Create a smart phone app, change the world

Would you like to learn and possess the technical skills to make this world a better place? ABCO Technology will teach you the computer programming skills to do just that. This article is the story about Brigitte, a cyber application that was created to prevent school bullying and other offenses against students.

A World Without Bullying: Brigitte’s Story

Some people call me a “bully buster.” As a teen I did my own research about bullying, I wrote a survival guide, and I was bullied myself. I believe there’s a lot we can do to stop bullying!

To share that hope, I often visit elementary, middle, and high schools. If I came to your school, here’s what I’d do in the all-school assembly: I’d ask everybody to close their eyes for a minute.

Then I’d ask you to think of a time when you may have been bullied. Perhaps somebody said something mean to you or gossiped about you. Somebody may have punched or kicked you; the point being, an individual or a group of people did something to you that made you feel bad about yourself.

Lee este articulo

With everyone’s eyes closed, how many hands do you think would reach into the air? Ten, 20, maybe 40, tops? The answer is … at least ¾ of the students raise their hands — 3 out of every 4 kids admit to going through similar experiences of bullying!

You’re Not Alone

If you have been a victim of bullying, you probably understand how lonely it feels. You might have even thought to yourself, “There can’t be anyone else in my whole school going through this type of torment!” But, as my experiment shows, it’s simply not true.

I know that when I was in eighth grade, I sure felt that way. I have always been rather tall — I’m like 5 feet and 11 inches tall now — and I’m also quite the science nerd. I went to an all-girls middle school so things were pretty catty, especially to someone who was a little different from the rest of the pack. I went through a lot of shunning and name calling in eighth grade and I used to spend our lunch and break times in the bathroom, many times crying.

How It Felt

I remember some of my best friends turned against me and I just felt completely worthless. I convinced myself there was something about me that made all of these people turn against me and ostracize me! I feel really lucky that I have such a great family to help me rise above it and channel all of my pain into a project that will be able to help other kids survive similar or worse experiences.

I started doing research with tweens and teens to figure out just how many people actually are suffering from bullying. That plus my personal experience led me to write a book called “Dorie Witt’s Guide to Surviving Bullies.” It’s a made-up story about very real happenings and feelings.

I began my process by creating a questionnaire and online survey. I administered my questionnaire in various focus groups in which students came together and talked about bullying. You can find some of the questions and answers at the beginning of each chapter of my book! In my opinion, it shows that bullying is a universal issue that kids like you and me across America are dealing with every day!

So, I’ve gone from being bullied to helping other people get through it. When I talk to school groups, I close the exercise by asking everybody to close their eyes and think about a time when the situation was reversed. Was there a time when you were the one who wasn’t being too nice? (p.s. In case you were wondering, my hand goes up every time for this question, too.)

But it’s not just my hand. Again, about 3 in 4 people — most of the audience — say they have sometimes been the bully!

So I always ask, “If we know bullying can hurt so much, why do we sometimes turn around and become a bully ourselves?”

What Counts as Bullying?

When you think of bullying, you have to consider all four types: physical, verbal, nonverbal, and cyberbullying (using computer or cell phone). I think a common misconception we have is that physical bullying is the worst, when really all four types of bullying can be equally painful. Verbal bullying (like using words such as “gay” as insults or speaking badly about another) or nonverbal bullying (such as ignoring another person) can have long-lasting effects.

As you get older, it’s also good to know that bullying can be different as you go from elementary school to middle school and from middle school to high school. From my experience, in elementary school, much of the bullying happens on the playground and involves physical bullying and friendship troubles. You do, of course, find a lot of verbal bullying too.

In middle school, bullying gets amped up. I saw a lot of gossiping and social exclusion among girls, many times much physical bullying among boys and also verbal and cyberbullying among both boys and girls. By high school, the problem of bullying gets a little better because we’ve matured, but it doesn’t just go away.

From what I’ve seen, bullying in high school can be more aggressive. The word choices may change (harsher words and curse words). Also, teens communicate more freely by text or online. Because some kids are just physically big, that can make a bully scarier. In addition, many high schools are quite large and it can be difficult for teachers to be everywhere to stop the bullying if they see it.

What YOU Can Do

If you see bullying happen, then, as I explain in my book, you are a not-so-innocent bystander. Bystanders are so important and they have potential to make such a big difference!

Bullies like feeling popular and that they have the support of their friends and classmates in general. If you see someone bullied, you can help take that feeling of power away from the bully. How? The hardest thing to do is step in on the victim’s behalf, especially when you are the only one standing up. It’s a great thing to do, but here are some alternatives that also can be very helpful:

1.Talk to the victim afterward. Ask if the person is OK, tell them you think what happened was wrong, and offer to help them contact a grownup.

2.Use “group correction.” This is when a bunch of people agree that they’re going to stand up to a bully. You can just calmly tell the bully to stop and leave the person alone. This works best when students have been trained in how it works, which is why schools need to educate kids about this.

3.If you can’t do 1 or 2, at least tell a grownup (teacher, coach, parent) about what you saw.

Adults really can actually help, even though I get it, we don’t always want to admit this can be the case. But sometimes problems are way out of our hands and we need to get somebody else involved who can make the situation better. (p.s. The bully never has to know you were the one who got an adult involved and so you don’t have to worry about being targeted next.)

I understand it is very daunting to stand beside the victim instead of behind the bully. But think about it: Wouldn’t you want somebody to do the same for you?

It is important that adults help us with stopping bullying, but we also need to take some responsibility ourselves! It doesn’t even matter if the victim isn’t your best friend in the world. As I say in every single school I speak in, “You don’t have to like every single person, but you do need to respect them.”

The Last Straw

We all reach a point when we say, “Enough is enough! I can’t take this anymore!” By definition, bullying is a repetitive action, meaning it happens over and over again. It’s this repetitiveness of bullying, which I like to call the “daily grind,” that can really affect people so much!

Many times we can’t tell what the last straw is for somebody and we don’t always know how our words and actions may affect another person! One small insult or sarcastic comment gone awry could send someone over the edge, while a smile or other gesture of concern and kindness could save them from reaching that point.

There’s Hope, Really!

So I’ve talked a lot about the bad stuff. But there’s good, too!

I don’t think people are born “bad” and wanting to hurt other people. I think we can make a difference if we start teaching kids from a young age. We can’t just tell them bullying is wrong. We have to tell them why.

Everywhere around us we see so much violence whether it be on the television or in video games that I feel we have become desensitized to pain. People need to be reminded that violence is not actually commonplace. In the real world, when people are violent, it has big consequences.

Kids, parents, and schools need more resources to teach about bullying. Where I live in Massachusetts, I helped pass one of the most comprehensive anti-bullying laws in the nation. Because of this legislation, all schools must have programs in place for anti-bullying as well as mandatory reporting by teachers. Schools cannot choose to ignore a bullying problem, they must act.

Ending bullying is really a community effort and the more we spread the word, the harder and harder it will be for people to simply put it aside as “kids being kids.” I guess some people call me an idealist for my optimistic hope for the future, but I think we need to stop focusing on the negative and start thinking about the positive. If we live our lives in goodness, we will be able to share that with others around us!

I realize that I may not be able to end bullying forever. But I believe I can help spread support and resources across the country — and maybe the world someday. Then kids just like me know that they are never alone when facing bulling. There will always be somebody, somewhere willing to listen and to help!

This article defines the need. Here is an App. Meet Brigitte. This app was built by a group of millennials who wanted to end bullying of all types by making the process of reporting very simple. Brigitte is spreading throughout the east Coast and schools all over the country are adapting this application for student protection.

If you are interested in solving world problems like bullying, it’s time to think about creating a powerful application.

ABCO Technology’s computer programming program will do just that. Call our campus between 9 A.m. and 6 P.m. Monday through Friday. Call today at: (310) 216-3067.

Email all questions to info@abcotechnology.edu

Financial aid is available to all students who qualify for funding.

ABCO Technology is located at:

11222 South La Cienega Blvd. STE #588

Los Angeles, Ca. 90304

 

Create that new successful application today!

9 important computer maintenance tips for beginners

abco 16 years

This article contains a brief list of nine computer maintenance tips, which will make you a valued employee at your place of work.

If you are able to perform some computer maintenance on your own, you will save both money and time.

This blog post will contain some maintenance tips, which you can perform by yourself, which will help you keep your computer running smoothly.

1 First tip make sure your computer is plugged in, connections connected and your monitor is turned on.

2 Computers often build up dust on the inside. Remove dust from your PC by using compressed air. compressed air removes dust. Perform this operation approximately every 90 days unless you are in a high dust environment. If you are in a polluted environment, then use compressed air every 30 days.

3 The disk defragmenter arranges your files in logical order. It will run automatically in Windows 7 if set up. Arranging your files in logical order will speed up your computer. The disk defrag command will defrag files up to 64MB.

If you want to defrag or arrange larger files, use this command defrag c: -w. This command will defrag all of the files in your hard drive.

4 If you want to check the condition of your hard disk, use the command, Chkdsk. This command will tell you if your disk has any errors or bad tracks.

If you want a command to fix these bad tracks and errors, use the command chkdskg/f. This command will repair your disk in many instances.

If you are using Linux, use fsck.

5 It is a good practice to delete temporary files. Deleting these files will save disk space.

6 Windows disk clean up utility will delete temporary files. Deleting these files will free up disk space, which will also increase the speed of your computer.

7 In windows you have a backup and restore command where you can restore your computer to a time when it functioned without errors.

8 It is a good practice to back up to an external hard drive. Hard drives are constantly getting cheaper. Use them, they will save you time and money.

9 When backing up files, use archive attributes, this will make it easier to find these files if you need them. You simply need to select file types to be backed up and the location where you want them to be stored.

#ABCO #Technology teaches comprehensive programs for network administration and #CyberSecurity . Possessing the knowledge to fix, maintain, install and protect networks is vital in the economy of the twenty-first century. Call our campus between 9 AM and 6 PM Monday through Friday. Call today at: (310) 216-3067

Email all questions to info@abcotechnology.edu

Financial aid is available to all students who can qualify for funding.

ABCO Technology is located at:
11222 South La Cienega Blvd. STE #588
Los Angeles, Ca. 90304

 

Get started by learning computers and networks today!

Block Chain Technology, will it help you get an IT Job?

Block chain technology is talked about everywhere in the media from local news broadcasts to bfinancial network speculation relating to the future price of bitcoin. If you ask most people about this technology, they can’t define block chain in one sentence.

Block Chain is simply nothing more than shared data stored on multiple computers, which uses encryption. When we talk about encryption, we are discussing scrambeling and descrambling data for the purposes of achieving privacy.

The basic use of encryption dates back to the mid 1980s when the first encryption standards were formed.

Encryption evolved with shared key or symmetric encryption where both parties used the same key to descramble the data. Semetric encryption was fast, easy to use, but it was cracked by hackers. Next came asymmetric key encryption where each party had a different key. This was known as a set of public and private keys. Asemetric encryption was slower than its brother semetric, but it was more difficult for hackers. The public key was assigned to the sender and the private key went to the receiver.

From asymmetric came the use of a third party or introducing a third key and party into the mix.

The third key developed into the multiple computer block chain where data is shared on a large number of computers or a concept of shared trust. In addition to simply sharing data, the algorithms or operations had to be complicated to make them difficult to attack.

Naturally bitcoin became an outgrowth of this technology. The price of bitcoin has made wild swings ranging between 20 to 60% in one week.

However, bitcoin is only one of 1376 different crypto currencies.

The jobs and money in this field will come from other uses of the technology. For example Kodak is using block chain to license images for photographers. IBM is developing uses for block chain to keep track of medical records. Oracle is developing a block chain solution for databases, which must be kept very secure. Microsoft along with other fortune 500 companies are researching uses of block chain technology.

The new uses of block chain will require anyone who works in the networking field to have a solid understanding of encryption, how encryption standards operate and the fastest solutions for descrambling the data. Bitcoin for example takes almost seven minutes to complete a financial transaction. A person making the same transaction using regular currency can complete a financial exchange in milliseconds.

Although encryption is getting a lot of attention, it’s still slow when the data needs to be converted back into a readable form. Research will continue and better solutions will be developed. It is the job of the cyber security professional to determine the best ways to use block chain.

#ABCO #Technology teaches a comprehensive class for cyber security. Call our campus between 9 AM and 6 PM Monday through Friday. You can reach us at: (310) 216-3067.

Email your questions to: info@abcotechnology.edu

Financial aid is available to all students who qualify for funding.

ABCO Technology is located at:
11222 South La Cienega Blvd. STE #588
Los Angeles, Ca. 90304

 

Get started in block chain cyber security today!

Computer jobs for millennials

One of the biggest challenges parents face in 2018 is the fact that jobs for millennials or teenagers are very hard to find.

The reasons are simple.

First of all the #US is moving toward a #skills oriented economy and teenagers or millennials haven’t had the opportunity to train for a skilled job.

Second the skills based economy with political pressure is artificially forcing wages higher than the market will bear. The higher wages forces teenagers out of the conventional restaurant jobs, which they have held for the past 100 years.

The solution to this challenge is to train your son or daughter to ensure they have an employable skill early in life.

One skill, which has high demand and job growth is computer repair. When we talk about computers, we are talking about laptops, iPhones and iPads. All of the mentioned devices will breakdown. The device itself could malfunction or simply be dropped.

A training course and certification, which trains millennials to compete in the computer repair field is the #CompTia A+. Training for the CompTia A+ or a course in computer repair can be accomplished in approximately 78 hours.

After the training is completed, the candidate passes two exams to obtain the CompTia A+ certification. These exams are: 901 for hardware, which covers the building of a computer and 902, which covers all of the operating systems, which can be installed on that computer. The CompTia A+ also covers setting up a small network, installation of printers and installation of online faxes.

Employers are looking for young people who can fix computers. Jobs come in many forms. Websites including Indeed and Glass door have many listings for young candidates with the A+ computer repair certification.

#ABCO #Technology teaches courses in networking and cyber security. Our school is ideal for the teenager who wants an employable skill. The CompTia A+ is a major part of this training. Call our campus between 9 Am and 6 PM Monday through Friday at: (310) 216-3067.

Email all questions to: info@abcotechnology.edu

Financial aid is available to all students who qualify for funding.

ABCO Technology is located at:
11222 South La Cienega Blvd. STE # 588
Los Angeles, Ca. 90304

 

Train your millennial to repair computers today!

Google’s assistant competes with Amazon

Amazon Echo and its voice assistant, Alexa, might be the current market leaders in voice-activated smart technology, but recent announcements from the 2018 Consumer Electronics Show have shown that Google fully intends to challenge Amazon for that crown.

The past few days have seen some big developments – and a couple of even bigger teasers – for the future of Google’s smart assistant, the imaginatively-named Assistant.

On Tuesday, the first day of CES 2018, Google published a post to its official blog announcing partnerships with more than a dozen electronics companies to produce Google Assistant smart speakers – some with a very significant upgrade.

The blog post also highlighted the breadth and depth of “Actions”, the name given to built-in apps and integrations for the Google Assistant. At the same time, Search Console users began receiving notifications that their podcast, recipe and news content was eligible to be included in a new “Actions directory”, which is being rolled out over the next few days.

This appears to be part of an increased focus on what can be accomplished with Assistant, shifting its emphasis from finding information (Google’s long-time speciality) to carrying out tasks.

There’s a lot of news to unpack, so let’s look at what exactly these developments involve, and what they mean for SEOs and the wider industry.

SEOs using structured data are first to the Google Assistant party

While a comparatively smaller development than the flashy revelations of major electronics partnerships and smart displays, Google’s introduction of native support for podcasts, recipes and news to the Assistant is nevertheless big news for SEOs.

I owe a hat tip to Aaron Bradley of SEO Skeptic, whose post to the Semantic Search Marketing Google+ group first tipped me off to this development. In turn, he was tipped off by SEO consultant Dan Shure, who tweeted about a Google Search Console alert he’d received inviting him to “improve discovery” of his podcast in the Google Assistant

Google is gradually rolling out a browsable directory of Actions for the Google Assistant, allowing users to more easily discover what the Assistant is capable of.

Podcasts, recipes and news will be the first wave of content added to this directory – though only content published with AMP, or marked up with structured data such as Schema.org, will be getting the nod.

This means that webmasters and SEOs who have been marking up their content with structured data are already ahead of the curve in making that content available via voice – while those who haven’t must hop on the structured data (or AMP) bandwagon if they want to be eligible.

Structured data has long been touted by its fans as a great way to get search engines to better surface content from your site, particularly in the form of things like rich snippets or Quick Answers. But it can be time-consuming to add and maintain, and the immediate benefit isn’t always so obvious.

This new use case, however, shows that there is a huge potential advantage to “future-proofing” your website by adding structured data markup. If Google continues to make Assistant a primary focus going forward, then this could be the key to content optimization and discovery in a voice-driven world.

Hey, Google – look what I can do!

As discussed, Google is clearly keen to shift the focus of its voice capabilities away from information discovery towards actions.

To this end, it’s heavily promoting “Hey, Google” as the slogan for the Google Assistant, placing it in huge letters on top of its CES installation, and creating a #HeyGoogle Twitter hashtag (complete with a unique Assistant emoji) to accompany their Assistant-related updates.

But wait, you might be thinking – isn’t “OK Google” the wake phrase for the Assistant?

Yes, Google has been a bit unclear on this point, but it seems that “Hey, Google” has been an alternative wake phrase for the Assistant for a while now. In late 2016, the website Android Police reported that the Google Home responds to both “OK Google” and “Hey, Google”, but Google voice search (e.g. on mobile) responds only to “OK Google” – making it possible to differentiate if you have multiple devices within earshot.

Now, as Google moves its focus away from search and towards actions, “OK Google” is out and “Hey, Google” is in.

#ABCO #Technology teaches E-commerce courses in its web design program. Voice search is powerful and you need to get onboard with it now! Call our campus between 9 AM and 6 PM Monday through Friday. You can reach us at: (310) 216-3067.

Email your questions to: info@abcotechnology.edu

Financial aid is available to all students who qualify for funding.

ABCO Technology is located at:
11222 South La Cienega Blvd STE #588
Los Angeles, Ca. 90304

Get started marking your pages for voice search today!

#Amazon Echo and its voice assistant, Alexa, might be the current market leaders in voice-activated smart technology, but recent announcements from the 2018 Consumer Electronics Show have shown that Google fully intends to challenge Amazon for that crown.

The past few days have seen some big developments – and a couple of even bigger teasers – for the future of Google’s smart assistant, the imaginatively-named Assistant.

On Tuesday, the first day of #CES 2018, Google published a post to its official blog announcing partnerships with more than a dozen electronics companies to produce Google Assistant smart speakers – some with a very significant upgrade.

The blog post also highlighted the breadth and depth of “Actions”, the name given to built-in apps and integrations for the Google Assistant. At the same time, Search Console users began receiving notifications that their podcast, recipe and news content was eligible to be included in a new “Actions directory”, which is being rolled out over the next few days.

This appears to be part of an increased focus on what can be accomplished with Assistant, shifting its emphasis from finding information (Google’s long-time speciality) to carrying out tasks.

There’s a lot of news to unpack, so let’s look at what exactly these developments involve, and what they mean for SEOs and the wider industry.

#SEOs using structured data are first to the Google Assistant party

While a comparatively smaller development than the flashy revelations of major electronics partnerships and smart displays, Google’s introduction of native support for podcasts, recipes and news to the Assistant is nevertheless big news for SEOs.

I owe a hat tip to Aaron Bradley of SEO Skeptic, whose post to the Semantic Search Marketing Google+ group first tipped me off to this development. In turn, he was tipped off by SEO consultant Dan Shure, who tweeted about a Google Search Console alert he’d received inviting him to “improve discovery” of his podcast in the Google Assistant

Google is gradually rolling out a browsable directory of Actions for the Google Assistant, allowing users to more easily discover what the Assistant is capable of.

Podcasts, recipes and news will be the first wave of content added to this directory – though only content published with AMP, or marked up with structured data such as Schema.org, will be getting the nod.

This means that webmasters and SEOs who have been marking up their content with structured data are already ahead of the curve in making that content available via voice – while those who haven’t must hop on the structured data (or AMP) bandwagon if they want to be eligible.

Structured data has long been touted by its fans as a great way to get search engines to better surface content from your site, particularly in the form of things like rich snippets or Quick Answers. But it can be time-consuming to add and maintain, and the immediate benefit isn’t always so obvious.

This new use case, however, shows that there is a huge potential advantage to “future-proofing” your website by adding structured data markup. If Google continues to make Assistant a primary focus going forward, then this could be the key to content optimization and discovery in a voice-driven world.

Hey, Google – look what I can do!

As discussed, Google is clearly keen to shift the focus of its voice capabilities away from information discovery towards actions.

To this end, it’s heavily promoting “Hey, Google” as the slogan for the Google Assistant, placing it in huge letters on top of its CES installation, and creating a #HeyGoogle Twitter hashtag (complete with a unique Assistant emoji) to accompany their Assistant-related updates.

But wait, you might be thinking – isn’t “OK Google” the wake phrase for the Assistant?

Yes, Google has been a bit unclear on this point, but it seems that “Hey, Google” has been an alternative wake phrase for the Assistant for a while now. In late 2016, the website Android Police reported that the Google Home responds to both “OK Google” and “Hey, Google”, but Google voice search (e.g. on mobile) responds only to “OK Google” – making it possible to differentiate if you have multiple devices within earshot.

Now, as Google moves its focus away from search and towards actions, “OK Google” is out and “Hey, Google” is in.

ABCO Technology teaches E-commerce courses in its web design program. Voice search is powerful and you need to get onboard with it now! Call our campus between 9 AM and 6 PM Monday through Friday. You can reach us at: (310) 216-3067.

Email your questions to: info@abcotechnology.edu

Financial aid is available to all students who qualify for funding.

ABCO Technology is located at:
11222 South La Cienega Blvd STE #588
Los Angeles, Ca. 90304

 

Get started marking your pages for voice search today!

Top tips for voice search and mobile usage

Voice search and mobile usage are both on the rise and look set to shape the SEO industry for some time to come. Nonetheless, 62% of marketers have no specific plans for voice search in 2018.

How can marketers take action today to tap into two of the most important trends in the industry?

As mobile usage continues to grow, more and more users are comfortable with speaking to their devices rather than typing their queries.

Of equal importance are the advances in speech recognition technology that have allowed the likes of Google, Amazon, and Apple to offer a satisfying voice search experience.

There is plentiful context to make marketers aware of these emerging trends, with both mobile and voice search set to shape the future of the industry:

◾Voice-enabled personal assistants are installed by default on all smartphones

◾Google has revealed that more than 20% of searches on an Android device are voice searches

◾The Amazon Alexa app recently topped the app store charts. The Google Home app occupied second position

◾The Amazon Echo was once again the best-selling item on Amazon this holiday season

◾Speech recognition accuracy is now north of 95% for all of the major technology providers

◾Google’s mobile-first indexis rolling out and will soon be applied to all sites

◾comScore predicts that 50% of all searches will be by voice in 2020.

Though the two are not perfectly aligned, there is a clear correlation between the growth of voice search and the ongoing rise of mobile.

As the Internet of Things takes off, voice will be one of the most important unifying factors across all hardware. Whether at home, in the car, or at work, there will always be a voice-enabled device close to hand.

And yet, a recent study by BrightEdgereported that 62% of marketers are unlikely to implement a specific strategy for voice search over the next 12 months.

This is not due to a lack of awareness of the trend, but rather a lack of direction when it comes to preparing for its implications.

In a clear indication of how significant the shift to voice-based searches will be, Google recently released a new set of Search Quality Rating Guidelines for the Google Assistant.

Though specific to the Google Assistant, we can safely assume that the same rules and objectives underpin the functioning of other digital assistants too.

As such, this document can prove both illuminating and instructive as we look to move beyond the hype that voice search brings and arrive at some tips to direct our mobile SEOefforts.

The findings in Google’s official guidelines for voice search evaluation, along with the best practices we already have for mobile SEO, can help us create a hybrid set of tips to improve any site’s chances of ranking in this new landscape.

This begins with some technical considerations, then moves on to a more nuanced understanding of how consumers are using voice to interact with their devices. Finally, we must create the right content to fit our target contexts, and find a way to measure our progress.

Technical SEO for mobile devices

As with so many aspects of SEO, crawlability is the foundation upon which a mobile SEO strategy for voice search must be built.

Put simply, if a search engine cannot access and understand your content, your chances of appearing in search results are slim. This as always been important, but it takes on a new level of significance when viewed through the lens of voice search.

Often, voice search removes the traditional search engine results page (SERP) and instead aims to provide one answer in response to a query. This is a search engine’s first port of call; it is only when one answer cannot conclusively answer the query that a more traditional list of results will be displayed.

Fortunately, there are some guidelines we can follow to increase the likelihood of our content ranking via voice search:

◾Schema markup: By adding schema markup, we can help to add structure to our website’s data. For example, we can alert search engines to elements that relate to events, prices, and people – among many others. When a search engine is trying to locate a response to a voice search, this extra information can prove invaluable.

◾XML sitemaps: Having a clearly structure sitemap that can be navigated easily both by people and by search engines will increase the likelihood that your information can be sourced quickly in response to a query.

◾Site structure: The structure of a website should mirror the journeys that users typically take when considering and making a purchase. For example, faceted navigation on an ecommerce site should aim to match common query strings.

◾Carry out a mobile SEO audit: Before embarking on any of the more innovative aspects of voice search, conduct a full mobile SEO site audit to ensure that you are in a solid position.

◾It is also worth reviewing the basics of mobile SEO to keep in mind the distinctions that set it apart from traditional SEO.

Understanding context

All language is contextual. The exact same query, at surface level, can in fact mean many different things based on how, when, where, and by whom it is said.

This is not a new discovery, but it is only recently that search engines have been able to understand the context of a query.

In part, this has been due to more sophisticated algorithms like Google’s Hummingbird update, which brought the concept of semantic searchto life.

However, the biggest source of contextual information is the smartphone. Our phones are constantly sending and receiving data, all of which can be processed to comprehend our past, present, and even our future behaviors.

Now, when a user searches for a term like [canon cameras], a search engine can use smartphone data to understand the implied intent of the query:

cameras

This implicit intent, now known to a search engine, can help to shape and personalize the results that the user sees.

There are other effects of this deeper understanding.

Varied queries can ultimately express the same underlying intent. For example:

sunny

The expression of the response may differ, but all variations are ultimately answering the same question. The user wants to know what the weather will be like tomorrow.

This is helpful, as it allows us to see that we don’t need to answer every single possible query that is out there. Many guides on voice SEO suggest creating FAQ pages as a way to grow traffic, but this seems a stop-gap solution when we can do better. SEO needs to move away from creating “SEO pages” on websites that serve no real purpose other than to attract organic search clicks.

Thus far, our industry has focused mainly on what has been said by searchers. We pull a list of keywords with search volumes, difficulty scores and so on, and we map those to our pages. Where a page does not exist for a group of keywords, we create one.

A further level of nuance can be added by segmenting the keywords by purchase stage: informational, navigational or transactional, for example. These can also be categorized as ‘Know’, ‘Go’, and ‘Do’ moments.

That is useful, but it is overly simplistic. What we often end up with is a comforting illusion; a spreadsheet that smooths over the rough edges to provide a digestible view of what people search for, cell by cell.

Reality does not fit so readily into neat compartments.

In a presentationgiven last year, Tom Anthony of Distilled mapped out what the new ecosystem looks like, based on the huge amount of data a smartphone both sends and receives:

tom_anthony

Even this is a reduction, but it does at least provide insight into the broader picture.

What this means is that when working on a mobile SEO strategy, we should identify the contexts in which our content could rank.

These contexts can be strung together to create a map of the typical user journey.

This can be informed by demographic data, as there are telling differences between the generations. In particular, we should note that younger generations are more comfortable with voice search and use it in very different situations to their older counterparts.

voice_search_today

Stone Temple Consulting produced an excellent, in-depth study that goes further still to segment this data by income. voice search seo incomeSource: Stone Temple Consulting

What we find through this report is that there are notable variations at every level of analysis. By location, gender, device, income level, and age, we find that people use voice search differently.

Marketers would do well to perform research of their own to pinpoint the right contexts for their business to target, through qualitative research and quantitative analysis.

Creating the right content at the right time

Once we have plotted out the potential contexts in which we could communicate with our audience, we need to create the content that will hopefully help us rank via voice search.

Though this is a nascent field, there are already some useful studies that can guide us in this process.

Voice queries tend to be longer, due to their closer relationship to natural speech patterns. This provides a significant amount of data for us to analyze, compared with the shorter queries we have grown accustomed to.

Where once we had to infer a consumer’s intent based on feedback signals (click-through rate, bounce rate, conversion rate), we can now start this process much earlier.

We should also bear in mind the anticipated input-output relationship between the consumer and the device. For example, a spoken query that prompts a spoken response will need to be fed by content that is clear, concise, and conclusive.

Google’s Research Blogoffers the following areas for assessment when it comes to this kind of voice search:

◾Information Satisfaction: the content of the answer should meet the information needs of the user.

◾Length: when a displayed answer is too long, users can quickly scan it visually and locate the relevant information. For voice answers, that is not possible. It is much more important to ensure that we provide a helpful amount of information, hopefully not too much or too little. Some of our previous work is currently in use for identifying the most relevant fragments of answers.

◾Formulation: it is much easier to understand a badly formulated written answer than an ungrammatical spoken answer, so more care has to be placed in ensuring grammatical correctness.

◾Elocution: spoken answers must have proper pronunciation and prosody. Improvements in text-to-speech generation, such as WaveNet and Tacotron 2, are quickly reducing the gap with human performance.

This insight should flow directly into the site experience. If we know which task our consumer is trying to complete, we can make this process and seamless and as painless as possible.

There are some points that apply to any site aiming to create content for voice search:

◾Remember that a voice search is only the start of the user journey. If your mobile site experience does not match the user’s intent, they will complete the journey elsewhere. Use a user-agent switcher or a site like http://mobiletest.me/to see how your mobile experience matches up.

◾Create content that responds to the most common conversational queries. Provide clear information that can easily be picked up by a search engine as it tries to provide one, true answer for each voice query. Tools like Answer the Publicare useful for this task, but try to assimilate this information naturally into your content rather than creating a host of FAQ pages.

◾Map this content to a logical site hierarchy that is crawlable for search engines and useful for consumers.

◾Google is preparing to add voice queries to Search Console, so we will soon be able to assess and track our voice search performance.

Given that voice searches on a mobile device are frequently completed on the go, it should not be surprising that users often want help with navigation.

Interestingly, the growth in the number of ‘near me’ searches has slowed as people have come to expect Google to understand this implied intent.

Google uses its own Maps product to respond to these queries, so we can optimize our own Maps listings to help search engines and people to navigate better. There are a few tips to keep in mind when working on a voice search strategy for local SEO:

◾Ensure that names, addresses and phone numbers are accurate across all locations.

◾Consider using a specialist platform to manage your local listings and monitor your local search performance. There is a growing range of mobile SEO tools that can help with these tasks.

◾Make it easy for consumers to act on their intentions. This means adding in clear calls to action and directions to further information.

What’s next for search?

It is important to understand Google’s vision for the future of search.

The technology has improved dramatically, but it is still some distance from fulfilling the ambitions of Google and Amazon. When this technology reaches its potential, there may be no need for a query at all, as the digital assistant will be able to pre-empt our actions.

For now, marketers need to assist the assistants in the manner outlined above.

In essence, technology is enabling behaviors that have their basis in pre-existing states of intent. The industry is growing in complexity, but simultaneously it is developing into a more realistic representation of how people want to search.

Through better understanding of both people and technology, marketers can create a voice search strategy that will stand the test of time.

ABCO Technology teaches an excellent course for the Certified Webmaster, which includes search engine optimization. Call our campus between 9 AM and 6 PM Monday through Friday. You can reach us at: (310) 216-3067.

Email your questions to: info@abcotechnology.edu

Financial aid is available to all students who qualify for funding.

ABCO Technology is located at:
11222 South La Cienega Blvd STE #588
Los Angeles, Ca. 90304

 

Build successful voice search webpages today!

New breakthroughs in cyber security by Polyverse will create new jobs for programmers and network administrators.

The “WannaCry” virus, which took down, among others, the National Health Services’ computer network in the United Kingdom last May, was formally labeled a North Korean plot by the U.S. last month. Lost in the foreign intrigue were some basic questions. Why had computer administrators in the U.K. and elsewhere not applied the software fix issued by Microsoft months earlier to protect the vulnerable Windows software? Or was the U.S.’s National Security Agency partly to blame for stockpiling malicious code?

Perhaps most important, why hadn’t billions of dollars worth of computer security gear from leading cyber protection companies such as Cisco Systems (ticker: CSCO), FireEye (FEYE), Palo Alto Networks (PANW), and Symantec (SYMC) foiled the attacks?

Not too surprisingly, the founders of a three-year-old cyber security start-up called Polyverse are convinced their new system “would have completely prevented WannaCry,” says Alex Gounares, the company’s CEO.

The chief technologist of Microsoft’s (MSFT) online unit back in the 2000s, Gounares—who was Bill Gates’ personal technology advisor—says the hackers’ success relied on a simple asymmetry: It costs far less to attack a computer system than it does to protect one. Existing systems build the equivalent of walls and moats around a castle, the so-called firewall that sniffs out intruders and tries to block access. The defenders must guess where they might be attacked and try to anticipate every possibility. It’s a costly and never-ending process.

The problem is that attackers can spend all the time they want studying the situation, looking for holes or ways to get around the protections. If anything, new discoveries have made it easier for hackers far less sophisticated than WannaCry’s creators to take control of a computer.

Polyverse, which has gotten good reviews for its fledgling system, tries to shift the balance of economic power back to the defenders. By replacing the basic instructions inside a computer program with alternate instructions, Polyverse keeps scrambling the code. Doors and windows familiar to hackers disappear quickly, raising the stakes—both on speed and spending—for attackers.

“Dollar for dollar, offense has been winning,” despite billions spent on computer defense, says Bryan Smith, who worked for six years at the National Security Agency and now runs a tech incubator called Bantam Technologies. “Polyverse actually does switch the advantage back to the defender.”

If #Polyverse or a rival does succeed, it will mark the latest shift in the decades-long war for control of computer networks. A computer operates via a series of instructions written by a programmer telling the microprocessor, the brains, to carry out one basic function over and over. That function is to take some values stored in its memory circuits, to perform an operation on them, such as addition, and stick the result back in memory. A hacker tries to gain control of a computer by replacing the programmer’s series of instructions with his own, either changing the operations specified or sometimes changing where in memory the chip fetches and stores values.

One of the last big strategic shifts in the war came in 2007, when a computer scientist named Hovav Shacham showed it was possible to use a computer’s own code against it without injecting new code. Code is a long string of ones and zeros, and the computer chip only knows the instructions by knowing how to divide the ones and zeros into the right sequence of bits that make up each successive instruction. But Shacham realized he could direct the chip to divide the ones and zeros differently, thus changing the instructions.

To complicate hackers’ task, Gounares, 46, conjured ways for them to find not the traditional string of instructions, but a completely different set. Polyverse’s technology is what’s called a binary scrambler. It mixes up the ones and zeros of a program but lets the users’ tasks be completed undisturbed. The exercise turns the attackers’ own game against them, employing different instructions before the attacker can.

AT MICROSOFT, Gounares was well aware of the common complaint that Windows was a “monoculture,” a uniform system that attracted a mass following of developers but also armies of attackers aware of the software’s vulnerabilities. At Gates’ famous retreats to contemplate high-level software issues, the two would occasionally discuss using epidemiology, or the study of the spread of disease, as a guide.

Gounares, who is fond of nerdy references, poses the question, “Why hasn’t the earth been taken over by the zombie apocalypse?” The answer is because human DNA varies enough that no diseases can spread so far they devastate the entire population. But software is like DNA that’s uniform: It can be compromised because it’s reliably the same.

The solution was to create “entropy,” as he puts it—a divergence in the code so that every computer has unique sequences of instructions running through it. Polyverse’s product to date has been for scrambling the Linux operating system. Later this year, it will offer a version that can scramble the entire Windows operating system and programs that run on Windows, says Gounares. Some customers have been given the Windows version to test.

POLYVERSE IS A VERY small company with a promising idea. Funded with just $6 million in private capital, the Seattle-area entity has less than $10 million in annual sales, though Gounares pledges that will rise into the tens of millions over the course of the next 12 months. That’s compared with roughly $2 billion annually in security-related revenue for Cisco, the biggest publicly traded cyber security vendor.

To be sure, Polyverse is not the only company to have thought of what’s known as “moving target defense.” The Massachusetts Institute of Technology’s Lincoln Labs has a rich literature on the subject. But researchers there found problems cropping up: Either the scrambling is limited, leaving avenues of attack, or the scrambled programs degrade in performance.

“We have taken this from an academic approach to an industrial-strength system,” insists Gounares. Polyverse scrambles all the parts of a program, not just some, he says, and without affecting the performance a user experiences.

Steven Potter, a former Navy SEAL who heads sales, sees the military as a key market for Polyverse. There are U.S. weapons systems running on versions of Windows no longer supported by Microsoft. To rip and replace, as they say, those computer systems to make them safer can run into billions of dollars. Hence, a Polyverse sale can be an economical option for government, notes Potter, who served as a contractor in Afghanistan ensuring cargo was safe for the war effort. The firm has already won several military contracts.

Potter, however, becomes most animated when discussing the possibilities offered by the weakness of existing cyber companies. “Where the disruption comes from,” says Potter, “is that with the Palo Alto’s, and the FireEyes, and Symantecs, you can literally take a class and for $1,000, you can hack through any known firewall on the planet.”

Cisco, FireEye, and Symantec declined to comment, while Palo Alto did not return my calls last week.

With the publicity and questions that accompany each new WannaCry-like cyber disruption, Polyverse’s opportunity grows. The system of walls and moats just might be giving this company a great opening.

ABCO Technology offers a complete program for cyber security. Cyber security jobs in Los Angeles are exploding. If you are interested in a career in this exciting field, contact ABCO Technology.

You can reach us by telephone from 9 AM to 6 PM Monday through
Friday at: (310) 216-3067.

Email your questions to: info@abcotechnology.edu

Financial aid is available to all students who qualify for funding.

ABCO Technology is located at: 11222 South La Cienega Blvd. STE #588

Los Angeles, Ca. 90304

 

Cyber security jobs will expand through 2030 says the US Department of Labor. Start your new career today!

iPhone X Explained

Apple departed from its traditional preview strategy for what it bills as its most important new iPhone in years, prioritizing early access to the iPhone X for YouTube personalities and celebrities over most technology columnists who traditionally review its new products.

Apple provided the iPhone X to a small number of traditional testers for about a week, while limiting most others, The Wall Street Journal included, to a single day with the device before reviews could be published. About a half-dozen personalities on Alphabet Inc.’s YouTube video service were granted time with the device before its release.

The company seeded the iPhone X to at least three influencers with different audiences: actor Mindy Kaling, who shared her thoughts with Glamour; 12-year-old developer Alex Knoll, who showed off the device on Ellen DeGeneres’s television show; and political journalist Mike Allen, who included insights from his tech-savvy nephew in Axios’s morning newsletter.

Apple Is Designing iPhones, iPads That Would Drop Qualcomm Components
Apple Watch Hits Cellular Snag in China
.
Traditional publications and tech outlets that in past years received review models for a week of testing were given the iPhone X fewer than 24 hours ago, resulting in crash reviews and first-impression takes from USA Today, the Washington Post, the Verge and others.

In the U.S., BuzzFeed, TechCrunch and Mashable were given a week with the iPhone X, as were the Telegraph and the Independent in the United Kingdom. The device also was given for a week to outlets in Japan, China, Australia and other countries. Steven Levy, among the handful of people to test the first-ever iPhone, spent a week with the iPhone X and posted his “first look” impressions on Backchannel, part of Wired Media Group, a day before most other publications..

The change in strategy meant the iPhone X, which hits stores Friday, got less testing than most of its predecessors before reviews could be published. The handful of reviewers that received the device for a week largely praised its full-screen display, facial-recognition system and smaller physical size. Removing the physical home button meant people would have to adjust to how they operated the device, they said.

iPhone X Review: Testing (and Tricking) FaceID
The number one new feature on the iPhone X is its facial recognition system. WSJ’s Joanna Stern put it to the test with masks, costumes and identical triplets.
Crash reviewers largely echoed those sentiments, adding the caveat that they could discover issues after they spend more time with the device. Most pledged full reviews for later in the week.

The review strategy is “unusual,” said Jan Dawson, an analyst with Jackdaw Research. “It’s possible Apple wanted some reviews out early and those would be the more enthusiastic ones.”

He said YouTube reviewers tend to be more positive when given early access to devices, and that most reviews aren’t overly negative.

“Unless Apple felt like there would be some bad elements in the reviews, why would you hold back?” Mr. Dawson asked. “Why would you be selective about who gets it first?

The unusual approach comes in an iPhone release year marked by anomalies. For the first time, Apple released a trio of new handsets at its big fall launch event—the iPhone 8, 8 Plus and X. It also increased prices on its suite of new phones and staggered the launch with the iPhone 8 hitting stores Sept. 22 and the iPhone X hitting stores six weeks later.

The iPhone X arguably is the most important iPhone in a decade. Apple billed the device the smartphone of the future, and investor anticipation of strong sales has helped send the company’s stock up more than 45%. Its success has taken on increasing importance amid lackluster sales for the iPhone 8 and 8 Plus.

At $999, the iPhone X is the highest-priced major smartphone ever. It is expected to be in limited supply after production issues over the summer delayed manufacturing by at least a month.
Advanced preorders began last week, and early demand quickly pushed shipment times for the device to five to six weeks from the day of an order—more than double the wait for last year’s iPhone 7.

 

If you want to learn how to build applications for Apple’s iPhone X along with other smart Phone, it’s time to contact ABCO Technology. You can reach our campus between 9 AM and 6 PM Monday through Friday. Call us today at: (310) 216-3067.
Email all questions to: info@abcotechnology.edu
Financial aid is available to all students who can qualify for funding.
ABCO Technology is located at:
11222 South La Cienega Blvd. in STE # 588
Los Angeles, Ca. 90304
iPhone X is the smart phone of the future. Build applications for it today!

What Does A Computer Systems Analyst Do?

What Does a Computer Systems Analyst DoAre you adept with computers and the information networks they are part of? If you are looking for a job with good pay and a bright future, you may want to consider becoming a computer systems analyst. According to the Bureau of Labour Statistics* the United States will need 118,600 new computer systems analysts between 2014 and 2024. The pay is excellent as well, at typically over $85,000 per year. So what do computer systems analysts do?

The main role of a computer systems analyst is to help an organization operate effectively using computer systems, procedures and software. He or she works with both the business side of the organization to determine their needs, and the IT side to help create the solutions. Getting from determining the need to creating the solution takes a number of steps.

Step One: Work With Business Managers to Understand Their Needs

Whether a business sells products online, keeps client records or tracks the movement of equipment, a computer systems analyst is the person who designs the IT system that makes it all work. By consulting with the business leaders, systems analysts create diagrams that show how information should move be accessed and stored throughout the organization. This is an investigative step, where the systems analyst has to ask open-ended questions like “Who, What, When, Where and Why?”

Step Two: Research Potential Solutions

If the current IT system isn’t providing all the solutions that the business leaders need, then the systems analyst starts his or her research. Their goal is to find out what new software, hardware or networks might work.

Step Three: Create a Cost/Benefit Analysis

Usually, a number of solutions will present themselves. When this happens, the systems analyst has to determine the pros and cons of each. A systems analyst might present a variety of recommendations, from “basic and inexpensive” to “powerful but costly”.   They then work with the business leaders to find the right balance between the cost of the system and the benefits to the organization.

Step Four: Improve existing systems /Design new systems

Depending on what decisions the business leaders reached, it’s the systems analyst’s job to manage any changes and upgrades. Systems analysts choose the hardware and software, and make sure that IT staff install and configure it correctly. They test the system thoroughly to make sure it works as expected once it’s installed.

Step Five: Document and Train

The computer systems analyst knows the new system like no other employee – at first. The final task in a project is to bring all the users up to speed. The analyst does this through training and providing documentation of how to use the system. Until recently this documentation would be provided in the form of instruction manuals. Now, that instruction can also take the form of video tutorials or guided online instruction and support. The systems analyst can to this job, or can act as the subject matter expert to an instructional designer who prepares the training materials.

Interested? Learn more

A computer systems analyst combines deep knowledge of computer systems with excellent communications and managerial skills. If you think this work is right for you, consider the hands-on, focused training at ABCO Technology in Los Angeles. Our Network Administrator and Systems Engineer program will help prepare you with the technical knowledge for success in this high-growth field.

*Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, 2016-17 Edition, Computer Systems Analysts,
on the Internet at http://www.bls.gov/ooh/computer-and-information-technology/computer-systems-analysts.htm (visited July 13, 2016).

 

×

Request Info with No Obligation

    How much is tuition?Can I get financial aid?What are my career prospects?When does it start?

    By checking this box, I give consent for ABCO Technology to use automated technology to call and/or text me at the number provided above, including my wireless number if applicable. Call us for information: 310-216-3067

    I understand & agree