|
|
The Art of SEO : The Theory Behind Keyword Research |
Keyword research is one of the most important, valuable, and high-return activities in the search engine marketing field. Through the detective work of dissecting your market’s keyword demand, you learn not only which terms and phrases to target with SEO, but also more about your customers as a whole. |
|
jQuery 1.3 : Headline rotator (part 7) |
Before we put away our headline rotator example, let's give it a finishing touch, by making the headline text appear to fade in from the bottom of its container. The effect will be a gradient fade, appearing as if the text is opaque at the top of the effect area and transparent at the bottom. |
|
jQuery 1.3 : Headline rotator (part 6) |
The news feed that we've been using for our example is a local file, but we might want to retrieve a feed from another site altogether. As we saw in Chapter 6, AJAX requests cannot, as a rule, be made to a different site than the one hosting the page being viewed. |
|
jQuery 1.3 : Headline rotator (part 5) - Pause on hover |
Even though the headline rotator is now fully functioning, there is one significant usability issue that we should address—a headline might scroll out of the viewable area before a user is able to click on one of its links |
|
|
jQuery 1.3 : Headline rotator (part 3) - Setting up the rotator |
Since the visible news item will change over time, we'll need a way to easily keep track of which items are visible and where they are. First, we'll set two variables, one for the currently visible headline and one for the headline that has just scrolled out of view. Initially, both values will be 0. |
|
jQuery 1.3 : Headline rotator (part 2) - Retrieving the feed |
This method, as we have seen before, allows us to operate on content from a remote source by using a success handler. The content of the feed is passed to this handler as an XML structure. We can then use jQuery's selector engine to work with this data. |
|
|
Benchmarking Current Rankingstages of SEO |
The most fundamental objective of any SEO project should be to drive the bottom line. For a business this means delivering more revenue with favorable ROI. As a predecessor to determining the level of ROI impact, the SEO practitioner must focus on increasing the volume of relevant traffic to the site. |
|
|
|
First Stages of SEO : Assessing Historical Progress |
Measuring the results of SEO changes can be challenging, partly because there are so many moving parts and partly because months can elapse between when changes are made to a site and when results are seen in search rankings and traffic |
|
First Stages of SEO : Determining Top Competitors |
Understanding the competition should be a key component of planning your SEO. The first step is to understand who your competitors in the search results really are. It can often be small players who give you a run for your money. |
|
Relevant IAM Standards and Protocols for Cloud Services (part 2) |
OAuth is an emerging authentication standard that allows consumers to share their private resources (e.g., photos, videos, contact lists, bank accounts) stored on one CSP with another CSP without having to disclose the authentication information (e.g., username and password) |
|
Relevant IAM Standards and Protocols for Cloud Services (part 1) |
The following IAM standards and specifications will help organizations implement effective and efficient user access management practices and processes in the cloud. These sections are ordered by four major challenges in user and access management faced by cloud users |
|
Identity and Access Management : IAM Architecture and Practice |
One critical challenge of IAM concerns managing access for diverse user populations (employees, contractors, partners, etc.) accessing internal and externally hosted services. IT is constantly challenged to rapidly provision appropriate access to the users whose roles and responsibilities often change for business reasons. |
|
Identity and Access Management : Why IAM? |
In addition to improving operational efficiencies and effective compliance management, IAM can enable new IT delivery and deployment models (i.e., cloud services). For example, federated identity, a key IAM component, enables the linking and portability of identity information across trust boundaries |
|
Identity and Access Management : Trust Boundaries and IAM |
In a typical organization where applications are deployed within the organization’s perimeter the “trust boundary” is mostly static and is monitored and controlled by the IT department. In that traditional model, the trust boundary encompasses the network, systems, and applications hosted in a private data center managed by the IT department (sometimes third-party providers under IT supervision). |
|
|
Parallel Programming with Microsoft .Net : Parallel Tasks - Design Notes |
The task will not migrate among threads at run time. This is a useful guarantee because it lets you use thread-affine abstractions, such as the Microsoft Windows® operating system’s critical sections, without having to worry, for example, that the Monitor.Enter function will be executed in a different thread than the Monitor.Exit function. |
|
Parallel Programming with Microsoft .Net : Parallel Tasks - Anti-Patterns |
In C#, a closure can be created with a lambda expression in the form args => body that represents an unnamed (anonymous) delegate. A unique feature of closures is that they may refer to variables defined outside their lexical scope, such as local variables that were declared in a scope that contains the closure. |
|
|
|
Parallel Programming with Microsoft .Net : Parallel Tasks - An Example |
An example of task parallelism is an image processing application where images are created with layers. Separate images from different sources are processed independently and then combined with a process known as alpha blending. This process superimposes semitransparent layers to form a single image. |
|
|
jQuery 1.3 : The jQuery UI plugin library |
While the Form plugin does one thing, and does it very well, jQuery UI does a wide variety of things (and does them well). In fact, jQuery UI is not so much a plugin, but rather a whole library of plugins. |
|
jQuery 1.3 : The Form plugin |
The Form plugin is a terrific example of a script that makes a difficult, complex task dead simple. The plugin file, along with detailed documentation, is available at http://malsup/com/jquery/form/. |
|
jQuery 1.3 : How to use a plugin |
Many plugins have built-in flexibility as well, providing a number of optional parameters that we can set to modify their behavior. We can customize their operation as much as needed, typically by including a map as the method's argument |
|