footage is put in cyberspace,  that person’s embarrassing moment is not forgotten.  The general reaction is to chalk this up to life in the digital age, but we expose personal information in public every day.  Do we want this information to be permanent online for everyone to see?  Many people argue that we have given up some privacy with the advent of the internet and social media already, and with the NSA privacy scandal, we can see that the government is willing to breach the privacy of its citizens in order to gain information from what they see as a threat through emails and phone calls.