I am very happy to introduce myself as a web promotion expert. I am sure & confident that I can promote any website. After my promotion techniques, your website will be available on first page in Google within 7 days...that’s for sure.
I look forward to promote your website…

Friday, June 24, 2011

आपकी प्रोफाइल से पैसे कमा रहा है फेसबुक

क्या आप विश्वास करेंगे की जिस फेसबुक का इस्तेमाल आप सोशल नेटवर्किंग लिए करते हैं वो आपकी प्रोफाइल से ही पैसे कमा रही है। दुनिया की प्रसिद्ध नेटवर्किंग साइट फेसबुक आप संबंधित सूचनाओं, आपकी प्रोफाइल वगैरह से पैसे कमा रहा है। वह इन सभी को विज्ञापनदाताओं को बेच रहा है जिससे उसे अच्छी आय हो रही है।



फेसबुक अपने यूजर की हर सूचना विज्ञापन कंपनियों को दे रहा है जो अपनी जरुरत के हिसाब से उन तक पहुंच रहे हैं मसलन अगर किसी यूजर की सगाई हो गई और उसने इस खबर को फेसबुक पर जाला तो उसे वेडिंग प्लानर से लेकर कैटरर तक के मैसेज स्वत: आ जाएंगे। इसी तरह अपनी हॉबी के बारे में लिखने वालों को उसके अनुरुप मैसेज आएंगे।



लॉस एंजिलिस टाइम्स के मुताबिक फेसबुक इस तरह से मार्केटिंग का बहुत बड़ा जरिया बन जाएगा।लेकिन आलोचक फेसबुक की इस पहल को पसंद नहीं कर पा रहे हैं। उनका कहना है कि यूजर की अनुमति के बिना ऐसा करना गलत है।

Kids Online Internet

Not so long ago, kids climbed trees, played on lawns and read books and the risks they largely faced were bruised knees. Now, they're glued to iPads and browse the internet for almost one to two hours every day. The risks? Extremely alarming. They tell unknown "friends" their parents' credit card numbers and almost one-fourth are exposed to adult content.

Meet the Facebook generation that's becoming increasingly vulnerable in faceless webscape.

According to the findings of a McAfee-Synovate survey among 500 children across ten cities, 42% kids spend 1-2 hours online every day. The survey was conducted in 10 cities among children between 9 and 17 years.

As many as 64% of the 9-12 age group are part of social networking sites. And the information they share there is rather scary -- 12% shared their parents' credit card details, 30% videos, 40% photographs and 57% their school details and 58% their home address.

Bangalore ranks second among the ten cities on exposure to adult content. While 40% in Mumbai had browsed adult content, in Bangalore it was 28%. On an average, 80% had a personal computer (except in Hyderbad, Ahmedabad and Pune).

The awareness among parents on the threats the children are exposed to is varied -- 42% of children don't share with their parents their online activities and 20% were not happy with parents advising them on what to see online.

Sunday, June 19, 2011

"What is a .cc (dot cc) domain?

Answer: The .cc domain suffix is the top-level domain (TLD) for the Cocos Islands. However, it is commonly used as an alternative to the '.com' suffix for commercial Web sites.

The .cc suffix is convenient because it is short and easy to say. However, not all Web hosting companies support .cc domains and they are not offered by many domain name registrars. Therefore, it is usually better to use an alternate domain name with a .com, .net, or .org suffix instead of selecting a .cc domain name."

Saturday, June 18, 2011

"Spyware, adware, and internet cookies. What's good and what's bad. Privacy and removal tips and help.

What is spyware? What is adware?

Spyware is simply a program (or multiple programs) that run on your pc and spy on your activities, most often displaying you advertisements based on your activities. This is also known as adware. Many times you will see popups, or ads on webpages that are really only displayed to you because you have been browsing these types of items and they are now displaying ads related to this. Many ads are just random ads also from the adware, as you may think a site is full of popups or that a site is slow loading, but its really just your pc and all the spyware and adware programs running on it.
What are web cookies?

Web cookies are simply bits of software placed on your computer when you browse websites. Not all websites have these, but many do, especially the large well-known websites. Websites use cookies so they can track what you are viewing, and although they won't necessarily know you by name (lets hope it never gets to that point), the website will recognize your computer when you come back to visit again.

What is bad about cookies?

People do not like being tracked. Even if some companies mean no harm, people still do not like the fact they are being monitored while they browse. Cookies can also show links in them if someone happens to look at them on your pc. For example, if you wife is on the pc and happens to browse any cookies (they are just viewable text files with other mumbled garbage which the websites can interpret), she may not like the fact that you have been viewing sex sites (or vice versa). Most of the websites that store the cookies, will have the site name or link visible in the cookie on your machine, so its normally easy to tell where the cookie came from.

What good are cookies?

Cookies have some beneficial things. For example, when you log on to certain sites, did you ever notice that when you return again you do not have to sign on the next time? Thats because it stored your password and id on your machine in a cookie. The same holds true when you purchase goods online, you can return later and your goods are still in your shopping cart (in a cookie!). Cookies are also very beneficial to websites trying to market to you. (Some consider this bad for the consumer as many do not want websites tracking what you like to view online!). For example, if you go to one of the major search engines, like yahoo.com, google.com, search.aol.com, etc. and search for 'web cookies', the next time you come back to the website to search again, you may see a large picture or cookie advertisement at the top of your screen. This is NOT what everyone sees, only you! They know you like this alot because you searched for it last time you were there, so they now show you advertisements because it may be something targeted towards your buying habits.

How do I get rid of cookies?

There is an option in your browser to ask if you want to accept cookies, but that is a real pain because you constantly are clicking buttons saying 'no'. It makes browsing very difficult when you spend all your time answering 'no' to every cookie, since they are all over the net on most websites. I recommend downloading the software program 'Complete Cleanup' at this site. This is the easiest program to use and the best program I have found for safely removing all the cookies on your machine (also cleans up many other things).

What are cache files? Are these related to cookie files?

Cache files help your browser go faster since it caches the files to be used. These are also left behind on your pc and includes everything, including pictures, sound files, video files, and text that you have browsed. If you share your pc in any way, you probably want to keep these cleaned when you get done browsing (see previous paragraph for removing these).

How does spyware or adware get on my pc?

Most spyware or adware occurs because of downloading freebie software (when something is totally free, you have to figure people have to make money somewhere), so that when you install it there are hidden programs installed with it that show you the ads. Normally this doesn't happen with shareware as shareware is free to try, then either expires or stops working, so you have to pay a small fee. Shareware usually comes with support for any questions you have also, as freeware does not, so if you get spyware or adware from a freeware installation then you are stuck trying to find it and remove it yourself. Many spyware or adware programs also can be installed by visiting rogue webpages that have security flaws, allowing these programs to be installed on your pc without your knowledge. This is typically done through ActiveX or Java security holes, but thats a more technical issue that we won't get into here, this is just to inform you where adware and spyware come from.

How do I track and find spyware or adware?

There are many programs on the internet that will attempt to find this for you, some work and some don't. The best way is to track what is really running on your pc when you reboot your machine, everything needs a way to startup when you reboot so you can find and kill it there. There are also browser objects that run when you open your web browser. Look for for a program named Spy Guardian Pro, it will track these for you and allow you remove them (they will also evaluate your system for free if you are a registered user of this program, but this is a shareware program). Many of the spyware programs out there that look for program names to remove simply are not accurate, so get used to viewing your programs that run in your browser and in your startup lists, and you will be way ahead of most people. Its actually fairly simple to do and can eliminate spyware or adware at the root.

Is it safe to buy stuff online? Are cookies used for this?

I have done a ton of shopping online, for clothes, cd's, books, and I have even bought groceries with my credit card online. I have never had a problem, and I personally feel it is safer than handing the credit card to a waiter at a restaurant. Cookies are used alot during internet shopping also, but in a good way. They often are used to store (for example, your clothes you have added to the shopping cart) your order on your machine. If you logoff and back on, your order is still there and you can continue shopping. They can of course, be used to market banners and advertisements towards you based upon what you were shopping or looking for.

What is the best way to keep my information private? How do I keep my email from getting spammed?

Most websites today that sell anything online are pretty good about keeping your information confidential (obviously not all of them though). Many even state this when you are ordering, as there is normally a link saying that they keep information private. You can help limit your information by not filling in information on sites that are NON-ordering sites. For example, you know those sites that want to send you a free magazine by just filling in your information and clicking ok? Many of those sites are giving you free stuff so they can get your information. If you wish to keep the cookie and history information left behind on your pc cleaned up, then you can use the software that I listed above in the previous paragraphs above. If you would like to keep you email from getting spammed, you can do a few things. First, send them a nice email and tell them not to email you again, or if you have an AOL account, there is blocking features on the email that you can set to block specific emails, or only allow specific emails. This can save you the trouble of even asking someone to stop, just simply shut them off! You can also get one of many free email services if you don't want to give anyone your main email, so there is alot of options for you to choose."

Spyware, adware, and internet cookies. What's good and what's bad. Privacy and removal tips and help.

What is spyware? What is adware?

Spyware is simply a program (or multiple programs) that run on your pc and spy on your activities, most often displaying you advertisements based on your activities. This is also known as adware. Many times you will see popups, or ads on webpages that are really only displayed to you because you have been browsing these types of items and they are now displaying ads related to this. Many ads are just random ads also from the adware, as you may think a site is full of popups or that a site is slow loading, but its really just your pc and all the spyware and adware programs running on it.

What are web cookies?

Web cookies are simply bits of software placed on your computer when you browse websites. Not all websites have these, but many do, especially the large well-known websites. Websites use cookies so they can track what you are viewing, and although they won't necessarily know you by name (lets hope it never gets to that point), the website will recognize your computer when you come back to visit again.

What is bad about cookies?

People do not like being tracked. Even if some companies mean no harm, people still do not like the fact they are being monitored while they browse. Cookies can also show links in them if someone happens to look at them on your pc. For example, if you wife is on the pc and happens to browse any cookies (they are just viewable text files with other mumbled garbage which the websites can interpret), she may not like the fact that you have been viewing sex sites (or vice versa). Most of the websites that store the cookies, will have the site name or link visible in the cookie on your machine, so its normally easy to tell where the cookie came from.

What good are cookies?

Cookies have some beneficial things. For example, when you log on to certain sites, did you ever notice that when you return again you do not have to sign on the next time? Thats because it stored your password and id on your machine in a cookie. The same holds true when you purchase goods online, you can return later and your goods are still in your shopping cart (in a cookie!). Cookies are also very beneficial to websites trying to market to you. (Some consider this bad for the consumer as many do not want websites tracking what you like to view online!). For example, if you go to one of the major search engines, like yahoo.com, google.com, search.aol.com, etc. and search for "web cookies", the next time you come back to the website to search again, you may see a large picture or cookie advertisement at the top of your screen. This is NOT what everyone sees, only you! They know you like this alot because you searched for it last time you were there, so they now show you advertisements because it may be something targeted towards your buying habits.

How do I get rid of cookies?

There is an option in your browser to ask if you want to accept cookies, but that is a real pain because you constantly are clicking buttons saying "no". It makes browsing very difficult when you spend all your time answering "no" to every cookie, since they are all over the net on most websites. I recommend downloading the software program "Complete Cleanup" at this site. This is the easiest program to use and the best program I have found for safely removing all the cookies on your machine (also cleans up many other things).

What are cache files? Are these related to cookie files?

Cache files help your browser go faster since it caches the files to be used. These are also left behind on your pc and includes everything, including pictures, sound files, video files, and text that you have browsed. If you share your pc in any way, you probably want to keep these cleaned when you get done browsing (see previous paragraph for removing these).

How does spyware or adware get on my pc?

Most spyware or adware occurs because of downloading freebie software (when something is totally free, you have to figure people have to make money somewhere), so that when you install it there are hidden programs installed with it that show you the ads. Normally this doesn't happen with shareware as shareware is free to try, then either expires or stops working, so you have to pay a small fee. Shareware usually comes with support for any questions you have also, as freeware does not, so if you get spyware or adware from a freeware installation then you are stuck trying to find it and remove it yourself. Many spyware or adware programs also can be installed by visiting rogue webpages that have security flaws, allowing these programs to be installed on your pc without your knowledge. This is typically done through ActiveX or Java security holes, but thats a more technical issue that we won't get into here, this is just to inform you where adware and spyware come from.

How do I track and find spyware or adware?

There are many programs on the internet that will attempt to find this for you, some work and some don't. The best way is to track what is really running on your pc when you reboot your machine, everything needs a way to startup when you reboot so you can find and kill it there. There are also browser objects that run when you open your web browser. Look for for a program named Spy Guardian Pro, it will track these for you and allow you remove them (they will also evaluate your system for free if you are a registered user of this program, but this is a shareware program). Many of the spyware programs out there that look for program names to remove simply are not accurate, so get used to viewing your programs that run in your browser and in your startup lists, and you will be way ahead of most people. Its actually fairly simple to do and can eliminate spyware or adware at the root.

Is it safe to buy stuff online? Are cookies used for this?

I have done a ton of shopping online, for clothes, cd's, books, and I have even bought groceries with my credit card online. I have never had a problem, and I personally feel it is safer than handing the credit card to a waiter at a restaurant. Cookies are used alot during internet shopping also, but in a good way. They often are used to store (for example, your clothes you have added to the shopping cart) your order on your machine. If you logoff and back on, your order is still there and you can continue shopping. They can of course, be used to market banners and advertisements towards you based upon what you were shopping or looking for.

What is the best way to keep my information private? How do I keep my email from getting spammed?

Most websites today that sell anything online are pretty good about keeping your information confidential (obviously not all of them though). Many even state this when you are ordering, as there is normally a link saying that they keep information private. You can help limit your information by not filling in information on sites that are NON-ordering sites. For example, you know those sites that want to send you a free magazine by just filling in your information and clicking ok? Many of those sites are giving you free stuff so they can get your information. If you wish to keep the cookie and history information left behind on your pc cleaned up, then you can use the software that I listed above in the previous paragraphs above. If you would like to keep you email from getting spammed, you can do a few things. First, send them a nice email and tell them not to email you again, or if you have an AOL account, there is blocking features on the email that you can set to block specific emails, or only allow specific emails. This can save you the trouble of even asking someone to stop, just simply shut them off! You can also get one of many free email services if you don't want to give anyone your main email, so there is alot of options for you to choose.

Saturday, May 7, 2011

Google: India Has 100M Internet, 40M Mobile Internet Users; India Search Trends..

“Search queries originating from India have grown 20 times in the last five years, Rajan Anandan, VP-Sales & Operations at Google India, adding that for Google, India is the third biggest Internet market in terms of users, with over 100 million internet user base, adding that 40 million people in India access the Internet from work, and 30 million from Cafes, apart from 11 million households that have a broadband connection installed. Anandan, speaking at the VC Circle E-Commerce Forum, held in Delhi last week, made a strong pitch for the Internet, saying that the amount of time that an average user in India spends online is now on par to TV viewing time at 16 hours in a week.

On the Mobile Internet, Anandan said that more than (according to Google estimates) 40 million Internet users in India access it through their mobile phones and there are 30 million app downloads in one week. The number of search queries originating from mobile phones have grown four times in the last 12 months and 50 times since 2007. Anandan predicted that more than 300 million people in India would be hooked on to mobile internet by the year 2015.

Segment Specific Search Trends

Anandan emphasized on the fact that Indians go online to search for product information and believe in Research Online and Buy offline. He gave an estimated breakup for various product categories:

- Auto – 33% Research online Buy Offline and 3% Research and Buy Online
- Healthcare- 39% Research online Buy Offline and 5% Research and Buy Online
- Media and Entertainment- 26% Research online Buy Offline and 16% Research and Buy Online
- Retail – 65% Research online Buy Offline and 19% Research and Buy Online
- Technology Products- 72% Research online Buy Offline and 21% Research and Buy Online
- Internet Banking: Google also found that the weekly queries for Internet banking have gone up 200 times in the last 18 months, which shows a lot of Indians want to bank online.

Travel Search

- 40% Research online Buy Offline and 29% Research and Buy Online
- 50% searches in India were for budget hotels that offered sub Rs 5000 a night tariff. He said that this was an indication about potential of the segment and the need for building more ‘Ginger’ like hotels.
- This was followed by Air travel queries at 27%
- Holidays at 10%
- Bus and rail at 7.42%
- Car rentals at 1.97%.

Local Search Opportunity

Anandan pointed out that there was a massive untapped opportunity in local searches, which have increased five times over the last year and out of the total, 50% are made from mobile phones. Only 45% of those local search queries are covered by Indian businesses and the rest remain unresolved. He advocated the Microtransaction payment model, keeping in mind the sheer volume of users in the country.

E-Commerce Payment Issues

Anandan felt that E-Commerce companies in India are not doing enough to address the segment and payment hiccups, lack of awareness and trust and a good online experience were the barriers in the growth of e-commerce in the country. He mentioned that most companies were using outsourced Internet marketing, which should be avoided beyond a point. Each should have a designated CTO and Technology team to avoid hiccups.

He said that e-commerce companies need to focus on the website design to make it clean, fast and give the user a great online experience by doing things like avoiding pop-ups to register when the user lands on the site. They need to integrate social and search elements but at the same time keep it relevant and cover the entire customer landscape.

On the payment side, he stressed on the need for cash on delivery as a viable payment option, saying that players who don’t want to do cash on delivery should not get into e-commerce.

www.rajeshgoutam.com

in reference to: Google (view on Google Sidewiki)

New Updates.......

Face-book and Google consider buying or partnering with Skype, report says

in reference to: Google (view on Google Sidewiki)

Thursday, April 14, 2011

How to find? Your computer is running a 32-bit version or 64-bit version of the Windows operating system.

Windows Vista or Windows 7
If you have Windows Vista or Windows 7, there are two methods to determine whether you are running a 32-bit or a 64-bit version. If one does not work, try the other.
Method 1: View System window in Control Panel

1. Click Start
Collapse this imageExpand this image
Start button
, type system in the Start Search box, and then click system in the Programs list.
2. The operating system is displayed as follows:
* For a 64-bit version operating system: 64-bit Operating System appears for the System type under System.
* For a 32-bit version operating system: 32-bit Operating System appears for the System type under System.

Method 2: View System Information window

1. Click Start
Collapse this imageExpand this image
Start button
, type system in the Start Search box, and then click System Information in the Programs list.
2. When System Summary is selected in the navigation pane, the operating system is displayed as follows:
* For a 64-bit version operating system: x64-based PC appears for the System type under Item.
* For a 32-bit version operating system: x86-based PC appears for the System type under Item.

If you cannot determine the operating system bit count with these methods, go to the "Next Steps" section.

Windows XP
If you have Windows XP, there are two methods to determine whether you are running a 32-bit or a 64-bit version. If one does not work, try the other.
Method 1: View System Properties in Control Panel

1. Click Start, and then click Run.
2. Type sysdm.cpl, and then click OK.
3. Click the General tab. The operating system is displayed as follows:
* For a 64-bit version operating system: Windows XP Professional x64 Edition Version < Year> appears under System.
* For a 32-bit version operating system: Windows XP Professional Version appears under System.
Note is a placeholder for a year.

Method 2: View System Information window

1. Click Start, and then click Run.
2. Type winmsd.exe, and then click OK.
3. When System Summary is selected in the navigation pane, locate Processor under Item in the details pane. Note the value.
* If the value that corresponds to Processor starts with x86, the computer is running a 32-bit version of Windows.
* If the value that corresponds to Processor starts with ia64 or AMD64, the computer is running a 64-bit version of Windows.

If you cannot determine the operating system bit count with these methods, go to the "Next Steps" section.
Windows Server 2003
If you have Windows Server 2003, there are two methods to determine whether you are running a 32-bit or a 64-bit version. If one does not work, try the other.
Method 1: View System Properties in Control Panel

1. Click Start, and then click Run.
2. Type sysdm.cpl, and then click OK.
3. Click the General tab. The operating system is displayed as follows:
* For a 64-bit version operating system: Windows Server 2003 Enterprise x64 Edition appears under System.
* For a 32-bit version operating system: Windows Server 2003 Enterprise Edition appears under System.

Method 2: View System Information window

1. Click Start, and then click Run
2. Type winmsd.exe, and then click OK.
3. When System Summary is selected in the navigation pane, locate Processor under Item in the details pane. Note the value.
* If the value that corresponds to Processor starts with x86, the computer is running a 32-bit version of Windows.
* If the value that corresponds to Processor starts with EM64T or ia64, the computer is running a 64-bit version of Windows.

in reference to: Google (view on Google Sidewiki)

Friday, April 1, 2011

E-commerce vs M-commerce

E-commerce vs M-commerce

In today’s fast developing technological world, businesses are usually transacted online. These online transactions are called m-commerce and e-commerce. E-commerce is a term that has been around for a long time already. This term is about conducting business online, and everybody knows about that. However, with the rise of m-commerce, certain confusions also rose. Both of them are about transacting business online, but there is still a significant difference between the two. To clear these confusions, it is best to define and differentiate these terms.

The meaning of commerce means, conducting a business transaction, whether it is promotional or selling products, goods, and services. The “m” in the term m-commerce means mobile. M-commerce then, is a type of business transaction done on your mobile phone; providing your mobile phone has Internet access. Lately, phones have Internet access, like 4G, which makes these transactions more accessible. With the rise of phones with Internet access, this kind of business transaction has become very popular. M-commerce has become a booming business lately.

With the use of m-commerce, there are plenty of products and promotional items that can finally be transacted. Movie tickets can be bought via your phone with Internet access. Not only that, you can also avail coupons, loyalty cards, and discount cards through you mobile phone with the help of m-commerce. M-commerce can also let you do mobile banking, and let you use your money in different companies. Just like using a laptop or a desktop, as long as your phone has Internet access, so too can you shop until you drop using m-commerce.

E-commerce, on the other hand, is an abbreviation of electronic commerce. This means that e-commerce is a way of doing business transactions through the Internet as well. If you have a laptop or a desktop then you can easily shop online. It has become very popular in these modern days. Not only can it help you do transactions online, it is also very convenient with all the swipe machines where you can swipe your credit card for payment. People can do a business-to-business transaction via e-commerce called B2B. It can also do a company to consumer transaction called B2C. This is where your orders will be received via shipments and deliveries. You can use credit cards when doing these transactions. One of the best examples for this is when amazon.com do business with their clients. Another popular online shopping site is eBay.

SUMMARY:

1.

M-commerce means using mobile phone with Internet access, while e-commerce needs a laptop or desktop, but both are performed online.
2.

You can pay an e-commerce transaction through swipe machines where you swipe you credit cards, m-commerce does not have this yet.
3.

M-commerce is more portable compared to e-commerce, because mobile phones are easy to carry.
4.

The “m” in m-commerce means mobile phone, while the “e” in e-commerce means electronic.

Read more: Difference Between E-commerce and M-commerce | Difference Between | E-commerce vs M-commerce http://www.differencebetween.net/business/difference-between-e-commerce-and-m-commerce/#ixzz1IGhRjOIz

in reference to: Google (view on Google Sidewiki)

Wednesday, February 16, 2011

DNS Records (NS, A, MX, CNAME, SPF) Explained!

Your domain name has a DNS zone which consists of the following records:

* NS - specifies which are the DNS servers for your domain;
* A - specifies IP addresses corresponding to your domain and its sub domains;
* MX - specifies where the emails for your domain should be delivered;
* CNAME - specifies redirects from your domain's subdomains to other domains / subdomains;
* SPF - Sender Policy Framework (SPF) is an attempt to control forged e-mail.

in reference to: Google (view on Google Sidewiki)

Sunday, February 13, 2011

Online Market Is Growing..... Americans watching more videos online

As many as 49 percent of all Americans now incorporate online video into their everyday lives. They are also watching more videos online per day, with 66 percent of respondents indicating that they view more videos than they did 12 months ago.

in reference to: Google (view on Google Sidewiki)

B2B online marketing proves to be resilient in 2010

With many Americans increasingly turning to online communication channels in 2010, firms are seeing more return on their B2B online marketing initiatives, comScore reports.

According to comScore's 2010 U.S. Digital Year in Review report, several online marketing channels are seeing more use from Americans. For example, one out of every eight minutes spent online is now devoted to social media platforms, with 90 percent of Americans visiting social networks every month.

Further, the number of people who conducted search queries increased by 4 percent in 2010. Meanwhile, the overall volume of searches performed by Americans rose by 12 percent over the course of the year.

"2010 was a very positive year for the digital media industry, highlighted by ... significant innovation and increased demand for online advertising" said comScore chairman Gian Fulgoni. "As we embark on a promising 2011, marketers must have a sound understanding of the digital media landscape and how it is changing if they hope to capitalize on key trends that can drive their business into the future."

While the number of queries conducted in 2010 rose, the search landscape is growing increasingly more complex. According to Experian Hitwise, Bing is gaining more market share each month, with a growth of 21 percent in January.

Thanks

http://www.rajeshgoutam.com

in reference to: Google (view on Google Sidewiki)

Friday, February 11, 2011

Online Market Updates!!!

Online marketing industry size to touch Rs 2k crore by 2013...

As rules of the advertising game change rapidly, online or digital marketing market size in India is estimated to touch close to Rs 2,000 crore in the next two years from a Rs 1,400 crore now, say management experts.

in reference to: Google (view on Google Sidewiki)

Saturday, February 5, 2011

Hey want to know more about Port's???

FTP: 20, 21,
SMTP: 28,
HTTP: 80,
SSL:443,
DNS: 53
POP3:110
SMTP:25
NNTP:119
IMAP:142

SSL port no:

HTTP: 443
SMTP:456
POP3:995
IMAP:993
NNTP:563
LDAP:636

>>>>>>

in reference to: Google (view on Google Sidewiki)

Shared Web Hosting - The best small business hosting solution

Shared Web Hosting is ideal if:
• You want your site online within 24 hours!
• You have little or no technical experience
• Want low cost hosting solutions
Yes, in a nutshell, that shared web hosting is a crucial key that can get web startups up and moving in a very short time. Lets find out how it works.

For small businesses entering into the web domain, shared web hosting is proving to be an ideal launch vehicle. We all know that for any startup in any business sector, it is vitally important to find the right partners to get a kickstart.

More so in the case of web business. If you choose the right web-partners, you are likely to get the right solutions at the right time from them. In fact, if you get your web partnerships to form the ideal synergy, even a small-web business start-up of yours can experience skyrocketing growth bringing in high ROI.

Vital steps towards building up a successful small web business

Right from designing your small-business website to hosting it over the net, the success of your small-business web site depends a lot on how you choose partners at each step of its development.

The right web partners will help you boost your business prospects, be it in terms of building your brand image and presence, search engine optimization or providing a small business hosting solution.

Right from website designing to hosting it over the net, the whole process of building a successful web business is completed in the following stages:
1. Buying a Domain
2. Choosing a Host
3. Designing your website
4. Promoting your website
5. Generating Revenue from your website

Rajesh Goutam....Online Marketing / Web Solution Expert

in reference to: Google (view on Google Sidewiki)

Friday, February 4, 2011

"Access is Denied" error message when you try to open a folder

To resolve this issue, you must turn off Simple File Sharing, and then take ownership of the folder:

1. Turn off Simple File Sharing:
1. Click Start, and then click My Computer.
2. On the Tools menu, click Folder Options, and then click the View tab.
3. Under Advanced Settings, click to clear the Use simple file sharing (Recommended) check box, and then click OK.
2. Right-click the folder that you want to take ownership of, and then click Properties.
3. Click the Security tab, and then click OK on the Security message, if one appears.
4. Click Advanced, and then click the Owner tab.
5. In the Name list, click your user name, Administrator if you are logged in as Administrator, or click the Administrators group.

If you want to take ownership of the contents of that folder, click to select the Replace owner on subcontainers and objects check box.
6. Click OK.

You may receive the following error message, where Folder is the name of the folder that you want to take ownership of:
You do not have permission to read the contents of directory Folder. Do you want to replace the directory permissions with permissions granting you Full Control? All permissions will be replaced if you press Yes.
7. Click Yes.
8. Click OK, and then reapply the permissions and security settings that you want for the folder and the folder contents.

in reference to: Google (view on Google Sidewiki)

Monday, January 31, 2011

Updates...

After Email Service Facebook Going to Launch Calling VOIP Service

in reference to: Google (view on Google Sidewiki)

Monday, January 10, 2011

Will Facebook shut down March 15th?

NO.....Rajesh Goutam

in reference to: Google (view on Google Sidewiki)

Wednesday, January 5, 2011

AJAX is nor supported by search engines.

Search Engines and AJAX Do Not Mix, spiders do not run JavaScript. Search engiens cant see AJAX delivered content. AJAX created navigation wont be crawled.

Every page must be HTML, every page must have its content on the page, all links must already be in the HTML, and test this by turning off JavaScript in your browser.

Web developers can use (non-AJAX_ JavaScript to update the anchors on the page, and change the functionality to AJAX calls. This ensures that the AJAX will work, we know it will work because AJAX calls were set up by the JavaScript, which search engines are not capable of...

Ensure baseline application is built first and then you can take AJAX to take the user experience one step forward.

AJAX breaks the normal browser refresh - This means content not necessarily corresponding to URL - No addition to the browser history - No history, no back button

in reference to: Google (view on Google Sidewiki)

Tuesday, January 4, 2011

QR Code :

QR code : Quick Response code technology

in reference to: Google (view on Google Sidewiki)

Goutam Updates.....

India is currently the 2nd largest Mobile Market in the world after China, adding nearly 10-12 million subscribers on average monthly.

in reference to: Google (view on Google Sidewiki)

Webmaster guidelines

Following these guidelines will help Google find, index, and rank your site. Even if you choose not to implement any of these suggestions, we strongly encourage you to pay very close attention to the "Quality Guidelines," which outline some of the illicit practices that may lead to a site being removed entirely from the Google index or otherwise penalized. If a site has been penalized, it may no longer show up in results on Google.com or on any of Google's partner sites.

Design and content guidelines

Learn more...

Technical guidelines

Learn more...

Quality guidelines

Learn more...

When your site is ready:

Design and content guidelines

  • Make a site with a clear hierarchy and text links. Every page should be reachable from at least one static text link.
  • Offer a site map to your users with links that point to the important parts of your site. If the site map is larger than 100 or so links, you may want to break the site map into separate pages.
  • Create a useful, information-rich site, and write pages that clearly and accurately describe your content.
  • Think about the words users would type to find your pages, and make sure that your site actually includes those words within it.
  • Try to use text instead of images to display important names, content, or links. The Google crawler doesn't recognize text contained in images. If you must use images for textual content, consider using the "ALT" attribute to include a few words of descriptive text.
  • Make sure that your elements and ALT attributes are descriptive and accurate.
  • Check for broken links and correct HTML.
  • If you decide to use dynamic pages (i.e., the URL contains a "?" character), be aware that not every search engine spider crawls dynamic pages as well as static pages. It helps to keep the parameters short and the number of them few.
  • Keep the links on a given page to a reasonable number (fewer than 100).
  • Review our image guidelines for best practices on publishing images.

With image search, just as with web search, Google's goal is to provide the best and most relevant search results to our users. Following the best practices listed below (as well as our usual webmaster guidelines) will increase the likelihood that your images will be returned in those search results.

Don't embed text inside images

Search engines can't read text embedded in images. If you want search engines to understand your content, keep it in regular HTML.

Tell us as much as you can about the image

Give your images detailed, informative filenames

The filename can give Google clues about the subject matter of the image. Try to make your filename a good description of the subject matter of the image. For example, my-new-black-kitten.jpg is a lot more informative than IMG00023.JPG. Descriptive filenames can also be useful to users: If we're unable to find suitable text in the page on which we found the image, we'll use the filename as the image's snippet in our search results.

The alt attribute is used to describe the contents of an image file. It's important for several reasons:

  • It provides Google with useful information about the subject matter of the image. We use this information to help determine the best image to return for a user's query.
  • Many people—for example, users with visual impairments, or people using screen readers or who have low-bandwidth connections—may not be able to see images on web pages. Descriptive alt text provides these users with important information.

Not so good:

Better:

puppy

Best:

Dalmatian puppy playing fetch 

To be avoided

dog pup pups puppies doggies pups litter puppies dog retriever 
 labrador wolfhound setter pointer puppy jack russell terrier 
puppies dog food cheap dogfood puppy food"/>

Filling alt attributes with keywords ("keyword stuffing") results in a negative user experience, and may cause your site to be perceived as spam. Instead, focus on creating useful, information-rich content that uses keywords appropriately and in context. We recommend testing your content by using a text-only browser such as Lynx.

Anchor text

External anchor text (the text pages use to link to your site) reflects how other people view your pages. While typically webmasters can't control how other sites link to theirs, you can make sure that anchor text you use within your own site is useful, descriptive, and relevant. This improves the user experience and helps the user understand the link's destination. For example, you might link to a page of vacation photos like this: Photos of our June 2008 trip to Ireland.

Provide good context for your image

The page the image is on, and the content around the image (including any captions or image titles), provide search engines with important information about the subject matter of your image. For example, if you have a picture of a polar bear on a page about home-grown tomatoes, you'll be sending a confused message to the search engines about the subject matter of polarbear.jpg.

Wherever possible, it's a good idea to make sure that images are placed near the relevant text. In addition, we recommend providing good, descriptive titles and captions for your images.

Think about the best ways to protect your images

Because images are often copied by users, Google often finds multiple copies of the same image online. We use many different signals to identify the original source of the image, and you can help by providing us with as much information as you can. In addition, the information you give about an image tells us about its content and subject matter.

Webmasters are often concerned about the unauthorized use of their images. If you prevent users from using your images on their site, or linking to your images, you'll prevent people from using your bandwidth, but you are also limiting the potential audience for your images and reducing their discoverability by search engines.

One solution is to allow other people to use your images, but require attribution and a link back to your own site. There are several ways you can do this. For example, you can:

  • Make your images available under a license that requires attribution, such as a Creative Commons license that requires attribution.
  • Provide a HTML snippet that other people can use to embed your image on their page while providing attribution. This snippet can include both the link to the image and a link to the source page on your site.

Similarly, some people add copyright text, watermarks, or other information to their images. This won't impact your image's performance in search results, but may not provide the kind of user experience you are looking for.

If you don't want search engines to crawl your images, we recommend using a robots.txt file to block access to your images.

Create a great user experience

Great image content is an excellent way to build traffic to your site. We recommend that when publishing images, you think carefully about creating the best user experience you can.

  • Good-quality photos appeal to users more than blurry, unclear images. In addition, other webmasters are much more likely to link to a good-quality image, which can increase visits to your site. Crisp, sharp images will also appear better in the thumbnail versions we display in our search results, and may therefore be more likely to be clicked on by users.
  • Even if your image appears on several pages on your site, consider creating a standalone landing page for each image, where you can gather all its related information. If you do this, be sure to provide unique information—such as descriptive titles and captions—on each page. You could also enable comments, discussions, or ratings for each picture.
  • Not all users scroll to the bottom of a page, so consider putting your images high up on the page where it can be immediately seen.
  • Consider structuring your directories so that similar images are saved together. For example, you might have one directory for thumbnails and another for full-size images; or you could create separate directories for each category of images (for example, you could create separate directories for Hawaii, Ghana, and Ireland under your Travel directory). If your site contains adult images, we recommend storing these in one or more directories separate from the rest of the images on your site.
  • Specify a width and height for all images. A web browser can begin to render a page even before images are downloaded, provided that it knows the dimensions to wrap non-replaceable elements around. Specifying these dimensions can speed up page loading and improve the user experience.

With image search, just as with web search, our goal is to provide the best and most relevant search results to our users. Following the best practices listed above will increase the likelihood that your images will be returned in those search results.

Technical guidelines

  • Use a text browser such as Lynx to examine your site, because most search engine spiders see your site much as Lynx would. If fancy features such as JavaScript, cookies, session IDs, frames, DHTML, or Flash keep you from seeing all of your site in a text browser, then search engine spiders may have trouble crawling your site.
  • Allow search bots to crawl your sites without session IDs or arguments that track their path through the site. These techniques are useful for tracking individual user behavior, but the access pattern of bots is entirely different. Using these techniques may result in incomplete indexing of your site, as bots may not be able to eliminate URLs that look different but actually point to the same page.
  • Make sure your web server supports the If-Modified-Since HTTP header. This feature allows your web server to tell Google whether your content has changed since we last crawled your site. Supporting this feature saves you bandwidth and overhead.
  • Make use of the robots.txt file on your web server. This file tells crawlers which directories can or cannot be crawled. Make sure it's current for your site so that you don't accidentally block the Googlebot crawler. Visit http://www.robotstxt.org/faq.html to learn how to instruct robots when they visit your site. You can test your robots.txt file to make sure you're using it correctly with the robots.txt analysis tool available in Google Webmaster Tools.
  • If your company buys a content management system, make sure that the system creates pages and links that search engines can crawl.
  • Use robots.txt to prevent crawling of search results pages or other auto-generated pages that don't add much value for users coming from search engines.
  • Test your site to make sure that it appears correctly in different browsers.

Quality guidelines

These quality guidelines cover the most common forms of deceptive or manipulative behavior, but Google may respond negatively to other misleading practices not listed here (e.g. tricking users by registering misspellings of well-known websites). It's not safe to assume that just because a specific deceptive technique isn't included on this page, Google approves of it. Webmasters who spend their energies upholding the spirit of the basic principles will provide a much better user experience and subsequently enjoy better ranking than those who spend their time looking for loopholes they can exploit.

If you believe that another site is abusing Google's quality guidelines, please report that site at https://www.google.com/webmasters/tools/spamreport. Google prefers developing scalable and automated solutions to problems, so we attempt to minimize hand-to-hand spam fighting. The spam reports we receive are used to create scalable algorithms that recognize and block future spam attempts.

Quality guidelines - basic principles

  • Make pages primarily for users, not for search engines. Don't deceive your users or present different content to search engines than you display to users, which is commonly referred to as "cloaking."
  • Avoid tricks intended to improve search engine rankings. A good rule of thumb is whether you'd feel comfortable explaining what you've done to a website that competes with you. Another useful test is to ask, "Does this help my users? Would I do this if search engines didn't exist?"
  • Don't participate in link schemes designed to increase your site's ranking or PageRank. In particular, avoid links to web spammers or "bad neighborhoods" on the web, as your own ranking may be affected adversely by those links.
  • Don't use unauthorized computer programs to submit pages, check rankings, etc. Such programs consume computing resources and violate our Terms of Service. Google does not recommend the use of products such as WebPosition Gold™ that send automatic or programmatic queries to Google.

Quality guidelines - specific guidelines

  • Avoid hidden text or hidden links.
  • Don't use cloaking or sneaky redirects.
    • Cloaking, sneaky Javascript redirects, and doorway pages
    • Cloaking
    • Cloaking refers to the practice of presenting different content or URLs to users and search engines. Serving up different results based on user agent may cause your site to be perceived as deceptive and removed from the Google index.
    • Some examples of cloaking include:
    • Serving a page of HTML text to search engines, while showing a page of images or Flash to users.
    • Serving different content to search engines than to users.
    • If your site contains elements that aren't crawlable by search engines (such as rich media files other than Flash, JavaScript, or images), you shouldn't provide cloaked content to search engines. Rather, you should consider visitors to your site who are unable to view these elements as well. For instance:
    • Provide alt text that describes images for visitors with screen readers or images turned off in their browsers.
    • Provide the textual contents of JavaScript in a noscript tag.
    • Ensure that you provide the same content in both elements (for instance, provide the same text in the JavaScript as in the noscript tag). Including substantially different content in the alternate element may cause Google to take action on the site.

Sneaky JavaScript redirects

    • When Googlebot indexes a page containing JavaScript, it will index that page but it cannot follow or index any links hidden in the JavaScript itself. Use of JavaScript is an entirely legitimate web practice. However, use of JavaScript with the intent to deceive search engines is not. For instance, placing different text in JavaScript than in a noscript tag violates our webmaster guidelines because it displays different content for users (who see the JavaScript-based text) than for search engines (which see the noscript-based text). Along those lines, it violates the webmaster guidelines to embed a link in JavaScript that redirects the user to a different page with the intent to show the user a different page than the search engine sees. When a redirect link is embedded in JavaScript, the search engine indexes the original page rather than following the link, whereas users are taken to the redirect target. Like cloaking, this practice is deceptive because it displays different content to users and to Googlebot, and can take a visitor somewhere other than where they intended to go.
    • Note that placement of links within JavaScript is alone not deceptive. When examining JavaScript on your site to ensure your site adheres to our guidelines, consider the intent.
    • Keep in mind that since search engines generally can't access the contents of JavaScript, legitimate links within JavaScript will likely be inaccessible to them (as well as to visitors without Javascript-enabled browsers). You might instead keep links outside of JavaScript or replicate them in a noscript tag.

Doorway pages ( Pages created just for search engines )

    • Doorway pages are typically large sets of poor-quality pages where each page is optimized for a specific keyword or phrase. In many cases, doorway pages are written to rank for a particular phrase and then funnel users to a single destination.
    • Whether deployed across many domains or established within one domain, doorway pages tend to frustrate users, and are in violation of our webmaster guidelines.
    • Google's aim is to give our users the most valuable and relevant search results. Therefore, we frown on practices that are designed to manipulate search engines and deceive users by directing them to sites other than the ones they selected, and that provide content solely for the benefit of search engines. Google may take action on doorway sites and other sites making use of these deceptive practice, including removing these sites from the Google index.
    • If your site has been removed from our search results, review our webmaster guidelines for more information. Once you've made your changes and are confident that your site no longer violates our guidelines, submit your site for reconsideration.
  • Don't send automated queries to Google.
  • Don't load pages with irrelevant keywords.
  • Don't create multiple pages, subdomains, or domains with substantially duplicate content.
  • Don't create pages with malicious behavior, such as phishing or installing viruses, trojans, or other badware.
  • Avoid "doorway" pages created just for search engines, or other "cookie cutter" approaches such as affiliate programs with little or no original content.
  • If your site participates in an affiliate program, make sure that your site adds value. Provide unique and relevant content that gives users a reason to visit your site first.

If you determine that your site doesn't meet these guidelines, you can modify your site so that it does and then submit your site for reconsideration.

Google Basics

When you sit down at your computer and do a Google search, you're almost instantly presented with a list of results from all over the web. How does Google find web pages matching your query, and determine the order of search results?

In the simplest terms, you could think of searching the web as looking in a very large book with an impressive index telling you exactly where everything is located. When you perform a Google search, our programs check our index to determine the most relevant search results to be returned ("served") to you.

The three key processes in delivering search results to you are:

Crawling: Does Google know about your site? Can we find it?

Learn more...

Indexing: Can Google index your site?

Learn more...

Serving: Does the site have good and useful content that is relevant to the user's search?

Learn more...

Crawling

Crawling is the process by which Googlebot discovers new and updated pages to be added to the Google index.

We use a huge set of computers to fetch (or "crawl") billions of pages on the web. The program that does the fetching is called Googlebot (also known as a robot, bot, or spider). Googlebot uses an algorithmic process: computer programs determine which sites to crawl, how often, and how many pages to fetch from each site.

Google's crawl process begins with a list of web page URLs, generated from previous crawl processes, and augmented with Sitemap data provided by webmasters. As Googlebot visits each of these websites it detects links on each page and adds them to its list of pages to crawl. New sites, changes to existing sites, and dead links are noted and used to update the Google index.

Google doesn't accept payment to crawl a site more frequently, and we keep the search side of our business separate from our revenue-generating AdWords service.

Indexing

Googlebot processes each of the pages it crawls in order to compile a massive index of all the words it sees and their location on each page. In addition, we process information included in key content tags and attributes, such as Title tags and ALT attributes. Googlebot can process many, but not all, content types. For example, we cannot process the content of some rich media files or dynamic pages.

Serving results

When a user enters a query, our machines search the index for matching pages and return the results we believe are the most relevant to the user. Relevancy is determined by over 200 factors, one of which is the PageRank for a given page. PageRank is the measure of the importance of a page based on the incoming links from other pages. In simple terms, each link to a page on your site from another site adds to your site's PageRank. Not all links are equal: Google works hard to improve the user experience by identifying spam links and other practices that negatively impact search results. The best types of links are those that are given based on the quality of your content.

In order for your site to rank well in search results pages, it's important to make sure that Google can crawl and index your site correctly. Our Webmaster Guidelines outline some best practices that can help you avoid common pitfalls and improve your site's ranking.

Google's Related Searches, Spelling Suggestions, and Google Suggest features are designed to help users save time by displaying related terms, common misspellings, and popular queries. Like our google.com search results, the keywords used by these features are automatically generated by our web crawlers and search algorithms. We display these suggestions only when we think they might save the user time. If a site ranks well for a keyword, it's because we've algorithmically determined that its content is more relevant to the user's query.

Verify that your site ranks for your domain name = Google search for www.[yourdomain].com

Check your site is in the Google index = A search for site:google.com


Rajesh Goutam

www.rajeshgoutam.com

Rajesh Goutam Google Group

My website: