Seo news

Seo news


Got a new mobile app that needs marketing? I wish I could say there’s an app for that, but for in-house search engine marketing managers, marketing a new mobile app involves a lot of the same elbow grease and detailed, tactical campaign work as a search engine marketing campaign.


The App’s (Finally) Approved

After a lengthy wait, your company’s iPhone, iPad or Android app is approved for download. Hurrah! Hopefully the development team built in great keywords to the app name and description to give the best advantage possible for being found in app store searches, so it’s time to move onto promoting the app outside the app stores.


Coordination is key to app promoting success. The more downloads generated in a short period of time, the better the app store ranking for Gabblet. Launching PR, main website and email promotion, and paid campaigns in as coordinated an effort as possible will help drive a burst of interest and hopefully downloads.


Any in-house search engine marketer can easily create an AdWords or AdCenter campaign promoting the app. For the best ROI and quality score, targeting keywords specific to the app (versus apps generally) makes the most sense.


For example, buying keywords for “iPhone apps” will generate lots of impressions, but a likely low CTR, quality score and download return (particularly if the app isn’t free).


But more targeted keywords, for example, “iPhone currency converter app” make perfect sense to purchase. Needless to say, it makes sense to run this campaign targeted to mobile devices, but you may also want to target desktops and laptops in a separate campaign as people may browse for apps via their computers.


Another good tactic is to create a Facebook ad campaign and target profiles interested in the app’s subject area (e.g., fantasy baseball) as well as profiles interested in mobile apps and technologies (e.g., iPhone apps, Android phones).


Tactics To Drive Efficient Paid Downloads

Once all the traditional marketing channels in-house search engine marketers are experienced running are covered, it’s time to look at mobile specific channels.


The most common tactic is to run paid marketing campaigns on a relatively low cost CPC basis with specialized mobile advertising networks like AdMob (Google owned) and iAd (Apple owned). These networks serve mobile banner and in-app advertising targeted to geographic and device specific audiences.


Both platforms support reporting on downloads to help refine campaigns and budgets, and account managers can refine matching placements once sufficient data is collected. Additionally, Google AdWords offers in-app advertising as well, with the ability to target placements in particular apps that are a good target audience fit.


Budget Not A Factor? Splurge On Pricier Placements

If the sky’s the limit in terms of app marketing spend, there’s plenty of pricier options for promotion. Mobile YouTube takeovers are available from Google, a great way to capture a broad mobile audience. Video ads (at a pricier CPC) are also available from AdMob.


Engaging in print advertising, or leveraging an ongoing print campaign to include a barcode or QR code to scan with a mobile phone to link to download the app is a great offline channel tactic. Contacting Apple for in-store app demo events is another offline strategy to generate buzz and interest.


Success Metrics

The primary goal of any campaign is to drive downloads, especially in an effort to enhance app store rankings. For paid apps, additional metrics around revenue, cost per download and ROI are immediately relevant.


For free apps, cost per download is a good metric to measure, but can be hard to pinpoint an appropriate value. Many free apps have downstream revenue associated with them for transactions or advertising revenue, that can also be measured.


Whistle Blowing – Doing The Right Thing

Whistle Blowing – Doing The Right Thing
A whistleblower is a person who raises a concern about any wrongdoing occurring in an organization or body of people. These wrongdoings could be a violation of a law, rule, or regulation. It could also be a health and safety violation or possibly fraud and corruption. Whistleblowers may decide to inform the organization or they may go outside the organization to tell law enforcement agencies or regulators. Depending on who they share the information with, they are considered to be internal whistleblowers or external whistleblowers. Internal whistleblowers report misconduct on a fellow employee or co-worker. External whistleblowers report misconduct on people outside their organization. Many companies and laws reward external whistleblowers. A whistleblower may be labelled as a snitch or a tattletale.
Whistleblowers are protected under law from employer retaliation. In some cases punishment for whistleblowing occurs. Punishment can include termination, suspension, demotion, wage garnishment, or harsh mistreatment. Typically, this only happens if the accusation that the whistleblower made was false and attracted a wide variety of media in an unfavorable light for the corporation. A person can serve up to six years in jail if there is a false accusation against an organization. All states vary in the amount of protection a person gets for whistleblowing. The first law created to protect whistleblowers was Lloyd-La Follette Act. There are also deadlines in which whistleblowers must report their information, usually a certain number of days after the incident occurred. Another form of a whistleblower can come from the military and they are protected by The Military Whistleblower Protection Act. This actprotects the right of members of the armed services to communicate with any member of Congress. It is wise to make sure that any accusation you make against a company or organization is one that it is completely true and that you have evidence to prove it. Whistleblowers are protected more today than they ever have been.

Whistleblower Protection – Spilling The Health And Safety Beans!

Whistleblower Protection – Spilling The Health And Safety Beans!

Copyright (c) 2011 Robert Gray

Employers have a duty to their employees to ensure that there is no risk to their health whilst in the work place. Employers are required to do this by carrying out relevant risk assessments of the work place, ensuring that all machinery and equipment is in good working order and is properly maintained and making sure that the work place as a whole is free from hazards.

Usually if an employee is concerned that something, or somebody, at work is posing a risk to their health, and/or the health of others , they discuss the matter with a senior member of staff, such as a line manager, and the employee’s concerns are discussed in full. It would then be best practice for the employer to fully investigate the employees concerns in order to eliminate any risk that may be posed.

However, in the event that the employee’s concerns are not taken seriously by the employer, or the employer fails to take any adequate steps to rectify the situation, the employee may feel that there is still cause for concern and that the issue needs to be directed elsewhere. The employee may decide to report the matter to, for example, the HSE, police or media who may investigate. ‘The Public Interest Disclosure Act 1998’ provides protection for an employee who reports his concerns – i.e. ‘blows the whistle’ on his employer. The act states that an employee who makes a disclosure about his concerns regarding a safety issue should not be treated detrimentally by his employer. The purpose of the act is allow concerns to be addressed and put right before harm is caused. If the act was not in place employees may feel less protected and therefore may be less likely to ‘blow the whistle’ on what are probably very genuine health and safety concerns.

Examples of whistleblowing include reports of untrained or inadequately trained nurses administering medication to patients, fraudulent expenses claims, inaccurate description of products or misuse of equipment.

It would benefit both the employer and employee if the employer had a ‘whistle blowing policy’ in place. This would address the correct manner in which to raise concerns in the workplace, such as who the employee should report the concerns to and in what manner. This may reduce the need for the matter to be taken elsewhere and will help to preserve the relationship between the employee and employer, and also the employer’s reputation. It is often the case that the employer is the person best placed to rectify any safety issue anyway so if matters can be discussed and investigated without the whistle being blown then this can be to the benefit of all involved.

Top 3 Windows Vista Password Recovery Measures

Top 3 Windows Vista Password Recovery Measures

If you’ve forgotten password on Win Vista and cannot log on your computer again, you need to perform Windows Vista password recovery. But the problem for you is that how can you recover the password and will it be difficult to perform password recovery? Below is a step-by-step guidance for you to recover Windows Vista password with 3 different methods.

Method 1: Perform Windows Vista password recovery with password reset disk

Win Vista allows you to create a password reset disk with a USB flash drive in a few seconds. It can help you reset the login password when you forget it. Just try to recover Windows Vista password as follows if you have a such a disk at hand.

1. Start your computer and get to the Vista login screen.
2. Type a wrong password, and then Reset password link will appear on the Vista login screen.
3. Click Reset password to enter to Password Reset Wizard screen, and then click next.
4. Select the right disk if you have more than one disk, click next.
5. Type in a new password and password hint, click next.
6. Click Finish when you’ve successfully reset the login password.

Method 2: Perform Windows Vista password recovery on safe mode

In addition to reset Vista login password with password reset disk, you can also recover Windows Vista password on safe mode. And the presupposition is that you have can log on computer with another Win Vista administrator account.

1. Press F8 when your Win Vista PC is booting. You will come to the Advanced Boot Options.
2. Select Safe Mode with Command Prompt and press Enter.
3. Enter safe mode with an available admin account. And a command prompt will appear.
4. Type net user in command prompt and press Enter. It will show you all accounts on the Win Vista.
5. Type net user Mike 123456 (Mike is the locked admin account’s name and 123456 is the new password. This depends on the setting of your computer) and press Enter. Now you have successfully created a new password on the locked admin account.
6. Type shutdown -r -t 00 and press Enter.
7. The computer will reboot automatically and then you can log on Win Vista.

Method 3: Perform Windows Vista password recovery with Windows Login Recovery

Windows Login Recovery is efficient Windows password recovery software designed to recover Windows login passwords for any version of Windows, including Windows 7, Vista, XP, 2003, 2000, NT, 2008. It is not necessary for you to reinstall the system when you forgot or lost your Windows login password. But a blank CD/DVD or USB flash drive and an available computer with optical drive is required before starting to perform Win Vista password recovery as below:

1. Download Windows Login Recovery and install it in any available computer.
2. Run the program and insert a blank CD/DVD or USB flash drive into computer. You will see a default path of an ISO image file after running the application.
3. Select CD/DVD or USB drive to burn the ISO image file and click Burn.
4. After burning, insert the CD/DVD or USB drive to your locked computer.
5. Set the locked computer to boot from CD/DVD or USB drive. After setting BIOS to boot from CD/DVD or USB drive, the computer will restart automatically. And then you can recover Windows Vista password under DOS.
6. Choose the installation path of Windows, and enter the ID of the path.
7. All the user names will be displayed for you, and you can select one to remove its password by entering the ID of User Name. And then enter y to confirm your operation.
8. After removing the selected password, you can enter y to continue to reset other passwords, or enter n to finish.
9. After entering n to finish, eject the CD/DVD or USB drive and press any key to restart the computer. Now, you can log on your PC.

How to Create and Remove SQL Server Password

How to Create and Remove SQL Server Password

SQL Server is a Microsoft product used to manage and store information. It uses tables to contain large sets of records for the database. Do you have a SQL server and have you ever used SQL server? Do you know how to create a SQL Server password to protect your data stored on SQL server? What to do if you forget your SQL password? Following it will introduce you how to create a SQL password. And it also tells you how to remove SQL Server password if you forget as password can be easily lost.

How to create a SQL Server password?

As we know, it is an important security measure to set a password for user accounts and in particular the SA account. And it is very easy for you to create a SQL Server password. Just follow the simple instructions.

1. Open the Microsoft SQL Server Management Studio program from the Start menu bar in Windows.
2. Click on the SQL Server instance on which the new user will be created.
3. Right-click the Security folder, point to New, and then click Login.
4. On the General page, enter a name for the new login in the Login name box.
5. Select SQL Server Authentication and enter a password for the login.
6. Select the password policy options that should be applied to the new login. In general, enforcing password policy is the more secure option.
7. Click the OK to complete the creation of the new user.

Sometimes it happens that you ignore or forget the system administrator password. What will you do if you forget SQL password and cannot access to SQL database? The effective way I know is to remove SQL Server password with the help of SQL Server password remover software. MS SQL Server Password Unlocker is one of the good MS SQL password remover tools which can help you remove SQL password in a few seconds.

How to remove SQL password with Windows Password Unlocker?

MS SQL Server Password Unlocker is handy SQL Server password remover software for you to reset SQL password including reset SA password and other user passwords. It can easily remove SQL Server password for Microsoft SQL Server 2000/2005/2008 in a minute. You don’t need to install MS SQL Server on your PC, and the file in master.mdf format is enough for you to remove SQL Server password and set a new one for it.

Step 1. Download and install MS SQL Server Password Unlocker, and run the application.
Step 2. Click Open to import your master.mdf file. All the user names of your MS SQL Server will be displayed.
Step 3. Select an SQL account, click Change password button.
Step 4. Type a new password, and then click OK.

This SQL account password has been reset. You can login with the newly set SQL password. Although it is easy for you to remove SQL Server password with SQL password remover, it is better to keep your SQL password in heart. Or you can also write it down on a paper and keep in a safe place.

An Almost Painless Introduction to Encryption

An Almost Painless Introduction to Encryption

Anybody who doesn’t happen to have a degree in science or math tends to shy away from the subject of encryption. One could hardly blame the layman – it’s heady stuff! But if you’re involved in telecommunications at any level, operating anything from a desktop computer to a mobile phone, you’re confronted with encryption every day. Here is at least a basic understanding of why encryption has to be such a complex science.

The first codes.

Probably the simplest code you might be familiar with is the letter substitution. One of the most common ones is “rotation-13”, also known as the Caesar cypher. In it, you just break the alphabet into two rows, like this:


A = N, B = O, and so on with 13 pairs to transfer all 26 letters. It’s called a rotation because you can apply the same method to encode and decode any given text. Letter substitution codes can be any kind of pattern where one letter means another one, and are commonly used on the Internet to hide plot spoilers when describing a movie or hide the punchline to a riddle. They even appear in word puzzle games, such as those printed in the daily newspaper.

As you might guess, letter substitutions are easily cracked on paper, and of course even faster to crack with a computer. In the above rotation-13 example, the key to the code is the two rows of letters. Finding the key to any code results in cracking it.

The reason simple letter substitutions are so easy to break is because one can always use letter-frequency analysis to guess at least half the key. In American-standard English, the twelve most commonly-appearing letters are: “ETAOIN SHRDLU”. Sounds like a magic spell, doesn’t it? Well, you could just take any text encoded by letter-substitution and have a computer count how many times each letter appears. The most common letter will represent “A”, the next “T”, and so on.

So let’s expand the concept!

As an intermediate step to understanding more complex cryptography, let’s see if we can imagine a key that would be harder to discover. What if we used a 3-digit number to represent each letter, but the three digits can appear in any order? E could be 428, 284, 842, and so on. With each letter appearing this way, we could also group the digits randomly to try to hide the pattern. Using this scheme with the key letters in the word “WORD” with W = 123, O = 456, R = 789, and D = 015, we could use any of these sequences:


And they could all decode as “WORD”. Our software program would know to ignore the spacing and read the digits in bursts of three, and take the three digits in any order to substitute for the letter in our key table.

But once again, this code is easy to break. Over time, if you had enough sample space (encrypted text) a computer analysis would find a pattern, and once again, where there’s a pattern, there’s a key! But we can still see that it would take much more work to find the pattern, due to the various false leads that you would take if you came upon the encrypted text for the first time without knowing the key.

So cryptography evolves…

Our above two code methods are examples of “stream cyphers”. Stream cyphers encrypt one symbol at a time. Another method is “block cyphers”, which take the symbols in blocks of a set number of characters and encrypt them all at once. Other methods include deterministic hash functions (in which the encrypted text produces a condensed unique ‘key’), asymmetric key cryptography (in which two different keys are used, one to encrypt and one to decrypt), and the one-time pad (in which the plain, unencrypted text is combined with a huge amount of random text, and eliminating the random text is the “key” to decrypting it).

There are many other methods that are used, but by now you’re at least getting the whole point with cryptography: ALL codes can eventually be cracked, but if you have a code algorithm that’s sophisticated enough, it will be practically unbreakable because it would take an eternity to solve it with our present technology.

All of the encryption methods we have now will one day become obsolete, because computers get faster and more powerful all the time. Thus, there is a kind of “arms race” that has gone on since ancient times. We have to keep developing more and more complex algorithms that can stand up to more sophisticated methods of discovering the keys.

What does this mean to the end user?

Just to follow the current conventional wisdom on what the current standard of secure encryption is. Depending on how private your data is (or how paranoid you are!) it is easy to protect confidential data with a variety of available software tools, and a passing knowledge of how they’re used.