Sunday 5 June 2016

Strength of Back Links and Site Trust


In SEO term powerful backlinks provides mechanism for google to trust your website, it also build authority and credibility. Sometime a site with 50 strong and trusted backlinks can beat the other site with 1000 week and untrusted backlinks. So, it is important to consider the strength of the link to your site as it matters.

Strength of Backlinks

Each backlink is valuable vote to your site in SEO world but here more is not always better, competitor can beat you even with less votes or backlinks because google or major search engines gives more priority to dofollow backlinks and links from trusted sites.

Following graph clearly describes the power and importance of backlinks.


Backlinks Pie Chart



Above pie chart noticeably shows the importance of each area of SEO. On Site or on page SEO means site optimization on written code whether it is  HTML, XML, CSS, JAVASCRIPT or mixture of them, it includes the following factors to keep in mind for onsite SEO.

Meta tag (Description, Robot file): Meta tag is a meaningful way for webmaster to deliver the information to search engine about your content/site, Usually search engine processes only the meta tag and ignore the rest.

Sitemap: Sitemap is list of webpages accessible to crawl or search engine in xml format, how many pages are there and how they are linking together, it doesn’t need to see to users.

Title Tag: To give the title to page, you cannot assign more than one title to html document.

The URL: It works well in SEO, your designated keywords should be in URL as well as in the content.

H1 Heading: It is very important as it shows the all about your content and each page should have one h1 heading.

Site Navigation: It should be well defined for the ease of users, your visitors won’t lost in your website. It is one of the google’s like list.

Image Alt keywords: Search engine do not mess with the picture placed on your site and for search engine to understand the image you should assign alt tag to each image because it defines the image what it is about.

Keyword Density: In lay man term it means the ratio of any keyword in your article, to elaborate it further let's ask, how many times any specific keyword is used in article as search engine consider it spam in case of excess usage. So it is good to keep it 2-3% of  total.


If we talk about content of the site, it should be unique first of all and attractive for users to like and share with others as this act increase the visibility of your site in the eye of google.

Last but not least, backlinks has more power than others as in real world anyone wins with more votes to compete the competitor, same rule apply here because your backlinks are your vote to your site but it should be from strong parties.

What Backlinks are and how it affects the ranking




When someone thinks to bring the web page or blog in list of search engine or wants the site to be indexed by search engine, owner of the site have to do a lot of work on Search Engine Optimization (SEO). Many are very familiar to this term but new comers to the SEO world are not. If you are familiar to the SEO but not backlinks then it is very important to understand what backlinks are and how it can affect the ranking of your page.
Backlinks means incoming connections or links to your web from other relevant sites. A webpage with lots of backlinks tends to high in ranking among other sites, search engine in this case Google will give priority and will trust your site to display your post or page to users searching for. But keep in mind Google is not just count the number of backlinks but also detect the strength of link whether it is linking with strong and trusted site or not, if not then your page will have low or no priority and ranking. Explore more about backlink strength and site trust, backlinks are votes to your site which builds trust and quality for ranking and listed in search result. If talking about backlinks then it is necessary to know about both types of backlinks as described below.
·         Nofollow links
·         Dofollow links

Nofollow Links

When your site is linked with noffollow tag, webmaster tells search engine to not to follow links on this page and then there is a chance to get low priority and ranking for your site or post. By linking this kind of tag you may do much struggle but earn less. Nofollow attribute entered in page level meta tag and it instruct the search engine to not to follow this link.

Example:

<meta name="robots" content="nofollow" />

Above example instructing all search engines that “Do not follow this link”
But in some cases you or someone aim to tag this attribute to a specific link or page so search engine won’t follow this, following attribute stating this.

Example:

<a href="signin.php" rel="nofollow">sign in</a>

In above scenario search engine will not follow only signin page.


Dofollow Links

Dofollow links giving instructions to search engine to follow this web page and in this case you may have more priority and trust if you are linked on a strong enough site. By default all tags you add are do follow until unless you mention “Nofollow”.
Means if you want search engine to follow this link, you do not even need to mention “dofollow” as it understands if there is no “nofollow” attribute then it is to do.

Example:

<a href="http://example.com">Example</a>

You have some background knowledge about backlinks, you might have question now that how to get back link opportunities?
Following are the tips and the way to get backlinks to your site, but before taking this step please be sure that you are getting this link from trusted, with high PR and dofollow link site.


Discussion Forums

One of the authentic and possible way to get backlinks are discussion forums and good thing is they are free to participate and to make links back to your site, here make sure you are doing backlinking on forums which provide dofollow links.
Find the list of some of the dofollow backlink forums, there may be more but some of them are listed below.

http://www.ewebdiscussion.com 
http://siteownersforums.com 
http://www.v7n.com/forums 
http://magentoexpertforum.com  


Educational and non-profit sites

If you are creating quality contents and articles then your site can be linked back by educational or non-profit site referring their visitors or students to explore more about specific topic, this kind of links called strong links because google trust them a lot.



Submission to online web directory

This is another way to index your site to search engine by submitting your site to an online web directory but it is recommended to use authentic and with good PR directory site. Before submitting your site explore a little bit about the ranking and PR of the site you are targeting to. Some of the web directory sites are mentioned below.

www.Sciencedirect.com
www.Doaj.org
www.Boingboing.net
www.Epa.gov
www.Freefind.com
www.Vlib.org
www.Highrankdirectory.com
www.Itknowledgeexchange.techtarget.com
www.Scrubtheweb.com



Useful Links:

What is the Strength of Backlinks and Site Trust?



Monday 23 May 2016

Become Advance in Hyper-V (History and Revolution)

history of hyper-v


To become advance and expert specifically in Microsoft Hyper-V, it is necessary to be familiar with the history of this feature and revolution from beginning to Windows server 2012 R2. Hyper-V has changed the way companies work in Server and network Infrastructure to the smart, efficient and cost effective perspective.

Let’s start with the very first addition of Hyper-V, which was introduced as an add-on after the release of Windows Server 2008. Hyper-V was not an update of Microsoft Virtual Server, which was a virtualization solution Microsoft acquired as part of the Connectix acquisition. Microsoft Virtual Server was not well adopted in many organizations as a virtualization solution because it was a type 2 hypervisor, whereas Hyper-V is a type 1 Hypervisor. I will cover up little bit description of each feature in this article.

Type 2 Hypervisor:  Type 2 hypervisor runs on top of host operating system, not directly on hardware, which means Type 2 hypervisor requests to host operation system for the resources and to perform necessary actions.

Type 1 Hypervisor:  The Type 1 Hypervisor runs on hardware of the server and directly control and allocates resources to the virtual machines. Type 1 hypervisors take advantage of a Ring 1, which is present on processor that supports hardware virtualization to run the hypervisor itself. Then it allow VM to still be able to directly access Ring 0 “Kernel Mode” of the processor for their computations, giving the best performance.  Now a day’s all modern datacenter hypervisors are Type 1.

Let's take a look on each version of Microsoft Server to understand the features and revolution

WINDOWS SERVER 2008

Type 1 Hypervisor: Type 1 Hypervisor runs directly on bare metal.
4 vCPU, 64 GB RAM: Only 4 Virtual Core of CPU and 64 GB RAM is allowed to each VM.
2 TB VHD:  2 TB VHD for each VM
Quick Migration:  It has the ability to Migrate quickly in cluster environment between hosts through Quick Migrate, it pause the VM, save the status, memory, processor and store it to file in cluster storage. Then on another host it reads the information same way to build that VM up again.
Iterative VSS Backup: It supports VSS live backup of VM, means allow to take backup from OS host machine. VSS requests and then communicate to virtual host OS by Hyper-V integrated services.
Snapshots: This feature enables to take snapshot at specific point of time of VM including disk and memory information and then roll back to the point we want. Multiple snapshots can be taken of any VM, it is useful for testing environment, where you need to test software/application frequently. It is also known as checkpoints.
Pass-through Storage:  It is generally used to access the single volume greater than 2 TB (VHD limit), it is not recommended.
Multiple Virtual Networks: Multiple virtual networks could be created.


WINDOWS SERVER 2008 R2
Live Migration: Live Migration feature enables the memory and state of VM to be replicated to another host without any downtime.
Cluster Shared Volumes: CSV allows NTFS formatted LUN (logical unit number) simultaneously available to all hosts in clustered environment.
Processor Compatibility Mode:  This mode enable VM to be migrated to different version of process but the same process family, If it moved to another host and that version do not support the instruction set, OS will be crashed.
Host add SCSI Storage:  It allows to add additional vhd without shutting down the VM.
Jumbo frames and VMQ: It includes support for Jumbo frames, VMQ and allows using of NIC teaming by network drivers.
NIC Teaming:  NIC Teaming is introduced to load the traffic and to improve the availability of NIC.
SLAT Support: Supports to Second Level Address Translation (SLAT) allow the processor to occupy the mapping of Virtual Memory to Physical Memory.


WINDOWS SERVER 2008 R2 SP1
Dynamic Memory:  By using this feature you can assign minimum and maximum memory to VM, so Hyper-V would then monitor the usage and if need it increase or decrease the certain buffer threshold.
RemoteFX: This feature was introduced to focus on Virtual Desktop Infrastructure (VDI) to run on Hyper-V to provide as rich 3D experience as possible even client machine do not have capabilities.




Note: Windows server 2012 has more than 300 important features whereas just some of them are described here. 

WINDOWS SERVER 2012
64 vCPU, 1 TB RAM: This feature allowed assigning as more as 64 virtual CPU to single VM along with NUMA awareness.
NUMA Support: The Non-Uniform Memory Access (NUMA) topology is given to VM to enable the most optimal level of performance. 
64 TB VHDX: This feature is enabled to bear almost any kind of workload, can say over 99% of globe SQL workload can be run on single Virtual Machine by assign 64 TB VHDX.
64-node Cluster: Because of this feature you can almost cluster your whole environment by just click.
SMB 3.0 support: OS 2012 supports main three types of storage option, SAN, Fiber Channel or iSCSI and this new SMB 3.0 on windows server 2012 file server or NAS/SAN that supports SMB 3.0.
Storage Migration: Storage Migration in windows server 2012 is pretty simple and provide optimal performance during the process, remember VMs not moving between the hosts its storage which is moving between.
Share Nothing Live Migration: This means whole VM can be moved to another 2012 server host with no downtime, no storage share but need capable internet connection because it moves vhd and memory contents to another host but with no downtime.
Hyper-V Replica: MS windows server 2012 introduces this new feature to meet the disaster recovery need independent of clustering; it replicates the Hyper-V with another Hyper-V server.
Virtual Fiber Channel: VFC allows VM to be directly connected to the fiber channel SAN without host requiring zone to the storage.
Network Virtualization: Network Virtualization allows VM to be abstracted from the Physical network fabric and it also allows complete isolation between and capability to use IP schemes independently physical network fabric. 
Hyper-V Extensible Switch: Hyper-V Extensible Switch also called Virtual switch may found in Hyper-V manager after installing Hyper V role, it is a layer 2 virtual network switch that includes programmatically managed and virtual capabilities to connect VMs.
Dynamic Memory +: In previous feature windows needs extra memory during start up and admin have to assign sometime more memory and Hyper V cannot reclaim memory from VM after start up, in this feature Dynamic Memory introduces minimum memory which allows Hyper V to reclaim from VM after start up.
1st Class Linux Support: Now Hyper V has a great support for number of linux distributions and even that are not officially supported will likely work and Hyper-V integration service for great experience.


WINDOWS SERVER 2012 R2
UEFI Generation 2 VM: This is very new type of VM and in this feature MS removed all legacy emulated hardware and now it boots faster than generation 1 VM.
Dynamic SCSI VHDX Resize: In previous versions admin can't re-size the VHDX if needed and it was a big problem for some organizations now in this version of OS admin can increase or decrease the size of VHDX to a running VM.
Shared VHDX on CSV/SoFS: Now no more iSCSI or Fiber channel required to enable shared vhdx for guest clustering purpose, it is hosted on cluster shared volumes or scale out file server and seen by VMs as share SAS storage.
Storage Metering/QoS: Previously you have to monitor through another server while moving VM between hosts, Resource Metering resolved this problem and it track total and average utilization of resource of VM, further you can view by using power shell cli. (Enable-VMResourceMetering –VMName).
Live Migration Compression/SMB: It compress and reduce the amount of data sent through network during live migration of VM.
Hyper-V Replica Granularity and Extended: By this feature admin can have more than one copy of Hyper V, for example you are running main and DR site and you want to have another replica site so this feature allows adding this protection.
Network Virtualization Gateway: By adding this feature Virtual Network now can communicate to other Virtual Network such as Internet, a corporate network or another virtual network outside.
Live VM/Checkpoint Export: Checkpoint formerly snapshot commonly used for test or development environment to revert back the VM to its previous state of time in case you lost in configuration. When you reapply the checkpoint/snapshot it changes the memory, process and disk contents to its previous state when it was captured.
vRSS: This feature allows to distribute the load of virtual network adapter across multiple virtual processors in the virtual machines.
Automatic VM Activation (AVMA): AVMA allows installing OS with proper activation without having to manage product key for each VM even in disconnected environment.



Thursday 12 May 2016

Cloud Data Protection


Cloud Data Protection

Cloud services and technology at glance and there are many service provider facilitating with this new technology and introducing it to the market with bundle of benefits, it could be individual organization which is providing whole service or bunch of providers providing their service at different levels. Whoever provider you choose to avail this service, the main concern is the height of managed services, Managed Services means here that cloud team is assisting you with full dedication even in off hours of business. The main concern is data privacy and protection, what if your data is not protected or not in your hands or can say what if you request for backup of your whole data and your services provider says, we are just giving services and backup of data is not included in your availed package, when you review your package again you found the same thing.


It may be sound strange, Yes it could be! because most of the customers having rigid time in believing the statement the first time they get it. You may say they have trusted all of the critical Information Technology Applications to the Cloud base and might be they think data protection and backup is there in package they have purchased.


Additionally, of course they are thinking that someone from cloud team from which they have got the services are being watched over the data and applications to ensure they are running smoothly and perfectly but it may be totally wrong at some context in this manner, However, in reality their belief in automatic data protection and backup availability in the cloud can and surely will bite you deeper than you an assume.


Yes ! Cloud technology is very efficient and cost effective as well for some organizations which are running mission critical applications and services all the time, in fact you are getting rid of hardware maintenance and replacement of its faulty components. Always there are some Do's and Don'ts , so it is good to know very well what what you are going to do and what is the level of criticality of your data and applications.


Microsoft Trust Center is giving you some briefing on this and assuring you that your data is in your hand all the time, consider all pros and cons before taking step to cloud.


The National Institute of Standards and Technology (NIST) publicly announced some of the key recommendations, You may visit and explore further in this regard. Plan well before shifting to cloud and understand your package fully what your cloud service providers is offering you.

Wednesday 27 April 2016

Cisco Digital Ceiling

Cisco Digital Ceiling

Manage work/room space environment according to your preferences with personalized lighting , temperature and color.



Cisco has been involved since line of years in advancing networking world and still playing major role in IP (Internet Protocol) advancement. Cisco has list technologies at the glance now days.


What if Cisco plays the same part in advancing Ceiling Lights and work space environment?


Yes it is!


Let's look at  Cisco Digital Ceiling, which is a instagram sift for our life, you may assume your office where you can manage the intensity of light, color as well as temperature to your personal preference. The digital ceiling framework solution can cover difference building's system and controls such as lighting, HVAC, Security and much more over IP, the best thing is advanced sensors those can also provide insight into previously opaque building operations. By binding together such as building systems, owners and operations then can be increased it's (building) efficiency and sustainability to manage more easily their buildings, it will also allow authorities of building to deliver much highly personalized user experience to improve productivity and safety.


"Increasingly, companies are looking to provide the perfect environment for each employee and customer" says Ingri Kambe, Solutions Marketing Manager for Cisco Digital Ceiling. The Digital Ceiling enables the new experience workplace and providing lighting that more closely mimics natural light. On a broader scale, it could be linking sensors in light fixtures to HVAC systems via the network so as more people enter a conference room, it is alerted to pipe in more fresh air to optimize comfort.


To bring the Digital Ceiling framework to life, Cisco is collaborating with domain experts including LED lighting innovators Philips, Molex and Cree, building automation leaders such as Johnson Controls, enablers and independent software vendors including Microsoft, Siemon, Superios Essex, Relayr and more. The aim of productive and energy efficient workspace is aided by utilizing existing daylight Network powered LED lighting in the Digital Ceiling can sense when daylight naturally illuminates a room, and it will therefore adjust to aim the artificial light. This ultimately lowers costs and makes the most of resources.

In addition, natural light can have a profound impact on our mood, productivity, healing and learning, Emberlight states " That our bodies respond to natural lighting by calming our moods and emotions" Brighter light also stimulates productivity and concentration. In contrast, fluorescence often aggravates uneasiness and can cause headaches. More workspace are opting for LEDs which can most closely mimic natural light and which are color tuneable allowing users to select cool or warmer light tones to optimize a calming yet energetic light source. Cisco's Digital Ceiling will change the way we think about lighting and the space we work in," said Tony Shakib, Vice President of Cisco's Internet of Things Vertical business unit. For the first time we can intelligently control our environment through IoT and the convergence of the network with building technologies, including lighting, heating, cooling security, motion detection, and  a multitude of other sensors, The results are significant from cost and energy saving to occupant comfort.

In Cisco's own implementation of a Digital Ceiling, the results have been fantastic:


  • 78% of occupants report a better sense of well being and comfort.
  • Potential $2M in annual productivity gains from better lighting and temperature controls.
  • About a 10-15% operational savings with energy efficiency.
  • $150,000 annual savings in conference room energy alone.






Monday 18 April 2016

Software Defined Networking (SDN)

Software Defined Networking


Software Defined Networking Market to grow at a Compound Annual Growth Rate (CAGR) of     44.2 % from 2014 to 2020 as per Grand View Research Inc.

Software Defined Networking Market to grow at a CAGR of 44.2% from 2014 to 2020, Grand View Research Inc. According to the new report published by Grand View research, SDN market is expected to reach USD 4.91 billion by 2020, grow at a CAGR of 44.2% from 2014 to 2020. Increasing need to implement cloud computing services in an organized and productive market is expected  to drive the market growth San Francisco, April 18, 2016 (Global Newswire) - Software Defined Networking market is expected to reach USD 4.91 billion by 2020. Software Defined Networking separates the control panel from the forwarding plane in a network. This helps in efficient data flow control and provides network administrator with a software-based approach to manage the network. Increasing the need to implement cloud computing services in an organized and productive market is expected to drive the market growth. Also, the rise in demand for proliferation and mobility of mobile devices is projected to fuel market growth further over the forecast period. Software Defined Networking provides a software interface for a system administrator to control and manage the network in an easier and mannered way thereby helping in setting up of efficient network infra. However, due to the unavailability of any standard process in the implementation of SDN along with difficulty faced in migration from legacy system is expected to restrain market growth over the forecast period. Rising trend of using BYOD in an organization is projected to serve as an emerging opportunity in the market. Brows to access in depth research report on Global Software Defined Networking with detailed charts and figures.


Analysis Enterprises accounted for over 38 % of the market share in 2013 and were the largest end user segment. This trend will continue over the forecast period owing to increasing demand from various end users including retail chains and hotels. Telecommunications service provider segment is projected to be the fastest growing segment over the forecast period at a CAGR of more than 40% over the forecast period. Cloud Virtualization applications in SDN solution accounted for over 25 % market share and are projected to the fastest and largest growing segment over the forecast period. 

Request for free sample of this research report.


Analysis/request North America, due to the need for highly advanced network infrastructure in the region and high penetration of mobile devices is expected to remain the largest market over the forecast period. With trends including bring your own device (BYOD) catching up in Asia Pacific due to a growing need for a manageable network, the region is projected to be the fastest growing market over the forecast period with a CAGR exceeding 45 %. Global SDN market consists of many players providing acquisition and strategic collaborations of consolidate market share and offer software, hardware as well as service s. Some of the major industry player are Cisco, NEC, Juniper Networks, VMware, HP and Alcatel-Lucent. 

Brows related reports by Grand View Research, Grand View Research has segmented the SDN market on the basis of end users, solutions and region.
SDN End users Outlook (Revenue, USD Million, 2012 - 2020)

  • Enterprises
  • Cloud Service Providers
  • Telecommunication Service providers
  • Switching 
  • Controllers
  • Cloud Virtualization Application


Other SDN Regional Outlook (Revenue, USD Million, 2012 - 2020)

  • North America
  • Europe
  • Asia Pacific








Wednesday 13 April 2016

Failover Clustering on Windows Server 2012 R2


Failover Clustering on Windows Server



I will provide you the information about failover clustering as well as demonstration for file server and web application step by step.

                                            Part - 1

Failover Clustering:                                     

Failover Clustering, HA (High availability), DR (disaster recovery), If these words are not familiar in your IT department, means that organization is not prepared to handle or to minimize the unplanned downtime, and I think some organizations would not like to bear a lot of downtime when they are running any critical application. Failover clustering connects servers and monitors the health of the servers (in such environment each clustered server will be checking heart beat of connected clustered server and if one server fails each of the service running on that server would be fail over to backup or secondary server (we will be doing this later in this series.

For example, you are dealing with the only main and critical application such as Ozeki NG SMS Gateway in this case and it can be mission critical application for that organization which is fully depended on this or can say most of the business dependent on this app. We will be adding this application in failover cluster environment to reduce the downtime as much as can be, if our one of the server or this application stops somehow, It should be up and running again on backup server in a matter of seconds not even minutes.

And then we will be doing failover cluster for File Server, For example, our organziation have very important data to be accessed by many users or departments who are reading and writing files every minute and if they can’t access those data, they can’t work anymore. And in this demo we will sure the availability of important data every minute, in fact we will reduce the downtime dramtically even if server crash somehow.

In this part we will install "Failover Clustering" Role on Primary and Secondary Server.

 Assumption:

Windows Server 2012 R2 is installed on each server (Primary, Backup and Domain Controller/Storage server).
Installing Domain services on DC Server.
Primary and backup server are member of Domain
We will be setting up client machine as well to be used for demo.





Following LAB is designed for demo purpose.

Network Diagram

Primary Server

Open Server Manager and Navigate to "Add Roles and Features"
Failover Clustering LAB step 1


 Initial window will pop up, you may skip this page. "Click Next"
Failover Clustering LAB step 2


 Leave it as default role based or feature base and "Click Next"
Failover Clustering LAB step 3


 Select the targeted server on which install will be done, in this case primary server is selected "Click Next"
Failover Clustering LAB step 4


 As we are not going to install any feature, leave it as it is and "Click Next"
Failover Clustering LAB step 5


 Navigate to Role "Failover Clustering" mark check, an additional window will pop up.
Failover Clustering LAB step 6


 In this additional window click "Add Features" for necessary installation of Failover Clustering.
Failover Clustering LAB step 7


 Mark Check on Failover Clustering Role and "Click Next"
Failover Clustering LAB step 8


 A little summary right before the installation we are going to perform, "Click Install"
Failover Clustering LAB step 9


 Installation is started, wait for awhile.
Failover Clustering LAB step 10


 Installation Succeeded, you may close this wizard.
Failover Clustering LAB step 11

Perform the same steps on Secondary Server to install the Failover Clustering feature.

In part 2 we will be doing remain installation on both of the servers.




















  • Watch Video Demonstration





  • Popular Posts

    Powered by Blogger.

    About

    This platform is helping in spreading knowledge base and best practices from real life experience. I am happy to provide enough information and knowledge.
    Please keep in touch through:

    Subscribe

    Please enter your email address to subscribe for new contents: