Search Engine Optimization (SEO) is a central issue for businesses that want their Web sites to be ranked high by leading search engines, such as Google and Yahoo, and easy for customers to find them. SEO best practices dictate that you publish a site map, that meaningful keywords be included in page metaheaders, and that key terms be used often in the page's body copy. Inbound links from other reputable sites also improve SEO rankings. However, search engines constantly modify their algorithms, making SEO a moving target.


Encryption Deals with Growing Pains

The good news, according a survey co-sponsored by nCipher and conducted by the Aberdeen Group, is that encryption reduces the vulnerability of data. Simply, companies that use it are less likely to More >

More Articles >


Know Your Network to Defend Your Network

Sugiarto Koh is regional director for Sourcefire, a security vendor specializing in network security solutions that spans a broad spectrum of organizations, including finance, defense, health care and the IT sector.

More >

CIO Conversations: Norton Healthcare's Joseph De Venuto

In the third of her series of discussions with CIOs, Ann All spoke with Joseph De Venuto, vice president of Information Services and CIO of Norton Healthcare, a Louisville, Ky.-based health care More >

SEO Helps SMBs in Online Competition with Larger Companies

Paul Mah spoke with David Mill, an SEO expert who has established a leading online marketing agency, MediaCo, in the UK, and more recently in Singapore. Mill is also the author of the book "Content More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making


SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice

2014 Holiday Shopping Trends Revealed

Security Staffing

The holiday season is an important one for retailers, but as shoppers become more savvy, every detail retailers can glean about shopper behavior can contribute to the bottom line.

 More >

Twitter Rethinks Authentication and Access

Women ‘Need to Be Willing to Try,’ Female Tech CEO Says

Canonical Upgrades Ubuntu Linux Distributions

SAP Collapses HANA Infrastructure Stack


Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Misc43 Guidelines for Smart Grid Cybersecurity

This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity st...

CLoud1a Managing Risk and Security in Outsourcing IT Services

The excerpt from chapter three addresses issues that should be considered before you decide to outsource, including securi...

Security24-290x195 A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification

This publication presents a methodology for assigning authentication strengths based on the strength of pair wise bindings...

GraphTN Using Attack Graphs in Forensic Examinations

Attack graphs are used to compute potential attack paths from a system configuration and known vulnerabilities of a system...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.