luni, 1 august 2011

Damn Cool Pics

Damn Cool Pics


Top 10 Ugliest Soccer Players

Posted: 01 Aug 2011 05:21 PM PDT

The soccer players are one of the most famous people on earth, but not all of them got what they desire. Some of them need an aesthetic surgery. The Sun offers you this top that include the 10 ugliest soccer players in the world.

10. David Hopkin


9. Robert Prosinecki


8. Peter Beardsley


7. Robert Earnshaw


6. Trifon Ivanov


5. Steve Ogrizovic


4. Ronaldinho


3. Dirk Kuyt


2. Luke Chadwick


1. Iain Dowie


100 Funny Sign Fails

Posted: 01 Aug 2011 04:27 PM PDT

Laugh your butt off with these absurd and thoroughly enjoyable sign fails. Human beings are actually being paid to come up with these classic misspellings, illogical signage and hilarious imagery. Check it out, but beware of prostitutes, swimming over the speed limit, and no-pee zones.








































































































































































































Natural Harvest: A Collection of Semen-Based Recipes

Posted: 01 Aug 2011 04:05 PM PDT

Fotie Photenhauer, author of Natural Harvest, describes this book as:
Semen is not only nutritious, but it also has a wonderful texture and amazing cooking properties. Like fine wine and cheeses, the taste of semen is complex and dynamic. Semen is inexpensive to produce and is commonly available in many, if not most, homes and restaurants. Despite all of these positive qualities,
semen remains neglected as a food.











CN Tower EdgeWalk

Posted: 01 Aug 2011 03:59 PM PDT

The EdgeWalk is a new addition to Toronto's CN Tower that lets small groups of people hang 1,168 feet off the top of the CN Tower.

The EdgeWalk plans to operate from May to October in all sorts of weather conditions excluding electrical storms and high winds. The cost for a walk is $175 and includes a keepsake video to show off to your friends.




























SEOmoz Daily SEO Blog

SEOmoz Daily SEO Blog


Better Understanding Link-based Spam Analysis Techniques

Posted: 31 Jul 2011 12:33 PM PDT

Posted by Justin Briggs

 One frustrating aspect of link building is not knowing the value of a link. Although experience, and some data, can make you better at link valuation, it is impossible to know to what degree a link may be helping you. It’s hard to know if a link is even helping at all. Search engines do not count all links, they reduce the value of many that they do count, and use factors related to your links to further suppress the value that’s left over. This is all done to improve relevancy and spam detection.

Understanding the basics of link-based spam detection can improve your understanding of link valuation and help you understand how search engines approach the problem of spam detection, which can lead to better link building practices.
 
I’d like to talk about a few interesting link spam analysis concepts that search engines may use to evaluate your backlink profile. 
 
Disclaimer:
 
I don’t work at a search engine, so I can make no concrete claims about how search engines evaluate links. Engines may use some, or none, of the techniques in this post. They also certainly use more (and more sophisticated) techniques than I can cover in this post. However, I spend a lot of time reading through papers and patents, so I thought it'd be worth sharing some of the interesting techniques.
 

#1 Truncated PageRank

 
Truncated PageRank
The basics of Truncated PageRank are covered in the paper Linked-based Characterization and Detection of Web Spam. Truncated PageRank is a calculation that removes the direct “link juice” contribution provided by the first level(s) of links. So a page boosted by naïve methods (such as article marketing) are receiving a large portion of the PageRank value directly from the first layer. However, a link from a well linked to page will receive “link juice” contribution from additional levels. Spam pages will likely show a Truncated PageRank that is significantly less than the PageRank. The ratio of Truncated PageRank to PageRank can be a signal to indicate the spamminess of a link profile.
 

#2 Owned / Accessible Contributions

 
Links can be bucketed into three general buckets.
 
  1. Links from owned content – Links from pages that search engines have determined some level of ownership (well-connected co-citation, IP, whois, etc.)
  2. Links from accessible content – Links from non-owned content that is easily accessible to add links (blogs, forums, article directories, guest books, etc.)
  3. Links from inaccessible content – Links from independent sources.
 
A link from any one of these source is neither good nor bad. Links from owned content, via networks and relationships, are perfectly natural. However, a link from inaccessible content could be a paid link, so that bucket doesn’t mean it’s inherently good. However, knowing the bucket a link falls into can change the valuation.
 
Owned Contribution
 
This type of analysis on two sites can show a distinct difference in a link profile, all other factors being equal. The first site is primarily supported on links from content it directly controls or can gain access to. However, the second site has earned links from a substantially larger percentage of unique, independent sources. All things being equal, the second site is less likely to be spam.
 

#3 Relative Mass

 
Relative Mass accounts for the percent distribution of a profile for certain types of links. The example of the pie charts above demonstrates the concept of relative massive.
 
Relative Mass
 
Relative Mass is discussed more broadly in the paper Link Spam Detection Based on Mass Estimation. Relative Mass analysis can define a threshold at which a page is determined “spam”. In the image above, the red circles have been identified as spam. The target page now has a portion of value attributed to it via “spam” sites. If this value of contribution exceeds a potential threshold, this page could have its rankings suppressed or the value passed through these links minimized. The example above is fairly binary, but there is often a large gradient between not spam and spam.
 
This type of analysis can be applied to tactics as well, such as distribution of links from comments, directories, articles, hijacked sources, owned pages, paid links, etc. The algorithm may provide a certain degree of “forgiveness” before its relative mass contribution exceeds an acceptable level.
 

#4 Counting Supporters / Speeds to Nodes

 
Another method of valuing links is by counting supporters and the speed of discovery of those nodes (and the point at which this discovery peaks).
 
counting supporters
 
A histogram distribution of supporting nodes by hops can demonstrate the differences between spam and high quality sites. 
 
supporters histogram
 
Well-connected sites will grow in supporters more rapidly than spam sites and spam sites are likely to peak earlier. Spam sites will grow rapidly and decay quickly as you move away from the target node. This distribution can help signify that a site is using spammy link building practices. Because spam networks have higher degrees of clustering, domains will repeat upon hops, which makes spam profiles bottleneck faster than non-spam profiles.
 
Protip: I think this is one reason that domain diversity and unique linking root domains is well correlated with rankings. I don’t think the relationship is as naïve as counting linking domains, but an analysis like supporter counting, as well as Truncated PageRank, would make receiving links from a larger set of diverse domains more well correlated with rankings.
 

#5 TrustRank, Anti-TrustRank, SpamRank, etc.

 
The model of TrustRank has been written about several times before and is the basis of metrics like mozTrust. The basic premise is that seed nodes can have both Trust and Spam scores which can be passed through links. The closer to the seed set, the higher the likelihood you are what that seed set was defined as. Being close to spam, makes you more likely to be spam, being close to trust, makes you more likely to be trusted. These values can be judged inbound and outbound.
 
I won’t go into much more detail than that, because you can read about it in previous posts, but it comes down to four simple rules.
  • Get links from trusted content.
  • Don’t get links from spam content.
  • Link to trusted content.
  • Don’t link to spam content.
This type of analysis has also been used to use SEO forums against spammers. A search engine can crawl links from top SEO forums to create a seed set of domains to perform analysis. Tinfoil hat time....
 

#6 Anchor Text vs. Time

 
Monitoring anchor text over time can give interesting insights that could detect potential manipulation. Let’s look at an example of how a preowned domain that was purchased for link value (and spam) might appear with this type of analysis.
 
anchor text over time 
 
This domain has a historical record of acquiring anchor text including both brand and non-branded targeted terms. Then suddenly that rate drops and after time a new sudden influx of anchor text, never seen before, starts to come in. This type of anchor text analysis, in combination with orthogonal spam detection approaches, can help detect the point in which ownership was changed. Links prior to this point can then be evaluated differently.
 
This type of analysis, plus some other very interesting stuff, is discussed in the Google paper Document Scoring Based on Link-Based Criteria.
 

#7 Link Growth Thresholds

 
Sites with rapid link growth could have the impact dampened by applying a threshold of value that can be gained within a unit time. Corroborating signals can help determine if a spike is from a real event or viral content, as opposed to link manipulation.
 
link growth thresholds
 
This threshold can discount the value of links that exceed an assigned threshold. A more paced, natural growth profile is less likely to break a threshold. You can find more information about historical analysis in the paper Information Retrieval Based on Historical Data.
 

#8 Robust PageRank

 
Robust PageRank works by calculating PageRank without the highest contributing nodes.
 
robust pagerank
 
In the image above, the two strongest links were turned off and effectively reduced the PageRank of a node. Strong sites often have robust profiles and do not heavily depend on a few strong sources (such as links from link farms) to maintain a high PageRank. Robust PageRank calculations is one way the impact of over-influential nodes can be reduced. You can read more about Robust PageRank in the paper Robust PageRank and Locally Computable Spam Detection Features.
 

#9 PageRank Variance

 
The uniformity of PageRank contribution to a node can be used to evaluate spam. Natural link profiles are likely to have a stronger variance in PageRank contribution. Spam profiles tend to be more uniform.
 
 
 pagerank variance
 
So if you use a tool, marketplace, or service to order 15 PR 4 links for a specific anchor text, it will have a low variance in PR. This is an easy way to detect these sorts of practices.
 

#10 Diminishing Returns

 
One way to minimize the value of a tactic is to create diminishing marginal returns on specific types of links. This is easiest to see in sitewide links, such as blogroll links or footer paid links. At one time, link popularity, in volume, was a strong factor which lead to sitewides carrying a disproportionate amount of value.
 
link building diminishing returns
 
The first link from a domain carries the first vote and getting additional links from one particular domain will continue to increase the total value from a domain, but only to a point. Eventually inbound links from the same domain will continue to experience diminishing returns. Going from 1 link to 3 links from a domain will have more of an effect than 101 links to 103 links.
 
Protip: Although it’s easy to see this with sitewide links, I think of most link building tactics in this fashion. In addition to ideas like relative mass, where you don’t want one thing to dominate, I feel tactics lose traction overtime. It is not likely you can earn strong rankings on a limited number of tactics, because many manual tactics tend to hit a point of diminishing returns (sometimes it may be algorithmic, other times it may be due to diminishing returns in the competitive advantage). It's best to avoid one-dimensional link building.
 

Link Spam Algorithms

 
All spam analysis algorithms have some percentage of accuracy and some level of false positives. Through the combination of these detection methods, search engines can maximize the accuracy and minimize the false positives.
 
Web spam analysis allows for more false positives than email spam detection, because there are often multiple alternatives to replace a pushed down result. It is not like email spam detection, which is binary in nature (inbox or spam box). In addition to this, search engines don’t have to create binary labels of “spam” or “not spam” to effectively improve search results. By using analysis, such as some of those discussed in this post, search engines can simply dampen rankings and minimize effects.
 
These analysis techniques are also designed to decrease the ROI of specific tactics, which makes spamming harder and more expensive. The goal of this post is not to stress about what links work, and which don’t, because it’s hard to know. The goal is to demonstrate some of the problem solving tactics used by search engines and how this impacts your tactics.

Do you like this post? Yes No

Get the Facts on the Debt Deal

The White House Monday, August 1, 2011
 

Yesterday evening the President spoke in support of a bipartisan deal to reduce the nation’s deficit and avoid default. This deal will extend the debt limit until 2013, ensuring stability and economic confidence, and it puts in place a framework for balanced long term fiscal discipline. The bipartisan compromise assures that the United States meets its obligations, providing monthly Social Security checks and veterans’ benefits, and fulfilling contracts with thousands of American businesses.

Watch the video of the President’s remarks, and read the fact sheet for a comprehensive breakdown of the new plan.

Have questions about the deal? White House advisors are taking time this week to answer your questions as part of White House Office Hours. Use the hashtag #whchat to ask your questions, and Brian Deese and Jason Furman of the National Economic Council will answer a selection of them directly. Check out this week's schedule below, and follow @WhiteHouse for more updates.

  • Monday, August 1
    5:00 p.m. EDT: Office Hours with Brian Deese, Deputy Director of the National Economic Council
  • Tuesday, August 2
    4:00 p.m. EDT: Office Hours with Jason Furman, Principal Deputy Director of the National Economic Council
  • Wednesday, August 3
    4:00 p.m. EDT: Office Hours with Brian Deese, Deputy Director of the National Economic Council

We’ve already answered dozens of questions from fellow Americans, and we look forward to hearing from you. For more information about Office Hours, including a wrap-up from last week, click here.

Follow us on Twitter for the latest updates: @WhiteHouse.



This email was sent to e0nstar1.blog@gmail.com
Manage Subscriptions for e0nstar1.blog@gmail.com
Sign Up for Updates from the White House
Unsubscribe e0nstar1.blog@gmail.com | Privacy Policy
Please do not reply to this email.
Contact the White House

The White House • 1600 Pennsylvania Ave NW • Washington, DC 20500 • 202-456-1111

 

Debt Deal Reached: Get the Facts

The White House Your Daily Snapshot for
Monday, August 1, 2011
 

Debt Deal Reached: Get the Facts

On Sunday night, President Obama informed the nation that an agreement had been reached between both parties to raise the debt ceiling, preventing our country from defaulting for the first time in its history. Read the factsheet for details of the deal and check out White House Office Hours on Twitter this week to get your questions answered.      

In case you missed it: watch the video of the President outlining the deal or read his full remarks.  



In Case You Missed It

Here are some of the top stories from the White House blog.

Office Hours 7/29/11 or "Time Flies When You're Tweeting": Brian Deese Answers Your Questions on Twitter
During White House Office Hours, Deputy Director of the Economic Council Brian Deese answers your questions live via Twitter about the ongoing debt negotiations.

Gayle Smith on Aid & Development: Twitter Interview Follow-up
Gayle Smith, Special Assistant to the President and Senior Director for Development and Democracy, answers follow-up questions from her live Twitter interview.

Over 1.5 Million Records Released
A new release of White House visitor records brings the grand total of records that this White House has released to over 1.5 million records.

Today's Schedule 

All times are Eastern Daylight Time (EDT).

9:30 AM: The President receives the Presidential Daily Briefing

10:00 AM: The President meets with Commerce Secretary Locke

10:30 AM: The President meets with Senior Advisors

11:00 AM: The Vice President meets with the Senate Democratic Caucus at the U.S. Capitol
 
11:45 AM: Press Briefing by Press Secretary Jay Carney WhiteHouse.gov/live

12:00 PM: The Vice President meets with the House Democratic Caucus at the U.S. Capitol

WhiteHouse.gov/live Indicates events that will be live streamed on WhiteHouse.Gov/Live

Get Updates 

Sign up for the Daily Snapshot 

Stay Connected

  

This email was sent to e0nstar1.blog@gmail.com
Manage Subscriptions for e0nstar1.blog@gmail.com
Sign Up for Updates from the White House

Unsubscribe e0nstar1.blog@gmail.com | Privacy Policy

Please do not reply to this email. Contact the White House

The White House • 1600 Pennsylvania Ave NW • Washington, DC 20500 • 202-456-1111 
    

 

     
 

Seth's Blog : Responsibility and authority

Responsibility and authority

Achievers in traditional organizations often say, "I want more authority." They mean that they want the power to make things happen, the mantle of authority that will allow them to get things done.

This is an industrial-era mindset. Management by authority is top-down, risk-averse, measurable and perfect for the org chart. It's essential in organizations that are stable, asset-based and adverse to risk.

There's a different approach, though, one that's based on responsibility instead of authority. "Anyone who takes responsibility for getting something done is welcome to ask for the authority to do it."

Ah, your bluff is called. And so is your boss's.

 

More Recent Articles

[You're getting this note because you subscribed to Seth Godin's blog.]

Don't want to get this email anymore? Click the link below to unsubscribe.




Your requested content delivery powered by FeedBlitz, LLC, 9 Thoreau Way, Sudbury, MA 01776, USA. +1.978.776.9498