Source: This article was Published business.com By Katharine Paljug - Contributed by Member: Grace Irwin

Good content marketing, which makes use of long-tail keywords, can be key to making sure your small business ranks well on Google.

As the internet continues to change consumer behavior, more marketers are turning to content marketing to reach customers. But the rules for this new form of consumer outreach are different than those of traditional ads. Rather than creating a slogan or image to catch customers' attention, content marketing requires the careful use of long-tail keywords.

What are long-tail keywords?

Trying to figure out long-tail keywords can feel overwhelming, especially if you aren't a marketing professional. For instance, a simple Google search for the phrase returns more than 77 million results. At its core, long-tail keywords refer to a phrase or several words that indicate precisely what a user has typed into Google. If you tailor your SEO properly, you will rank high in the search results for the phrase that directly corresponds to what your customers are searching for online as it related to your business. 

For example, say your Atlanta-based company makes doodads that are only meant for use within restaurants and bars. Someone looking to buy those doodads might search for "where to find doodads for restaurants in Atlanta." And if you're positioned well in search results (because you've made effective use of that long-tail keyword phrase on your website), you may show up in the first- or second-page search results. 

To use long-tail keywords, you don't need to know everything about them. You just need to understand six things about the changing world of marketing, how long-tail keywords fit in that picture and where you can find them. The answer, generally speaking, is content marketing.

Content marketing has a low cost and high ROI.

Though you can still purchase ads online, one of the most cost-effective and valuable ways to reach customers is through content marketing. That involves creating online material, such as blog posts, website pages, videos or social media posts, that do not explicitly promote your brand. Instead, the messaging stimulates interest in your business and products by appealing to the needs and interests of your target customers. 

Content marketing is a form of inbound marketing, bringing consumers to you and gaining their trust and loyalty. It generates more than three times as many leads as traditional outbound marketing while costing about 62 percent less. 

However, blogging and other forms of content marketing aren't effective unless you make effective use of keywords, particularly long-tail keywords.

Long-tail keywords are essential to content marketing.

When creating online content, you want customers to be able to find it. The most common way that customers find content online is through search engines. The average business website receives more than three-quarters of its traffic from search, but that level of traffic is impossible without using keywords. 

When you incorporate relevant keywords in your content, you optimize your website for search, making it more likely that customers searching for the keywords you have used will find your business. This search engine optimization, or SEO, increases your web traffic and exposes new audiences to your brand. 

Just using keywords isn't enough. To create effective content that makes it to the top of a search engine results page, you need to use a specific type of keyword known as long-tail keywords.

Long-tail keywords attract customers who are ready to buy.

Long-tail keywords are phrases of three or more words, but their length isn't where the name comes from. Long tail describes the portion of the search-demand curve where these keywords live. 

In statistics, the long tail is the portion of a distribution graph that tapers off gradually rather than ending sharply. This tail usually has many small values and goes on for a long time. 

When it comes to online marketing, a small number of simple keywords are searched for very frequently, while keywords that fall into the long-tail are searched for more sporadically. For example, a simple keyword that is searched for hundreds of thousands of times would be "fitness." A long-tail keyword would be "dance fitness class in Boston." Because the tail is so long and there are so many of them, these keywords account for about 70 percent of all online searches, even though the individual keywords themselves are not searched as often. 

Long-tail keywords are not searched for as frequently as simple keywords like "hotel" or "socks," because they don't apply to everyone. They're what a customer plugs into a search engine when they know exactly what they want and need an online search to help them find it. These search terms communicate a consumer's intent – especially their intent to buy – rather than their general interest. 

This means that when you use the right long-tail keywords, you appeal directly to customers who are looking for what you are selling. You want to determine what your audience might be searching and then work those phrases into your content marketing.

Look for high search volume and low competition.

Because long-tail keywords are so niche, there is much less competition for them. If your long-tail keyword is "dance fitness class in Boston," you aren't competing for search traffic with every dance class out there or even every gym in Boston. You are only competing with Boston studios that offer dance fitness classes. That is a much smaller field. 

However, you still need enough people to search for your keywords for your investment in content marketing to be worthwhile. The best long-tail keywords are low in competition but higher in search volume. High volume in this context doesn't mean thousands of searches every day. But several dozens to a couple hundred searches shows that many of your potential customers are actively searching for that keyword.

There are many tools to help you find long-tail keywords.

The best way to find low-competition, high-volume long-tail keywords is with a keyword tool. These tools allow you to plug in a seed keyword related to your business or audience, and they will return relevant long-tail keywords. 

Keyword planners, such as Answer the Public and Keywords Everywhere, are free, though the number of keywords and the information they provide about them is limited. You can also plug seed keywords into a Google search and use the auto-complete and related search term features to find new long-tail keywords. 

Paid keyword research tools, such as LongTailPro or Ahrefs Keyword Explorer, return not only thousands of relevant long-tail keywords but also statistics on the number of monthly searches and the level of competition for those keywords. They also include tools for project planning, search filters, and additional traffic stats. However, these tools can be expensive, costing several hundred dollars to use. 

The type of tool you select depends on your budget and the scope of your content marketing, and the keywords that get you the best results depend on your business and your customers.

Long-tail keywords tell you what content to create.

If you know who your target customer is, you can use their interests and concerns as seed keywords to find related long-tail keywords. For example, if you know that your customers are interested in travel, you can search for those words to find related keyword such as "which travel insurance is best" or "tax deductible travel expenses." 

Once you have a list of these high-volume, low-competition keywords, they provide you with ideas for blog posts, social media, video content, web pages and more. You can create a series of blog posts comparing kinds of travel insurance. You can make an infographic about tax-deductible travel expenses. Rather than wondering what content to create, the long-tail keywords themselves can serve as your topics. 

Creating content around these relevant keywords automatically optimizes your web platforms for search. And since your initial seed keywords were based on what you know about your target customer, you are designing content that directly appeals to the people searching for a business like yours. Using long-tail keywords effectively works with search engines to bring customers directly to your website, rather than hoping that they see an ad and decide your business is worth visiting.

Categorized in Online Research

 Source: This article was published searchengineland.com By Barry Schwartz - Contributed by Member: Jennifer Levin

New markup from Schema.org including HowTo, QAPage, and FAQPage can be used to potentially show your content in Google in a brand new way. Google previewed this in Singapore a couple weeks ago.

Google has confirmed with Search Engine Land that it has been testing for the past several months a new form of search results snippets — the way the search results appear to searchers. These new search snippets are in the form of FAQs or frequently asked questions, Q&A or question & answers and How-Tos.

Akhil Agarwal notified us about this feature on Twitter, and Google has just sent us a statement explaining the test. Here is the screenshot presented at a recent Google event in Singapore:

A Google Spokesperson told us:

We’re always looking for new ways to provide the most relevant, useful results for our users. We’ve recently introduced new ways to help users understand whether responses on a given Q&A or forum site could have the best answer for their question. By bringing a preview of these answers onto Search, we’re helping our users more quickly identify which source is most likely to have the information they’re looking for. We’re currently working with partners to experiment with ways to surface similar previews for FAQ and How-to content.

These new snippet features give more insights into what the searcher can expect from that web page before deciding to click on the search result. Webmasters should be able to mark up their content with structured data and to have their search results be eligible to have the question and answer previews shown. Similar to how supporting metadata around the number of upvotes and the Top Answer feature works.

Google will soon open up an interest form to allow publishers and webmasters to participate in the FAQ and How-to formats shown in the screenshot above.

Categorized in Search Engine

Source: This article was published thefutureofthings.com - Contributed by Member: Issac Avila

Research is the most critical step when writing an academic paper. It’s nearly impossible for students to impress and inspire the assessor with their academic paper if it’s not well-researched. It needs to contain authentic and genuine information for credibility, and that requires a credible source with authoritative reference materials.

While most academic resources can now be easily accessed online, using search engines like Google can be quite frustrating. The reason is that popular search engines like Google, Bing, and Yahoo are full of advertisements and click baits that can really deter your effectiveness. And if you’re lucky enough to find some nearly relevant information with the aforementioned search engines, you will notice that it is improperly (rarely) referenced, poorly formatted and casually presented

We both know that you can’t get away with citing WikiHow, Hubspot or Wikipedia in your research paper. So what’s next? You need a list of search engines for students which will provide credible and authentic scholarly material for your use and reference – and for that, we’ve got you covered. Below is a list of the top 9 Educational Search Engines for Students that you will find rich in authoritative, accurate and credible information for your academic projects and assignments.

If for some reason you still can’t find what you’re looking for or you are overloaded with other research papers or essays and still want to provide a high quality work with credible resources, you may try custom writing service like www.copycrafter.net/custom-writing. CopyCrafter company has qualified and experienced authors that will deliver high-quality custom essays or research papers on pretty much any subject area. And for now, you may try yourself, with the help of the following resources:

1.Google Scholar

Google Scholar is a free, customized academic search engine designed specifically for students, tutors, researchers and anyone interested in academic materials. It’s the most popular research search engine for students and it lists academic resources across a wide range of sources. It allows students and researchers to find credible information, research papers and search journals, and save them in their personal library.

2.iSEEK- Education

iSeek is another widely used and one of the best search engines for students, educators and scholars. It’s a reliable, smart, and safe tool for your academic research and paper writing. Since the search engine was specially designed with students, educators and researchers in mind, you will be able to find credible and relevant resources that will ultimately save your time.

3.Microsoft Academic Research

Most people can associate with Microsoft products and brands, and there is no denying that the company delivers some incredible quality and consistency in its project. Microsoft Academic Research is no exception; the search engine indexes a wide range of scientific journals and research publications from engineering and computer science to biology and social science. It has over 47 million publications written by more than 20 million authors. Microsoft Academic Research allows you to search resources based on authors, conferences, and domains.

4.ResearchGate

If you’re a science major, you will love ResearchGate. In fact, chances are you’ve already searched for certain academic topics in Google and ended up on the ResearchGate platform. It’s a networking site for students, researchers, and scientists and provides access to more than 100 million publications and over 15 million researchers. Other than accessing the information, the platform also lets you ask researchers questions.

5.Wolfram Alpha

Wolfram Alpha presents itself as a computational knowledge engine’ that provides results as answers. All you need is to type in the question or topic that you’re interested in like “What is the diameter of the observable universe?” and the answer will pop up. The best part is it doesn’t make you scroll through tens of pages of results. It doesn’t present search results as the other engines, but it’s great for students looking for quick, snappy answers to bits of questions as they go about their assignments and projects.

6.ScienceDirect

ScienceDirect presents itself as a leading and reliable full-text scientific database that offers access to journal publications, book chapters, and research papers. It’s one of the most popular science search engines for students with more than 20,000 books and over 2,500 journals across various scientific topics and domains. You will be able to access articles, book chapters, peer-reviewed journals and content from topics and subjects like Chemistry, Computer Science, Energy, Earth and Planetary Sciences, Engineering, Materials Science, Physics and Astronomy, Mathematics and so on.

7.RefSeek

RefSeek employs a minimalistic design, which doesn’t look like much at first, but there is a lot going on in the background. It’s probably the most aggressive search engines for students as it pulls from more than 1 billion journals, research papers, book, encyclopedias and web pages. It works more or less like Google, but it only focuses on or academic and scientific results without the distraction of paid links. So you can expect the most results from .edu and .org sites.

8.Educational Resources Information Center (ERIC)

ERIC is reliable and informative online digital library that is populated and maintained by the U.S. Department of Education. The platform provides academic and educational resources for educators, students and researchers with over 1.3 million publications. Students can find materials such as books, research papers, journals, technical reports, policy papers, dissertations, conference papers and so on. The platform receives over eight million searches per month, meaning it’s a reliable and authoritative source of academic and research information.

9.The Virtual Learning Resources Center (Virtual LRC)

Virtual LRC is a search engine for college students which allows students to search and explore educational websites with authoritative and high-quality information. The search engine indexes thousands of scholarly and academic information sites ensuring that you get the most refined and relevant results. The platforms and the results you get have been organized by researchers, library professionals and teachers around the globe to ensure that students easily get resources for their projects and academic assignments.

Conclusion

The above-named directories and databases are among the most trusted and highly reputable search engines for students to find credible, authoritative and reliable academic resources. They offer information and references on all subject areas including chemistry, biology, physics, business, social science, mathematics, computer and technology and environmental science.

Categorized in Search Engine

 Source: This article was published icij.org By Spencer Woodman - Contributed by Member: Dorothy Allen

Reporters are navigating a more treacherous environment than at any time in recent memory, and despite a plethora of digital tools to keep them safe – many are failing to adopt new strategies.

It’s a bleak reality: Last year alone, a record number of journalists were killed in Mexico, reporters were imprisoned in Myanmar and journalists in Turkeyfaced criminal charges en masse.

The press’s enemies have been boosted by U.S. President Donald Trump, who has lodged almost daily attacks against journalists, and many have followed his lead. Wealthy private interests have launched their own crusades: a private firm was hired to undermine New Yorker reporter Jane Mayer’s reporting on Koch Industries, and Harvey Weinstein offered big bucks to a military-grade surveillance firm to spy on reporters and their sources breaking the story of his sexual harassment.

“The World Press Freedom map is getting darker,” according to the 2017 World Press Freedom Index compiled by Reporters Without Borders, “and media freedom is under threat now more than ever.”

[Journalists] frequently disregard their sense of insecurity even when they feel unsafe in public or cyberspace.
Canadian Journalists for Free Expression

These threats are compounded by increasingly potent hacking tools falling into the hands of governments around the world and, in some cases, hackers serving government interests. This makes personal cybersecurity an essential first line of defense for reporters everywhere.

Yet many journalists are failing to utilize some of the most basic tools to keep them and their sources safe from digital attack. A recent study by the Canadian Journalists for Free Expression found that some of the most at-risk journalists “frequently disregard their sense of insecurity even when they feel unsafe in public or cyberspace.”

So what can journalists (and citizens) do to better protect themselves online? Here are five security tools that have emerged as among the most commonly recommended for reporters and news organizations as well as their sources.

1. Signal and other end-to-end encrypted apps

Phone calls and digital messaging often comprise the bulk of a journalist’s workday. But conventional lines of communication can leave the contents of conversations vulnerable to hacking. And, even if someone is not able to intercept to the contents of these chats, a hacker can still access extensive archives of related metadata, including who you talked to and when.

But there are an increasing number of options to help you communicate securely with a high degree of confidence.

As we settle into 2018, the app Signal — possibly you’ve already heard of it – is a clear favorite for secure voice calls and messaging between journalists, their editors, and sometimes their civil servant sources.

You can easily use the Signal app on your phone.

“Everyone is really enthusiastic about Signal,” said Harlo Holmes, director of newsroom digital security with the Freedom of the Press Foundation. “Right now it’s the state of the art in terms of encrypted communication.”

To the user, Signal looks and operates like a traditional chat app, and also allows you to avoid expensive international call and text fees. But Signal also offers what’s called end-to-end encryption, meaning communications can only be deciphered on the physical devices of the communicating users. Even if a government tried to compel the group of developers that administers Signal to turn over your communications, it couldn’t provide information: Signal simply has no ability to figure out exactly what you’re doing on its platform.

An increasing number of digital platforms are using end-to-end encryption, but some popular products differ from Signal in one key way: While some of these firms may not be able to access the content of your communications, they can often access valuable metadata that may reveal who you were communicating with and when. These apps also may allow users to inadvertently send messages without end-to-end encryption.

To learn more about Signal, Holmes recommends checking out the foundation’s page on Security Planner, a project of the University of Toronto’s Citizen Lab.

2. Secure file storage and encrypted sharing

A large portion of our lives is often stored on our laptops and the messaging platforms, social media sites and work portals they access. For journalists, this can mean a lot of sensitive material, including leaked documents, identities of sources and unpublished story drafts.

Bill Budington a security engineer at the Electronic Frontier Foundation, a group dedicated to digital privacy, points to the particularly risky situation of crossing a border and recommends a series of products and measures journalists and others can adopt to keep files safe in the most at-risk circumstances.

His first tip: When most under threat, ditch your primary laptop or smartphone completely. If you have a burner phone or a cheap netbook that doesn’t contain sensitive data, bring this secondary device along instead while traveling.

But when burner devices aren’t an option, Budington says, “the most powerful thing” a person can do to keep devices safe at a border-crossing is to make sure the hard drive is fully encrypted beforehand – helping to ensure that only those with the device’s passphrase will be able to access its files. This step is also among the easiest – for Mac iOS and some Windows users, it can be as simple as clicking a few buttons to activate built-in encryption programs.

Even with an encrypted hard drive, hackers can attempt to “brute-force” a password, potentially gaining access to the encrypted data. (In many jurisdictions, courts and law enforcement agencies can try to compel you to turn over your password under threat of punishment, including incarceration.) An open-source program called VeraCrypt can add an additional layer of encryption, so that, even if hackers get access to your hard drive, they then must enter what amounts to a highly-fortified folder to gain access to your most sensitive information.

Yet even the most highly secured hard drive will provide little help in protecting your data when you inevitably need to transfer a sensitive document to someone else via the internet. Some of the most prominent file-sharing programs, such as Google Drive and Dropbox, do not provide what Budington calls “client-side” encryption by default.

“For cloud storage, the most important feature for secure storage is for the program you’re using to encrypt files locally on your own machine before they are uploaded to the cloud servers,” Budington told the International Consortium of Investigative Journalists (ICIJ). There are some services that provide local encryption prior to upload – Budington recommends SpiderOak, the Keybase filesystemtresoritand Jungle Disk.

You can learn more about device security and document storage by watching a security talk Budington gave in December.

3. Password managers

As hackers become more sophisticated, maintaining strong and up-to-date passwords that aren’t reused across different services is a must. But for reporters who use numerous online services and databases, this can become burdensome: Memorizing a series of complex and ever-changing passwords isn’t feasible and storing them in your computer or email makes them prone to fall into the hands of hackers.

Chris Walker, Digital Security Advisor at the Tactical Technology Collective, a cyber security initiative based in Berlin, recommends solving this problem with an encrypted password manager, which can both generate and store your passwords for you.

“Writing down your passwords and keeping them all in one place might not sound like a good idea at first,” Walker says, but he assures that with the right password manager, users will be more secure with fewer hassles. These apps can both generate stronger passwords and remember them for you.

KeyPass is just one Password manager available.
 
Walker recommends one tool in particular: KeePassXC, a system he describes as highly secure. “It is well maintained, free and open-source software that relies on well understood, standards-based encryption to protect your passwords,” Walker says. “It is also quite simple. It does not try to store your data online or sync between multiple devices. This simplicity helps protect KeePassXC from many potential avenues of attack.”

KeePassXC also has competitors that have been highly rated, including Lastpass, which both Securityplanner.org and online consumer guide Wirecutter recently recommended.

4. Two-factor authentication and its innovations

But Walker is quick to point out that even the most well-managed passwords must be used, when possible, alongside two-factor authentication – an extra layer of security that most often requires users to enter a temporary code that is only accessible from a personal device, usually a cell phone, in addition to their passwords. The idea is that, even if hackers have cracked your password, they still must somehow get their hands on a physical device that only you carry.

This is a basic step that should be used whenever you need to log in to an online service – including email portals, Twitter, Facebook, bank accounts and wherever else you use passwords to protect and to prevent hackers obtaining sensitive information.

One problem with this: The text messages containing these codes can be intercepted. This year may also see a growing adoption of a new sort of two-factor authentication that security engineers believe may be safer than receiving a code on your iPhone: Google is now offering to provide people at high risk of surveillance a program that requires users deploy two physical authenticator keys as a final step for unlocking an account. The devices can fit on a keychain and use USB or bluetooth technology to communicate with your computer and smartphone.

Google’s two-factor authentication requires an extra login step.

Runa Sandvik, the senior director of information security at The New York Times, is a fan of Google’s new initiative, known as the Advanced Protection Program. “I think the Advanced Protection Program (APP) is a great option for at-risk users,” Sandvik told ICIJ. “I have, personally, used APP for a few months and see no reason not to turn it on.”

For more information on Google’s APP and its physical security key, the New York Times has a good article on it and you can also visit the Google’s website. (Unfortunately, this feature isn’t free – each key costs about $20.)

5. Slack alternatives for your office

Over the past several years, new technology known widely by the brand-named Slack has pervaded American office culture. It’s part chat, part email, highly distracting and can archive everything you say and all the documents you upload. Slack has been criticized for its lack of full encryption, and, last year, a web security researcher discovered that a vulnerability in Slack’s code would allow hackers to gain access to millions of users’ private conversations – a particularly sensitive potential exposure for some, given that Slack’s private channels are infamous for encouraging fierce workplace gossip.

Slack does not offer end-to-end encryption, so the contents of your communications may be retrievable if the firm receives an order from, say, an intelligence agency or law enforcement office. Martin Shelton, a data security researcher who works with at-risk groups, says that, although Slack may be the most user-friendly service of its kind, organizations seeking a higher level of security have other options. Semaphor, designed by the tech security firm SpiderOak, is a prominent alternative to Slack. Shelton recommends it as a “nice choice for an end-to-end encrypted chat,” but notes that its “user experience is a little clunky.”

Shelton also points to Mattermost, another potentially appealing chat application for organizations on perhaps the more established side. Like Signal, Mattermost’s code is open source, meaning that anyone can inspect its architecture for vulnerabilities.

“This is great because it’s regularly audited by security researchers,” Shelton says. “You can also host it on your own server, so you know where your data is located,” Shelton notes that this last feature can, however, mean a bit more work. “News institutions will need administrators who know what they’re doing to maintain the server,” Shelton says.

As the Electronic Frontier Foundation reminds us, good data security is a process, not just a series of products. The tools above only offer a start. Some commonly used digital security products that didn’t make the list also include email encryption – which can be a pain to set up but can ensure your encrypted emails are all but impenetrable – as well as secure and private web browsing with Tor and DuckDuckGo.

For more tools and a more detailed explanation of how to use them, take a look at the Electronic Frontier Foundation’s Surveillance Self-Defense project and the Citizen Lab’s SecurityPlanner.org. Threats to journalists may be building, but, luckily, so are our defenses against them.

Categorized in Internet Privacy

 Source: This article was published searchengineland.com By Barry Schwartz - Contributed by Member: Barbara Larson

Data nuts, here is your chance to get your data and charts looking pretty in the Google search results snippets.

Google has announced support for datasets markup schema in the Google search results. This makes it possible for searchers to better visualize data represented on a web page directly in Google’s search results.

Google explained that “news organizations that publish data in the form of tables can add additional structured data to make the dataset parts of the page easier to identify for use in relevant Search features.” Google added, “News organizations add the structured data to their existing HTML of a page, which means that news organizations can still control how their tables are presented to readers.”

Here is what it looks like, with the markup version on the right:

Google’s developer site explains this is a “pilot” release of this markup. Google wrote:

Datasets are easier to find when you provide supporting information such as their name, description, creator and distribution formats are provided as structured data. Google’s approach to dataset discovery makes use of schema.org and other metadata standards that can be added to pages that describe datasets. The purpose of this markup is to improve discovery of datasets from fields such as life sciences, social sciences, machine learning, civic and government data, and more.

Around two years ago, Google first announced this as Science datasets in the search. Google is now calling them simply “Dataset” and expanding it beyond the science community to any data-driven agency.

Here are some examples of what can qualify as a dataset:

  • A table or a CSV file with some data.
  • An organized collection of tables.
  • A file in a proprietary format that contains data.
  • A collection of files that together constitute some meaningful dataset.
  • A structured object with data in some other format that you might want to
    load into a special tool for processing.
  • Images capturing data.
  • Files relating to machine learning, such as trained parameters or neural network structure definitions.
  • Anything that looks like a dataset to you.

Categorized in Search Engine

Source: This article was published theverge.com By Dami Lee - Contributed by Member: Anna K. Sasaki

Google is working with publishers to make it easier to view data journalism in search results, as announced on its blog today. It’s one of the steps Google News Initiative is taking to make data journalism more visible, with the field quickly growing across media. Over half of all newsrooms now have dedicated data journalists, and this feature aims to pinpoint the most useful results from pages containing data tables.

“Data journalism takes many forms, and it’s not always clear from the headline that there is potentially useful data within that document or story,” Google News Lab’s Simon Rogers wrote in today’s blog post. “It isn’t always easy for Google Search to detect and understand tables of data to surface the most relevant results.”

News organizations have the option to add additional structured data to note which parts of their page will be the most relevant in search results. Adding this structured data to the existing HTML of their page, they’ll be able to control how the tables will be presented to readers when searching. One of the early participants is ProPublica, which has been testing the feature with its interactive databases like the Nonprofit Explorer.

The feature is currently in pilot, so search results may not frequently turn up datasets just yet. Developers can look into how to make their datasets more discoverable here.

 

Categorized in Search Engine

Source: This article was published cnet.com By MATT ELLIOTT - Contributed by Member: Grace Irwin

Want to quietly opt out of an email chain or take back that pathetic note to your ex? Gmail can help.

Google overhauled Gmail with a new look and a host of new features including Smart Compose, and you can get the new Gmail right now. While the new additions are appreciated, Gmail has a number of oldies but goodies that you may have overlooked. Here are seven such features that make Gmail awesome.

Mute annoyingly noisy email threads

Muting group texts are probably the single greatest thing about owning an iPhone at Cricket Wireless) (or at least texting on an iPhone), and Gmail offers a similar ability to mute noisy email threads. If you got put on a group email and no longer care to follow the back-and-forth replies, you can opt out. Open the thread, click the triple-dot button at the top and click Mute. The conversation will be moved to your archive, where it will remain even when more replies arrive. 

If you later get curious about what you missed, you can always find it in the All Mail view of Gmail, which includes your archived messages. You can then unmute the conversation if you so choose by opening the conversation and clicking the Move to Inbox button at the top of the page.

Send and archive for the win

You can add a second send option for all replies and email forwards that archives the conversation with your reply or forward. It's helpful for keeping your inbox orderly. And don't worry, the conversation will pop back up in your inbox if someone replies to it. To set it up, click the gear icon in the top right and go to Settings > General > Send & Archive, select Show "Send & Archive" button in reply and then scroll down and hit the Save Changes button. Now, you'll see a blue Send-and-archive chive button next to the regular Send button at the bottom of replies and forwards.

gmail-send-and-archive
Screenshot by Matt Elliott/CNET

Set undo send to 30 seconds

There's an undo option for emails you send and then immediately regret sending, whether it's because of a typo or your current emotional state. Or maybe you just hit send by accident when you were in the middle of composing your missive. Go to Settings > General > Undo, select the maximum time limit of 30 seconds and then scroll down and hit the Save Changes button. (The other options are 5, 10 and 20 seconds). After you hit send, look for the banner that pops up at the bottom of the screen that says "Your message has been sent." Click Undo to bring it back.

Hiding in plain sight: Advanced search

With Google behind Gmail, it's no surprise that Gmail offers powerful search functionality. You've likely used the search bar above your inbox to dig up an old email based on a keyword or sender, but it can do so much more. Click the little down-arrow button on the right of the search bar to open Gmail's advanced search panel where you can search for date ranges and attachment sizes, by subject line and with other filters.

gmail-advanced-search
Screenshot by Matt Elliott/CNET

Preview pane for an Outlook-like look

If you've got a big display, then I encourage you to make use of your luxurious screen real estate and use Gmail's preview pane. It makes Gmail look and feel more like Outlook, where you can view and respond to messages without leaving the inbox. Head to Settings > Advanced, click Enable for Preview Pane and then scroll down and hit the Save Changes button. You'll see a new button at the top of your inbox that lets you toggle the preview pane on and off and choose to split your inbox horizontally or vertically.

Choose your tabs

Gmail does an admirable job of filtering your inbox so the messages you care about go to your inbox while the rest get relegated to the Social or Promotional tabs. Go to Settings > Inbox > Categories and you can choose which tabs you want at the top. Or if you simply ignore all tabs other than your Primary inbox, then you can uncheck all but Primary for a streamlined, tab-less Gmail experience.

Email large attachments via Google Drive

There's a little Drive icon at the bottom of Gmail's compose window. It lets you attach files you have stored in Drive or simply send a link. For Google Drive formats -- Docs, Sheets, Slides and so on -- your only option is to send a link to the file. For other file types -- PDFs, Word docs, images -- you have the option of sending them as an attachment or a Drive link, which lets you share files larger than Gmail's 25MB size limit for attachments.

Categorized in Research Methods

Source: This article was published entrepreneur.com By Neil Pate - Contributed by Member: David J. Redcliff

You probably use Google every day. But, are you using it right?

You may know how to use Google's basic search functions, but in this video, Entrepreneur Network partner Neil Patel wants to teach you some advanced tricks for market research. 

His first tip is to use an exclusion query. By excluding some criteria, you can find out which sites mention you or a keyword of your choice while filtering out unnecessary noise. For example, if you want to see which websites mention you, but have a bunch of mentions from sites or blogs you are associated with, you can use an exclusion query to find new potential partnerships.

Categorized in Market Research

Source: This article was published searchengineland.com By Barry Schwartz - Contributed by Member: Wushe Zhiyang

Google image search on desktop tests tiled image layout with titles and URLs beneath the snippets.

Google Image Search for desktop is testing a user interface and design that makes it more aligned with the mobile image search layout that launched back in March of this year. The desktop version in this test shows the tiled image layout in this white interface, it also shows the titles and URLs beneath each image search result snippet.

Here is a screenshot of the test, which I grabbed from a Google support forum

This brings it more in line with the mobile version of the image search results on Google. Here is a screenshot from my iPhone this morning:

Here is what the current design looks like, without the tiled design and titles and URLs:

Google is often testing new user interfaces, but it does make sense that it would align the desktop and mobile interfaces for image search.

Categorized in Search Engine

Source: This article was published searchenginejournal.com By Matt Southern - Contributed by Member: William A. Woods

The rate at which Google shows its “People Also Ask” search suggestions, aka “Related Questions”, jumped by 34% this week.

According to data from Moz, Google’s Related Questions are now shown 43% of the time.

Dr. Pete Meyers@dr_pete

Big increase (+34%) in Related Questions ("People Also Ask") on Google SERPs last night. They're on a whopping 43% of all SERPs in the MozCast 10K data set. This number rises and falls, of course, but I've hand-checked and confirmed the increase--

To put that in a different perspective — one out of every two or three searches will now display “People Also Ask” suggestions.

Putting it yet another way — Related Questions are now the fourth most commonly displayed Google search feature out of all the features tracked by Moz.

As you can see in the image above, Related Questions are now shown almost as frequently as AdWords.

Just so we’re all on the same page, this feature is not the same as the “People Also Search For” suggestion box. Although the wording is similar, they are two distinctly different features.

This data strictly applies to the “People Also Ask” suggestion box, as seen in the example below.

What makes this feature unique is that each suggestion has a drop-down button that can be clicked on to reveal a search snippet.

Therein lies the opportunity for SEOs and site owners. With this feature now appearing more regularly, it gives content creators the opportunity to drive traffic by targeting related terms.

For example — instead of going after a highly competitive query with a new piece of content, you might want to consider other ways that question might be typed into Google.

A related question could be less competitive, giving you the opportunity to gain exposure by possibly appearing in the “People also ask” suggestions.

Since this feature usually appears near the top of the first page, ranking for a related questions suggestion could be highly valuable.

Categorized in Search Engine

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.
Please wait

airs logo

Association of Internet Research Specialists is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Newsletter Subscription

Receive Great tips via email, enter your email to Subscribe.
Please wait

Follow Us on Social Media

Book Your Seat for Webinar GET FREE REGISTRATION FOR MEMBERS ONLY      Register Now