New breakthroughs in cyber security by Polyverse will create new jobs for programmers and network administrators.

The “WannaCry” virus, which took down, among others, the National Health Services’ computer network in the United Kingdom last May, was formally labeled a North Korean plot by the U.S. last month. Lost in the foreign intrigue were some basic questions. Why had computer administrators in the U.K. and elsewhere not applied the software fix issued by Microsoft months earlier to protect the vulnerable Windows software? Or was the U.S.’s National Security Agency partly to blame for stockpiling malicious code?

Perhaps most important, why hadn’t billions of dollars worth of computer security gear from leading cyber protection companies such as Cisco Systems (ticker: CSCO), FireEye (FEYE), Palo Alto Networks (PANW), and Symantec (SYMC) foiled the attacks?

Not too surprisingly, the founders of a three-year-old cyber security start-up called Polyverse are convinced their new system “would have completely prevented WannaCry,” says Alex Gounares, the company’s CEO.

The chief technologist of Microsoft’s (MSFT) online unit back in the 2000s, Gounares—who was Bill Gates’ personal technology advisor—says the hackers’ success relied on a simple asymmetry: It costs far less to attack a computer system than it does to protect one. Existing systems build the equivalent of walls and moats around a castle, the so-called firewall that sniffs out intruders and tries to block access. The defenders must guess where they might be attacked and try to anticipate every possibility. It’s a costly and never-ending process.

The problem is that attackers can spend all the time they want studying the situation, looking for holes or ways to get around the protections. If anything, new discoveries have made it easier for hackers far less sophisticated than WannaCry’s creators to take control of a computer.

Polyverse, which has gotten good reviews for its fledgling system, tries to shift the balance of economic power back to the defenders. By replacing the basic instructions inside a computer program with alternate instructions, Polyverse keeps scrambling the code. Doors and windows familiar to hackers disappear quickly, raising the stakes—both on speed and spending—for attackers.

“Dollar for dollar, offense has been winning,” despite billions spent on computer defense, says Bryan Smith, who worked for six years at the National Security Agency and now runs a tech incubator called Bantam Technologies. “Polyverse actually does switch the advantage back to the defender.”

If #Polyverse or a rival does succeed, it will mark the latest shift in the decades-long war for control of computer networks. A computer operates via a series of instructions written by a programmer telling the microprocessor, the brains, to carry out one basic function over and over. That function is to take some values stored in its memory circuits, to perform an operation on them, such as addition, and stick the result back in memory. A hacker tries to gain control of a computer by replacing the programmer’s series of instructions with his own, either changing the operations specified or sometimes changing where in memory the chip fetches and stores values.

One of the last big strategic shifts in the war came in 2007, when a computer scientist named Hovav Shacham showed it was possible to use a computer’s own code against it without injecting new code. Code is a long string of ones and zeros, and the computer chip only knows the instructions by knowing how to divide the ones and zeros into the right sequence of bits that make up each successive instruction. But Shacham realized he could direct the chip to divide the ones and zeros differently, thus changing the instructions.

To complicate hackers’ task, Gounares, 46, conjured ways for them to find not the traditional string of instructions, but a completely different set. Polyverse’s technology is what’s called a binary scrambler. It mixes up the ones and zeros of a program but lets the users’ tasks be completed undisturbed. The exercise turns the attackers’ own game against them, employing different instructions before the attacker can.

AT MICROSOFT, Gounares was well aware of the common complaint that Windows was a “monoculture,” a uniform system that attracted a mass following of developers but also armies of attackers aware of the software’s vulnerabilities. At Gates’ famous retreats to contemplate high-level software issues, the two would occasionally discuss using epidemiology, or the study of the spread of disease, as a guide.

Gounares, who is fond of nerdy references, poses the question, “Why hasn’t the earth been taken over by the zombie apocalypse?” The answer is because human DNA varies enough that no diseases can spread so far they devastate the entire population. But software is like DNA that’s uniform: It can be compromised because it’s reliably the same.

The solution was to create “entropy,” as he puts it—a divergence in the code so that every computer has unique sequences of instructions running through it. Polyverse’s product to date has been for scrambling the Linux operating system. Later this year, it will offer a version that can scramble the entire Windows operating system and programs that run on Windows, says Gounares. Some customers have been given the Windows version to test.

POLYVERSE IS A VERY small company with a promising idea. Funded with just $6 million in private capital, the Seattle-area entity has less than $10 million in annual sales, though Gounares pledges that will rise into the tens of millions over the course of the next 12 months. That’s compared with roughly $2 billion annually in security-related revenue for Cisco, the biggest publicly traded cyber security vendor.

To be sure, Polyverse is not the only company to have thought of what’s known as “moving target defense.” The Massachusetts Institute of Technology’s Lincoln Labs has a rich literature on the subject. But researchers there found problems cropping up: Either the scrambling is limited, leaving avenues of attack, or the scrambled programs degrade in performance.

“We have taken this from an academic approach to an industrial-strength system,” insists Gounares. Polyverse scrambles all the parts of a program, not just some, he says, and without affecting the performance a user experiences.

Steven Potter, a former Navy SEAL who heads sales, sees the military as a key market for Polyverse. There are U.S. weapons systems running on versions of Windows no longer supported by Microsoft. To rip and replace, as they say, those computer systems to make them safer can run into billions of dollars. Hence, a Polyverse sale can be an economical option for government, notes Potter, who served as a contractor in Afghanistan ensuring cargo was safe for the war effort. The firm has already won several military contracts.

Potter, however, becomes most animated when discussing the possibilities offered by the weakness of existing cyber companies. “Where the disruption comes from,” says Potter, “is that with the Palo Alto’s, and the FireEyes, and Symantecs, you can literally take a class and for $1,000, you can hack through any known firewall on the planet.”

Cisco, FireEye, and Symantec declined to comment, while Palo Alto did not return my calls last week.

With the publicity and questions that accompany each new WannaCry-like cyber disruption, Polyverse’s opportunity grows. The system of walls and moats just might be giving this company a great opening.

ABCO Technology offers a complete program for cyber security. Cyber security jobs in Los Angeles are exploding. If you are interested in a career in this exciting field, contact ABCO Technology.

You can reach us by telephone from 9 AM to 6 PM Monday through
Friday at: (310) 216-3067.

Email your questions to:

Financial aid is available to all students who qualify for funding.

ABCO Technology is located at: 11222 South La Cienega Blvd. STE #588

Los Angeles, Ca. 90304

Cyber security jobs will expand through 2030 says the US Department of Labor. Start your new career today!

How to ensure your local Search Engine Marketing campaign is working for your business


For local businesses, having a strong presence in local search results is fundamental to those all-important conversions

Just to be clear, a “local business” refers to any business that has either a physical location that offers face-to-face contact with the customer, such as a showroom or shop, or one that offers a face-to-face service within a certain area.

When it comes to local search, it’s simple: if searchers can’t find you on the web, then frankly, you are web invisible. It’s the way of the modern world.

It’s all very well dominating the SERPs for your more general target keywords, but if you fail to rank highly for location-specific terms then you are missing a great opportunity.

When users are searching for a local term, they are far more likely to be looking for a service or product. Hence why the conversions on local search tend to be higher, and why you need to ensure that your local search engine marketing is on target for your business.

Of course all the usual SEO 101 knowledge applies. Offer an unrivaled user experience, nail your on-site optimization, provide exceptional content and build quality links.

Those fundamentals will set you up for ranking well for local search terms, but there are extra steps you must take to differentiate yourself from the competition and really bolster your local SEM strategy.

Local business listings

The first place to start is with local business listings. Ensure that your business is included in all the major directories (Yell, which is the UK’s local directory, Yelp, Thomson Local, etc.), as well as any industry specific ones. Some listings may already exist, and it may just be a case of claiming your business so that you can take ownership of the listing.

We recommend keeping track of all your business listings in one comprehensive spreadsheet to save you repeating or forgetting any entries. It also enables you to be consistent (more on this in the next point) in your information across all listings.

Remove all duplicated entries, as multiple listings for one business or location can become confusing, both to potential customers but also to Google. And we certainly don’t want to be confusing the Big G.

Be thorough but don’t be reckless. Avoid spammy directories as these could have a detrimental effect on your SEO. Deploy a spot of common sense to identify the spammy directories but if you are really unsure then it’s worth checking the spam score via Moz’s Open Site Explorer or via other similar tools.

Google My Business

So this technically falls under business listings, but it’s so important we’ve given Google My Business its own subheading. Arguably the most important business listing because, well, it’s Google. Remember to implement the following:
◾Claim your business via a verification process
◾Include accurate information: contact details, location and opening hours
◾Carefully select a small number of highly relevant categories to represent your business
◾Ensure up-to-date branding, such as in any images of logos or premises
◾Use high quality images to represent the business

Be comprehensive and accurate in the information you provide in order to strengthen your Google My Business profile and improve your chances of being featured in Google’s three-pack.

For further information, have a read of Google’s guidelines on representing your business. Don’t forget to also cover off the equivalent for Bing and Yahoo with Bing Places and Yahoo! Local.

NAP consistency

NAP consistency sounds a like a fancy term but the concept is very simple. NAP stands for Name, Address and Phone number, although it is sometimes expanded to NAP+W to include website address too. As mentioned above, it is crucial that your business information appears consistently across the web.

This is particularly important to consider if your business has changed address, contact details or even rebranded. Any mentions of your business will need to be checked and updated to ensure accuracy.

Simply google your business name (do the same with your previous business name if you have undergone a name change) and work your way through the listings. Maintain a spreadsheet of your progress so you can keep track.


Reviews can bring both utter joy and absolute misery to any business owner. Unfortunately you cannot simply ignore them, as reviews are indeed used as ranking signals in the eyes of the search engine. This is especially true for your Google My Business reviews.

Not only are reviews important in terms of local rankings, they are also key in terms of click-through rates. According to a recent study by BrightLocal, 74 per cent of consumers say that positive reviews make them trust a local business more.

Apart from providing the most incredible customer service you can muster, how else can you seize some control over your reviews? No, this isn’t about getting your mum, brother and great-nan to write a review for your business. It’s about a bit of gentle encouragement and managing a bad customer experience before it reaches the review stage.

It is also important to check the rules and regulations of each review platform, as they all have very different policies on asking customers for reviews and responding to them.

We’ve had several students who have received a negative one-off, anonymous review for their business or website that is either quite clearly spam, or in some cases, a bitter competitor or personal enemy. These situations can get a bit sticky, but sadly there isn’t an awful lot you can do.

Generally people won’t be deterred by one bad review, and the best course of action is to encourage other happy customers to get reviewing. This will push the bad review down and push the average star rating back up.

Many review platforms allow you to reply to reviews. This can be a good opportunity to set the record straight but you have to be careful about it. For this reason, sometimes it is best to get someone who is not as emotionally invested in the business to either write the response or edit it before it gets published. Be professional, remain calm, and kill them with kindness.

Location pages

If you don’t already have location pages on your website, then you could be missing a valuable opportunity to target all the relevant locations. For each key location that your business operates within, create a page dedicated to that location on your website. This is easier if you have a unique physical address in each location, as it is important to include as much location-specific information as possible.

Where there is a physical location, be sure to include an interactive map and images to further enhance the page. If you do not have separate physical addresses, try including testimonials and case studies relevant to each location.

This will help you to avoid duplicating content across your location pages; it’s a fine art to differentiate the copy, but do it right and it can have seriously good effects on your local SEM strategy.

Schema markup

Once you have your location pages set up, the cherry on the cake is schema markup. The whole concept of structured data can sound very daunting to markup newbies, but it’s easier than it sounds. Schema markup simply helps search engines to understand what your website is about.

This is particularly important for local information, as it will help those spiders crawl your location pages and you’ll benefit as a result.

According to a study by Searchmetrics, pages with schema markup rank an average of four positions higher in search results. Now that’s a pretty good incentive. Get your head around schema markup and you’ll have that crucial advantage over your competitors in the local search results.

Ensuring your local search marketing strategy is up to speed shouldn’t be difficult or convoluted. Follow the above steps and obey the usual SEO rules. With some hard work and perseverance, you’ll start dominating those coveted top spots and see your conversions skyrocket in no time.

ABCO Technology teaches a comprehensive program for web design, which includes search engine marketing and social media strategy. Call our campus to receive information about this program or other classes. Call us between 9 AM and 6 PM Monday through Friday at: (310) 216-3067.

Email your questions to:

Financial aid is available to all students who can qualify for funding.

ABCO Technology is located at:
11222 South La Cienega Blvd. in STE # 588
Los Angeles, Ca. 90304.
Build highly successful websites today!

Four Top tips for guest blogging. and

Many people still rely on guest blogging as an ongoing part of their link-building strategy.

If you analyze this for a moment, getting links through guest blogging is much easier than getting links through some other channel.

So it’s no wonder that a lot of bloggers and SEO experts still favor this method. The main question is, are these guest post links still safe and viable?

The answer is yes.

It is very possible to build our link portfolio by contributing on authoritative websites. However, there are certain rules that we need to follow in order to avoid any issues with Google.

Guest blogging 101

One of the beautiful things about guest blogging is that it gives us the opportunity to score some great links from high-tier websites.

To be honest, we probably couldn’t have gotten those links with any other method. This is why guest blogging is always worth bearing in mind as a link-building strategy.

But, we need to be very careful when choosing the websites we guest post for.

Although guest blogging can be carried out on a large scale, you should probably avoid it. This method is optimal in small dosages while cooperating with the biggest domains.

Google trusts authoritative domains. If they notice that your links are coming only from reputable sources, they will not impose a penalty. However…

1) Be Careful not to overdo it!

The biggest problem with guest blogging is that people tend to overdo it.

Your articles should be coming from various sources, with different anchors. If your only source of inbound links is from guest articles, Google will notice this pattern and you will soon get into trouble.

Instead, you should choose your battles carefully. You need to diversify your link profile.

If you already decide to do some guest posting, make sure it counts. Otherwise you’ll waste all that time you spent building up relationships and writing your posts – with only a Google penalty to show for it.

2) Focus on quality

This is where most people go wrong.

Google assesses the articles from which you are getting links. If the article is of high quality, your link will also be regarded as a quality one.

This makes sense, right? After all, why would anyone bother creating a great piece only to place crappy links throughout?

So when you put together a guest post, make sure it’s a good one.

After creating their own article, people try to promote it by writing guest posts. These guest posts will usually be of much lower quality and they will have the same regurgitated content which you published on your own blog.

By doing this, not only are you getting a devalued link, but you are also endangering your original piece. Google will flag up the regurgitated versions of your article as possible duplicate content. And because there are any number of similar, low-quality pieces out there online, it may conclude that your article is low-quality as well.

Everything you create has to be unique and to provide value to the reader. When you write a guest post, ask yourself: would I link to this piece?

If the answer is yes, you are in the clear.

3) Add images, links and formatting

As I mentioned, each guest post you make needs to be distinctive. Even if you are employing this strategy on a larger scale, at least make sure that everything you create is a separate entity.

One of the best ways to differentiate articles is by using varied formatting.

Blogs always have use different fonts and that is something you have no control over. But you have the ability to break up paragraphs and add things like bullet points, subheadings, block quotes and more. These increase the readability of your piece, and also make it easier for search engines to crawl it and interpret the content.

Another way to improve the look and layout of your text is to add images and other media.

Do not be shy and don’t wait for the website editor to insert them for you. Instead, be proactive and use your own images. Add a couple of them if necessary. If they make sense and the text looks better because of it, the editor will be more inclined to ask you for additional guest posts.

You can even go the extra mile and write titles and alt text to optimize the images for SEO – the editor will thank you, as it will save them the effort, and it will improve the overall SEO value of your piece.

Lastly, we come to links.

Now, editors usually allow one link in your bio, or one link within the article. Most of them do not like it when an author writes a piece with numerous links pointing to different websites.

However, if the editor allows it, make sure to add some highly relevant links that will make the article even more authoritative.

4) Vary your anchor text

You are trying to rank for a certain keyword. In an attempt to rank, you try to spam the same anchor text over and over.

This strategy is pretty much obsolete. Instead, just as with everything else that we’ve mentioned so far, make sure to diversify things.

Anchor text should vary.

When people place links with purely editorial value, without trying to cynically rank for a specific keyword, they will rarely link with the exact same phrase every time. This is highly unnatural behavior and can get you in trouble.

Instead, make sure to use different phrases. Place links in different sentences, with different anchors. Focus on writing naturally and place your link accordingly.


Guest blogging is NOT dead. As far as we know, there is no Google system or algorithm that will penalize the creation of such articles.

Nevertheless, it is better to be conservative. Like always, it comes down to whether your link profile looks natural. There should be no indication that you are purposely trying to push a keyword (even if you are).

People usually think about guest blogging in terms of links. However, you should observe it from a different perspective. By using this strategy, not only should you get links, you should also get some good exposure.

Your articles should promote your skills as well as your blog.

By placing emphasis on this, you will be able to accomplish much more with guest posts and as a result, links will start coming from various sources without you forcing them.

ABCO Technology teaches a comprehensive course for web development, guest blogging and search engine marketing. Call our campus between 9 AM and 6 PM Monday through Friday. You can reach us at: (310) 216-3067.
Email your questions to:

Financial aid is available to all students who can qualify for the federal funding.
ABCO Technology is located at:
11222 South La Cienega Blvd. in STE # 588
Los Angeles, Ca. 90304
Start building successful websites today!

Why should you become an Oracle Certified Associate

As an Oracle Certified Associate, you will cultivate industry-supported skills and credentials that you will be able to transfer to future employment opportunities. With your OCA certification, you will be able to demonstrate and promote the fact that you have the necessary skills to do your job effectively and you are certified by Oracle Corporation the world’s leader in Database Management Systems.

What are the Prerequisites & for OCA

Prior to enrolling for OCA courses the applicants have to know how to use the Microsoft Windows operating system. General knowledge of computer programming and databases will be helpful but not necessarily required.

OCA® Topic Requirements:

SQL Fundamentals I

Program with PL/SQL

SQL Fundamentals I
Oracle routinely publishes new versions of exams, and the passing score across versions may differ.

Oracle Developer/Administrator Certified Associate (OCA)

SQL Fundamental I
This course introduces students to the fundamentals of SQL using Oracle Database 12C database technology, which revolves around the cloud. In this course students learn the concepts of relational databases and the powerful SQL programming language. This course provides the essential SQL skills that allow developers to write queries against single and multiple tables, manipulate data in tables, and create database objects.

The students also learn to use single row functions to customize output, use conversion functions and conditional expressions and use group functions to report aggregated data. Demonstrations and hands-on practice reinforce the fundamental concepts.

In this course, students use Oracle SQL Developer and SQL *Plus as the tool.

Course Objectives:

• Retrieve row and column data from tables with the SELECT statement

• Create reports of sorted and restricted data

• Employ SQL functions to generate and retrieve customized data

• Display data from multiple tables using the ANSI SQL 99 JOIN syntax

• Create reports of aggregated data

•Use the SET operators to create subsets of data

•Run data manipulation statements (DML) to update data in the Oracle Database 12C

•Run data definition language (DDL) statements to create and manage schema objects

• Identify the major structural components of the Oracle Database 12C

Course Topics:

•Listing the features of Oracle Database 12C
•Discussing the basic design, theoretical and physical aspects of a relational database
•Describing the development environments for SQL
•Describing Oracle SQL Developer, Describing the data set used by the course

Retrieving Data Using the SQL SELECT Statement

• Listing the capabilities of SQL SELECT statements.

• Generating a report of data from the output of a basic SELECT statement

• Using arithmetic expressions and NULL values in the SELECT statement

• Using Column aliases

• Using concatenation operator, literal character strings, alternative quote operator, and the DISTINCT keyword

• Displaying the table structure using the DESCRIBE command

Restricting and Sorting Data
•Writing queries with a WHERE clause to limit the output retrieved Using the comparison operators and logical operators
•Describing the rules of precedence for comparison and logical operators
•Using character string literals in the WHERE clause
• Writing queries with an ORDER BY clause to sort the output
•Sorting output in descending and ascending order
•Using the Substitution Variables

Using Single-Row Functions to Customize Output
•Differentiating between single row and multiple row functions
•Manipulating strings using character functions
•Manipulating numbers with the ROUND, TRUNC and MOD functions
•Performing arithmetic with date data
•Manipulating dates with the date functions

Using Conversion Functions and Conditional Expressions
•Describing implicit and explicit data type conversion
•Using the TO_CHAR, TO_NUMBER, and TO_DATE conversion functions
•Nesting multiple functions
•Applying the NVL, NULLIF, and COALESCE functions to data
•Using conditional IF THEN ELSE logic in a SELECT statement

Reporting Aggregated Data Using the Group Functions
•Using the aggregation functions in SELECT statements to produce meaningful reports
•Using AVG, SUM, MIN, and MAX function
•Handling Null Values in a group function
•Creating queries that divide the data in groups by using the GROUP BY clause
•Creating queries that exclude groups of date by using the HAVING clause

Displaying Data from Multiple Tables
•Writing SELECT statements to access data from more than one table
•Joining Tables Using SQL:1999 Syntax
•Viewing data that does not meet a join condition by using outer joins
•Joining a table by using a self join
•Creating Cross Joins

Using Sub-queries to Solve Queries
•Using a Subquery to Solve a Problem
•Executing Single-Row Sub-queries
•Using Group Functions in a Sub-query
•Using Multiple-Row Subqueries
•Using the ANY and ALL Operator in Multiple-Row Sub-queries

Using the SET Operators
•Describing the SET operators
•Using a SET operator to combine multiple queries into a single query
•Using the ORDER BY Clause in Set Operations

Manipulating Data
•Adding New Rows to a Table Using the INSERT statement
•Changing Data in a Table Using the UPDATE Statement
•Using DELETE and TRUNCATE Statements
•Saving and discarding changes with the COMMIT and ROLLBACK statements
•Implementing Read Consistency
•Using the FOR UPDATE Clause

Using DDL Statements to Create and Manage Tables
•Categorizing Database Objects
•Creating Tables using the CREATE TABLE Statement Describing the data types
•Describing Constraints
•Creating a table using a subquery
•Altering and Dropping a table

Creating Other Schema Objects
•Creating, modifying, and retrieving data from a view
•Performing Data manipulation language (DML) operations on a view
•Dropping a view
•Creating, using, and modifying a sequence
•Creating and dropping indexes
•Creating and dropping synonyms

ABCO Technology offers a comprehensive program for OCA version 12C. Call our campus today between 9 AM and 6 PM Monday through Friday. You can reach us at: (310) 216-3067.
Email your questions to:
Financial aid is available to all students who can qualify for funding.

ABCO Technology is located at 11222 South La Cienega Blvd. in STE # 588
Los Angeles, Ca. 90304.
Get certified for Oracle database OCA 12C today!