Skip to main content

Home/ Groups/ DISC Inc
jack_fox

Why You Might Not Want a Featured Snippet - 0 views

  • Due to the fact that the calls immediately stopped coming in after we got rid of the featured snippet, it tells me that users put a tremendous amount of trust that a featured snippet is authoritative. Why else would they completely ignore the fact that the website you land on after clicking the featured snippet is clearly for a company called Sterling Sky?
  • Our title tag that appeared in the featured snippet has our company name in it. Not Google. Hundreds of users either did not bother to register this or, going back to the first lesson, the illusion that the featured snippet provided, trumped the fact that the title tag clearly tells them that we are Sterling Sky.
  • We also learned how users skim pages rather than read them fully. Our phone number isn’t even listed anywhere on the page except for the footer! So they had to scroll all the way down to the bottom and breeze past our content before calling us.
  • ...2 more annotations...
  • users just wanted help no matter who it comes from, because of their frustration with GMB support.
  • often that whole SERP is made useless by the featured snippet
jack_fox

Republishing Content: How to Update Old Blog Posts for SEO - 0 views

  • republishing any old post isn’t going to work. You need to find those that are underperforming because of content issues.
  • It’s sometimes because those that outrank you have more high-quality backlinks and ‘link authority.’To check if that’s the case, search for your keyword in Keywords Explorer, scroll to the SERP overview, then look at the Domain Ratings (DR) and URL Ratings (UR) of the sites and pages that outrank you.
  • If product, category, or landing pages are outranking you, then maybe searchers aren’t looking for blog posts.
jack_fox

Gary 鯨理/경리 Illyes en Twitter: "Googlebot ignores the non-standard crawl-delay... - 0 views

  •  
    "Googlebot ignores the non-standard crawl-delay token in robotstxt files, it has no effect at all. For slowing Googlebot crawls down, use Search Console or submit a problem with Googlebot."
jack_fox

- 0 views

jack_fox

What To Do If You Lose Your Two-Factor Phone - 0 views

  • Other services even let you remove your two-factor security through email. They’ll send you an email at your registered email address and let you click through a few dialogs to remove the protection and gain access to your account. That’s not good for security—it means an attacker with access to your email could easily remove your two-step verification—but many services do it anyway.
  •  
    "Other services even let you remove your two-factor security through email. They'll send you an email at your registered email address and let you click through a few dialogs to remove the protection and gain access to your account. That's not good for security-it means an attacker with access to your email could easily remove your two-step verification-but many services do it anyway."
jack_fox

Get verified on Google - Knowledge Panel Help - 0 views

  • Verification also allows some to participate in Posts on Google.
  •  
    "Verification also allows some to participate in Posts on Google."
jack_fox

How to Encrypt and Password Protect Files on Your Mac | The Mac Security Blog - 0 views

  • If, for whatever reason, you cannot password protect the file itself, then the file needs to be compatible with another operating system or any of several scenarios; wrapping the file, files or a whole folder in a .zip archive can come in handy. 
  •  
    "o existing Wi-Fi network required, so this will work even in the middle of a park. The sender and recipient Mac create a network between them which is encrypted and secured by firewall, so it's a secure connection even if other Macs are within range and"
jack_fox

How to Use Apple's Built-in Features to Encrypt Files and Folders | The Mac Security Blog - 0 views

  • If you have a drive that already contains data, and you don’t want to erase it, you can still encrypt it
  • Encrypted disk images let you store files securely on cloud servers, and you can even use them to send sensitive files via email.
  • You can also encrypt PDF files, using macOS’s built-in print to PDF option
jack_fox

8 Best Practices for Working Remotely | CI Security - 0 views

  • be sure your device is set to have all stored data encrypted in the case of theft.
  • USB Data Blocker
  • secure Wi-Fi, a VPN, encrypted drives, anti-virus, and endpoint protection,
jack_fox

DNS Hosting, Registration, and Web Hosting.. Aren't They the Same? | DNS Made Easy Blog - 0 views

  • When evaluating providers look for: Redundancy: many points of presence (PoP) Reliability: partners with top tier data and bandwidth providers Security: multi-factor authentication Support: availability and thoroughness
  •  
    " A domain registrar is the company you purchase your domain from. Once you purchase your domain, the registrar will (usually) also host your IP address on their name servers. This is called DNS hosting. Your DNS host is responsible for holding the map that connects your domain name to your IP address. We typically advise against keeping your DNS hosting with your registrar, because the free (or low cost) hosting service will only offer bare minimum IP to domain name resolution. "
jack_fox

- 0 views

jack_fox

- 0 views

Rob Laporte

Consolidate duplicate URLs - Search Console Help - 0 views

  • Which is my canonical URL, according to Google? Use the URL Inspection tool to learn which page Google considers canonical. Note that even if you explicitly designate a canonical page, Google might choose a different canonical for various reasons, such as performance or content.
Rob Laporte

Block crawling of parameterized duplicate content - Search Console Help - 0 views

  •  
    "Open the URL Parameters tool"
jack_fox

How to Find Your WordPress Page ID and Post ID: A Step by Step Guide - 0 views

  • Every piece of content on your WordPress site has an individual ID number. This includes pages and posts, as well as media files, comments, categories, tags, users, and more. These ID numbers help to organize content within your site’s database, and enable you to find, query, and target particular content.
jack_fox

Google Says Many Manual Actions Are Algorithmic Now - 0 views

  • John Mueller: A lot of these manual actions have evolved over time. Where we would say well we need to do this manually and at some point we figure out how to do it algorithmically. And it kind of evolved into that direction.
  • Because the web is just gigantic and we can't manually review the whole web. We have to find ways to do as much as possible algorithmically. And in many cases there's still weird things out there that we don't catch algorithmically that maybe we do have to take manual action on.
  •  
    "John Mueller: A lot of these manual actions have evolved over time. Where we would say well we need to do this manually and at some point we figure out how to do it algorithmically. And it kind of evolved into that direction. "
« First ‹ Previous 721 - 740 of 3586 Next › Last »
Showing 20 items per page