Animated Banner

SSR

About my banner.

My banner was adapted from my black on white logo design I took my initials and had them slowly come into view   then I added a flash of white to transition to the reverse white on black design.

Steps I took

Step 1. I took the black on white logo I made on photoshop and created a timeline by going to window > timeline. 

Step 2.  I duplicated my logo 5 Times.

Step 3. I erased the last two initials and filled the space in white for my first frame.

Step 4.  On the second frame I only erased the R and filled in the space white

Step 5. I left the logo as the original with all initials on it.

step 6.  I filled in the entire frame white; erasing my logo for a quick flash effect.

Step 7. I reversed the coloring of my logo for the last frame so it is white on black.

Step 8. Adjust timing to my desired look and set the repeat for forever.

Step 9. Save for Web and select Gif.

Learning WordPress Lesson 2!

Blossoming Code

I now present the second lesson of Learning WordPress! These lessons will normally be presented every Friday, but seeing how it is Friday, and hardly anyone was in class… I will be presenting this on Monday.

Also a plan of mine is to do a Kahoot! every two lessons. So that way you can have a quick review and the information can hopefully stick.

So, here is the next lesson! Psst… Click the giant picture.

wordpress-logo-stacked-rgb 

View original post

PayPal

Explain why Website Payments Standard is fast, easy, low cost.

With Paypal’s Payments Standard you get no set-up fees. No monthly fees or termination fees. No hidden fees. You only pay when you get paid. Volume discounts available. You are charged by: 2.9% + $0.30 per transaction. which makes setup a breeze.

Which are the different methods PayPal can accept?

  1. Accept PayPal payments
  2. Accept credit and debit cards
  3. Accept PayPal Credit payments (U.S. only)

Do you need to have a shopping cart to use PayPal? Name 5 compatible carts with PayPal.

If you want to sell more than one item online, you need shopping cart software so your customers can:

  • Browse items
  • Make multiple selections
  • See shipping, taxes, and any other costs up front

5 compatible carts with PayPal:

  • Bigcommerce
  • Magento
  • Wix
  • Godaddy
  • 3dcart

Are applications, setup, or monthly fees required with PayPal?

No fees at all only charged once a transaction has been made.

With PayPal, do you need to store and protect customers’ sensitive financial information?

No paypal takes care of that for you.

 

Is a long-term commitment required with PayPal?

No long term commitment required.

 

Does every customer require a PayPal account to make payments on your web site?

No they usually have the option to pay with credit or debit cards as well.

Briefly explain what happens after the customer reviews the order in your site and proceeds to checkout in PayPal.

Once at checkout they will be brought to paypal to confirm the order, after which they will be returned to the initial site.

Explain briefly if the PayPal check-out site can match the look and feel of your own site.

The only way to customize the PayPal check-out site is to sign-up for PayPal Payment Pro which is $30/ month + the 2.9% + $0.30 per transaction.

 

Briefly explain what encryption is and why PayPal encrypts your business and customer information.

Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ;encrypted data is referred to as cipher text.

PayPal does this to keep your information and your customer’s information  secure.

 

What is the PayPal transaction fee?

2.9% + $0.30 per transaction.

 

What are the three steps to integrate the PayPal Shopping Cart?

Go to your paypal shopping cart page, enter your product details, copy and paste the html code generated into your website.

Name 5 additional features of the PayPal Shopping Cart.

  1. Accept 26 currencies from 203 countries
  2. Detailed transactions dashboard
  3. Optimized mobile checkout experience
  4. Simplified PCI compliance standards
  5. Accept credit and debit cards +PayPal payments

 

 

 

 

 

E-commerce

Compare and Contrast the following sites:

Shopify, Big Cartel, bigcommerce, and Prestashop are all onlinestore builders with fully integrated shopping carts whereas zen cart and 1shoppingcart are just shopping cart software.

Price + Special Features Comparison

  • Shopify: Basic plan = $29/ Month
    • Online Store
    • Social Media Integration
    • Unlimited Products
  • Big Cartel: Titanium plan = $29/ Month
    • Online Store
    • Inventory Tracking
    • 300 Products
  • Bigcommerce: Standard plan = $29.95/ Month
    • Online Store
    • Unlimited Storage
    • Unlimited Products
  • Prestashop: Free to use
    • 2,000+ professional ecommerce website templates $124+
    • mobile-responsive design

Cart Price + Special Features Comparison

  • Zen Cart: Free open source software
    • You are free to modify the source code in whatever ways your application requires.
    • Many popular payment gateways built-in, you can start accepting payment immediately.
  • 1Shoppingcart: 1 Month Free Trial*  + Standard Monthly Price* of $24.95
    • Unlimited Products
    • Full Featured Email Marketing
    • Integrated Post-Sale Upsells
    • Over 1GB Online Storage

Hosting options available for use with shopping cart software.

Zen Cart: “Works with any* hosting company”

Shopping cart vulnerabilities and best-practice preventative measures.

Shopping carts are vulnerable to viruses and attacks.

6 Essential Requirements for a Secure e-Commerce Site

  • Use Enhance Verification SSL
  • Use PCI and Vulnerability Scanning Services
  • Use penetration testing to stay ahead of the bad guys
  • Use multi-factor authentication
  • Trust seals matter. Use them
  • Use a Managed DNS

What software is needed to install and setup pre-built shopping cart software.

It is all determined by what shopping cart you will use but Paypal is currently the most convenient pre-built software that can be easily integrated into websites

 

 

Identify security issues associated with E-commerce and discuss methods to mitigate risks.

Describe the differences between Transaction Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL).

Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols designed to provide communications security over a computer network.

SSL is an encrypted connection between web server and visitors browser allowing for private information to be transmitted without eavesdropping, data tampering or message forgery.

TLS ensures privacy between communication applications and their users.

Explain transaction security

Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet. It was supported initially by Mastercard, Visa, Microsoft, Netscape, and others. With SET, a user is given an electronic wallet (digital certificate) and a transaction is conducted and verified using a combination of digital certificates and digital signatures among the purchaser, a merchant, and the purchaser’s bank in a way that ensures privacy and confidentiality. SET makes use of Netscape’s Secure Sockets Layer (SSL), Microsoft’s Secure Transaction Technology (STT), and Terisa System’s Secure Hypertext Transfer Protocol (S-HTTP). SET uses some but not all aspects of a public key infrastructure (PKI).

 

What are security and payment processing issues involved in developing a site (e.g., SSL, Digital Certificates, SET Protocol, Cyber Cash)?

SSL security certificate is critical. SSL certificates prevent cyber criminals from intercepting financial data. They encrypt credit card numbers/ passwords/ log -ins.

Extended validation is considered the best bet, when developing a e-commerce site. It requires a more thorough authentication process.

Payment security is complex. Many vulnerabilities exist in the payments processing chain, especially in the interactions between consumers, merchants and acquirers. The sheer volume of consumers and merchants provides a large window of opportunity for thieves to capture data that can be fraudulently turned into profit. J None of the technologies that exist today solves all the security problems in the payments processing chain. However, a select few technologies focus on solving the biggest problems and greatest vulnerabilities that affect most merchants, and they can do so in a cost-effective manner. Merchants can use these solutions to reduce their overall level of vulnerability. J New security methods are now available to secure sensitive cardholder data from compromise as close to the initiation of the transaction as possible. In addition, these technologies can help reduce a merchant’s PCI compliance burden.

Payment processing chain:

  1. A consumer wants to buy goods or services and pay for it using his credit card. The cardholder data is entered into the merchant’s payment system, which could be a point-of-sale (POS) terminal/software or an e-commerce Web site.
  2. The card data (PAN) is sent to an acquirer/payment processor, whose job it is to route the data through the interchange system for processing.
  3. The acquirer/processor sends the data to the payment brand (e.g., Visa, MasterCard, American Express, etc.), who forwards it to the issuing bank.
  4. The issuing bank verifies that the card is legitimate, not reported lost or stolen, and that the account has the appropriate amount of credit/funds available to pay for the transaction.
  5. If so, the issuer generates an authorization number and routes this number back to the card brand. The issuing bank agrees to fund the purchase on the consumer’s behalf.
  6. The card brand forwards the authorization code and the PAN back to the acquirer/processor.
  7. The acquirer/processor sends the authorization code and either the PAN or a viable substitute number for the PAN (i.e., a token) back to the merchant.
  8. The merchant concludes the sale with the customer.
  9. The merchant may retain the transaction data long term for the processing of returns, retrieval requests or chargebacks, as well as for business intelligence reasons such as analysis of consumer buying behavior and creation of marketing programs.

Where encryption fits in the payments process

  1. When the cardholder data (the PAN) is captured at the POS (with a physical swipe or data entry), the data is encrypted.
  2. The data is encrypted as it traverses any in-store network.
  3. The merchant sends the encrypted PAN to the acquirer/processor.
  4. The payment processor decrypts the data and sends it via a secure channel to the appropriate network or association for authorization. When the transaction is authorized for payment, it gets sent back to the payment processor.
  5.  After authorization, the acquirer/processor returns the encrypted PAN along with the transaction response to the merchant.
  6. The merchant may retain the encrypted transaction data long term for the processing of returns, retrieval requests or chargebacks, as well as for business intelligence reasons such as analysis of consumer buying behavior and creation of marketing programs

The problems that data encryption solves

Data encryption solutions solve for the problem of live (clear text) data in transmission as it moves upstream to the acquirer by encrypting the data as close to the point of capture as makes sense for a particular merchant. It also can solve for the problem of having clear text cardholder data in electronic storage environments when the data is kept for auxiliary use. These are two of the greatest vulnerabilities for most merchants, and by applying data encryption technology, merchants can reduce their risk of liability stemming from a data breach. If a breach does occur and a thief obtains encrypted data, he can’t use it without also obtaining the decrypting key. End-to-end encryption is not currently a requirement in PCI DSS. However, according to George Peabody, principal analyst with the Mercator Advisory Group, “end-to-end encryption may well be the end game recommendation of PCI and, if data breaches continue to plague the payments industry and occupy headlines, that recommendation may become a mandate within two years.”

Where tokenization fits in the payments process

  1.  When the cardholder data (the PAN) is captured at the POS (with a physical swipe or data entry), the data is encrypted.
  2.  The data is encrypted as it traverses any in-store network.
  3. The merchant sends the encrypted PAN to the acquirer/processor.
  4. The payment processor decrypts the data and sends it via a secure channel to the appropriate network or association for authorization. When the transaction is authorized for payment, it gets sent back to the payment processor.
  5.  After authorization, the acquirer/processor returns the encrypted PAN along with the transaction response to the merchant.
  6. The merchant may retain the encrypted transaction data long term for the processing of returns, retrieval requests or chargebacks, as well as for business intelligence reasons such as analysis of consumer buying behavior and creation of marketing programs.

The problems that tokenization solves

Tokenization solves the problem of having live cardholder data in storage or in use in business applications after the transaction approval. This process eliminates the possibility of having real card data stolen at this point because it doesn’t even exist here. And unlike encrypted data, the use of tokenized data reduces the scope of PCI audits, again because there is no cardholder data that must be secured. Merchants can save significant time and money by reducing the scope of their PCI audits.

SSL security certificate is critical. SSL certificates prevent cyber criminals from intercepting financial data. They encrypt credit card numbers/ passwords/ log -ins.

Extended validation is considered the best bet, when developing a e-commerce site. It requires a more thorough authentication process.

 

What is https and htaccess?

HTTPS (HTTP over SSL or HTTP Secure) is the use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer under regular HTTP application layering.HTTPS encrypts and decrypts user page requests as well as the pages that are returned by the Web server.

A .htaccess (hypertext access) file is a directory-level configuration file supported by several web servers, that allows for decentralized management of web server configuration.

 

How to obtain an SSL certificate and secure transactions?

  1. Purchase an SSL certificate from a vendor
  2. Install Certificate on your host
  3. Update site using https

Compare and contrast the appropriateness of employing a merchant account or a payment gateway to handle online transactions.

Merchant Account:

A merchant account is a type of bank account that allows businesses to accept payments by payment cards, typically debit or credit cards. A merchant account is established under an agreement between an acceptor and a merchant acquiring bank for the settlement of payment card transactions.

Payment Gateway:

A payment gateway is an e-commerce application service provider service that authorizes credit card payments for e-businesses, online retailers, bricks and clicks, or traditional brick and mortar.

 

Discuss the process, advantages, disadvantages, and costs associated with opening a merchant account.

First off, card processing is actually quite regional and the options differ based on the location of your business (e.g. in the US or outside the US, for example) as well as where customers primarily are located.  Lastly, the business needs you have may dictate specific integrations or gateways that you need to use, and then the decision process can be based around technology offerings available from the different platforms.

With Stripe, PayPal and Intuit “GoPayment”, you are leveraging a Payment Service Provider (“PSP”) and not generally establishing a directly acquired merchant account.

 

Describe the process, advantages, disadvantages, and costs associated with using a payment gateway.

Advantages:

  • Process is integrated with the shopping cart.
  • Guaranteed fraud protection Mechanisms in place.
  • PayPal guarantees customer personal data protection.
  • PayPal supports multicurrency payment processing.
  • PayPal has ease of access and use.
  • PayPal has relatively good rates on money transfer.

Disadvantages:

  • PayPal can freeze your money and account at will.
  • Although PayPal may be global not all online businesses have adopted it.

 

E-commerce Quizecommerce quiz

 

Breaking the glass ceiling

Designz by Leslie

Women make up about 12 percent of programmers and developers in today’s workforce.

In former times women developers were at a disadvantage from making the same salary, as their male counter parts.

Forbes cities the study where males made  $ 95,000 and women made $ 87,000 a year.

Screen Shot 2015-11-04 at 8.22.13 AM

Along with the study by Dice, Smithsonian.com highlighted another study by the American Association of University Women that found pursing a career in computer sciences, as well as with engineering and health care, has some of the greatest earning potential for women. A chart from this study shows that from 2007 to 2008, one year after graduation, there was no significant difference between the income of men and women who majored in computer sciences; both made an average annual income of $48,485.

On the other hand, Dice said it still may appear that men make more than women. In 2012-2013, an average…

View original post 230 more words

Study Guide

The Code Cabinet

imgres.jpg

What to know:

  • What variables are
  • What Booleans are
  • What Arithmetic operators are 
  • How to find a string and its length
  • How to make a Basic alert in a javascript console
  • What Js is and What its used for

Sources:

JavaScript lesson 1

https://docs.google.com/presentation/d/1RTn4lOXw_7pDEGWei36laBYXZZg7HnyPXKFCRYmFkOY/edit#slide=id.gcc28fa89e_1_6

JavaScript Lesson 2

https://docs.google.com/presentation/d/1pdNQl0a3pRKdSz9X2K2XX-tnZjVEWMbTJ43Fy2g5pjw/edit#slide=id.p

JavaScript Lesson 3

https://docs.google.com/presentation/d/1Vpe-4KF-F2UAhxpwfQ-LAD1xLqpCXe67H_Nvyy12LkY/edit#slide=id.p

JavaScript Lesson 4

https://docs.google.com/presentation/d/1JYvIa12bs-Kp_721S2mZbL-D6tO-UHjS263vuQml1B8/edit#slide=id.p

Flip Quiz Game: I did not change any of the information from this game , therefore it can be used as a fun way to study. It does actually have similar questions to the ones on the test. Challenge yourself while having fun the same time. Click the image to proceed.Screen Shot 2015-12-03 at 12.41.09 PM.png

Hope that helped guys 🙂

View original post

Freelancer tips for Client Questionnaire

As some of you may know I am one of the students in class that is on their final stretch of the course(Leslie SmithSteven Ruiz, and myself) and I am working on my client project so after doing tons of research online I came to the conclusion that I need a very extensive questionnaire to properly determine whether or not a Potential Lead can become a Qualified prospect.

Overview: Stages of the sales funnel and how I use it

Lead (Suspect): A lead (also known as a suspect) is someone you have not spoken to. But if a lead appears similar in profile to your target customer, you may decide that they are worth pursuing. Track your most fruitful sources of leads (that is, leads that become customers).

What do Leads look like pertaining to my business?                                             I consider users that have found themselves landing on my site to be potential leads because I feel that action shows the interest they have in my services

Prospect: A prospect has confirmed interest in your offering. You have had a conversation, provided the person with information about what you do, and both of you have agreed to a next step in the sales process.

How do I determine if someone is a Prospect?

I consider someone as a prospect when they have submitted their information through my contact form on my website.

Qualified prospect: Qualification is the most critical and demanding stage of the sales funnel. In the qualification process, you verify that the prospect has a need for your product, that the prospect sees value in your offering, that there is sufficient budget for a deal, that you have access to the decision-maker, and that there is an agreed-upon timeline for the sales process.

But how do you determine if they Qualify?

Once they submit the contact form I will email them my questionnaire to help me determine wether or not I want to take them on as a client.

So if they don’t qualify you will just turn them down?! Are you crazy? Why?!

Yes, no. I do so because if they prove to be ecstatic about getting a new website but have no plan that tells me they are not serious about the need or have no clue what they want.

But, but why? Why if you can just go speak with them, maybe they were just confused at the time, you can help them along the way, after all you do need the money!

TIME. There is no sense in me jumping at every chance I get to make a website for someone when it can equal to:

  1. Pointless hand-holding them through the process of the web design process.
  2. Practically help them develop a business plan for their company.
  3. Loss of better opportunities.

Committed: Ideally, you want to close the deal when all red flags have been dealt with. In reality, most deals close while critical red flags still exist. At this point, you have provided the customer with a proposal that outlines key contractual terms. When a customer has agreed to move forward with a deal, they are “committed” (also known as “verbal commitment” or “verbal”). What remains is to work out the details of the contract, delivery and payment, all of which have the potential to“undo” the commitment. The commitment may be offered contingent upon certain terms being met.

How do you know if they are committed?

If they qualify I would proceed to meet with the client to review the questionnaire, discuss what they want in terms of design, what they have, what they would have to deliver to me, what is expected for me to do, and they will leave with a quote.

After the meeting I will compose a proposal and email it to them along with an invoice.

And if they approve that is when I move on to creating a contract.

Transacted: A sale has transpired when a contract is signed by both parties.

After the contract I will give the client a checklist of what they have to provide for me to finish the site.

My Questionnaire

(the link to my questionnaire is now broken if you want to see it ask me to send it to you)

As you can see my qualification questionnaire plays a huge role in my sales process, I am very new to this and I do expect a lot of trial and error experimenting before I fully resolve my bottlenecks to make my process more efficient.

My purpose for writing this article is for you to start thinking about how you will tailor yours to meet your specific needs. To help you out I provided some links below to sample questionnaires.

Also I used Google Forms to compose my questionnaire and the nifty thing about it is that allows you to:

  • Q&A, your way– Choose from a bunch of question options, from multiple choice to dropdowns to a linear scale. Add images and YouTube videos, or get fancy with page branching and question skip logic.
  • Organized & analyzed- Responses to your surveys are neatly and automatically collected in Forms, with real time response info and charts. Or, take your data further by viewing it all in Sheets.

Before and during this section of this course I advise you to start thinking of how you plan on charging clients luckily I have a previous post somewhat related to that topic Click Here!!! to read How to Set a Value for Your Design Work.

My experience at WordCamp Orlando 2015

WordCamp Orlando 2015 was an AMAZING experience for me I volunteered as a greeter and floating happiness helper and participated in the setup and breakdown of the event. I felt it was a great opportunity for me as a web development student as I got to meet new people, network, make connections and learn so much from fellow developers and WordPress Wizards. Today I am going to share with you an overview of the sessions I attended along with my key takeaways and some of the slides the speakers provided.

Day 01: Workshops

I kicked off day one helping set up rooms but mainly I was greeting people at the registration table and handing out “swag bags”, maps and giving directions.  Thankfully everyone there was very friendly and you really felt the sense of community.

Each workshop consisted of 3hrs of lessons.

Search Engine Optimization (SEO)

Nile Flores, Chris Edwards

Now for those of you who know me (like my classmates) I am an SEO fanatic so of course I would attend this workshop over others. Unfortunately I didn’t take much notes but here is an overview of what was to be covered from the WordCamp Orlando website:

SEO, short for search engine optimization, can be a headache for the new website owner. Terms like focus keyword, header tags, user experience, website page load, Google Search Console, and more, can be overwhelming.

Our workshop will go over the basics of SEO, specifically best practices, in order to take away those headaches.

If you’re a beginner, or still need to learn a solid foundation on SEO basics, this this is the workshop for you. This workshop is intended to lead up to the Content Creation course so you can be fully prepared to put your best foot forward for your visitors, and on Google search.

– WordCamp Orlando

Slides

Content Production

Jennifer CoxAngelica Yarde, Andrea La-Rosa

Overview:

Creating content for your WordPress site can seem overwhelming but with the proper tools, it can be easy and effective. In this session, we will be offering an overview of how to create effective content for SEO and marketing, how to do it consistently to avoid burnout, and how to make your content work for you. We will also be sharing the tools we use for content production.

This three-hour workshop will be a hands-on learning experience so be sure to bring your laptop. We also encourage you to complete the SEO workshop prior to this workshop as we will sharing how to create search engine optimized content. This workshop is great for beginner users who need help understanding how effective content can be to their site or to the intermediate level user who wants to know how to overcome the content production battle. We look forward helping you find the ease in content production. – WordCamp Orlando

Key takeaways:

GOM

  • Genertate
  • Organize
  • Maximize

Andrea La-Rosa Slide,  Angelica Yarde Slide

Day 02:

Teaching Your clients to use WordPress

Nile Flores

Overview:

You’ve probably seen it happen- someone complains because they just got a website, but they don’t know how to use it. Their designer or developer or project manager just left them high and dry without some type of direction or documentation.

Let’s face it, as a designer or developer or project manager, you’re definitely going to run into someone who isn’t really that familiar with WordPress. In fact, you’ll encounter all sorts of user levels when it comes to working with clients. How do you teach your client how to use their WordPress website? How do you figure it into your project’s scope? If you don’t like teaching them, what can you do to make sure your relationship with your client ends on a good note because you were diligent to give them the tools they need to continue on their own?

I’ll be going over strategies to help you put together a plan on teaching your clients how to use WordPress. Let’s decrease the frustration together and allow your clients to become enthusiastic WordPress users that are making money.  – WordCamp Orlando

Key Takeaways:

Training is always in proposal

slides

Live Streaming on a WP site

Bess Auer

Overview:

Video and in particularly live streaming allows you to instantly connect with your audience in a real-time way. Thanks to the ease of using ready-made platforms like Livestream and Ustream, and now apps like Periscope, Meerkat, and Nomadcast, utilizing this media on your WordPress site is easier and more effective than ever. Bess will cover not only the technology and must-have hardware for live streaming, but also the most effective streaming platforms and website considerations you must decide when utilizing this exciting content. – WordCamp Orlando

Slides

Five Events In The Life Of Every WordPress Request You Should Know

Josh Pollock

Overview:

WordPress is a magical system that turns any URL into a web page, dynamically. In this talk, aimed at beginning wizards, looking to develop new WordPress powers, we’re going to take a look at five major events in the transformation of a request to your site, into a web page.

This talk is for new plugin developers, or those looking to increase their skills in the art of custom site development. It is designed to show you where to look when you need to change WordPress’ behavior to fit your specific needs and increase your ability to make use of WordPress hooks. – WordCamp Orlando

Slides

Repurposing Your Blog Posts: How to Save Time byExtending the Life of Your Content

Andrea La-Rosa

Overview:

Blogging burnout is a real thing: it can be creatively exhausting to come up with 5 or 10 new pieces of content week after week. In this panel, you’ll learn how to identify your blog’s best existing content, then quickly repurpose it into a YouTube, series of posts, email course, eBook, infographic, slide show and more – leaving you less time coming up with new things to write, and more time to market the great content you already have. – WordCamp Orlando

slides

Day 03:

When Giving It Away is a Mistake 15 Years of Lessons Learned About Being Too Nice

Scott Mann

Overview:

Scott comes from a long line of business owners that drove their businesses into the ground by being too nice. He spent 5 years not charging enough and 10 years doing favors that were never returned. He’s here to share some of his hard-knocks tips and tactics on staying nice but earning what you deserve and leveling up your business. – WordCamp Orlando

slides

WordPress Growth Hacks

Chris Lawson

Overview:

WordPress’ extensibility not only allows for additional features, but also the ability to grow your user base rapidly. We will discuss many ‘growth hacks” available through plugins and coded functionality.

Growth Hacking is more than just marketing; it is the narrow focus of growing your user base (rapidly) through optimizing how they got to your site, the user experience funnel while they are there, and how you keep them active. Through a series of systems, processes, and mindsets, you can continually experiment with different growth hacks to see which ones grow and convert your visitors, email list, or customers. – WordCamp Orlando

Slides

Google Analytics

Mike Hansen

Overview:

Having a website is a great, but if you don’t know what’s working and what isn’t, are you getting the most out of your site? Mike Hansen’s presentation will review the Google Analytics dashboard and describe how best to use it, as well as create a list of things to do right now to improve your data like setting up site search, custom filters to remove common spam referrers, setup goals and automating your reports. – WordCamp Orlando

Work Smarter not Harder: WordPress for the Average Business

Tim Sisson

Overview:

We’ll be looking at how the average business owner can launch a WordPress website in minimal time. Let’s face it, we all want to spend more time on our business and less time on a website. Learn how you can maximize what WordPress does for your business and how that leads to more time cultivating revenue.  – WordCamp Orlando

WordPress for Everyone: Case Studies for Non-Profits, Education, and Bloggers

Angelica Yarde

Overview:

Are you unsure if WordPress is the platform for you or your business?. From a range of topics from themes, plugins, custom-builds, e-commerce, and more, I will share three case studies of how I’ve used WordPress in different ways to centralize three different brands online. The case studies covered here will share how WordPress can be beneficial to almost any business.  – WordCamp Orlando

slides

 

SEO/ Site Maintenance

What is SEO

Search Engine Optimization or “SEO” is the process of affecting the visibility of a website or a web page in a search engine’s “natural” or “organic” unpaid results.

The importance of having a“search engine friendly” website is the visibility it can give your website to the world for your business or organization.

“Search Engine Marketing and search engine optimization are critically important to online businesses. You can spend every penny you have on a website, but it will all be for nothing if nobody knows your site is there. -Marc Ostrofsky

Web Crawlers explained

Web Crawlers (web spider or web robot) is a program that automatically browses the internet.  Search engines, use crawling as a means of providing up-to-date data for users.

Meta Tags and how they are used

Meta tags are snippets of text that describe a page’s content; they don’t appear on the page itself, but only in the page’s code; more specifically within the <head> element. they are typically used as little content descriptors that help tell search engines what a web page is about.

SEO attributes and their role in the grand scheme of things

The following two attributes are provided in the html of a site as meta data:

  • The Keyword Attribute is used to specify words that are a comma-separated list of relevant words that informs search engines what the page is about.

    Example: <meta name=”keywords” content=”HTML, meta tag, tag reference”>

  • The Descriptions Attribute is just what you expect, its the descriptions of the page. Search engines can pick up this description to show with the results of searches.

    Example: <meta name=”description” content=”Free web tutorials”>

Other SEO attributes:

  • The Title tag is meant to be an accurate and concise description of a page’s content and is arguably the most important on-page seo factor to address on any web page. Title tags are often used on search engine results pages to display preview snippets for a given page.
  • The Domain name  should strike a balance between finding a catchy, unique, brand-friendly domain name and having a domain that contains keywords they are trying to target.

Caution for Spamdexing

In computing, spamdexing (also known as search engine spam, search engine poisoning, Black-Hat SEO, search spam or web spam) is the deliberate manipulation of search engine indexes. spamdexing involves a number of methods, such as repeating unrelated phrases, to manipulate the relevance or prominence of resources indexed in a manner inconsistent with the purpose of the indexing system. If you spamdex you will be penalized.

search engine marketing methods:

  • Pay Per Click (PPC)  is a model of internet marketing in which advertisers pay a fee each time one of their ads is clicked.  Sponsored Listings are another form of PPC you most likely have seen it in the form of the first two results on a google search that look different from the other “organic results”.
  • Paid Inclusion is a search engine marketing product where the search engine company charges fees related to inclusion of websites in their search index.
  • Video Search Marketing  Search engines are pushing the universal search movement to evolve results into a multimedia-rich blend of images, maps, local and video. As a result, search engine algorithms will look more favorably on video content for the top spots on their result pages, meaning the opportunity for exposure increases for any video producer that is on top of its SEO game.
  • Google-Adsense is a wonderful tool that allows you the site owner to place  PPC ads on your site and start earning some money. You can also you’re in control block ads you don’t like, customize where ads appear, and choose which types fit your site best.

The difference between white hat SEO and black hat SEO.

white hat SEO refers to the usage of optimization strategies, techniques and tactics that focus on a human audience opposed to search engines and completely follows search engine rules and policies. Whereas, black hat SEO refers to the use of aggressive SEO strategies, techniques and tactics that focus only on search engines and not a human audience, and usually does not obey search engines guidelines.

Google Webmaster Guidelines

 

  • Make a site with a clear hierarchy and text links. Every page should be reachable from at least one static text link.
  • Offer a site map to your users with links that point to the important parts of your site. If the site map has an extremely large number of links, you may want to break the site map into multiple pages.
  • Keep the links on a given page to a reasonable number.
  • Create a useful, information-rich site, and write pages that clearly and accurately describe your content.
  • Think about the words users would type to find your pages, and make sure that your site actually includes those words within it.