CompTIA A+ graduates are proven problem solvers in today’s digital world!

CompTIA launched A+, the organization’s first information technology certification, in 1993 to standardize skills for PC technicians in a manner that showed they could work on any machine, no matter the vendor. Today, CompTIA A+ validates the entry-level IT skills employers demand and gives information technology pros a broad perspective on many computer and networking functions. If you received your CompTia A+ 10 or 20 years ago, you may be wondering how the Core series, which launched in January of 2019, compares to the exams you took. Keep reading below to see what’s changed and what’s stayed the same.

CompTIA A+: The Initial Release

1993 to 2000

The first iteration of CompTIA A+ focused on PC components and did not have dedicated domains for computer networking or security. It covered popular operating systems, including DOS 6.x, Windows 3.1 and Apple Macintosh System 7. It also covered an array of hardware, including AT motherboard form factors, serial and parallel ports and connectors, CRT monitors, dot matrix printers, floppy disk drives and CD-ROM.

When was the last time you saw a dot matrix printer or a floppy disk drive? This is a strong example of why CompTIA A+ has continued to evolve over the years – to reflect the changes in technology and the needs of the industry.

CompTIA A+: Version 2001

2001 to 2003

After eight years on the market, CompTIA A+ was ready for a refresh. This also marks the beginning of the three-year renewal cycle.

The core of the exam still focused on PC hardware components, but this sparked its evolution from computer repair to a better-rounded tech support certification. This version saw the addition of a domain dedicated to computer networking, including topics on internet connectivity, HTTP and TCP/IP. CompTIA A+ also now emphasized diagnosing and troubleshooting issues, a shift from the break-fix mentality.

The exam still covered Windows, motherboard form factors, drives and ports, but it upgraded to the latest technologies, including Windows 2000, DVD drives, SCSI connectors and LCD monitors. Coverage of the Apple Macintosh was dropped.

CompTIA A+: Version 2003

2004 to 2006

In this second update, we saw even more of a transition from PC repair to building a PC from components, connecting it to the network and troubleshooting. In 2004, CompTIA A+ put network and internet connectivity front and center and split networking into two domains: network hardware and client software configuration.

In 2003, the first iteration of personal devices – personal digital assistants (PDAs) and Palm Pilots – were added to CompTIA A+. New technology including wireless LAN connectivity, DNS and Cat6 networking cabling were also added, as were firewire, USB 1.1 and infrared receivers.

How Has CompTIA A+ Changed?

Wondering how CompTIA A+ has changed since you took your exam? Call ABCO Technology where you can learn about the new exam objectives from your exam to the new Core Series.

CompTIA A+: 600 Series

2006 to 2009

By 2006, security had found its way to tech support and the help desk, and CompTIA A+ reflected that. The 600 series added a dedicated security domain, covering topics including software-level security, accounts, permissions, antivirus software, firewalls, encryption and malware, including adware, viruses and grayware.

This series also offered three different exam options to meet the needs of different IT pros: remote support for end users, enterprise technical support and PC build and repair.

Computer networking and the internet continued to be a focus, with topics such as LAN/WAN and VoIP. In addition to PCs, CompTIA A+ also now supported laptops, setting the stage for mobile device support.

CompTIA A+: 700 Series

2010 to 2012

As cybersecurity threats exploded, CompTIA A+ delved even deeper into types of attacks and how to mitigate them. The entry-level IT certification covered topics including authentication technologies, encryption, BitLocker and social engineering as well as Disk Manager, Event Viewer, Device Manager and Remote Desktop Protocol (RDP).

Networking coverage expanded as well, covering ports and protocols, TCP/IP, HTTP, FTP, POP, SMTP, TELNET, wireless networking, WEP, WPA, SSID and more. In addition to the printers themselves, the 700 series of CompTIA A+ covered networked versus local printers.

Lastly, devices including projectors, web cameras, touchscreens, touchpads, track points and removable storage were added to the IT certification exam.

CompTIA A+: 800 Series

2013 to 2015

The CompTIA A+ 800 series split its focus evenly between supporting end users across devices and building custom PCs. Basic cloud computing concepts were added for the first time in 2013, as well as a dedicated domain for mobile devices, featuring OS administration and device connectivity.

Operating system coverage included Windows XP, Vista and 7, Android and iOS, with command-line admin tools and utilities, user account control, Windows firewall and upgrade paths.

On the hardware side, CompTIA A+ included motherboard expansion slots, storage drives, output connectors and devices. The exam even covered gamepads, joysticks, motion sensors and Smart TVs.

Physical and logical security, client-side virtualization and virtual printing were also added.

CompTIA A+: 900 Series

2016 to 2018

In 2016, CompTIA A+ brought back Apple and added Linux and the internet of things (IoT). The 900 series focused on supporting user access to applications and data from any device. Security moved to the forefront, bleeding into all exam domains rather than being limited to one.

CompTIA A+ now covered a wide variety of computers, ranging from PCs to wearables, from smartphones to GPS. The operating systems covered are just as broad, with Windows, Android, Mac and Linux all getting attention.

The modern exam stayed true to its roots with coverage of motherboard form factors, hardware and components, but it included the latest iterations. Hardware coverage also now included mobile device accessories, such as headsets, docking stations and credit card readers.

Cloud, mobile devices and connectivity, wireless networking and cybersecurity were all addressed, as well as PowerShell, software as a service (SaaS) and router configurations.

CompTIA A+: The Core Series

2019

This week CompTIA released the newest version of the CompTIA A+ certification, the Core Series. It focuses on enabling end users and devices to securely access the data needed to complete a task. Despite its evolution, the exam continues to emphasize problem solving and takes a vendor-neutral approach to tech support.

The latest iteration gives cloud computing and virtualization a dedicated domain and introduces scripting as an important technical support tool. Coverage of IoT is expanded, including both device hardware and connectivity.

Cybersecurity also plays a key role, with topics such as Active Directory security settings, software tokens, security protocols and encryption, authentication methods and security threat identification and prevention. Privacy concerns and policies, such as GDPR, are also addressed.

Networking and hardware round out the certification, which gives aspiring IT pros a well-rounded view of what they might encounter at the help desk and a taste of the specialties they could choose to pursue in the future.

 

They say the more things change, the more they stay the same. While CompTIA A+ still covers the basics, like motherboards and operating systems, it has evolved to include modern technology concepts and devices and shifted some emphasis to cloud technologies.
If you are interested in a fulfilling career in the field of information technology, stop what you are doing and contact ABCO Technology. You can reach our campus between 9 A. M. and 6 P. M. Monday through Friday at: (310) 216-3067.
Email all questions to: cpascal@abcotechnology.edu
Financial aid is available to all students who qualify for federal student aid.
ABCO Technology is located at:
11222 South La Cienega Blvd. STE #588
Los Angeles, Ca. 90304
Train and certify for your information technology career today!

6.7 million job openings and only 6.4 million people to fill them, US Department of labor says

The US Department of Labor announced on June 6, 2018 that the United States had 6.7 million job openings and only 6.4 million workers to fill them.

The reason for this wide job gap was due to the fact candidates for the work simply didn’t possess the correct qualifications. The Department of Labor announcement went on to say that three million of these job openings were in the field of information technology.

This article will focus on the specific areas of information technology where these job openings exist.

Network administration

Websites, newspapers and magazines are filled with ads looking for qualified network administrators. Companies are looking for candidates who can function in the cloud and using servers on site. The problem faced by many organizations is the candidates who apply for these positions do not have the right qualifications. Network administrators need three basic certifications: CompTIA A+, Microsoft Certified system expert or Microsoft certified system associate and Cisco Certified Network administrator.

The certifications mentioned above involve fixing a computer, handling a corporate server and installing plus configuring routers.

The certifications listed above can be obtained in less than one year.

Cyber Security

The next area, which is experiencing high demand is cyber security. All networks are open to some type of cyber-attack. Cyber security professionals can also repair a network, which has been damaged by a cybercriminal.

The Certifications required for cyber security are:

CompTIA A+

CompTIA Network +

Cisco Certified Network Associate

CompTIA Security +

Certified Ethical Hacker

Linux Fundamentals.

The certifications listed in this program are completed in less than one year.

Database administrator is another area, which is receiving a great deal of demand. In this program employees are paid to organize, secure and backup a company’s information. The two popular database classes to take are Microsoft and Oracle.

A student can receive the database certification in less than one year.

Computer programming is another area receiving a lot of demand. Computer programmers are needed for gaming, application development and website backend functionality.

Computer programmers will receive their certification in one year.

Finally web developers are needed. Pew research confirmed that 75% of small businesses having less than five employees don’t have a functional website. If you become a web developer, you can be the person who builds it for them.

A career in information technology is only a telephone call away.

Call ABCO Technology between 9 A.M and 6 P.M Monday through Friday at: (310) 216-3067.

Email all questions to: info@abcotechnology.edu

Financial aid is available to all students who can qualify for funding.

ABCO Technology is located at:

11222 South La Cienega Blvd. STE #588

Los Angeles, Ca. 90304

 

Get one of those three million jobs. Get certified for information technology today!

Anyone can alter Google’s search results. This article will explain how.

In 2013 Google moved to what it called the Internet of things. The move was a change in policy, which announced Google’s use of three sources of information to obtain knowledge for search results. The new sources were Wikipedia, CIA world Fact Book and Freebase. Wikipedia appears to be the dominating source. Google’s dependence upon Wikipedia cause this accident to happen.

House Majority leader Kevin McCarthy

(R-Calif.) on Thursday went after Google for displaying “Nazism” as one of the ideologies of the California Republican Party.

A search on the site for “California Republican Party” apparently returned with a sidebar result listing Nazism as an ideology alongside “conservativism” and “market liberalism.”

McCarthy noted the sidebar in a tweet at the company.

“Dear @Google, This is a disgrace #StopTheBias,” McCarthy tweeted, accompanied by a screenshot showing Nazism listed among the California Republican party’s ideologies alongside values like “conservatism” and “market liberalism.”

Ideologies associated with the California GOP are no longer visible in the sidebar on Google’s results page when users search “California Republican Party” or in similar searches.

The sidebar, which Google calls the “knowledge panel,” is often populated by content from Wikipedia; however, no mention of Nazism is visible of the California GOP’s page there. The party’s Wikipedia page’s edit history, though, shows that “Nazism” was briefly added to the page on Thursday.

Google blamed the result as online “vandalism” from outside the company that slipped through its safeguards.

“This was not the result of any manual change by anyone at Google. We don’t bias our search results toward any political party. Sometimes people vandalize public information sources, including Wikipedia, which can impact the information that appears in search,” a Google spokesperson said in a statement.

“We have systems in place that catch vandalism before it impacts search results, but occasionally errors get through, and that’s what happened here. This would have been fixed systematically once we processed the removal from Wikipedia, but when we noticed the vandalism we worked quickly to accelerate this process to remove the erroneous information,” they added.

The mistake comes in advance of California’s statewide primary elections, which are set for next week.

Other conservatives expressed outrage over Nazism appearing, including President Trump.

Anyone can post a Wikipedia article. ABCO Technology’s web development program will teach you how. If you are interested in learning advanced website techniques for promoting your business online, call our campus. You can reach us by telephone between 9 A.M and 6 P. M Monday through Friday at: (310) 216-3067.

Email all questions to :- info@abcotechnology.edu

Financial aid is available to all students who qualify for funding.

ABCO Technology is located at:
11222 South La Cienega Blvd. STE #588
Los Angeles, Ca. 90304

 

Building engaging and highly visible webpages today!

Create a smart phone app, change the world

Would you like to learn and possess the technical skills to make this world a better place? ABCO Technology will teach you the computer programming skills to do just that. This article is the story about Brigitte, a cyber application that was created to prevent school bullying and other offenses against students.

A World Without Bullying: Brigitte’s Story

Some people call me a “bully buster.” As a teen I did my own research about bullying, I wrote a survival guide, and I was bullied myself. I believe there’s a lot we can do to stop bullying!

To share that hope, I often visit elementary, middle, and high schools. If I came to your school, here’s what I’d do in the all-school assembly: I’d ask everybody to close their eyes for a minute.

Then I’d ask you to think of a time when you may have been bullied. Perhaps somebody said something mean to you or gossiped about you. Somebody may have punched or kicked you; the point being, an individual or a group of people did something to you that made you feel bad about yourself.

Lee este articulo

With everyone’s eyes closed, how many hands do you think would reach into the air? Ten, 20, maybe 40, tops? The answer is … at least ¾ of the students raise their hands — 3 out of every 4 kids admit to going through similar experiences of bullying!

You’re Not Alone

If you have been a victim of bullying, you probably understand how lonely it feels. You might have even thought to yourself, “There can’t be anyone else in my whole school going through this type of torment!” But, as my experiment shows, it’s simply not true.

I know that when I was in eighth grade, I sure felt that way. I have always been rather tall — I’m like 5 feet and 11 inches tall now — and I’m also quite the science nerd. I went to an all-girls middle school so things were pretty catty, especially to someone who was a little different from the rest of the pack. I went through a lot of shunning and name calling in eighth grade and I used to spend our lunch and break times in the bathroom, many times crying.

How It Felt

I remember some of my best friends turned against me and I just felt completely worthless. I convinced myself there was something about me that made all of these people turn against me and ostracize me! I feel really lucky that I have such a great family to help me rise above it and channel all of my pain into a project that will be able to help other kids survive similar or worse experiences.

I started doing research with tweens and teens to figure out just how many people actually are suffering from bullying. That plus my personal experience led me to write a book called “Dorie Witt’s Guide to Surviving Bullies.” It’s a made-up story about very real happenings and feelings.

I began my process by creating a questionnaire and online survey. I administered my questionnaire in various focus groups in which students came together and talked about bullying. You can find some of the questions and answers at the beginning of each chapter of my book! In my opinion, it shows that bullying is a universal issue that kids like you and me across America are dealing with every day!

So, I’ve gone from being bullied to helping other people get through it. When I talk to school groups, I close the exercise by asking everybody to close their eyes and think about a time when the situation was reversed. Was there a time when you were the one who wasn’t being too nice? (p.s. In case you were wondering, my hand goes up every time for this question, too.)

But it’s not just my hand. Again, about 3 in 4 people — most of the audience — say they have sometimes been the bully!

So I always ask, “If we know bullying can hurt so much, why do we sometimes turn around and become a bully ourselves?”

What Counts as Bullying?

When you think of bullying, you have to consider all four types: physical, verbal, nonverbal, and cyberbullying (using computer or cell phone). I think a common misconception we have is that physical bullying is the worst, when really all four types of bullying can be equally painful. Verbal bullying (like using words such as “gay” as insults or speaking badly about another) or nonverbal bullying (such as ignoring another person) can have long-lasting effects.

As you get older, it’s also good to know that bullying can be different as you go from elementary school to middle school and from middle school to high school. From my experience, in elementary school, much of the bullying happens on the playground and involves physical bullying and friendship troubles. You do, of course, find a lot of verbal bullying too.

In middle school, bullying gets amped up. I saw a lot of gossiping and social exclusion among girls, many times much physical bullying among boys and also verbal and cyberbullying among both boys and girls. By high school, the problem of bullying gets a little better because we’ve matured, but it doesn’t just go away.

From what I’ve seen, bullying in high school can be more aggressive. The word choices may change (harsher words and curse words). Also, teens communicate more freely by text or online. Because some kids are just physically big, that can make a bully scarier. In addition, many high schools are quite large and it can be difficult for teachers to be everywhere to stop the bullying if they see it.

What YOU Can Do

If you see bullying happen, then, as I explain in my book, you are a not-so-innocent bystander. Bystanders are so important and they have potential to make such a big difference!

Bullies like feeling popular and that they have the support of their friends and classmates in general. If you see someone bullied, you can help take that feeling of power away from the bully. How? The hardest thing to do is step in on the victim’s behalf, especially when you are the only one standing up. It’s a great thing to do, but here are some alternatives that also can be very helpful:

1.Talk to the victim afterward. Ask if the person is OK, tell them you think what happened was wrong, and offer to help them contact a grownup.

2.Use “group correction.” This is when a bunch of people agree that they’re going to stand up to a bully. You can just calmly tell the bully to stop and leave the person alone. This works best when students have been trained in how it works, which is why schools need to educate kids about this.

3.If you can’t do 1 or 2, at least tell a grownup (teacher, coach, parent) about what you saw.

Adults really can actually help, even though I get it, we don’t always want to admit this can be the case. But sometimes problems are way out of our hands and we need to get somebody else involved who can make the situation better. (p.s. The bully never has to know you were the one who got an adult involved and so you don’t have to worry about being targeted next.)

I understand it is very daunting to stand beside the victim instead of behind the bully. But think about it: Wouldn’t you want somebody to do the same for you?

It is important that adults help us with stopping bullying, but we also need to take some responsibility ourselves! It doesn’t even matter if the victim isn’t your best friend in the world. As I say in every single school I speak in, “You don’t have to like every single person, but you do need to respect them.”

The Last Straw

We all reach a point when we say, “Enough is enough! I can’t take this anymore!” By definition, bullying is a repetitive action, meaning it happens over and over again. It’s this repetitiveness of bullying, which I like to call the “daily grind,” that can really affect people so much!

Many times we can’t tell what the last straw is for somebody and we don’t always know how our words and actions may affect another person! One small insult or sarcastic comment gone awry could send someone over the edge, while a smile or other gesture of concern and kindness could save them from reaching that point.

There’s Hope, Really!

So I’ve talked a lot about the bad stuff. But there’s good, too!

I don’t think people are born “bad” and wanting to hurt other people. I think we can make a difference if we start teaching kids from a young age. We can’t just tell them bullying is wrong. We have to tell them why.

Everywhere around us we see so much violence whether it be on the television or in video games that I feel we have become desensitized to pain. People need to be reminded that violence is not actually commonplace. In the real world, when people are violent, it has big consequences.

Kids, parents, and schools need more resources to teach about bullying. Where I live in Massachusetts, I helped pass one of the most comprehensive anti-bullying laws in the nation. Because of this legislation, all schools must have programs in place for anti-bullying as well as mandatory reporting by teachers. Schools cannot choose to ignore a bullying problem, they must act.

Ending bullying is really a community effort and the more we spread the word, the harder and harder it will be for people to simply put it aside as “kids being kids.” I guess some people call me an idealist for my optimistic hope for the future, but I think we need to stop focusing on the negative and start thinking about the positive. If we live our lives in goodness, we will be able to share that with others around us!

I realize that I may not be able to end bullying forever. But I believe I can help spread support and resources across the country — and maybe the world someday. Then kids just like me know that they are never alone when facing bulling. There will always be somebody, somewhere willing to listen and to help!

This article defines the need. Here is an App. Meet Brigitte. This app was built by a group of millennials who wanted to end bullying of all types by making the process of reporting very simple. Brigitte is spreading throughout the east Coast and schools all over the country are adapting this application for student protection.

If you are interested in solving world problems like bullying, it’s time to think about creating a powerful application.

ABCO Technology’s computer programming program will do just that. Call our campus between 9 A.m. and 6 P.m. Monday through Friday. Call today at: (310) 216-3067.

Email all questions to info@abcotechnology.edu

Financial aid is available to all students who qualify for funding.

ABCO Technology is located at:

11222 South La Cienega Blvd. STE #588

Los Angeles, Ca. 90304

 

Create that new successful application today!

Network administrators get high paying jobs with CompTIA Security+ listed on their resume.

Are you a US veteran, network administrator or a person who allowed their certifications to laps? Would you like to gain a big advantage over your IT competition?

If you answered yes to these important questions, The CompTIA Security + certification is for you.

The CompTIA Security + is gaining in popularity across the United States. Over two million companies are requiring the CompTIA Security + as a major requirement for network administrators.

The reason for this surge in demand for this certification is because of the massive increase in cybercrime. Cyber-attacks are a normal part of a network administrator’s business day. These attacks usually are made upon the corporate server, routers, attacks on individual work stations and in some cases hackers have been known to gain access through a device like a simple printer or fax.

On May 15, 2018 Banks in Mexico had to admit that cyber-criminals stole twenty million dollars due to hacking. In fact Money transfers had to be suspended for 24 hours so the crimes could be sorted out. Only one result came from this attack, more cyber security professionals were hired.

The US government is requiring all companies who contract with them, have a person on staff who is certified in cyber security. The last thing our government wants is to have important information fall into the wrong hands. News leaks dominate the news today. Cyber security is one solution to stop vital information from falling into the hands of the media. The CompTIA Security + is the certification most recognized by the US government.

What is needed to fight these attacks, is a qualified person who has certified cyber security skills. The CompTIA Security + is your credential, which will prove to employers that you can defend their network against a cyber-attack.

The CompTIA Security + is not a standalone certification. In order to receive maximum benefit from this certification, network administrators should have the CompTIA A+, Microsoft’s MCSE, Cisco CCNA and if the MCSE isn’t possible the CompTIA Network + will be sufficient to advance to the CompTIA Security + certification.

The CompTIA Security + is completed in 78 hours. While in class, you will learn the critical strategies you can employ to harden your network against all kinds of cyber-attacks.

In addition, the US Department of Defense recognizes the CompTIA Security + as a major proof of cyber security competence. In fact, the CompTIA Security + is a key part of a Department of Defense security clearance known as DOD 8140.

Veterans, persons working in network administration and candidates who have various degrees in the field of information technology will benefit from this information packed certification.

After completing the CompTIA Security +, many of our students move onto the Certified Ethical hacker, which provides all of the tools you will need for network penetration testing and defense.

You will receive access to over 600 tools, which will enable you to defend your organization against a cyber-attack. Cyber-security is big business in 2018. Students who train and become certified will be in demand. Jobs for cyber security professionals are listed in all 50 states. If you obtain this certificate, you can choose where you want to live. Most important, you will know that you have the earning power to receive a solid income so you can buy that house or car you’ve always wanted.

If you are interested in learning about cyber security, contact ABCO Technology.

Reaching our campus by telephone is easy. Call Monday through Friday between 9 AM and 6 PM. Our phone number is (310) 216-3067.

Email your questions to info@abcotechnology.edu

Financial aid is available to all students who qualify for education funding.

ABCO Technology is located at:

11222 South La Cienega Blvd. STE #588

Los Angeles, Ca. 90304

 

Become a cyber-security certified professional today!

Optimizing Youtube videos

As we approach memorial day, many of our readers may want to put a video online about their business, activity or cause. I decided to reprint a chapter from my book, Search engine Marketing Guide for the small business. If you like this chapter, please consider giving our school a call. My book has 32 chapters filled with information about optimizing for search engines. Today we’ll discuss optimizing your Youtube video.

Chapter 24 Optimizing YouTube Videos

Google has provided statistics proving that Internet users spend more time on YouTube than they do on Google. YouTube states they receive over forty million visitors per day. YouTube videos are entertaining. The information presented on all search engines appeals to three types of learners: visual, audio and kinesthetic. Understanding this concept will be of significant benefit to your organization’s bottom line. This chapter will show you how to make your videos stand out for your chosen key phrases on YouTube.

It’s no secret that YouTube is a traffic source with almost limitless potential. There’s only one problem: YouTube is crowded with video content. According to YouTube over 100 hours of video are uploaded to this search engine every minute. When you take into consideration the large amount of content displayed on YouTube, the key question is how to get your customers to view your videos? The answer to this question is to optimize your YouTube video. It probably will not surprise you to learn that your competition simply uploads their videos to YouTube and hopes for the best. After reading this chapter you will be able to do much better than that.

Before we dive into how you can optimize your videos for YouTube, let’s review some of the most important ranking factors that YouTube uses.

YouTube’s ranking is not nearly as complex as Google’s famous 160 ranking signals, which was published in 2015 but YouTube’s algorithm is much focused. It compiles dozens of signals into a weighting system for ranking videos in YouTube search and for suggested videos, like this:

YouTube Sidebar Suggested

Now let’s get started. We will begin with a basic YouTube primer.

YouTube Ranking Factors

Here’s some information to keep in mind about the trust signals YouTube uses. So let me give you a brief list to use containing the most important signals that YouTube ranks videos:

•Title tag information

•Audience retention

•Keywords in description tag

•Tags

•Video length

•Number of subscribers after watching

•Comments

•Likes and dislikes

YouTube

It’s time to show you five strategies that you can leverage these trust signals to bring more traffic to your videos…and ultimately to your site.

1. Write Super-Long content for your Video Descriptions

Please note that YouTube and Google can’t watch or listen to your video. The search engine can only understand the contents of your video by what you write about it.

That means that they heavily lean on the HTML text surrounding the video to index your video’s topic. That’s why it disturbs me to see extremely brief video descriptions. For example: YouTube short non-ranking description “Japanese food”. The more YouTube knows about your video, the more confidently it can rank it for your chosen key words. Even more important to your ranking, YouTube uses keywords in the description to rank you for super-long tail keywords. A better ranking video description would look like this “Japanese food West Los Angeles including: Sushi, Sashimi and Tempura under $25.” If you owned a Japanese restaurant serving these dishes containing these prices, your video would be viewed by potential customers who were hungry for Japanese food. YouTube videos are designed to be niche specific.

2 Find “Video Keywords”

Like a normal practice in SEO, the YouTube SEO process begins with keyword research.

Your goal is to find keywords that have YouTube results on the first page of Google. The Key word tools we provided will be of great help to you in selecting those key niche phrases.

These are called, “Video Keywords”.

Unlike a normal SERP with 10 webpage results, containing Video Keywords, Google reserves a large portion of the first page for video results:

Google Video Results

In general, Google tends to use video results for these types of keywords:

•How-to keywords (“how to install a dish TV antenna”)

•Reviews (“Islands Restaurant review”)

•Tutorials (“Setting up your YouTube Channel”)

•Anything fitness or sports related (“long distance running”)

•Funny videos (“Cute animals”)

Let’s suppose you optimize your video around a keyword that doesn’t have any video results in Google.

In this case, you’ll ONLY get traffic from people searching on YouTube. This will cut your traffic results in half.

If you optimize for Video Keywords, you’ll also receive targeted traffic to your video directly from Google’s first page.

How to Find those High Traffic Video Keywords

The easiest way to find video keywords is to search for keywords in your niche. Then see if any of the keywords you searched for have YouTube video results, like this:

YouTube Results in Google for your selected key phrase.

Does this sound simple enough?

Once you’ve found the right Video Keywords, it’s time to check if there’s enough search volume for that keyword.

Since videos don’t take a ton of time to put together, you don’t need to go after keywords with massive search volumes.

Just make sure your target keyword gets at least 300 searches per month in Google (you can find this information using the Google Keyword Planner):

GKP Results

Why 300 searches per month?

If a keyword delivers at least 300 searches per month, then you know it also gets a decent amount of searches within YouTube itself. The free Keyword Suggestion tool by Wordstream is another excellent tool to verify against Google’s GKP tool.

If you can get that video to rank in Google, then a lot of those 300+ monthly searches will click on YOUR video from the search results.

That means you’ll get more high-quality traffic to your video, and ultimately, your site.

3 Make your (great) Video

When manufacturing a product for your business, the more effort you put into your product, the better your return on investment. This same philosophy also applies to your video.

If your budget can afford a professional look, you might want to consider hiring a professional videographer for the day, pay an editor to add graphics, rent a studio…

YouTube has facilities around the country that offer this service at a reasonable cost. In fact a YouTube facility opened near me in the suburb of Playa Vista, California.

If you’re on a really tight budget, you can record your voice over a PowerPoint presentation using Screencast-O-Matic ($15/year). This service will deliver professional quality at a very reasonable price.

I’m highly emphasizing quality because user engagement is THE most important YouTube ranking signal. Again to repeat Google can’t watch your presentation, but they can digitally judge the reaction to it.

If your video stinks, it won’t rank…no matter how optimized it is for SEO.

Unlike Google — which can use backlinks and other signals to evaluate the quality of a piece of content — YouTube doesn’t have this luxury.

They judge your video’s quality based on how people interact with it.

The User Experience Metrics That YouTube Uses

Here’s what YouTube uses to determine the quality of your video:

•Video retention: The percentage of your video people tend to watch (the more, the better).

Video_Retention•Comments: If people comment, they probably enjoyed the video (or at least watched it).

Video Comment•Subscriptions after watching: If someone subscribes to your channel after watching your video that sends a HUGE Trust signal that you have an amazing video.

YouTube Subscribe Button•Shares: How many people share your video on social media sites like Twitter and Google+.

YouTube Sharing Icons•Favorites: The number of people that favor your video or add it to their “Watch Later” playlist:

Watch Later•Thumbs up/Thumbs down: Self-explanatory 🙂

If you want to see how your videos are performing, you can see user experience data in your YouTube Analytics:

YouTube Analytics

If you make a top-notch video you’re highly likely to get top-retention views, likes, comments and all the things that YouTube likes to see in a video.

Make Your Video At Least 5-Minutes Long

Similar to text-based articles, longer videos rank better.

Since 2013, I’ve consistently observed longer videos outperforming shorter videos in YouTube and Google search.

For example, if you search in YouTube for the keyword “WordPress”, 3 out of the 4 top videos are an hour long.

So make a Video that runs for at least 5-minutes.

If it makes sense for your video to be even longer than that, go for it. Don’t worry about your video being too long. If it’s awesome, people WILL watch it.

OK so you’ve created your compelling video that’s 5-minutes or longer in length. Good job-)

Now it’s time to optimize your video and upload it to YouTube.

Here’s how to extract the most SEO value from your video.

Video Filename

When you’re done with the video make sure that you use your chosen keyword in the video’s filename.

For example, if you wanted to rank for the keyword “computer training Los Angeles”, you’d want to name your video computer_training_Los_Angeles_video.mp4.

Video_Filename

Video Title

The title of your video should be at least 5-words long. That way, you can include your full keyword phrase without keyword-stuffing.

Video Title

Power Tip: Like with a blog post, I’ve found that you get a slight video SEO boost by putting your keyword at the beginning of the title.

So if you were trying to rank for “surfing tutorial” you’d want a title like: “Surfing Tutorial: Learn How to Ride a Wave Today”.

Description

Your videos description is VERY important.

Because Google and YouTube can’t “listen” to videos, they rely on your text description to determine your video’s content.

Here are the basic guidelines for the description:

•Put your link at the very top of the video (this maximizes CTR to your site)

•Include your keyword in the first 15 words

•Make the description at least 300-words

•Include your keyword 3-4 times

This SEO-optimized description helps tell Google and YouTube what your video is about without being spammy.

YouTube Description tags

Tags aren’t super-important…but they help.

Just include a few keywords to help YouTube and Google learn what your video is about.

Targeted Tags

Targeted tags will not only help you rank for your target keyword…

…but they will get you to show up more often as a related video in the sidebar area of YouTube:

YouTube Sidebar

When the video someone’s watching has a similar tag as your video– boom! – You’re added to the sidebar.

Once you’re done, hit “Save Changes” and your video will go live!

5 Get Video Views

We talked a lot about user experience signals so far…which are really important.

In order for your video to rank for competitive keywords, it needs to receive A LOT of views.

More views=higher rankings.

But there’s one catch…

…the views need to be real.

YouTube has caught onto fake views. That’s why I don’t recommend using a service on Fiverr to pump up your view count.

As we already discussed, long-retention views are worth their weight in gold.

Here are a few strategies you can use to get targeted views to your video:

Mention Your Video on Quora and Other Q&A Sites

Quora, Yahoo Answers, and other Q&A sites are some of the most popular sites on the web (Quora rocks a top 500 Alexa ranking).

But if you try to go in there and plaster links all over the place, you’re going to get banned in a flash unless you link to YouTube.

Because you’re posting your video in a place where people are desperate for information on a given topic, the views you’ll get are extremely high-retention.

Just search for a question on your video’s topic:

Quora Search Results

And add a link to your video. Or better yet, embed it into your answer:

Quora Answers

Link to Your Video in Your Email Signature

People that email you (like your family or wife) generally like you.

And if you’re like me, you get A TON of emails.

So when you add a link to your latest video in your email signature, that means you get high-retention views like they’re going out of style.

Email Signature

Embed Your Videos in Blog Posts

Whenever you write a blog post (on your site or as a guest post for another site), think to yourself:

“Where can I embed a YouTube video into this post?”

As we stated at the beginning of this chapter Google reports their users spending more time on YouTube rather than searching for information. If your product translates well for videos use them for promotion.

If you want to build websites or make videos, which are highly visible to your audience call ABCO Technology. You can reach our campus by telephone at: (310) 216-3067 from 9 A.m to 6 P.m Monday through Friday.

Email all questions to info@abcotechnology.edu

Financial aid is available to all students who qualify for funding.

ABCO Technology is located at:
11222 South La Cienega Blvd. STE #588
Los Angeles, Ca. 90304

Build highly visible webpages and videos today!

Mark Zuckerberg is hiring 20,000 more cyber security professionals over the next 12 months

The federal government is already investigating Facebook. The question now is how much further it will go to regulate it.

Facebook founder and CEO Mark Zuckerberg is testifying before the EU Tuesday and Wednesday of this week in the wake of the Cambridge Analytica scandal and revelations about the platform’s role in both privacy issues and the dissemination of Russian disinformation during the 2016 presidential campaign to answer questions about Facebook’s past, current, and future actions.

But what Facebook will do on its own will likely no longer be enough. Calls have grown for the government to try to rein in the social media giant. Even Zuckerberg has acknowledged it might be time for regulators to step in.

Europe is taking some pretty significant steps in clamping down on Facebook and big tech at large. In the United States, where policymakers have traditionally been reluctant to regulate technology, it’s a bit more complicated.

Regulating Facebook is a complicated balancing act, multiple technology experts and Capitol Hill aides said in interviews. The company isn’t facing one scandal — it’s facing two: one about Russian disinformation and fake news, and one about user privacy and data security.

There are no easy answers about where Facebook’s responsibility begins and ends over what’s shared on its platform. In the United States, there’s also a First Amendment issue. When clamping down on what’s shared on social media, the government’s hands are actually more tied than, say, Facebook or Twitter through their terms of service.

“The idea of what they could be doing and what they should be doing is the dividing line,” Michelle De Mooy, the director for privacy and data at the Center for Democracy & Technology, stated.

Facebook could face a “breathtaking” federal fine

Congress and federal agencies are already considering several avenues to rein in Facebook. Arguably the biggest is an investigation that’s already underway: The Federal Trade Commission is looking into the possible misuse of personal information in the Cambridge Analytica scandal, which involved sharing data from as many as 87 million users. At issue is whether Facebook violated a 2011 consent decree with the FTC over charges it deceived consumers about their privacy.

The settlement required Facebook to give consumers “clear and prominent notice” and obtain their consent before sharing their information. And it barred the company from making any further deceptive privacy claims.

If the FTC finds Facebook did violate the 2011 agreement, it could be in deep trouble.

“If there was a violation, and let’s assume there was, the FTC is in a position to punch very hard if it wants to,” said former FTC Commissioner Bill Kovacic. “The potential monetary penalties under the status quo would be extraordinary.”

He said that each violation of the existing settlement could be punished by a fine of $40,000 — per day, per user. For a single wronged user over the course of a month, that’s a potential $1.2 million fine. And compounded among potentially tens of millions of users across several weeks and months, the amount would be astronomical. “Now, would the FTC say, ‘Here’s a bill for $1 trillion?’ No. But short of that, could they impose a breathtaking civil penalty?” Kovacic said.

He said the FTC would need to go through the Department of Justice to pursue a civil penalty, and it is unclear what the result would be. And, of course, we don’t know what yet the FTC will find, if anything. But the investigation could be a big one. “Think of this headline: biggest fine imposed on a business enterprise in the history of government regulation,” Kovacic said. “That would catch the attention of [Facebook] and of others in the industry.”

De Mooy warned that the results of the FTC investigation might not be so satisfying for harmed customers, even if it results in a blockbuster fine. “The problem with anything that the FTC does is that it’s not public,” she said. “If they come to a conclusion that there was a violation, that there were unfair and deceptive practices, we still wouldn’t know why they came to that conclusion.”

Congress wants to force more disclosure on Facebook ads

Meanwhile, there are other proposals on the table to impose new requirements on Facebook. Sens. Amy Klobuchar (D-MN), Mark Warner (D-VA), and John McCain (R-AZ) last October introduced the Honest Ads Act, which seeks to regulate online political advertising much in the same way as television, radio, and print are. The legislation has largely stalled, with Senate Rules Committee Chair Richard Shelby (R-AL) expressing little interest in holding hearings on it.

Sen. Roy Blunt (R-MO) is expected to take over for Shelby as chair of the Rules Committee, and the bill’s proponents hope he will express more of an interest in it, a Democratic aide told me.

After Cambridge Analytica and the continued information drip out of Facebook over what Russia did in 2016, public outcry may also push reluctant legislators to be more open to acting.

The Honest Ads Act would require social media companies to disclose which groups are running political advertisements and make reasonable efforts to ensure foreign governments and agents aren’t purchasing ads on their platforms. On Friday, Zuckerberg came out in support of the Honest Ads Act in a Facebook post, saying it would “raise the bar for all political advertising online.” Twitter announced its support for the legislation on Tuesday.

In the same post, Zuckerberg said Facebook would require political-leaning advertisers to verify their identity and location. Anyone who wants to run political or issue-based ads will need to be verified, and Facebook will label the ads and who paid for them. Facebook unveiled a similar authorization requirement for election ads in October.

Meanwhile, the California legislature is seeking to clamp down on bots. Democratic state Sen. Bob Hertzberg and Democratic State Assembly member Marc Levine have both introduced legislation that would require social platforms such as Facebook and Twitter to identify automated accounts — essentially, a sort of sticker that says, “I’m a bot.”

“They built the car and they allowed the Russians to get in it, gave them the keys, and allowed them to go speeding on the highway. And then they wrecked that car into our democracy,” Levine told me recently. “So big tech needs to take responsibility for the software that they are creating.”

In November, California voters will also have the opportunity to vote on the California Consumer Privacy Act, a ballot initiative that would require companies to disclose what information they gather and how they share and sell it, and give people the right to tell businesses what they can and cannot do with their data. Facebook, Google, AT&T, Verizon, and Comcast oppose it.

The Federal Election Commission is also contemplating amending its rules on for disclaimers on political communications, including advocacy and fundraising, online. In late March, it put out two alternative proposals on the matter.

Also in March, a bipartisan group of 37 state attorneys general sent a letter to Zuckerberg “demanding answers” about the company’s business practices and privacy protections.

There’s a lot that could be on the table, but it’s not clear whether it will be

What else could the federal government do? Plenty of proposals are floating around, including mandating new guidelines on transparency and data portability (the ability of users to essentially own their data, have it deleted, and take it from one platform to another), adjusting a law to hold social media platforms liable for users’ content, and even potentially enacting comprehensive privacy legislation.

One possibility is broader legislation dealing with bots, perhaps modeled on the Better Online Ticket Sales Act (better known as the BOTS Act), a 2016 law meant to clamp down on ticket scalping and computer programs that sweep up large numbers of tickets in online sales.

Another is stricter privacy standards. The Obama administration proposed the Consumer Privacy Bill of Rights, outlining consumers’ rights to control their personal data and requirements for transparency and security. It failed to gain consensus twice, and, if anything, privacy has moved in the opposite direction: President Donald Trump in 2017 signed legislation repealing the FCC’s privacy protections for internet users.

“Efforts to set privacy standards have been ignored or even repealed,” said Rep. Frank Pallone (D-NJ), ranking member of the House committee Zuckerberg will testify before on Wednesday.

Advocates of a new comprehensive privacy in the United States hope that revelations about Facebook’s practices might push for more sweeping change. “What’s become clear here is that this is not just a consumer protection issue,” said Rebecca MacKinnon, an internet freedom advocate and director of Ranking Digital Rights, a research initiative on global standards for freedom of expression and privacy in the digital space. “Privacy protection is a national security issue.”

“The idea of Congress passing a baseline privacy law is something we’ve championed,” De Mooy said. “It’s a good time to talk about what that actually looks like.”

Advocates of broader regulation for Facebook also suggest expanding the FTC’s authority and lightening some limitations on its jurisdiction. “The FTC has no authority over nonprofits, no authority over common carriers like telecommunications or transportation, airlines, banking,” Kovacic said. “To be a really effective national privacy regulator, you have to have a broad scope of authority over everything that faces the consumer in all contexts.”

Another option would be to revisit Section 230 of the Communications Decency Act, a 1996 law that provides immunity from liability to online platforms for content generated by its users. Essentially, the law says that Facebook is like a library, not a newspaper — if you go to a library and check out a book on how to build a bomb, the library isn’t liable for that. If a newspaper publishes an article explaining how to do it and encouraging it, that’s another story.

Congress just passed legislation that rolls back portions of Section 230 for cases of sex trafficking, and that could potentially open the door for further meddling with the law. Proponents of Section 230 warn it could open up a Pandora’s box of threats to internet freedom and actually have the opposite effect of what is intended, in the case of the sex trafficking bill pushing illicit activity into even darker corners of the internet.

Sen. Ron Wyden (D-OR), who wrote Section 230, warned that changing it would “punch a hole in the legal framework of the open internet” in a speech on the Senate floor. One congressional aide said he believes that Section 230 will be the “central discussion point” on what the internet looks like over the next several years.

One big sticking point in regulating Facebook in America is the First Amendment

Part of what explains why the United States has been so reluctant to enact regulations on the internet and technology is the matter of free speech, as mandated by the US Constitution. Simply put, there is a lot the government just can’t control when it comes to what people do and do not say online.

“From a starting point, we have to recognize particularly here in the United States, with the First Amendment, there is a real limit to what regulation, what government action can do around online content,” said Emma Llanso, director of the Center for Data & Technology’s free expression project. “There are certainly things that are illegal content, so that is more of an area where talking about regulations could make sense, but so much of what comes up in general discussion about this is out of reach of government action from the get-go.”

The Honest Ads Act and FEC guidelines may be able to do something about political advertising and transparency online. But when it comes to policing hate speech, propaganda, and even fake news, it’s just a different story.

And that’s where the companies themselves have to come in. The US Congress might not be able to keep people from bullying online, but Twitter’s terms of service can.

“People tend to confuse what the government can do with what these individual companies can do,” said Karen Kornbluh, a senior fellow for digital policy at the Council on Foreign Relations and former ambassador to the Organization for Economic Cooperation and Development under the Obama administration. “It’s not a First Amendment issue for companies to take down misleading ads, hate speech, or hoaxes.”

She added that companies often face political or financial pressure to take down or lead up content and should be clearer in their terms of service about what they take down and why.

Llanso said getting more transparency from platforms about their content moderation practices, including the numbers and scope of the material there that’s being flagged and is being taken down, could help shape policy prescriptions as well. “Until we get better information into the public discourse about how these platforms are shaping the information environments that they control, we are sort of talking about policy options in the dark.”

She concurred that given limits to government control of free speech, companies do have more freedom to police what’s out there. “Any platform that I can think of has a content policy that is more restrictive than the First Amendment would permit the government to do,” she said.

There are, of course, risks to putting so much impetus on companies to act and turning them into the arbiters of what is and isn’t allowed online. MacKinnon said she’s worried about a setup that turns companies “basically into private judges, juries, and executioners when it comes to online speech.”

But if Facebook, as it says, wants to do better, that’s certainly a way. Zuckerberg told reporters last week that it currently has 15,000 people working on security and content review and plans to have 20,000 by the end of the year.

Antonio García-Martinez, who worked on Facebook’s targeted ads from 2011 to 2013, pointed out to me recently that Facebook already does plenty of self-policing and in political advertising specifically uses a strategy similar to the ones it uses in other advertising arenas. Alcohol ads, for example, are only shown to users of a certain age in the United States, another age in Spain, and not at all in Saudi Arabia, where alcohol is illegal.

“Facebook actually goes in and programmatically figures out what’s an alcohol ad and then applies business logic to it saying what’s allowable,” García-Martinez stated. “And if you break the rules enough, the account gets frozen.”

The hard truth is that the horse is already out of the barn

Zuckerberg’s congressional testimony and his and other Facebook executives’ mea culpa media blitz is perhaps the start of taking a hard look at privacy protection, data, and information manipulation online. But there’s a long road ahead — and a lot of what’s already been done is, well, done.

Facebook has admitted the majority of its users’ information has been accessed by third parties, that it scans messages, and that it keeps pretty much all of your data forever. It just announced it found more evidence of Russian troll accounts. Zuckerberg last week said uncovering nefarious content is going to be a “never-ending battle” and that you “never fully solve security.”

“I think we will dig through this hole, but it will take a few years,” Zuckerberg recently told Vox’s Ezra Klein. “I wish I could solve all these issues in three months or six months, but I just think the reality is that solving some of these questions is just going to take a longer period of time.”

The issue is, of course, a lot of data is already out there, the 2016 election is already over, and consumers’ trust in Facebook has already been breached.

“There is an element that it’s too little, too late. But we still want Facebook to make some changes, and we will ask Zuckerberg some questions about what changes he’s making. But we also have to realize that a lot of this information is already out there, and so that has to be thought about, in terms of regulation and legislation — what do we do going forward, but also what do we do for the stuff that’s out there?” Rep. Pallone said. “I don’t know that there’s an easy answer out there.”

The best answer is to hire more cyber-security professionals.

If you are interested in a career in cyber-security, it is time for you to contact ABCO Technology.

You can reach our campus by telephone at: (310) 216-3067.

Email all questions to: info@abcotechnology.edu

Financial aid is available to all students who qualify for funding.

ABCO Technology is located at:

11222 South La Cienega. Blvd. STE #588

Los Angeles, Ca. 90304

 

Cyber-security professionals needed, train and certify for a fulfilling career today!

Oracle database is in the cloud. This means numerous jobs for database and network administrators.

Database administrators are in demand. As the amount of data online continues to increase, a solid platform is needed to keep track of this information. In addition, this information needs to be accessed by many users who are in need of the reports, which can be generated by this data.

Out of all available databases, Oracle has the best platform. Oracle is now in the cloud. The company has a thriving cloud business, which enables many companies who couldn’t afford the database to now be able to access it on the cloud at a fraction of the cost.

The key question for anyone interested in database management and administration revolves around the best way to get into this career.

Oracle has the best program for training as a database administrator. In order to become a database administrator, students must pass two exams.

First the Oracle certified Associate or OCA, which tests SQL and data entry skills with the Oracle database.

The second exam is the Oracle certified Professional, which covers installation, back up and security of an Oracle database.

Training for the Oracle database administrator is usually accomplished in about four months. Students attend classes three times per week and complete a series of lab assignments, which builds upon the practical use of this database.

Major employers in Los Angeles including the Los Angeles Unified School district, Mattel, the Federal government, Department of Motor Vehicles and Raytheon use Oracle as their primary database of choice.

Students who pass both exams, the OCA and OCP may apply for jobs as an Oracle database administrator.

If you are interested in this career, it’s time to contact ABCO Technology.

You can reach our campus between 9 AM and 6 PM Monday through Friday at: (310) 216-3067.

Email all questions to: info@abcotechnology.edu

Financial aid is available to all students who qualify for funding.

ABCO Technology is located at:

11222 South La Cienega Blvd. STE #588

Los Angeles, Ca. 90304

 

Train for database administrator today!

Another day, another cyber-attack.

major restaurant chain hacked again, more cyber security needed

Chillis, a large chain of restaurants was hit with a major cyber-attack in 2018.

The chain restaurant reports the attack occurred between March and April 2018

Do you believe your credit information is safe when you eat out? If you believe so, think again! Chillis stock symbol is found by typing eat. Well, the restaurant chain sure ate it on this one.

Between March and April of 2018, Chili’s restaurants were hit by a data breach that may have compromised some guests’ payment card information. The breach was discovered last Friday, according to a press release by Brinker International, which owns the 1,600+ location chain.

Per Chili’s press release:

♬ Hey you got maybe hacked, maybe-hacked, maybe-hacked ♬

♬ Hey you got maybe hacked, maybe-hacked, maybe-hacked ♬

♬ Chili’s got hacked, baby, hacked ♬

Ok, I’m going to level with you. That wasn’t the press release. And I will probably never get a PR job with Chillis. But seriously, how could you even be mad at that?

Back to the real press release, though. Here is what happened:

On May 11, 2018, we learned that some of our Guests’ payment card information was compromised at certain Chili’s restaurants as the result of a data incident. Currently, we believe the data incident was limited to between March – April 2018; however, we continue to assess the scope of the incident. We deeply value our relationships with our Guests and sincerely apologize to those who may have been affected.

Chili’s immediately launched into its response plan and is currently working with third-party forensic experts to investigate exactly what happened.

Based on the information currently available, it appears as though malware was used to collect payment card information, specifically credit and debit card numbers and cardholder names, used during in-restaurant purchases at affected restaurants.

Chili’s does not collect certain personal information (such as your social security number, your full date of birth, or federal or state identification number). Therefore, this personal information was not compromised.

Chili’s suggests that all customers monitor their bank accounts for any unauthorized transactions. So far the complete scope of the breach is not known, including how many restaurants were affected and how many customers had their data compromised. The restaurant will continue to issue updates as they become available.

Overall, Chili’s handled this situation with aplomb. We’ve reached a point where, for big companies, data breaches aren’t a matter of if, they’re a matter of when. Chili’s had a contingency plan in place, it disclosed the breach within 72 hours of its discovery (something that would make GDPR compliance specialists proud) and the company is communicating clearly and giving customers actionable advice to help ensure that they aren’t negatively impacted.

All in all, at least externally, Chili’s has handled itself fine here. Besides, a data breach is not what keeps successful chain restaurants up awake at night. Millennials are the prime source of stress.

It is important for Chillis ensure that their customers continue dining at their restaurants. In order to create trust, the chain will be forced to spend more money for cyber security. That’s where readers of our ABCO Technology articles will benefit. If you want a promising career in cyber security, contact ABCO Technology. You can reach our campus between 9 AM and 6 PM Monday through Friday at: (310) 216-3067.

Email all questions to: info@abcotechnology.edu

Financial aid is available to all students who qualify for funding.

ABCO Technology is located at:

11222 South La Cienega Blvd. in STE #588

Los Angeles, Ca. 90304

Cyber-crime is growing faster than professionals can be hired. Train and certify for a cyber security career today!

Mobile vs desktop web pages have different search engine rankings

As if we didn’t have enough to think about with respect to any given SEO campaign, it is now imperative to separate and refine your approaches to mobile and desktop search.

While mobile has moved to 70% of all searches over the past five years, this shouldn’t be to the neglect of desktop. Although SEO for mobile and desktop follow the same basic principles and best practices, there are nuances and discrepancies that need to be factored in to your overall ranking strategy.

Part of this is the keyword rankings: you won’t ever know how to adapt your strategies if you’re not tracking the rankings separately for each. Research from Bright Edge found that 79% of listings have a different rank on mobile devices compared with desktop, and the top-ranking result for a query is different on desktop and mobile 35% of the time. These are statistics that simply cannot be ignored.

Why are they different?

Before delving into how to compare keyword rankings on mobile and desktop, it’s highly important to acknowledge the why and the what: why they rank different and what it means for your SEO strategy.

It’s paramount to understand that desktop and mobile searches use different algorithms. Ultimately, Google wants to provide the best user experience for searchers, whatever device they are using. This means creating a bespoke device-tailored experience and in order to do that, we need to delve deeper into user intent.

It’s all about user intent

The crux of the mobile versus desktop conundrum is that user intent tends to differ for each device. This is particularly important when considering how far along the funnel a user is. It’s a generalization, but overall mobile users are often closer to the transactional phase, while desktop users are usually closer to the informational phase.

For example, we can better understand user intent on mobile by understanding the prevalence of local search. If a user is searching for a product or service on mobile, it is likely to be local. In contrast, users searching for a product or service on desktop are more likely to be browsing non-location-specific ecommerce sites.

Let’s also consider the types of conversions likely to occur on each device, in terms of getting in touch. Users on mobile are far more likely to call, by simply tapping the number which appears in the local map pack section. Alternatively, desktop users would be more inclined to type an email or submit a contact form.

What on earth is a micro-moment?

To better understand the different ways in which consumers behave, it may help to spend a little time familiarizing yourself with micro-moments. These refer to Google’s ability to determine a searcher’s most likely intent, and is particularly important for mobile users, when a consumer often needs to take immediate action.

For example, if a user is searching for a local product or service, the local map pack will appear, but if they are searching for information then the quick answer box will appear. These micro-moments therefore have a significant impact on the way the SERPs are constructed.

Once you’ve understood the user intent of a given searcher, you can ensure that you are providing content for both mobile and desktop users. However, it’s worth bearing in mind that content with longer word counts continues to perform well on mobile, despite the general consensus that people on mobile simply can’t be bothered to consume long form content. This harks back to Google’s prioritization of high quality content. Besides, anybody who has a long train commute into work will understand the need for a nice, long article to read on mobile.

Rankings tools

With that context, we can now return to the matter at hand: rankings. Of course, you could record the rankings for both desktop and mobile the old-fashioned way, but who has time for that? In short, any good SEO tool worth its salt will enable you to track both desktop and mobile rankings separately. Here are some favorites:

◾SEMRush is a personal favorite among the plethora of fancy SEO tools. SEMRush provides a comprehensive breakdown of mobile vs desktop results (as well as tablet if you really want to geek out) and displays the percentage of mobile-friendly results for your domain.

◾Search Metrics offers Desktop vs. Mobile Visibility metrics, detailing individual scores for desktop and mobile, as well as overlap metrics which show how many keyword search results appear in exactly the same position for both. You can also drill down further to view how a website performs with regard to localized results.

◾Moz. Through Moz Pro, you can track the same rankings metrics for both desktop and mobile. Filter by labels and locations to dig further into the data.

◾Google Search Console. Don’t have access to any of the above tools? Don’t panic as you can still rely on the trusty Google Search Console. When looking at your search analytics, filter devices by comparing mobile and desktop. Even if you do have access to a SEO tool that allows you to do comparison analysis, it’s still worth checking in on your Search Console insights.

Rankings are only part of your overall page strategy.

It’s important to remember that rankings are basically a tiny part of the picture; it’s essential to take a more holistic approach to the mobile vs desktop issue. This means taking the time to dig around Google Analytics and unearth the data and meaning beyond the vanity metrics.

You may have higher rankings for mobile, but those users might be bouncing more regularly. Is this a reflection of the user intent or is it a poor user experience? Does higher rankings for one device correlate to higher conversions? If not, then you need to consider the reasons for this. There’s no one-size-fits-all answer, so you must take a tailored approach to your search engine strategy.

ABCO Technology teaches a comprehensive course for web development. Call our campus between 9 AM and 6 PM Monday through Friday. You can reach our campus at: (310) 216-3067.

Email all questions to: info@abcotechnology.edu

Financial aid is available to all students who qualify for funding.

ABCO Technology is located at:

11222 South La Cienega Blvd. STE #588

Los Angeles, Ca. 90304

 

Learn to build highly visible webpages today!

×

Request Info with No Obligation

    How much is tuition?Can I get financial aid?What are my career prospects?When does it start?

    By checking this box, I give consent for ABCO Technology to use automated technology to call and/or text me at the number provided above, including my wireless number if applicable. Call us for information: 310-216-3067

    I understand & agree