Skip to main content

Posts

Showing posts from May 30, 2014

IP Delivery Concept

It is the practice of using the IP, the network address of the connecting computer, whether robot or human, and sending different content based on that. The database used to assist with the process. In the case of geo-targeting: Databases stores various ranges of IP addresses, and indicates where this ranges of IPs are in the world. A geo-targeting script scans the list to see in which country the current IP is located. Programmer can use this value to effect changes in presentation or logic. In the case of cloaking : Databases stores the IP addresses of the various spiders that may hit your site. The cloaking script scans the list to see if the current IP is a spider. The programmer can use this information to effect changes in presentation or logic. Implementations of IP-delivery-based cloaking also look at the User-Agent header of the request. The user agent header is a header sent by both browsers and spiders. But it is not regarded authoritative, bec

What is Geo-targeting ?

It is similar to cloaking in that it provides different content depending on the type of visitors by their physical location on earth. Search engine spiders are not treated any differently than human visitors. Geo-targeting E.g. Provide different content to a user from France than to a user from the United States. We can say it is related to foreign search engine optimization. E.g. Google uses geo-targeting to redirect users of www.google.com to country-specific domains. Geo-targeting is regarded as ethical by all search engines. Image Courtesy :  http://www.innovationinpractice.com/

What is Cloaking ?

It refers to the practice of delivering different content to a search engine than to human visitors browsing a web site. Cloaking Cloaking is usually implemented through IP delivery. Google says that “….. cloaking …. may result in removal from our index.” Dan Thies states that “we do not consider IP cloaking to be an acceptable techniques for professionals to associate themselves with.” The New York Times uses IP-delivery-cloaking to show search engine spider the entirely of a news article, but only shows the abstract to a regular user. Matt Cutts of Google states “Googlebot and other search engine bots can only crawl the free portions that non-subscribed users can access. So, make sure that the free section includes interesting content that offers value.” Cloaking is often suggested as a solution to preexisting sites that use Flash or AJAX. It is also only way to implement indexed subscription-based content.

DB2 Instance

It is defined as a logical data server environment. All databases are created within instances on data servers. When multiple instances are created  on same server it provides a unique database server environment using which you can differentiate your tasks going on, such as maintain a testing environment and a production environment on same machine. You may have different administrative groups working with different instances. Information related to instances are stored in instance directory. Location of instance directory cant be changed once created. It contains information like: · Database manager configuration file · System database directory · Node directory · Node configuration files · Other files containing debugging information DB2 Storage Model To create an instance in windows you have to write following command:             db2icrt To start an instance:             DB2START             NET START (for windows) To stop an instance: