Sunday, 28 February 2016

What Software Do Warehouses Use To Keep Track of Inventory


The inventory in your warehouse represents a lot of value, and it is essential to keep track of each and every component. Organizing data has always been a challenge, and new software tools are making it easier than ever to streamline costs and improve productive output.

The Old Ways 

Before computers became common place in the business world, complicated ledgers were kept by hand in log books. Very precise notes of inventory had to be maintained and inventory specialists relied on physical counts of parts. This method was error prone as a human being can only keep track of so much information at a time. While obsolete, upgrading with a personal computer and digital ledgers presents many of the same problems to small businesses.

The Spread Sheet

For small companies or startups, an inventory ledger can be approximated with a well-organized spreadsheet. Spreadsheet software is robust and can perform a number of automated calculations that reduce errors in counts, but as a business grows, this method must be abandoned as well. Spreadsheets do not store history or track process moves. The files must be constantly updated, and there is the risk that important data can be lost. Reports must be generated from scratch, and redundant information between different departments can overwhelm your company’s decision makers.

Dedicated Database

Eventually a large enough company needs to implement a database system to track inventory. With a barcode reader and digital locations, placing parts into a system and tracking their moves through a process is easy. Reports can be generated that help the warehouse staff streamline redundancies. It is even possible to create multiple locations for your components, and the information remains current.
Databases are great tools, but they are still limited in many ways. They require hardware to support the data, and information can only be accessed by those in the warehouse. Reports are much easier to create, but new information must be manually transferred back and forth between business units.

ERP Warehouse Solutions

Most companies now depend on enterprise resource planning software. These are the most advanced and powerful tools that companies have for managing their entire operations. Like the database, the information in your warehouse is easy to organize and keep current, but an ERP system integrates all of the data your company uses into one solution. Each department has easy access to information that impacts its operations.

With current information shared across business units, employees are free to make decisions and respond to changes in the market. It is important for sales staff to know what is available. Customer service reps should be able to see if a delivery has been made on time when responding to a complaint. Accounting departments need to be able to estimate the value of the inventory to balance accounts.

ERP solutions are also readily available to small companies through software service programs. Instead of purchasing and maintaining the computing hardware and software themselves, high speed internet access gives companies the options to contract with a solutions provider. Storing data on a network server operated by an outside company lowers the initial cost and provides quick access to these tools.

The better organized your inventory is, the greater the efficiency you have in your operations. Upgrading with an ERP solution gives your company the opportunity to streamline processes and increase its competitive edge. These tools are more readily available and essential than ever before.

comparison faceoff between LG 5 vs Samsung 7



LG5 and Samsung S 7 compared and reviewed by features





5 kind of linking strategies that can effect your seo rankings

Among the the most crucial changes that might affect your website traffic is your linking strategy. At times we go overboard to get links and focus on the quantity , rather than quality.This affects your traffic and might change your SERP Again how do you judge quality of your links . There are 3 ways how you can do this
1) Is the industry you are targeting complimentary or it is your competitor ?
2) How many links does the website have ? Are the links merely buried in their links pages. A page has more than 100 links ..you can be assured the link will not  pass on the attributes of links



3) Relevance and authority : Links that are related to the same topic are given more weightage than random linking  to unrelated pages.Think of relevance of each link being evaluated by in the context of specific user search query .For example " for a search term " new cars at Arizona " if the publisher has received a link from Arizona chamber of commerce, the search engine derives  that  the fact that" the link is relevant and trustworthy as the site is about Arizona".Once you decide on the industry you are targeting,your focus on link building should be razor sharp on getting linksfrom within that industry.



4) No follow links : Although google recently claimed that the attribute of "Nofollow" links is no longer that relevant and important as compared to a couple of years ago. However when you use a No follow meta tag on a page, the search engine will still crawl the page and place it in its index. However all links ( both external and internal) on the page will be disabled from passing the link juice to other pages

 4) Anchor text : Desist from a link where the anchor text mentions" our links, click here to know more,read more, or check out the full post here. Be very specific on the anchor text to which you site is being linked to. The best policy is to use the title of your website or webpage as an anchor text The impact of anchor text is quite more powerful than you think.For example if you link to a page that has minimal search friendly ( flash site for example) The search engine will look for signals to know what the page is about.In such case inbound anchor text becomes the primary driver in determining the relevance of the page 


Friday, 26 February 2016

end of good times for swiss watches, as apple smartwatch is on a roll


In what could be a watershed in the history of wrist watch.. Smartwatches sales have surpasses traditional swiss watches with a sales of 8.1 million in Q4, 2015.. In contrast 7.9 milliom swiss watches were sold during the same period.As compared to Q4,2014, smartwatches have seen unprecedented e growth of 316% , wheras Swiss watches managed to ship a mere 1.9million.


In terms of marketshare ,Apple smartwatch rules this segment with over 63% marketshare and is far ahead of samsung with 16% share .Combined, Apple and Samsung make up 8 out of 10 smartwatches sold . Apple sold 2.6millio smartwatches in q2,2015 while samsung managed to sell 600,000 which means apple sales is 6 times ahead of its nearest rival.Across wearable technology, which icludes smartwatches, fitness trackers , Apple’s 3.6m Watch sales contributes only 0.8m and ranks 2nd behind market leader Fitbit, which sold 4.4m devices in Q2.2015



" global smartwatches  marketshare"

" top 10 nations where swiss watches are exported"

Biggest market for swiss watches

In terms of geographic breakup, Apple watches smartwatches sold the highest in North America with 7.4million units , while Asia Pacific contributed 6.7 million units, followed by western europe with 5.4million units.

contribution of swiss watches by regions and countries

swiss watches contribution by regions





Meanwhile About 1.2 billion watches are produced annually, according to the Federation of the Swiss Watch Industry’s estimates ..At company level, three Swiss watch and luxury groups – Swatch Group, Richemont, and Rolex – are the clear world market leaders. Together the three groups account for an estimated 45% ofglobal swiss  watch sales.
 Rolex leads the market with a share of 13.59% followed nby Omega and IWC, with a marketshare of  9.82 and  7.23%. Rado and Breitling  with 5.6 and 8.08%


Thursday, 25 February 2016

how search engines use historical and temporal link data for ranking



5 ways how search engines use historical and temporal data to determine SERP ranking


while we know that links are the basic bedrocks to ranking a site and count them as a vote for the site. This concept was actually based on " citation" where an established thesis was often cited during researching for another topic, which meant that the original thesis was a vote for further research.However how do search crawlers use these links as an information ?Know more below or click here

Index inclusion :Search engines need to decide what kind of information and pages to include in their index .They do this by discovering web pages by crawling the links, if the site has more links it crawls through those pages and this  process continues as the crawlers jumps from one link to another 

In short links are used to index most parts of the world wide web, by which  search spiders collect all the relevant information which is stored in its index .The second way how search engine discover webpages with links is through Xml site maps



However one caveat here is that " search engines" do not include links to webpages which it considers to be a low value  page.. They do this as  cluttering up their index with  low quality pages impacts the search results for the user.

Crawl Rate Frequency :The search spider crawls  a portion of the world wide web every day. How do  search engine decide which sites they need to visit, where to begin and where to end 
Google has publicly stated that page rank is an indicator in which order it starts to crawl . According to Google, it starts their crawl in reverse Page Rank order. So they visit the PR 10 sites,followed by PR 9 and so on and so forth. A page with higher page rank also gets crawled much faster and more deeper

Ranking :Everything being equal , the site with the highest number of backlinks will be ranked first 

Source independence : A link back from your own site to another site run by you is not an editorial vote for your site. A link from 3rd party independent site is seen as an " actual link" which  is a vote for your site.

Among the temporal factors used for ranking are 

1)When did the link first appear.
2)When did the link disappear or become a broken link
3)How long has the link been there: A link for a larger time is a ranking factor
4)How quickly was the link added : should be organic and gradual
5) The context of the page and links pointing towards them
6)Page Placement : links at the body content  as compared to a link page at the bottom is considered more powerful and impacts ranking



Wednesday, 24 February 2016

Jaq's Salt Water Charger Powers Up Phones

Jaq

 

MyFC Unveiled its Jaq – Fuel Cell Charger


A portable power bank which tends to use salt as well as water for recharging smartphones has been put up on show at the Mobile World Congress tech show in Barcelona.Swedish start-up MyFC unveiled its cool technology called Jaq at the CES on Jan 6. It is said that the device is small enough to be slipped into the back pocket and is fuel cell charger.

 It utilises saltwater and oxygen in converting chemical energy into electricity. The Jaq cell charger comprises of colourful rubber sleeve together with a credit card-sized `power card’ containing saltwater. It tends to work by causing detached chemical reaction between the saltwater – fuel and oxygen – oxidant wherein hydrogen molecules from the water tends to enter the fuel cell at the anode.

A chemical reaction shreds the hydrogen molecules of their electrons and the positively charged hydrogen ions are then capable of moving through the electrolyte where the negatively charged hydrogen electron delivers the current via the external circuit. Oxygen, in the meantime, enters the fuel cell at the cathode where the oxygen molecules mingle with the hydrogen electrons returning from the electrical circuit and the hydrogen ions that have been delivered through the electrolyte

Each Power Card Used Only Once


The outcome of the reaction tends to produce electricity and water which the device connects and utilises to charge the phone through a Micro-USB cable. It is said that one power card can generate 1,800 mAH amount of electricity which would be adequate in charging an iPhone 6S completely though each power card could be used only once.

The charger comprises of a credit card shaped `power card’ and a hollowed out port which is about the size of a smartphone. The card contained saltwater that tends to fuel electricity producing chemical reaction when one slips the card into the port.

To obtain electricity to the battery of the phone one needs to plug the phone into the port with a standard cable.The Jaq charger does not require plugging in, since it tends to utilise disposable cartridges in generating power. Chris Foxx of BBC had asked Bjorn Westerholm the company’s chief executive if it was better for the environment than using the normal battery based power banks.

World’s Smallest Charger


It is the world’s smallest charger of its type and the device has got its European unveiling offers up speedy phone charging without the need of plugging it in a socket. It is owing to Jaq powering itself with the help of its own PowerCard that is made of water and salt.

When this is stuck in the charger, some chemical magic hydrogen is created and the charge takes place. It tends to charge a phone just the same time a normal power outlet does. Though the chemical reaction and hydrogen may sound a bit dangerous, MyFC undertakes the responsibility that the chemical reaction seems to be completely safe and that it is also environmental friendly.

The MyFC Jaq seems to be compatible with all phones as well as tablets inclusive of iOS and would be made available in white, black and purple. Though the release date is not yet out, MyFC has put the Jaq up for pre-order wherein one can sign up to have PowerCards sent to them on a subscription basis.

John McAfee offers to Unlock Killer's iPhone for FBI

John McAfee

John McAfee to Break the Encryption on iPhone of Killer Syed Farook


John McAfee the creator of anti-virus software has stated that he would break the encryption on iPhone which tends to belong to San Bernardino killer Syed Farook. He made the offer in an article to FBI which was published by Business Insider. Apple had declined to abide with the court order asking it to unlock the device in-between opinion on whether the firm should be compelled in doing so.

Mr McAfee stated that he together with his team would undertake the task `with no charge’. The offer came up while Mr McAfee continued his campaign as a US presidential candidate for the Libertarian Party. He had claimed in his article that it would take them around three weeks. Graham Cluley, security expert had informed BBC that he was doubtful about Mr McAfee’s claim.

He stated that the iPhone is notoriously difficult to hack when compared to the other devices. Mr Cluley, for instance, had doubts on Mr McAfee’s idea that he could use `social engineering’ to work out the pass-code on the locked iPhone of Farook. It is a procedure wherein the hackers attempt to find out login identifications by deceiving people in disclosing them.

Back Door – iPhones Susceptible to Hacking


Mr Cluley said that `in a nutshell, dead men tell no tales. Good luck to Mr AcAfee trying to socially engineer a corpse in revealing its pass-code’ He added that the FBI is not interested anyway, they want to set a pattern that there should not be locks, they cannot break’. Mr McAfee, in his article had said that he was keen in unlocking the device since he did not want Apple to be forced in implementing a `back door’, a method wherein security services could access data on encrypted devices.

Tim Cook, chief executive of Apple had earlier commented in a statement that the firm did not want to co-operate. He discussed that introducing a back door would make all the iPhones susceptible to hacking by the criminals. Mr McAfee is of the belief that there would be a possibility of retrieving data from the phone by other means, but did not give much details regarding the same.

Tech Firms Support Apple


Those comprising of the Australian Children’s eSafety Commissioners, who had spoken to tech website ZDNet had stated that Apple would not essentially need to introduce a back door. However, the firm is only being asked to provide access to a single device. Other tech firms have supported Apple’s following a few days of debate on how it ought to respond to the request of FBI.

Sundar Pichai, Google boss had expressed his support for Mr Cook and recently chief executive of Twitter Jack Dorsey had added his approval through a tweet. Facebook had mentioned in a statement that it condemned terrorism and had solidarity with the victims of terror, though would tend to continue its policy of opposing requests of diminishing security.

It stated that they would continue to fight aggressively against the necessities for companies in weakening the security of their systems and these demands would develop chilling pattern as well as obstruct the efforts of the company in securing their products.

us states ranked by vc investments across saas start ups


California,New York and Massachusetts are among top 3 US states with the highest investment in SaaS  companies





With over $16 billion investment across Saas Companies, Calfornia VC investment exceeded vc investment of all US states combined by $6billion



US states Ranked  by   "SaaS" start up Venture Fund Deals

Caifornia VC firms have invested $16billion across saas start ups from 2011 to 2014. The VC deals in California was equal to all other US started combined. saas based VC firms invested a total of $11.7 billion,as compared to VC investment of $16billion in california. To read more click below



The Smartphone That You Can Bend

smartphone

ReFlex – Bendable Smartphone – Get Direction/Read/Play Games


Recently, researchers from the Human Media Lab at Queen’s University in Canada have revealed a lightweight model atthe Tangible Embedded and Embodied Interaction conference in The Netherlands. It is called ReFlex which is built to bend as well as vibrate providing users with an improved sense of third dimension on their phones while they tend to get directions, read or play games. The phone’s basic hardware comprises of a 720p display which has been developed by LG together with a small phone processor running Android 4.4 `KitKat’.

Users could bend it like a stem or tend to stretch it like a rubber band. Having a bendable phone, users could rapidly thumb through books; feel for highlighted passages or for dog eared pages. Moreover, the flexible phone could also help drivers in keeping their eyes on the road enabling the possibility of `feel’ turn-by-turn directions. With games like Angry Birds, players could also bend their screens stretching out a slingshot with vibrations which could make the phone seem like recoiling rubber band.

However, the most amazing feature of the latest bendy model is that it is basically shatterproof. The secret behind the phone which is quite durable and lightweight is that the screen is plastic and not made of glass.

Android Device Stronger to Bend to 40 Degrees


The trade-off could be a deal-breaker in smartphone industry which has been dominated by glass screens. The phone tends to use off-the-shelf parts meaning a leap to market would not be a big jump. Professor Roel Vertegaal leading the team behind the phone comments that it is technology twelve years in the making. He further added that the phone is mass produceable as it is today.

Vertegaal whose academic research had been sponsored by the Canadian government and Canadian touch tech company, Immersion Corporation will not be building a consumer phone. He states that he will leave it to the Samsung’s and the LG’s of the world. According to his estimates it would take around three to five years in bringing the tech to the market.

The LG OLED display in the phone seems to be the same tech in bendable TVs and for $100, these LG smartphone screens could cost $25 more than a typical glass screen though would make the latest Android device much stronger to bend up to 40 degrees. The phone tends to be more flexible towards the centre with semi-rigid ends, where the 1,280 x 720-pixel display has a bit inferior resolution than an iPhone 6 at 1,334 x 750 pixels.

Flexible OLED Display


ReFlex seems to utilise a Flexible OLED display from LG alike to some of the rollable screens shown recently at CES this year which enables the user to bend it as desired. It is the first flexible phone with the combination of bend input with standard multi-touch abilities which means that one could use touch interaction such as a typical smartphone and also interact with definite apps on bending the phone.

Vertegaal has mentioned that when this smartphone is bent down towards the right, pages tend to flip through the fingers from right to left just like a book. With more extreme bends it would speed up the page flips and users can feel the sensation of the page moving through their fingertips through a detailed vibration of the phone. This would enable eyes-free navigation for the user, thus making it easy to keep track of where they are in a document.

Top PC Monitoring Software 2016


software
PC monitoring has become a necessity, especially in the organizations where there are a large number of employees with digital privileges. There’s no possible way for you as an employer to keep an eye on each and every individual, and this is exactly what employees take advantage of. They waste their time at work doing mundane activities like watching random videos, chatting with people, checking their social networking profiles, etc. This of course affects the overall performance of the company, which just isn’t acceptable in a competitive market. This is where PC monitoring software can really come in handy as it lets you keep tabs on how employees are using their computer and internet privileges at work. If you’re an employee who’s looking to get rid of the headache related to employees wasting time at work, we’ve got just the software lined up for you. Take a look and pick the one that best suits your needs.

Mobistealth

Mobistealth comes with a slew of awesome features that really puts you in control of your employees’ digital activities. It records every single keystroke typed by the employees during work hours, allowing you to know exactly what they are up to on their computer. Furthermore, there is a screenshot feature that takes pictures on regular basis. That’s not all though as Mobistealth also offers Skype logs. It’s no secret that Skype is a go-to platform for workplace chats, so having an eye on it certainly helps. Apart from the aforementioned features, this tool also comes with Facebook, Yahoo and Gmail chat logging, enabling you to see what’s being conversed. It even empowers you to keep tabs on the emails exchanged via Yahoo, Gmail, and Hotmail accounts. All of Mobistealth’s features are pretty important and if you’re on the hunt of a powerful monitoring software, then this one comes highly recommended.

Spyrix Personal Monitor

Spyrix Personal Monitor is another brilliant monitoring software. It is not as feature-rich as Mobistealth, primarily because its developers have put more of an effort on key logging. It can give you information regarding the passwords, created files, started applications, system logon, system log off, and so much more. Other than that, it provides you with the option of monitoring browsing activity, which is also a great help. With the help of this feature, you can see what sites your employees are visiting, and if you see too many random URLs there, then it is a pretty good sign that they have their priorities all wrong.

All in One Keylogger

As the name suggests, this tool also focuses more on key logging. The best part about this software is that it’s not very complicated. It is designed with the convenience of not so tech savvy people in mind. Even if you don’t possess knowledge about monitoring tools, you will still be able to operate All In One Keylogger without a hitch. All features of this software are presented upfront so that the users can see what’s on offer and then avail them without a problem. Some important features in this tool include key logging, web browser logging, multi-language support, website blocking, and so much more. If you are not good with technology but are really interested in deploying an employee monitoring solution in your workplace, then you should give All in One Keylogger a shot.

Tuesday, 23 February 2016

these are vc firms with highest exposure across the fintech sector


The list of VC investors which the highest exposure across Fintech sector

  1. Google Ventures 
  2. Intel Capital 
  3. Citi Ventures 
  4. Mastercard wordwide 
  5. Funders Club 
  6.  American Express Ventures
  7.  Ebay 
  8. Cyberrentagent ventures 
  9. Renren
  10. Credit Saison
  11. Bitcon Shop 
  12. SK Telecom Ventures

    These listings does not include conventional financial  investors like Banks, Insurance firms and other financial services companies.The list shows VC firms that have been traditionally active across the Tech and IT services, which have recently started to invest across Fintech recently
    Google Ventures, is no 1 most active across the Fintech industry with investment across 25 start ups, followed by Intel Capital  with morethan 10 investments into the space



    Fintech Companies have started to grow big time after the 2008  financial market crash as as policymakers  started to concentrated on making finance safer.However apart from the regulatory spotlight, Fintech companies have  started to revolutionized the financial services with innovative products and services across such areas as mobile payments, online transactions , peer to  peer lending payments, big data, using technology to change financial alternatives.

    Goldman sachs estimate the worldwide fintech pie to be worth $4.7 trillion, with North America projected to reach $19.9 billion in 2017.
    According to  to  statista  around 29% investments across Fintech were in the banking &corporate finance space. Read about fintech start ups in Israel  more below after the click





  Apart from US, Israel is the next biggest and hottest market in the fintech ecosystem which has seen many start ups going on to become the leaders across fintech vertical Israel vased Actimize is the leader across the area of fraud prevention, FundTech in the area of transaction banking solutions, Retalix in the area of point-of-sale, Trusteer in the area of cybercrime prevention, Sapiens in the area of insuranc First, the fintech disrupters will cut costs and improve the quality of financial services. They are unburdened by regulators, legacy IT systems, branch networks—or the need to protect existing

top 10 private equity firms investing across financial services



private equity firms investing on finance start ups


>



The list of  the top 10 PE firms across the fintech & financial sector with the highest fund size.Among the top 3 include  HML investments ,New York Life Partners and DB capital  



the highest paid top 3 chief information officers








The comparison chart shows the most highly paid chief information Officers( includes salaries and stocks and shares)


With over $40 million annual compensation,Walgreen's  Timothy J. Theriault , the  Global Chief Information Officer and Executive VP   of Walgreen Boots Alliance happens to be  he highest paid CIO  

The  second and  the  highest paid CIO ,with a total salary of $36 milllion happens to be Mr. Robert B. Carter , The CIO and Divisional Executive VP at Fedex . A veteran at at Fedex he has been in the company for the last 16 years as EVP - FedEx Information Services and CIO

Trent Taylor , the CIO at Hhgregg is at number 3 with annual compensation  of over  $12 million,Mr. Taylor has over 25 years of experience in the information technology field, including systems architecture, data center infrastructure, networking, applications and e-commerce.

Monday, 22 February 2016

list of ad networks acquired by google ventures

.


"list of top 10  most expensive ad networks acquired by google"



So far Google has purchased 16 ad networks, which include online as well as mobile ad networks .Google's double click acquisition was the most expensive , followed by Admeld .

Google acquired  double click for  $3,100,000,000, while Admeld  was the  second most expensive advertising network  to be acquired by Google for  $400,000,000
Google's purchase of ad networks gives it enormous reach in display advertising . While AdSense network enables publishers to run relevant ads - including text, image,rich media and video ads


across their websites, The ad networks plays a different role .The ad networks  aggregates  a large number of ad networks (over 65 at last count, including more than half of the largest 20 networks in the US)  which competes in real time auction instead  of  using  historical data, or trying to negotiate prices upfront (usually at a discount). It chooses the highest value ad from these competing networks at each moment,

Google acquisition of ad networks integrated its  AdSense network to work with DoubleClick, Admeld , Invite media and other ad networks t help publishers  more precise metrics  which helps them to judge the effectiveness of their campaigns

google's most expensive acquisition in united kingdom




"list of acquisition of UK start Uk start ups by google ventures"

LIST OF STARTUPS BOUGHT BY GOOGLE IN UNITED KINGDOM;

 Out of 8 start ups acquired by Google, the biggest  acquisition in UK or for that matter in Europe was  of  DEEP MIND technologies.
DeepMind technologies, a London-based artificial intelligence firm which specialises in machine learning, advanced algorithms and systems neuroscience was aquired by Google Ventures, the VC group of Google..  Google paid  a hefty amount of  £400m ($650m) for  acquisition of DeepMind



Deep minds  has created a neural network that  might be able  to access an external memory like a conventional Turing machine, resulting in a computer that appears to possibly mimic the short-term memory of the human brain.Deep Mind Technologies plans to develops technologies for e-commerce and games, and plans to  develop computers that think like humans.

Deepmind recent made headlines when it announced  that its alphaGo program had successfully beaten  a human professional 

The two-year-old artificial intelligence startup was founded by former child chess prodigy and neuroscientist Demis Hassabis alongside Shane Legg and Mustafa Suleyman.

Sunday, 21 February 2016

Tor- 'Mystery' Spike in Hidden Addresses

Tor

Tor/The Onion Router – Browse Through Web Anonymously


Exceptional spike in the number of hidden addressed on the Tor network has been identified by security expert and Prof Alan Woodward at the University of Surrey had spotted an increase of over 25,000 onion `dark web’ services. Prof Woodward had commented that he was unsure on how best to explain this sudden boom but one possibility was that it could be a sudden swell in the popularity of Ricochet, which is an app that tends to use Tor in enabling anonymous instant messages between users.

 The Onion Router or Tor enables users to browse through the web anonymously by routing their connections through a sequence of various computers and in the process encrypt the data. Prof Woodward had mentioned on his blog that there had not been a similar increase in .onion sites in the history of Tor network.

He had informed BBC that something unprecedented has been happening though at moment that is all what they are aware of. Dr Steven Murdoch at the University College London had mentioned that it is hard to know for certain what could be the reason for the jump. One of the objectives of Tor is to protect people’s privacy by not revealing how they are using Tor.

Rise in the Use of Ricochet - Chat App


Another interest defined by Prof Woodward was that inspite of the rise of hidden addresses; traffic on the network had not perceived a similar spike. He informed that it could be a coincidence that the spike could be due to a network of computers called a botnet unexpectedly using Tor or the hackers had been launching ransonware attacks.

It could also be the outcome of malware which could be creating unique .onion addresses when it tends to infect a user’s computer, though there seems to be no evidence for it. Prof Woodward also mentioned that he is of the belief that a rise in the use of an anonymous chat app known as Ricochet that has just received a huge positive security audit could be the most probable explanation.

Dr Murdoch had stated that this could be a possibility, adding that the spike could also be the result of someone running an experiment on Tor.

Ricochet Use Tor Network in Connecting Two Users


Ricochet tends to use the Tor network in setting up connections between two users who prefer to chat securely. The app’s website states that the same is accomplished without disclosing the locations or the IP address of the users and instead a username, each of the participants tend to receive a unique address like `richchet:rs7ce36jsj24ogfw’.

Though Ricochet had been available for some time, on 15 February reasonably positive results of an audit by security firm NCC Group had been published. Prof Woodward had mentioned on his blog that every new user of Ricochet would have to create a unique onion address while setting up the service and that could account for the flow in services. But he also admitted that 25,000 new users in just a matter of few days for the app, could recommend remarkable growth.

5 tips on how to make your content management system friendly for seo



5  Ways to ensuring SEO benefits while deciding your content management system


While looking to publish a website many webmasters might wonder if the selection of CMS plays a role in seo and how to ensure that " you fine tune your CMS to make it SEO friendly
The truth is that CMS  does play a huge role in seo. The top 3 CMS  happens to be Jhoomla,Drupal and Wordpress, out of which wordpress has the largest marketshare
Lets take a look on the the basic things you need to keep in mind while deciding the CMS and how to ensure your CMS functionality plays a big role in ensure your search visibility


TITLE TAG CUSTOMIZATION : A search engine friendly CMS has to ensure that each title tags are customised based on the url not only at a page level but also enable rules for particular webpages Sites that run on blogger and wordpress often use the date as a url. xyz.wordpress/post/21-02-2016 . This is seo unfriendly and should be avoided. Replace the date in the url with the post title . The biggest issues CMS faces is not to customise the title tags with the url or the theme of the post
 For example if you have a site on cameras ..and your url is .www.a1cameras4 you.com , and your CMS only allows you to create the title , where the tag always has to start with your domain name followed by a colon, followed by the article you post, Your on the brink of seo disaster

Lets see the example below. In the above site , a post on the top 10 cameras has a url which is a1cameras4you.com/top-10/cameras If your CMS allows you only to create your title which starts with your website name for example in the above post ( the  title shows A 1 cameras for you  repeats for every ul and post , then you  are treading dangerously .You should be able to customize each url with customized title and meta tags

PAGINATION CONTROLS :Pagination can be the bane of website search rankings so controlling it with inclusion of more items per page and  more contextually relevant anchor text  is recommended .Instead of next or previous page at the bottom of   you can use titles like "more eCommerce news", or latest trends on online marketing

 301 FUNCTIONALITY: Many CMS lack this critical feature which plays an very crucial role in redirection of content when necessary.. Using 301 permanent redirection tells the search crawlers to treat a non www version and www version as the same url, therefore informing the crawlers to pass on the benefits and link juice to the same url. 301 redirection is used when you have a new domain or have a newer version and wish to pass on the search benefits to the new one, thereby helping to preserve the search benefits of the the older version.This also helps dodging from keyword cannibalization

IMAGE HANDLING :mage Handling and alt attributes:: alt attribute are a must have feature , which is used as an anchor text when you use an image link.( However remember on terms of search preference text links are more advisable than image links.) However if you are using it, ensure that the CMS have this alt tag functionality when helps search engines understand " the relevance the content of your image . Images in CMS navigational elements should preferably use CSS image replacement rather than merely al tag attributes

STATIC CATCHING OPTIONS :Static Catching options is a must for the CMS you are considering for your website: Many CMS currently offer caching options which makes perfect sense if a page receives consistently higher traffic from social or news portals. A bulk CMS often make extraneous database connections which may increase load and and overwhelm the server if caching is not in place.. This might affect and lessem your potential inbound links.


MULTILEVEL CATEGORIZATION STRUCTURE:.If your CMS does not allow you to nest subcategories into categories , subcategories to internal categories, rethink your CMS options. This limited functionality of the CMS will not allow you to use your site structure and internal hierarchical linking structure.

 META NO INDEX FOR LOW VALUE PAGES : even if you use rel= NoFollow for your internal pages , other sites might still link to you, or some low value pages might rank ahead of the pages you intend to optimize for . Check if your CMS allows to you use NoIndex  for those pages which have a low value, like about us, contact us or FAQ's 
This  iis a better way to handle these low value pages which you do not intend to show up in the SERPs

Britain's top 10 best seller consumer electronics products in Amazon

Amazon's Kindle  Fire Stick, and Kindle Fire ( 7inch display with 8gb) along with Kindle paperwhite  6 inches, high resolution are among the higest selling products at UK Amazon.E


The Kindlle Fire TV stick has been UK's Amazon's best seller since the past 256 days, while The Kindle Fire has been the second most sought after gadget at number 2 for 184 days. Kindle stick overall has been the highest selling consumer electronic items online since the last 8 months on Amazon
The kindle stick allows Tens of thousands of TV episodes and movies, from Amazon Video, Netflix, BBC iPlayer and more, plus games, music and apps. 8 GB of storage and 1 GB of memory, plus a dual-core processor for fast streaming and smooth performance. 
However its not all good news for Tablet manufacturers SA new report published by IDC shows that worldwide tablet shipments have shrunk for the first time since 2010.

Saturday, 20 February 2016

why should you stop commenting on blogs

Many site owners use Spam tactics by creating bots that crawls around the web looking for open forums and blogs  where its easy to add comment  and get a backlink to their website , which leaves behind automated comments bordering on spam, which are most of the times, not related to the content of the site in question
The great majority of these sites are deleted  by the  rel=NoFollow  tag or by the blogs software content management systems. however the spammers do not care as they operate on a huge scale



Reason number 2 why you should avoid comments across blogs and forums is most of the times, the comments do not have any relevance to the topic. If you do have to comment ,ensure you stick on the context and relevance, this way. For Example sites like quora and a  the seo forum  like webmastertools, has user generated content which is editorially very sound.While blog and forum site owners might use rel=NoFollow tag, as we saw in the previous post, Search engines can decide the quality of the post and the site which is linked too, while the no follow tag might be used, it only stops passing of the link juice to the page linked to and not the indexing

Link Farms  and Number of links: due to the nature of the blogs and forums, just anyone can leave behind a comment, irrespective of relevance or being topical. Over a number of time Forums and Blogs  acquire a huge number of links, with search engines viewing the links as not relevant or even ignoring  the links .Worse a webmaster that has many related sites , might ask a link back in exchange for 10 other sites he owns.  This way all links are interlinked and your site might be a part of the "link farms" which google penalises very heavily

5 facts about rel=no follow attribute to keep in mind before optimizing your search

In 2005 all 3 search engines,Yahoo, Bing an google agreed to support an initiative to reduce the effectiveness of automated spam
Unlike the meta robots version of NoFollow, a new directive was employed as an attribute with within an or link tag to indicte the fact that the linking site " does not vouch for the quality of the linked page.


With In short the rel=nofollow tag was intended for search spiders not to pass on the link juice to the third party link which the website is linking to originally this enabled to " stop automated links appearing o blogs as comments, forums and other user generated content siteswhere links were liberally splashed around, to fool the search engine to crawl and pass on the usual benefits of the search benefits


 In due course of time" it was seen" most website owners used content from other sites, but used the tag rel=no follow" to stop the link juice flowing to the linked page. However google guidelines say that " only paid links" or links attained through dubious methods should be used as rel=noFollow tag. Google also says that " when linking a site " which is editorially good" you should not be using the " rel=no follow tag.


Please note that although the rel=noFollow tag is used to indicate search crawlers from passing on the linking benefits, it does not stop indexing the link( despite the lack of semantic logic)
You can implement the no Follow link as follows a <a href="http://www.onlinemarketing-trends.com/" rel="NoFollow">


In  2009, Matt Cutts wrote a post which suggests that" link juice " associated with NoFollowed link is discarded rather than reallocated , In theory you can still use rel=NoFollow  many times you want, however using it on internal links does not bring the type of benefit webmasters and seo preference which it once used to

One word of caution, is  using it many times across external links too many times,can be flagged as a site being overoptimized. the thumb rule here is out of 10 posts use no follow for 7 of them , while for posts which  you use from third parties" no do use rel=no Follow for sites which are editorially seen as very strong

santa barbara real estate median sales price in 2016

.






At $537,250, Santa Barbara County homes have the ninth-highest median sale price of all counties in California. With a 1-year price forecast of 6.30%, home values in Santa Barbara County are expected to have one of the lowest appreciation rates compared to counties in California, where prices are expected to rise 9.32% on average

Salesforce ups its arsenal with with the acquisition of machine learning start up PredictionIO

" how machine learning is changing the world of big data"

Machine Learning and its application across Industries


Salesforce with its acquisition of Machine Learning start up, salesforce looks to stock ups its cloud based data science business by strengthening its arsenal further. Salesforce has recently acquired similar machine learning start ups RelateIQ and Tempo AI, among other companies.Machine learning is a predictive and powerful recommendation engine which uses algorithms to crunches tons and petabytes of unstructured data into meaningful insights..Its application in Big data is immense. Click below to see applications of machine learning in real life

The simplest examples of machine learning in action are aggregator sites like like reditt or quora, or google news where consumer generated questions are automatically grouped by algorithm and arranged by topics and are automatically classified into meaningful categories. News aggregators are examples of real time machine learning .
Amazon is one of the pioneers in use machine learning.. with the concept of " using social proof" to encite users to buy related products

the top 5 start ups that received venture funding this week

The following are the start ups  that got funding this week

  • Snapbizz: Retail technology firm
    Investors : Former CEO of the TATA group Ratan Tata
    Amount : Undisclosed
  • LodgIQ: Hotel revenue management systems
    Investors:Highgate Ventures and Trilantic Capital Partners.
    Amount :$5million
  • Jugnoo :aggregator of auto rides
    In
    vestors:Led by personal HNI TV and film actress Saumya Tandon.
    Amount : Indosclosed
  • Diligent Corp: Maker of boardbook apps
    Investors: Insight Venture
    Amount :$624 million
  • Qualia Media : SasS start up
    Investors : 15 investors led by Verizon Ventures
    Amount : $5.5million

    Scroll down or click below to see  the other Vc deals this week




  • Hometeam, $5 million: seniors home care provider
    Investors:Kaiser Permanente Ventures
    Amount: $5 million

  • Operative: ophthalmic app that allows users to get an eye check via its app
    Investors:Led by Jump Capital along with Tribeca Venture Partners, Pritzker Group Venture Capital, Chicago Ventures,
    Amount : $6million



Friday, 19 February 2016

Automatic Bug-Repair System Fixes 10 Times As Many Errors as Its Predecessors



debug
The researchers at MIT (Massachusetts Institute of Technology) have devised a new system that is going to look for and detect bugs in a computer program and then run a repair process to fix it up automatically. This new system can browse through computer programming languages that are open-source in nature and learn about their general properties. This learning would then be used by the system to debug or make repairs for computer programs that might be of a different set.

What is it exactly? How does it function?

In simpler terms, this is a machine learning system that has been developed to fix up bugs that come up while developing various sorts of software. The system functions by borrowing the functionalities of various other applications or computer programs. The researchers at the institute are busy in experimenting so that they are able to take this hybrid system to a new level where the application will absorb the best components of all the other computer programs or languages.

This new and automatic debugging program has been named as the CodePhage and it will effectively patch program errors by picking up codes from another program (referred as the donour application) and paste into the program under diagnosis thereby make it bug free. The best part is – CodePhage is being developed in such a way that it will not be necessary for the repair code to be of the same programming language. In fact, the patch can belong to any programming language and the repair work would still be carried out. Not only that, the application would also have a function that will do a re-check and a verification to make sure that the bug has indeed been fixed. The system also makes use of DIODE (Directed Integer Overflow Discovery Engine) for the generation of crash inducing input(s).

The fate of CodePhage

Those who had worked on this wonderful project have claimed that this automatic bug repair system was put to test against seven of the commonly used open source languages that had bugs in it. It was found that this new app had successfully repaired the faulty code in a span of 10 – 2 minutes for each. And, this was a standard result for all such instances.

One of the interesting things about this experiment by the MIT researchers was that it was a standard approach where one could actually learn from a certain set of programs and apply those properties or knowledge for another or a different set of programs. Recognizing the correct code is very important as it will have a huge impact in the software engineering domain. Though this is just the beginning and is the very first application, but the experts believe that it does have the potential of becoming an excellent tool that going ahead.

The crucial aspect of this experiment with machine-learning systems was the analyzing and selection of the ‘feature set’. Thirty prime characteristics were identified and then the program was developed to evaluate these characteristics.