Blog

Penguin on guard, or a new search algorithm from Google
The decisive role was played by the quality of the content and the number of purchased links. Google Penguin (Penguin), the newly introduced algorithm, did not accept "too" optimized texts stuffed with links and keywords. He didn't like texts intended for machines either. And after looking at the work of their algorithm, the developers promised to severely punish dishonest optimizers. They noted that they are striving not only to remove pages littered with spam from the issue, but also to achieve their complete absence, replacing them with sites “for people”. Yes, and SEO-optimizers should have been put in place for a long time with their dishonest promotion methods. In addition, non-thematic links led to a significant loss of positions - just a couple of such links, and the entire site can be blocked as spam.
08.05.2012
What's on my page for you?
What do we know about social networks? How many of your friends, relatives and acquaintances are registered on VKontakte, Facebook or Twitter? And how many people are there that you will never see, let alone know?
26.04.2012
What should be the landing page?
A lot depends on which page of your site a visitor goes to from a search engine or contextual advertising. After all, this is the page from which the viewing of the site begins and the first impression of it is formed. That is why you should pay special attention to the landing page: properly optimize it and structure the presentation of information.
29.03.2012
Writing HTML Code Faster
Zen Coding is a plugin for code editors that allows you to quickly create HTML , XML , XSL markup. The principle of operation is based on the use of abbreviations to denote HTML tags , their attributes , and their nesting .
28.02.2012
Hacking one of Webakula's servers failed
Attempts by a circle of individuals, and possibly direct competitors of Webakula, to damage the existing sites of the company failed. According to the information of the hosting provider Webakula, there were clear signs of hacking attempts, as a result of which access was opened to the test part of one of the servers hosting the sites under development, access to which is possible only for the company's clients.
14.02.2012