Search Engine Optimization (SEO) is a central issue for businesses that want their Web sites to be ranked high by leading search engines, such as Google and Yahoo, and easy for customers to find them. SEO best practices dictate that you publish a site map, that meaningful keywords be included in page metaheaders, and that key terms be used often in the page's body copy. Inbound links from other reputable sites also improve SEO rankings. However, search engines constantly modify their algorithms, making SEO a moving target.


Encryption Deals with Growing Pains

The good news, according a survey co-sponsored by nCipher and conducted by the Aberdeen Group, is that encryption reduces the vulnerability of data. Simply, companies that use it are less likely to More >

More Articles >


Know Your Network to Defend Your Network

Sugiarto Koh is regional director for Sourcefire, a security vendor specializing in network security solutions that spans a broad spectrum of organizations, including finance, defense, health care and the IT sector.

More >

CIO Conversations: Norton Healthcare's Joseph De Venuto

In the third of her series of discussions with CIOs, Ann All spoke with Joseph De Venuto, vice president of Information Services and CIO of Norton Healthcare, a Louisville, Ky.-based health care More >

SEO Helps SMBs in Online Competition with Larger Companies

Paul Mah spoke with David Mill, an SEO expert who has established a leading online marketing agency, MediaCo, in the UK, and more recently in Singapore. Mill is also the author of the book "Content More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making


SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Related IT Downloads

Security44 Assessing Security and Privacy Controls in Federal Information Systems and Organizations

This publication provides a set of procedures for conducting assessments of security controls and privacy controls employe...

Misc43 Guidelines for Smart Grid Cybersecurity

This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity st...

CLoud1a Managing Risk and Security in Outsourcing IT Services

The excerpt from chapter three addresses issues that should be considered before you decide to outsource, including securi...

Security24-290x195 A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification

This publication presents a methodology for assigning authentication strengths based on the strength of pair wise bindings...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


Thanks for your registration, follow us on our social networks to keep up-to-date