SEO

Search Engine Optimization (SEO) is a central issue for businesses that want their Web sites to be ranked high by leading search engines, such as Google and Yahoo, and easy for customers to find them. SEO best practices dictate that you publish a site map, that meaningful keywords be included in page metaheaders, and that key terms be used often in the page's body copy. Inbound links from other reputable sites also improve SEO rankings. However, search engines constantly modify their algorithms, making SEO a moving target.


Articles

Encryption Deals with Growing Pains

The good news, according a survey co-sponsored by nCipher and conducted by the Aberdeen Group, is that encryption reduces the vulnerability of data. Simply, companies that use it are less likely to More >

More Articles >

Interviews

Know Your Network to Defend Your Network

Sugiarto Koh is regional director for Sourcefire, a security vendor specializing in network security solutions that spans a broad spectrum of organizations, including finance, defense, health care and the IT sector.

More >

CIO Conversations: Norton Healthcare's Joseph De Venuto

In the third of her series of discussions with CIOs, Ann All spoke with Joseph De Venuto, vice president of Information Services and CIO of Norton Healthcare, a Louisville, Ky.-based health care More >

SEO Helps SMBs in Online Competition with Larger Companies

Paul Mah spoke with David Mill, an SEO expert who has established a leading online marketing agency, MediaCo, in the UK, and more recently in Singapore. Mill is also the author of the book "Content More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Related IT Downloads

IT_Man16-190x128 Managing Risk and Security in Outsourcing IT Services

The excerpt from chapter three addresses issues that should be considered before you decide to outsource, including securi...

Security24-290x195 A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification

This publication presents a methodology for assigning authentication strengths based on the strength of pair wise bindings...

GraphTN Using Attack Graphs in Forensic Examinations

Attack graphs are used to compute potential attack paths from a system configuration and known vulnerabilities of a system...

Guide to Industrial Control Systems (ICS) Security

This document provides guidance on how to secure Industrial Control Systems (ICS), including SCADA systems and DCS.

...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.