從2005年后,我基本都只是給大型網站做SEO,因為給大型網站做SEO,效果非常的明顯,價格自然也可以收的非常高。總結這兩年來我做過的幾十家大型網站的SEO經驗,我發現,SEO策略是最為重要的。

  什么是SEO策略呢?

  幾個SEO技術差不多的人,在對一個網站做SEO的時候,營銷效果確實天壤之別,那是為什么呢?

  因為他們的SEO策略不同!

  SEO技術其實非常的簡單,因為SEO不是去尋找搜索引擎的漏洞,而是根據搜索引擎標準去把網站打造成為符合搜索引擎標準的優秀的網站。

  而搜索引擎的那些基本標準,只要專門花時間學習過SEO的,并且實踐過一段時間的朋友都知道。但是,面對同一個網站,如何給這個網站進行SEO? 如何把SEO的效果達到最佳?

  假如來操作呢? 絕對不是簡單的執行。

  比如,一個客戶找到一個SEO服務機構,總喜歡這樣說,我給你一個要害詞,你把他排到前幾名。

  這個時候,大部分SEO人員可能就會老老實實按照客戶的要求來執行,累的要死,最好排名獲得非常好了,但是并沒有讓客戶興奮。為什么呢?因為這個客戶發現,排上去了,并沒有給他帶來太多客戶。

  假如我面對這樣的客戶,我問客戶的目的?你的目的是為了簡單的排名,還是為了利用網絡帶來銷售讓自己賺錢?

  客戶肯定會回答,當然是賺錢了。

  這時候我就會告訴客戶,假如是為了賺錢,就不要盲目的去追求你目前的這個要害詞的排名。因為你選擇的這個要害詞,給你帶來客戶是有限的,甚至可能不會給你帶來客戶。要實現通過SEO,把自己的營銷效果最大話,就要這樣系統化的來制定SEO策略。

  SEO策略包括那幾部分呢?

  一、要害詞選擇的策略:

  1、門戶類網站要害詞選擇策略:

  網站每個頁面本身都包含的要害詞:網站擁有上百萬甚至上千萬的網頁,每個網頁都包含有對應的要害詞,合理的SEO,突出龐大數量的要害詞。

發掘目前互聯網上流行的要害詞:看看互聯網上最近什么詞最熱門,這些也是目標要害詞。因為很多超級熱門的要害詞,每一個詞一天都可以帶來幾萬的流量。

  2、商務類網站要害詞選擇策略:

  不要簡單的追求網站定位的幾個熱門要害詞,核心應該放到以下兩類詞上:
  產品詞
  產品相關的組合詞

  比如酒店機票預訂行業,假如只排機票預訂,酒店預訂,帶不來多少流量,應該考慮的是以下這類詞。

城市名 酒店(例如:北京 酒店預訂)
城市名 機票(例如:北京機票預訂)
城市名 城市名 機票(例如:北京到廣州機票預訂)
酒店名 預訂

  3、企業網站要害詞選擇策略

  不要盲目的把自己公司的名稱當作要害詞,這些沒有多少人用,并且不用進行SEO,也可以排到前面。企業要根據自己潛在客戶的喜歡,去選擇最適合自己的要害詞。這個可以借助相關的工具來挖掘。

  二、網站結構優化策略:

  要害詞選擇好了,這時候就會發現,你的網站構架和目前的網頁不能按照SEO的標準將這些要害詞很合理的進行分布和表現。這時候你可能就要采取一些網站結構優化策略。

  比如門戶類網站假如要搞熱門要害詞的排名,就是為這些熱門要害詞重新設計專題頁面。比如酒店機票預訂的網站,基本上都是查詢式的,幾乎沒有表現組合詞的頁面。所以也要根據這個據現象制定一個網站結構的優化策略。

另外的結構優化中,還會設計到網站的超鏈接結構等方面的基礎SEO策略。那么一個網站要想優化好,就需要是基礎網站結構優化策略加創造型的結構策略。

  假如是創造型的增加欄目,肯定不能讓搜索引擎認為是單純的為SEO做的,應該可以和其他營銷策略進行結合。比如聯盟策略、人性化優化策略等。

  比如,2005年我們為IT世界服務的話,他們的內容聯盟這策略就是一種和SEO結合的結構優化策略。這種創造型的SEO策略,通過合作網站的配合推廣,為他們帶來了巨大的流量。因為你可能搜索某一條新聞或者某個要害詞,排在前幾頁的都是它和它的合作網站的。

  要做好這一點,必須能夠站到網站運營的角度來考慮SEO。

  三、SEO的執行策略:

  SEO的執行策略,也需要根據網站的技術團隊和營銷團隊的實際情況來制訂,這時候就需要站到項目治理的角度來規劃。然后制定出一個合理的計劃,然后長期的去執行下去。

  做SEO,不能只是為了排名而SEO,應站在網站策劃、網站運營、網絡營銷的角度去做SEO。

EMBA的小眼睛 發表在 痞客邦 留言(0) 人氣()

Each iteration of Windows has featured improved security – it’s necessary to withstand the constant barrage of attacks aimed at the popular platform – and Windows 8 is no exception.

In Windows 8, Microsoft expanded its support for embedded hardware security, bundled a full-blown security suite into the operating system, introduced Secure Boot and signed applications, and enabled alternate authentication schemes, to name a few measures. Some of the latest innovations are aimed specifically at enterprises, but there are plenty of improvements that end-users will notice right off the bat, too.
"After reviewing the layers of technologies used by Microsoft to protect Windows 8, it is our opinion that it is the most secure version of Microsoft Windows to date," Aryeh Goretsky, a researcher at ESET, wrote in a whitepaper examining security technologies in Windows 8 released earlier this month.

Microsoft is offering three main versions of the new operating system. Windows 8 is the vanilla "home" edition, Windows 8 Pro includes features for businesses, such as support for Hyper-V, BitLocker, a virtual private network client and group policy support, and finally Windows RT is for ARM-powered devices.
Secure Boot
Microsoft designed Secure Boot to protect the computer from low-level exploits such as rootkits and bootloaders. A security process shared between the operating system and Unified Extensible Firmware Interface (UEFI, replacing the BIOS), Secure Boot requires all the applications that are running during the booting process to be pre-signed with valid digital certificates. This way, the system knows all the files being loaded before Windows 8 fires up have not been tampered with.
If a bootloader has infected your computer and it tries to load during the boot-up sequence, Secure Boot will be able to undo all the changes and thwart the attack. Having Secure Boot means it is that much harder for attackers to try to compromise your PC’s start-up sequence.
While PC makers must have Secure Boot enabled in the UEFI firmware by default if they want to be able to slap the Windows logo on their box, the feature can be disabled within the UEFI interface. Anyone who wants to install a non-Windows operating system on Windows 8-certified hardware would first have to manually disable Secure Boot.
Windows Defender
Microsoft decided to release Windows 8 with built-in antivirus. This is a much more robust application than Microsoft Security Essentials, the free anti-malware software that users could download and install manually in previous versions of the OS.

Windows Defender (Microsoft repurposed the name for the anti-malware product) is enabled by default, right out of the box, which means users have some form of security protection as soon as they turn on the machine. While it can't be uninstalled, it can be disabled if the user wants to install a different security product from another vendor. In fact, Windows Defender must be disabled if you want to install a third-party security suite.
Loading the AV first
Regardless of whether you are using Windows Defender or a different anti-malware product, Windows 8 has tweaked its load process so that security software runs first. Early Launch Anti-Malware (ELAM) ensures that the first software driver loaded into Windows 8 is a driver from the user's anti-malware software.
In previous versions, if the malware executed and was loaded into system memory before the operating system and the antivirus, it was difficult to detect and remove. Secure Boot prevents rootkits from interfering with the OS, and ELAM ensures that pre-approved anti-malware software drivers are loaded before any other application.
For now, whether or not it is effective is unknown, but Goretsky noted in the aforementioned whitepaper that the concept was "fundamentally sound."
SmartScreen
Originally an Internet Explorer security feature, Microsoft added SmartScreen to Windows 8. When a user downloads a program or a file from the Internet, the SmartScreen filter checks to see if other people have downloaded the same file as well. If so, there is a rating for the file based on its popularity and whether it was considered malicious.

Users trying to download something with a low rating while SmartScreen is enabled will see a warning message. This can be good for detecting fake antivirus and other rogueware programs.
Since SmartScreen is now part of Windows 8, the filter will kick in regardless of what browser the user is running, not just Internet Explorer.
Alternate passwords
Picture Password is one of my favourite bits of Windows 8. The idea is that instead of relying on alphanumeric passwords, you can use pictures. When this feature is enabled, you select a photo from your image library and then define three gestures on the photo using any combination of circles, straight lines, and taps (using either touch or the mouse). It's possible to switch to PIN-based authentication.

Apparently, the alternate authentication methods still need some tweaking, though. Earlier this month, password experts Passcape Software claimed that it was possible to recover passwords from Windows 8 systems with Picture Password enabled.
The problem was related to the fact that users need to have an account with a regular password before switching to the alternate authentication scheme. It turned out that when the switch was made, the regular password remained in the system and what’s more, it could easily be decoded to the original plaintext form by a user with administrator-level privileges who could access the Vault where the information is stored. Here’s hoping that Microsoft has fixed this issue, or a fix is imminent, as this seems a rare misstep for the new operating system’s across-the-board security improvements.
AppContainer
One of the invisible-to-the-user changes in Windows 8 is AppContainer, the more secure application sandbox environment where Windows 8 apps will reside. Designed to prevent apps from disrupting the operating system, AppContainer decides which actions are available to which apps.
Following the same logic, all Internet Explorer plugins run in their own sandboxes under Windows 8.
Apps will also be available through the new Windows 8 app store, which means Microsoft will be able to check beforehand for malicious applications. Only time will tell whether Microsoft will manage to successfully keep dodgy apps out of its store. The restore feature will at least make it easier to return to a previous safe state if malware does somehow manage to infect the machine.
Enterprise-specific security improvements
Samara Lynn, our networking expert, pointed out some of the enterprise-specific features in Server 2012 which would flow into Windows 8 and Windows 7 systems. Dynamic Access Control (DAC), which expands access control to include a wider list of attributes, is one of them.

In previous versions, administrators could define who had access to files and folders on a per-user basis, or by creating groups and assigning permissions specific to those groups. In Windows 8, DAC allows administrators to use any of the data stored in Active Directory, such as personal information, device ID, log on method, or even location, to define access control rules.
Here is an example: Documents marked "confidential" or "private" are only accessible to members of the Human Resources division. In this case, in Server 2012, the administrator would create a claim that "confidential" and "private" would be accessible to people with the "Human Resources" attribute. There is no need to create a specific group for HR and add individual users to it. So long as the user in the Active Directory is defined as being part of HR, the access control rule would apply.
This definitely makes managing users and permissions much easier within the enterprise.
Microsoft also added a few new Group Policy settings in Windows Server 2012. The settings could prevent new accounts from being created on the computer or lock a session if the machine is inactive for a specified period of time. Another policy automatically locks out users from accessing volumes that use BitLocker encryption after a certain number of failed login attempts.
Hardware-based security
Windows 8 will really push the hardware-based authentication capabilities of the Trusted Platform Module (TPM) to the forefront, Steven Sprague, the CEO of Wave Systems, noted. TPM makes a lot of sense if you stop to consider the increase in sophisticated rootkits and other malware that increasingly targets the hardware layer such as the Master Boot Record. TPM stores sensitive configuration data and credentials, making it possible to implement single sign-on and access to VPN. Device-based security could be used to log in users to the network, Sprague said. No passwords required.
Windows 8 machines can optionally ship with self-encrypting drives, which provides businesses and security-minded end-users with hardware-based encryption that can never be turned off. SEDs are ready-to-go out of the box, protecting data right from the start. Hardware-based encryption also has less of an impact on performance as well.
Speaking of encryption, BitLocker also Embedded System has a new feature that will allow users to encrypt only the parts of the disk that are in use, instead of encrypting the whole volume at once.

And there you have it – these are just some of the more obvious security changes Microsoft has made in Windows 8. There is plenty more under the hood that we will never notice, but that's the way it should be, with these features chugging away in the background keeping users safe from attackers.
For more on Windows 8, see our full review of Microsoft’s new OS here. You might also want to check out our tips on dealing with the operating system’s Metro/Desktop minefield.
Published under license from Ziff Davis, Inc., New York, All rights reserved.
Copyright © 2012 Ziff Davis, Inc

 

 

EMBA的小眼睛 發表在 痞客邦 留言(0) 人氣()

Optical bonding - display system solutions from a single source

The philosophy of DATA MODUL, your reliable Display and Embedded technology partner, is to develop state of the art technology which enables the realization of high quality, durable and cost-effective display solutions. To even better serve our clients throughout the entire market segments, extensive investments in both, the extension of production capacities and infrastructure as well as in manpower are in full progress. This includes for example new, much larger clean room facilities which are used for panel enhancement, touch panel integration, and now also optical bonding.

With the development of an in-house optical bonding technology DATA MODUL is now capable of providing displays solutions with very high functional, optical and environmental performances.

Optical bonding is the process of adhesive bonding of two or more transparent components using a high-quality optical grade adhesive. By such bonding the air gap between the transparent components is entirely eliminated. This results in enhanced optical performance, especially with respect to readability under direct sunlight use. Additional benefits are increased mechanical strength, reduced sensitivity to humidity, dust and temperature fluctuations, higher durability, and even better functionality for touch sensitive display solutions.

DATA MODUL focuses on the most advanced optical bonding technology using an atmospheric UV curing system with an one component adhesive. Our technology enables high volume, scalable and high performance optical bonding at reasonable costs. The first fully automated bonding equipment is ready to be installed in our new cleanroom and shall be operational beginning 2013. The automated process can be used for bonding various components (e.g. displays, cover glasses, touch sensors, EMI filters etc.) for a wide range of displays solutions and optical components in our market segments.
The unique combination of optical bonding and high quality materials ensures the best performance of our products. An example of such materials that are optically bonded would be the wide variety of covered glasses currently employed in our products. These have improved mechanical properties and/or are surfaced refined with various coatings (anti-reflective, anti-glare,  Embedded System anti-smudge, anti-fingerprint, and combinations), thereby further enhancing the optical performance of our products.

Customers are invited to experience the improved characteristics of the new optically bonded products. DATA MODUL is looking forward to facing new technical challenges, thereby remaining, as always, a front runner in its business.

Examples of optical bonding applications and the added value to our products are:

Bonding displays to cover glasses
• improved readability through lowering reflectance, increasing contrast and brightness
• avoidance of Newton rings
• improved mechanical strength and durability (scratch resistance, vandal proof, resistance to humidity, dust, temperature fluctuations)
• improved heat dissipation through direct contact

Bonding touch sensors to displays and/or cover glasses
• improved heat dissipation through direct contact
• improved functionality
• no dust and condensate between sensor and cover

 

EMBA的小眼睛 發表在 痞客邦 留言(0) 人氣()

Avnet and ARM continue to pioneer online software offering to the market

PHOENIX, ARIZ. & CAMBRIDGE, ENGLAND — Avnet Electronics Marketing, an operating group of Avnet, Inc. (NYSE: AVT), and ARM celebrate one year of the popular online software store for embedded design. Over a twelve month period, the Embedded Software Store (ESS) has grown to include products from 24 vendors, while increasing their online partner support and product selection to nearly 1,000 products.

ESS was launched at ARM’s TechCon 2011 to provide an e-Commerce website and online information dedicated to the embedded design community. It took the industry by storm and established a comprehensive one-stop online store that enables embedded designers to evaluate and purchase leading software products to accelerate their ARM processor-based design.

Now, one year later, the Embedded Software Store is at TechCon 2012, to showcase its latest offerings along with several of its key vendors: DSP Concepts, InterNiche Technologies, Motomic Software, RoweBots, and Timesys.

The store has gained momentum in the market with its offering of nearly 1,000 products. All solutions sold in the ESS are offered royalty-free. This momentum is a validation that both vendors and customers see value in the online marketplace.

“The Embedded Software Store is well positioned to help ARM Partners extend their product offering and help software developers accelerate their design through a single online marketplace,” said Will Tu, director, ARM. “The rapid adoption by our partner eco-system and the steady increase of software developers visiting our site and purchasing products reinforces the value of ESS as an efficient and time-saving tool to bring products to market.”

The Embedded Software Store offers developers a broad range of foundation software for their embedded design. Examples include:

Software tools–the Embedded Software Store sells a broad range of the ARM Keil® MDK software development toolkit.
RTOSs and the ESS offer leading RTOSs software through vendors such as Micrium, CMX, Code-Time, and RoweBots. Customers have a broad choice based on functionality and memory requirements.
Customers who are exploring open source can find a less time-consuming solution, and simplified approach offered by Timesys, which provides a tool, LinuxLink, that helps a developer leverage open source code for specific silicon target boards.
“Our customers transitioning to 32 bit MCUs face challenges with integrating and developing more complex software IP blocks, resulting in increased time-to-market and cost pressures,” said Tim Barber, senior vice president, design chain global business development, Avnet Electronics Marketing. “The ESS allows embedded software developers to leverage the ARM and Avnet ecosystems to quickly acquire industry-proven software IP blocks, decreasing their time-to-market. Having a variety of reliable off-the-shelf solutions complements any in-house design teams’ efforts.”

ESS will be participating at the 2012 TechCon event, October 31st – November 1st in booth 215 at the Santa Clara Convention Center. Come see us!

About Avnet Electronics Marketing

Avnet Electronics Marketing is an operating group of Phoenix-based Avnet, Inc. that serves electronic original equipment manufacturers (EOEMs) and electronic manufacturing services (EMS) providers in more than 70 countries, distributing electronic components from leading manufacturers and providing associated design-chain and supply-chain services. The group's website is located at www.em.avnet.com.

About Avnet, Inc.

Avnet, Inc. (NYSE:AVT), a Fortune 500 company, is one of the largest distributors of electronic components, computer products and embedded technology serving customers globally. Avnet accelerates its partners' success by connecting the world's leading technology suppliers with a broad base of customers by providing cost-effective, value-added services and solutions. For the fiscal year ended June 30, 2012, Avnet generated revenue of $25.7 billion. For more information, visit www.avnet.com.

About ARM

ARM designs the technology that is at the heart of advanced digital products, from wireless, networking and consumer entertainment solutions to imaging, automotive, security and storage devices. ARM’s comprehensive product offering includes RISC microprocessors, graphics processors, video engines, enabling software, cell libraries, embedded memories, high-speed connectivity products, peripherals and development tools. Combined with comprehensive design services, training, support and maintenance, and the company’s broad partner community, they provide a total system solution that offers a fast, reliable path to market for leading electronics companies. Find out more about ARM by following these links:

ARM website: http://www.arm.com/
ARM Connected Community: http://www.arm.com/community/
ARM Blogs: http://blogs.arm.com/
ARMFlix on YouTube: http://www.youtube.com/armflix
ARM on Twitter:

http://twitter.com/ARMMultimedia
http://twitter.com/ARMMobile
http://twitter.com/ARMCommunity
http://twitter.com/ARMEmbedded
http://twitter.com/ARMSoC
http://twitter.com/ARMTools
http://twitter.com/SoftwareOnARM
ARM, Artisan and AMBA are registered Embedded System trademarks of ARM Limited. Cortex, CoreLink, big.LITTLE, Mali and POP are trademarks of ARM Limited. All other brands or product names are the property of their respective holders. “ARM” is used to represent ARM Holdings plc; its operating company ARM Limited; and the regional subsidiaries ARM Inc.; ARM KK; ARM Korea Limited; ARM Taiwan Limited; ARM France SAS; ARM Consulting (Shanghai) Co. Ltd.; ARM Germany GmbH; ARM Embedded Technologies Pvt. Ltd.; ARM Norway, AS and ARM Sweden AB

 

EMBA的小眼睛 發表在 痞客邦 留言(0) 人氣()

CHIP DESIGNER VIA has announced its quad-core X86 Artigo A1250 system.
VIA, the often forgotten third X86 licence holder, has been pushing low-power X86 chips since long before it became fashionable. Now the firm claims to have created the smallest quad-core X86 system in its Artigo A1250.
The VIA Artigo A1250 system has a 1.0GHz quad-core E series chip with 1MB Level 2 cache that can use a single 8GB DDR3 1,333MHz RAM module. The firm's Chromotion GPU provides Microsoft DirectX 11 support but uses up to 1GB of frame buffer memory from the RAM. The system is packed into a case measuring 17.7cm x 12.5cm x 3.0cm.
Epan Wu, head of the VIA's Embedded Platform  Embedded System Division said, "By leveraging the ultra compact Pico-ITX form factor, the VIA Artigo A1250 is able to deliver a powerful x86 quad core computing experience in the smallest system design on the market. The VIA Artigo A1250 boasts the latest technology with 3D stereoscopic display and USB 3.0 support for an unparalleled ultra compact computing experience, making small truly beautiful."

Via said the system can decode H.264, MPEG-2, VC-1 and WMV9 video at HD 1080p resolution without any problems and has a total system TDP of 32W. However the firm did not reveal pricing and while the system's size and power draw are impressive, some might find that the Raspberry Pi, even after buying codec licences, might be a cheaper option if video playback is the main objective.

 



EMBA的小眼睛 發表在 痞客邦 留言(0) 人氣()