Skip to main content

The History Of Search Engine Optimization

Search Engine Optimization is a marketing strategy that analyzes what people are searching for on the Internet. The procedure involves determining what keywords or what keyword phrases people are using to enter into the search box in looking up any particular subject.

Optimizing a website might also involve editing the verbiage in the website itself to better reflect a more focused content. If people are searching for a specific keyword, then the information that appears should at least shed some light on that topic. So the editing of the actual content of the website, reworking the HTML code, and adding more backlinks to give the site more relevance on the internet can add to the credibility of the site.

All of this began to occur back when the search engines began to send a spider to new websites so they could be indexed and cataloged on the server of the search engine. Information about the page, its contents and relevancy to the subject, the number of links coming back to the site, and weighting for certain words and overall weight of the page in regard to relating information is all considered as well.

As web site developers began to catch on the workings of the search engines in indexing and classifying websites, they began to work a little harder to make their sites become more appealing to the search engines. The term “search engine optimization” came into common use around 1997.

Early optimization relied on meta tag and keyword density placement, and promised some quick success for awhile until the search engines determined that this type of manipulation was not to be allowed because it place too much control of the wrong kind in the hands of the webmasters. The objective of the search engines was to provide pertinent information in relation to the search terms imputed by the viewer, rather than to have stuffed keywords be the prime factor of search results.

The search engines came back with more complex algorithms, which made it more difficult for webmasters to be too quick to dominate a niche or a broader subject. The plan of the search engines was to make a truer representation of the search requests appear at the top.

Two Stanford students established a term called PageRank, which provided a true result of what people were searching for. They also scored the value of links from page to page as being a major determinant as to how popular a page was in relation to others.

In 1998 these two students founded Google, which began to gain a following because of its simplicity and well-designed search capabilities. The sophistication of the Google search engine began to outpace the “gamers”, or those who would try to outsmart the Google analytics in order to rank well.

It has been a constant battle between Google and webmasters as each plays the algorithm game. It has been found, however that if a Webmaster will just give google what it wants, then the chances for ranking improves very quickly. The main ingredient that will carry the day is good content that gives a good description on the webpage of the subject that the keyword is asking for. All the scheming and plotting doesn’t do all that much good. The emphasis should be the narrowing of the subject matter down to a smaller niche so the subject matter can be more focused upon what the viewer is looking for.

Comments

Popular posts from this blog

Password Crackers

There are password crackers for almost every password-protected system available. A quick search on the Internet identifies password crackers for Windows NT, UNIX, Novell, PGP, Word, VNC, pcAnywhere, Lotus Notes, Cisco routers, WinZip, and many others. Password crackers can be effective tools to use during penetration testing to help ensure users are selecting strong passwords. If a strong password is used, password crackers can take weeks, months, or even years to crack it. If a weak password is used, the cracker could succeed in hours, minutes, or even seconds. In this chapter we concentrate on OS-specific password crackers and describe their use during testing. L0phtCrack URL: www.L0pht.com Client OS: Windows 9x/NT Target OS: Windows NT Price: Under $100 Description:  L0phtCrack is the premier NT password cracker. The first version provided administrators the ability to extract user names and encrypted password hashes from the SAM database and perform a dictionary and brute for...

How AI can change the world?

There are many ways in which AI (artificial intelligence) can change the world, both positive and negative. Some potential impacts include: Improved decision-making: AI algorithms can analyze large amounts of data quickly and accurately, allowing businesses and governments to make more informed decisions. Increased efficiency: AI-powered systems can automate tasks and processes, freeing up human workers to focus on more complex tasks. Enhanced healthcare: AI can be used to analyze patient data and diagnose diseases more accurately, improving patient outcomes and reducing healthcare costs. Increased safety: AI can be used in transportation, such as self-driving cars, to reduce accidents and improve safety on the roads. Environmental benefits: AI can be used to optimize energy usage, reducing waste and helping to reduce greenhouse gas emissions. However, there are also potential negative impacts of AI, such as job displacement and the potential for AI to be used for nefarious purposes, s...

Nmap

URL: www.insecure.org/nmap/ Client OS: UNIX, Windows NT (ported by eEye Digital Security) Target OS: TCP/IP networks Classification: Discovery tool Price: Free Description:  While Nmap is a most powerful port scanner, it can also serve as a more sophisticated ping sweep utility. In this chapter, we discuss only Nmap's ping capability. If the target network is blocking ICMP ECHO requests and replies, Pinger and other normal ping utilities will not be able to identify any active systems. Additionally, the target network may have the most crucial systems configured to not respond to ICMP ping but may allow some nonessential systems to respond to ICMP ping to trick attackers. By finding some interesting hosts that respond to ping, the attacker may not think to use a more sophisticated ping tool to identify hosts not responding to ICMP ping. Nmap provides the capability to perform TCP pings on TCP ports rather than the usual ICMP that everyone associates w...