Coffee’s For Closers

….but only if you have an established sales process.

I’ve given this talk a few times. It started out as a flash talk and turned into a full 30-45 minute presentation. I’d like to write out this presentation in long form, that way the next time I give the talk, I’ll be able to direct people to it afterwards.

Let’s begin

How many people here are familiar with the scene “Coffee’s for Closers” in the movie Glengarry Glen Ross? To give a backdrop, Glengarry Glen Ross was originally a play turned into a movie depicting the lives of real estate salesmen. “Coffee’s for Closers” is a scene in that movie where Blake, portrayed by Alec Baldwin, comes down to motivate the other salesmen.

“Put that coffee down! Coffee’s for closers, ONLY! You think I’m f*ck!ng with you? I am not…”

He’s basically saying that if you’re in a sales capacity at an organization and you’re not closing business, don’t drink the company’s coffee, let alone make the base salary that you’re making. And is that true? Should coffee be for closers? The answer it YES!! Absolutely! Coffee should be for closers….but only if you have an established sales process. Because if you don’t, then you can’t expect your sales people to close on a continually basis.

We need a sales process to integrate ourselves into. To focus on it, to make it a standard, and then finally to improve it.

Introductions

So, who am I? My name is Adam Lamagna, sounds like lasagna! Easy to remember!! I am a sales consultant for Sucuri, I help agencies pick the right solutions to secure their websites and their clients’ websites.

When I turned 18 and graduated high school, I flew out to Hollywood, California to become a rockstar, that dream was short-lived! I got into sales and I’ve done everything from cold calling, to door-to-door, inside sales, to high-pressured, hard selling. I got into technology about around 2012 and haven’t looked back since. I’ve worked for a small web agency and a large (enterprise-level) agency. I love business development and sales. I believe sales to be a noble profession!

History of Sales

The history of sales is super important, it gives us an overview of how sales has progressed and where the pivotal moments were. If anyone wants to read more about the sales process, you can always check out my blog post on the history of sales. Starting at the beginning of time, we had the bartering system. You give me this, I give you that — still relevant to this day. But when money was introduced, it turned the bartering system into markets and gave us a system to improve upon.

Fast forward to the Industrial Revolution, this is when the modern day salesman comes into play. He’s also known as the exaggerated salesman, the guy who would sell you snake oil. And from there up to the 1950’s, when we see the fast-talking salesmen come in, it’s really important to note that all the information in the sales process was owned by the seller. If a consumer wanted to know more about a product or service, they had to go to the seller to get that information.

Consumers finally got wise to this, so in the 70’s, 80’s, and 90’s, we see things like SPIN (Situation, Problem, Implication, Need) selling, and Solution selling, and Strategic selling. They were kind of variations of themselves, but they all aimed to bring the consumer into the process, and make them feel like they were making informed decisions based on data. When the 2000’s hit and information was readily accessible, it rocked the very foundation of the selling world. Sellers were no longer in control, it was the age of the buyer!!

Sales Process

What is a sales process? Simply put, it is your view of your customer’s buying journey. With all the tasks, steps, procedures, and resources it takes to effectively manage that buying journey. I separate the sales process into 3 areas: 1—Pre-sales, 2—Engagement, 3—Post-sales.

Pre-Sales

Pre-Sales is planning and preparing to effectively engage the right prospects at the right time with the right tools.

First off, you need to know your buyers. Who are you selling too? What verticals/industries are they in? What do they care about and what do they need to make a decision? You can do your own buyer personas with this link to a HubSpot template — http://offers.hubspot.com/free-template-creating-buyer-personas — this is a really easy way to figure out who your buyers are.

Next is the marketing collateral. What are you using in your ‘sales tool-bag’ to sell people with? Your marketing collateral should do two things. 1). Showcase your talents. 2). Answer your buyers’ questions. You can answer your buyers’ questions by writing blog posts. You probably get asked the same questions over and over again. Well, write a blog post about it! Then showcase your talents through case studies and portfolio pieces. You can also reach out to the giants like WordPress or WP Engine to see if they have any marketing collateral you might be able to use. They’ll have written white papers that are available to download and use. Check it out!

Engagement

Engagement is the fun part! It’s actively talking to your prospect and funneling them down the sales funnel. There are different stages in engagement and it’s important to know the essentials (my own terminology) of each stage:

  1. Requirement: What is the requirement for a prospect to be in or get into this particular stage?
  2. Purpose: What is the purpose of this stage? Or what am I trying to accomplish with this stage?
  3. Team Member: Who am I using in this stage? Is it just me or should I bring another team member in? If you are a freelancer, then what hat (cap) am I wearing?
  4. Resources: What collateral should I use for this stage? What’s appropriate?

Then you’ll want to grid out each essential for each stage.

Closing

How do you close on a continual basis successfully? That is a phenomenal question. One that I do not have an answer to! But I will say this — it revolves around value! I look at 3 different areas of value.

  1. Value Relevancy: Is the prospect’s challenge relevant to what I do? In other words, am I the right person to solve this prospect’s challenge? If not, refer them to someone who is. Do NOT chase a client who’s project isn’t relevant to what you do! Please!
  2. Value Perception: This is a really important thing to learn about, value perception. Understand what the prospect’s perceived value is. Ask questions like “have you ever done a project like this one for your company?” and really try to understand what they perceive your value to be. Because, make no mistake, the perception is the reality. If someone values your skill set to be below what it actually is, then that’ll make for a frustrating partnership and project. If someone comes to you with a budget of $15k, and you know it’ll only take you $5k to do, their perceived value of that project is already $15k. You’re going to need to educate your prospects and sometimes that can be really hard to do. Learn value perception and how big a role it can play in the sales process.
  3. Value Diagnosis: Focus on your prospect and what they need. Make them a collaborative partner. Remember, it’s about the observable symptoms of problems and how they can be solved within the parameters of the solution. Encourage things like ownership and have a mutual self-respect/mutual self-esteem with your prospect. This can ultimately make you stand out from the competition.

Post-Sales

Once you close business, you then become a client advocate. You need to do a proper handoff with your new client and the Project Manager. If you are a freelancer, then it’s time to switch roles and become that PM. Make sure you explain what’s going to take place over the next month or two, or 7! Make sure your client understands the role and responsibilities they have. And finally, check in with your new client after the project is in full swing. Ask them about the sales process, what did they like or dislike? Ask them if they’d recommend anyone for your services. Keep in touch and become that client advocate — it will lead to more business.

Quick Tips

In sales there are very few things that are within our control. These are the things you’ll want to keep in check:

  1. Listening: They say great salesmen listen 70% of the time and talk 30% of the time. That is not the case for me, I talk a lot more than that. I wish I could talk less, hehe! I don’t care how much you talk, but when you’re listening, make sure to actually listen. Respond with good feedback and answers.
  2. Time: If you are not a wealthy person, time is your next greatest commodity, spend it wisely!
  3. Attitude: The best sales people are the ones who can dust themselves off from a loss and go after the next deal with the same gusto and rigor as they did the very first deal they ever went after! People can hear when you are not smiling over the phone, believe me, they can!

Recap

The sales team and the marketing team work together. The sales process consists of Pre-sales, Engagement, and Post-sales. And doing all this will eventually lead to closing more business and drinking more coffee.


The Wonderful World of Hacking

I’ve always been fascinated by hackers ever since I saw the movie Hackers, which I now know does NOT accurately portray what being a hacker consists of. Hackers are an interesting bunch. Why? Because their reasons for doing what they do can vary the full length of the spectrum.

Let me explain

Back before computer systems and the internet got to be wildly popular, the term “hacker” was used to embody the tinkerers of software or electronic systems. These hackers enjoyed learning (and exploring) all they could about computers and the way they operated. In the beginning, hacker was a term that was used to describe a person who was really awesome at working with computers.

Now…it’s taken on a slightly different and somewhat complex meaning.

When you hear the term hacker, you automatically think of someone who tries to gain entry to a website or system to do something malicious, whether that be stealing information, defacing a website, etc. The term hacker now refers to someone who maliciously breaks into systems for personal gain. But the key phrase within that sentence is personal gain. What is personal gain? Well…it could be just about anything.

SOME OF THE REASONS WHY HACKERS HACK:
  1. Profit – this could be money or this could be web traffic.
  2. Notoriety – some hackers like to hack for the esteem it brings them in the hacking community.
  3. Hacktivism – hackers try to disseminate political or social messages and campaigns to raise awareness surrounding a certain issue or issues.
  4. Hobby – others do it because they want to see what they can break into, how hard it is, and so on.
  5. Because they can – yup, some do it just because they can.

Now, just like hackers hack for varied reasons, there are also several types of hackers out there and their motivations are varied as well.

TYPES OF HACKERS:
  1. Script Kiddies – these hackers are considered (in the hacking world) to be novices. They take advantage of hacker tools and upload scripts to different places (often times, without knowing what that script will do or how damaging it’ll be) for the fun of it. Hence the name, Script kiddies.
  2. Hackers for Hire – these hackers are the mercenaries of the cyber world. People will enlist their services for money.
  3. Cyberterrorists – usually they attack government networks or power/utility grids. These hackers will crash systems and steal government top secrets (aliens, UFO’s, stuff like that!). Very dangerous hackers, very dangerous!
  4. Criminal Hackers – often a part of an organization of hackers, they are very skilled in breaking into systems (often times, without a trace) and either stealing credit card info or personal identification information.
  5. Security Researchers – these guys are the good guys, the ones who find flaws in companies and organizations’ systems and bring them to light without causing harm. They’re also the ones who develop the tools to use against malicious hackers.

Now let’s talk a little bit about the different categories of hackers, they can all be described by colors. I know, pretty cool, huh?

CATEGORIES OF HACKERS:
  1. White Hat Hacker — the good guys!
  2. Black Hat Hacker — the bad guys!
  3. Grey Hat Hacker — kinda the in-betweeners, sometimes for good, other times, not so much.
  4. Blue Hat Hacker — the ones who get paid to uncover vulnerabilities (I feel like these guys should be called the green hat hackers, but that’s just me).

So, now that you have an idea of what types of hackers are out there, and before we get into what types of security threats are out there, let’s take a look at why it’s getting increasingly easier to hack systems and websites.

  • Networks, nowadays, are extremely widespread and we are all connected
  • Lots of hacking tools available
  • Many and many wifi networks that are open
  • Applications have complex codebases
  • Generations of our kids are getting super smart when it comes to computers
  • Anonymity

There are sooo many things that people should be concerned with if they are on the internet, have a website that they manage, pay for products online, or have personal identifiable information online. If you don’t participate in any of the preceding things, then you are a hermit and stop reading this post. Ha!

But hacking happens every single day. Every. Single. Day. Every. Single. Hour. Wrap your head around that! It does happen and if you have not been hacked, then you’re lucky, but it will eventually happen to you unless you take proper action, which I’ll write about in an upcoming post. But (and this list is by no means complete) here are different ways hackers can mess with you or your systems.

TYPES OF ATTACKS:
  1. Brute Force – these attacks are when a hacker keeps on trying to gain access to your login credentials on any number of password protected sites, by continually trying different password combinations. Almost like a guy trying to break down your door. When ramming his foot into it doesn’t work, he’ll try a battering ram, when that doesn’t work, maybe he’ll try to pick the lock. Hence, brute force. These happen on my WordPress sites everyday.
  2. DoS / DDoS – ahh, the infamous Denial of Service or Distributed Denial of Service. This is an attack that’s designed to flood a website or network with traffic overload to render it inoperable. The group Anonymous (which is a network of hackers that primarily hack to bring certain issues to light) is well-known for a series of public DDoS attacks. Interesting group and I would never want to do anything to upset them, that’s for sure!
  3. SQL Injection – SQL stands for Structured Query Language, which is used for communicating with databases. The injections are attacks that “inject” (obviously) malicious code into a database to gain access to that database.
  4. Cross-Site Scripting (XSS) – this is a vulnerability which allows hackers to insert client-side (meaning executed by a user’s web browser) scripts into pages on a website or application. Then they can go on and do anything malicious or see certain activity, etc.
  5. Cross-Site Contamination – this is when hackers gain access to a “secure” site by infiltrating it from a site that’s not secure, but on the same server. We see this a lot when people have outdated CMS installs on the same server they have the updated ones on.
  6. Phishing Emails – have you ever gotten an email asking you to update your profile on Facebook, but it looks a little off? That’s because it probably is! Phishing emails are exactly that, they’re when hackers are fishing for information. You’ll get an email that looks a lot like it came from Facebook (the good phishing emails are the ones where you can’t tell the difference) asking you to put in your password or personal information. Hackers are able to log what you do on these sites/emails, so don’t ever click anything in an email unless you absolutely trust the source, but even then you can’t be 100%, be careful!
  7. Social Engineering – this is a method many hackers use that relies on interacting with humans. It’s basically getting a person to be relaxed enough to offer up information they normally wouldn’t give out. So, if you’re ever on the phone with someone (a person you don’t know, like someone claiming to be from the post office or some other government agency) and they ask you what your mother’s maiden name is, don’t give it out unless you are absolutely positive you’re speaking to the proper person.

Again, this is by no means a complete list, but these are some of the common things hackers will try. The best way to protect yourself is by getting a service like Sucuri’s AntiVirus or Firewall plans, making sure to keep your systems updated, and by being informed. Make yourself aware when you’re online and be cognizant of what you are clicking on and activity in general. And luckily, you won’t be another statistic of getting hacked!

The Black Book of Web Terms

For those of you who are in the business of talking tech, you’re probably familiar with certain web terms like SEO, Full Stack Developer, Adwords, HTML, FTP, Above the Fold, CSS, etc. I’ve put together a list of the most common terms used when talking about everything tech from computer programming to open-source platforms to blogging. I’ve tried to make them as relatable as possible so you can explain these terms to your cyberspace-challenged family at the next Thanksgiving dinner and sound super tech savvy. Terms, acronyms, phrases, and slang are all in the mix, alphabetically ordered for your convenience. If you need more clarification, fill free to reach out!

A:

Above the Fold – this refers to anything that can be seen on a webpage without having to scroll down. It stems from the newspapers where anything in the top fold was considered prime real estate for content and ads.

Adwords – this is the most commonly used ad service powered by Google. It allows account holders to bid on certain keywords relevant to their website and create ads which appear on SERPs. It places ad copy usually at the top or to the right of the search engine result page (SERP). If you look closely at the first two or three results on your next search, you’ll see a little yellow box that says “ad” directly to the left of the link, that is if you use Google. Bing has its own ad service, surprisingly called Bing Ads.

Adsense – this is a little different than Adwords, but connects with it. Adsense allows bloggers and other webmasters to display ads on their sites which can generate income through a CPM (Cost per impression, aka PPM) and CPC (Cost per click, aka PPC). An account holder can get paid through Adsense by taking the ads from Adwords that companies create and pay for and displaying it on their websites. I know this is a little confusing, but all you need to know is Adwords costs money, Adsense can make you money.

Analytics – services that generate statistics about a website’s traffic, patterns, and has the ability to measure conversions. These tools basically track activity on a website.

API – Application Programming Interface – it’s a way for one technology to interact with another technology. Like a Twitter API let’s developers incorporate Twitter data into a website or application, same thing with a YouTube API. This maintains a level of cohesion in the building process.

B:

Back End – refers to everything on the “back-end” of a website, basically what goes on behind the curtain. Back end functionality are the inner workings of a website or application. Also known as server-side, back end is the stuff you don’t see when you look at the webpage. (EX: Have you ever filled out a contact form online? Where does that information go and how does it get there? That’s back end!!) Back end may also refer to a person, he’s a back end developer.

Bandwidth – is a resource in use. If a website has millions of users viewing the site, it will be using a lot of bandwidth. Bandwidth can also be used to describe someone’s availability – a developer just finished their project and has some “bandwidth” to help out on different projects.

Beta – we always hear this product is currently in beta – that means it’s the first “live” phase of a website or a platform. The product is ready for use but the kinks are still being worked out and it’ll improve.

Black-Hat – used to refer to malicious hacking or aggressive SEO strategies.

Blog – if you don’t know what this is, you’ve got problems. But just so you know, blogs started as sort of an online journal and now blogs have turned into complex inbound marketing tools. The internet is like an ocean and companies use pieces of bait called content (blogs) to reel people in with.

Bounce Rate – used in analytics to represent the percentage of visitors to a particular website who navigate away from that site after viewing only one page. This is when visitors come to a website and then “bounce” off never going to another page than the one they landed on – hence bounce rate – a low bounce rate is usually good, a high bounce rate is usually bad – usually!!

Browser – this one’s easy. A browser is an application we use to surf the web. (EX: Chrome, Firefox, Safari, Internet Explorer (do people still use that, ha!))

C:

Caching – this is when your computer stores a copy of a webpage you previously looked at so it can deliver that page to you faster the next time you view it.

CDN – Content Delivery Network – CDN’s are normally for websites that have lots and lots of images, videos, and rich media. CDN’s will store cached versions of the website on different servers at different locations around the world. This enables the site to be served up quicker when trying to view it. Depending on your location, the server closest to you will show you the website.

CMS – Content Management System – software that makes the management of a website easier for those who aren’t developers. A CMS can have a number of different users, usually called admins, that access the website through a login portal. The user interface opens into a dashboard where admins can publish, edit, and update the website’s content. Examples of CMS’s are WordPress and Drupal, both open source!

Cookie – stored in your web browser, a cookie comes from a website you visited. When you revisit the same website, the cookie will send data back to the server to notify the website of your previous activity.

CRO – Conversion Rate Optimization – the practice of creating great experiences for a website user with the goal of converting them to paying customers.

CSS – Cascading Style Sheets – this is a stylesheet for sprucing up your website pages and making things look pretty. With a .css extension and linked from an HTML (seen below) page, it is the decoration of a website.

D:

Deep Web – a part of the internet that is not indexed by regular search engines. The internet is an ocean as in 90% of its contents are below the surface. For every page a regular search engine indexes, there are many more that are not being indexed. See TOR – the software for trolling the deep web.

DNS – Domain Name System – a unique user-friendly name that identifies a website, like any domain.com and essentially converts the number of the IP address.

DOM – Document Object Model – let me preface this by saying this will be hard to understand! There are objects in an HTML page called elements, things like <title> and <header>, the DOM is basically a representation of the document (often times in the form of a tree) and determines how objects can be manipulated.  It can be considered kind of a theory, and it’s technically an interface. Told you it would be hard to understand. Google it – I dare ya!

Domain Authority – honestly, no one really knows what this is. It’s a secretive algorithm that measures how a website will perform in search engine rankings. Moz has the info you need on Domain Authority.

Drupal – free, open source content management system used to build websites and online communities leveraging modules for functionality.

E:

Element – the components in HTML, they represent content and are wrapped in tags EX:  <p>Paragraph tag</p>, <h1>Heading with the most weight</h1>, <h6>heading with the least weight</h6>, <img src=”this shows an image” />

F:

Favicon – these are the tiny little images and icons that are displayed in the tab of a window next to the title of the actually webpage.

FTP – File Transfer Protocol – a way for files from one computer (usually a personal computer) to be transferred to another computer (usually a server) to be viewed on the internet.

Framework – in development, a framework helps by having a defined collection of tools to pull from for creating websites and web apps. Common activities (e.g. – fixed layouts, responsive markup) are put together and available for use instead of building something from scratch.

Front End – development that involves everything a user sees on a website, sometimes called client-side. Also refers to a person, she’s a front-end developer.

Full Stack Developer – a developer who knows both front-end and back-end development, these developers are extremely skilled and demand a high salary!

G:

GIF – a format file type used most times for animated images and graphics.

Git – a version control system which enables developers to work on projects simultaneously from different computers and store revisions of development history. It’s really good for holding developers accountable!

H:

Hack – there’s two meanings for this. One – is the traditional meaning where your computer gets hacked by a hacker for profit, gain, or notoriety. The Second – is when files are customized by a programmer, but not coded properly. You’ll often hear, “the core files are so hacked we’d have to start from scratch.” – this could mean that the files were hacked by a hacker, but it probably means that some developer who had access to those files changed the code to get the website or program to run the way it needed to run, but they didn’t use best practices.

High-level – this is a business term which means very basic, an overview, not specific or detailed. Your boss comes to you and says, “I’d like a high-level overview of your department’s business objectives for Q4 this year, just something simple.”

HTML – Hyper Text Markup Language – one of the first languages in website building, it leverages components known as elements wrapped in tags (surrounded by angle brackets shown here – <title>My Website</title>) to render certain types of text and images in a file with the extension .html. When rendered on a webpage, the above example would only show My Website. It is the skeleton of pretty much any website and contains different types of content.

HTTP(S) – Hyper Text Transfer Protocol (Secure) – it’s basically a set of rules for transferring information over the internet between browsers and servers. HTTPS is the secure transfer over an encrypted connection.

I:

IP Address – Internet Protocol Address – this is the number associated with a web address or computer.

J:

JS – JavaScript – a scripting/programming language used to create dynamic websites. It can handle user events and movements, alter content, and make for an overall great user experience. JavaScript has become very popular these last few years.

jQuery – a JavaScript library to simplify creating animations and handling events. It’s the most widely used JavaScript library today, and it’s got a great API.

K:

Keyword – any term, phrase, or word typed into a search query in a search engine that shows results.

KPI– Key Performance Indicators – companies use KPI’s to gauge and compare performance, they usually come in the form of some type of data-driven metric like social media reach, profits, or analytics.

L:

Landing Page – a webpage built within a website for the purpose of being “landed” on, usually from email marketing or social media. A landing page is built in hopes of converting users into customers.

Link Bait – content on a website that other sites link to because they find it interesting, unique, funny, and want to link to it.

Link Building – getting other websites to link to your website in hopes of improving your own ranking in a search engine.

M:

Markup – another way to say code, HTML is a markup language. See also syntax.

Meta – often heard in line with the word data, metadata is literally data about data. It helps search engines read parts of your website to determine what type of data it is.

Microsite – this is an individual website with its own domain/subdomain and as its own entity, but often times associated with another larger website. A microsite is usually used to showcase some type of event or new product.

Mockup – a design that shows a user what a website will look like without having to build any of the functionality.

MVP – Minimum Viable Product – for a website, the MVP has just those core features that allow the site to be deployed live. It’s the absolute bare minimum a website can be and still be used.

N:

NAP Consistency – Name, Address, Phone Number – a company’s NAP should be the same across all different local listings and other listings. This will help with local SEO.

O:

OOP – Object Oriented Programming – is a fundamental of computer programming that centers around objects and the methods or functions that control them.

OS – Operating System – are you using a Mac, Windows, or Linux OS? The iPhone’s operating system is iOS, go figure!

P:

Panda – this was an update to Google’s algorithm that aimed at lowering the rank of low-quality sites aka “thin sites”, and return higher quality sites at the top of the SERP.

Penguin – this was another update to the Google algorithm that aimed at decreasing search engine rankings for those sites that were still practicing Black-Hat SEO tactics.

PHP – PHP Hypertext Preprocessor – what?!? yes that first P stands for PHP, it makes no sense, I guess HP was taken! This is a programming language that is normally used with a database like MySQL to build dynamic websites and web applications. Over 80% of the web is written in PHP.

Pogo-sticking – users who search for a keyword and click on the first result they see. Then they don’t find what they want and hit the back button to the results page and click on the second result they see. Then they don’t find what they want again, and this can go on and on, hence the pogo-stick.

Post – an article in a blog.

Q:

QA – Quality Assurance – the act of making sure something works properly. In development, massive regression testing, unit testing, browser testing, and cross-platform testing is usually done.

Query – any question, whether that’s searching in a search box or querying a database to get back info from that database, a query is simply a question.

R:

RFP – Request for Proposal – this is a business term, but it’s when companies contact a web agency in hopes of finding a solution to their web challenge. If a company wants to build a website or do a redesign, they’ll put together an RFP (which basically describes what they’re using now and what they’d like to change about it – high level stuff) and send it to a web firm to get a proposal.

Rich Media – this can be different things, a few examples are images, videos, and animations that usually involve some type of user interaction. Or it can be an image, video, or interactive advertisement.

River – on a blog, it’s the main section of blog posts, not the sidebar.

RSS – Really Simple Syndication, actually it’s Rich Site Summary – RSS feeds allow a webmaster to syndicate someone’s content from a blog or news source to their own site and link back to that blog or news source, the feed will automatically update with any new posts.

S:

Scope Creep – adding incrementally to a project plan or statement of work (SOW), and realizing that the project plan has gotten way too big! The creep refers to adding small things (features, functionality, etc.) to a project and then realizing that the scope (what the project entails) is way over budget or the timeline’s too short.

SEO – Search Engine Optimization – for lack of sounding obvious, this means optimizing a website for the search engine. It’s an organic (meaning free) process of affecting a website’s visibility in SERPs. The strategy for this is extensive and constantly changing, you can check out some of my previous posts on SEO and Search Engines to get a basic look.

SEM – Search Engine Marketing – increasing the visibility of your website through paid advertisements.

SERP – Search Engine Results Page – it’s the page that has all the results on it after you enter a search query and hit enter.

Server – simply put, a server is a computer, but it’s a big one that houses a bunch of different websites.

Sitemap – this is a list of all pages within a website that can be crawled by spiders or by users, normally showing the taxonomy of a website.

Spamdexing – slang term for the use of Black-Hat SEO strategies like invisible text (hiding text between the markup and rendering it invisible), keyword stuffing (stuffing a webpage full of the same keyword), and doorway pages (landing on a page and then suddenly being redirected to another page) for the purposes of high visibility in search engine rankings. This is a very bad thing to do and it’s like committing SEO suicide.

Spider – a program designed to crawl (read) web pages.

SOW – statement of work – a document that tells the client what you plan on doing for their project.

Syntax – properly structured code.

T:

Table – a slang term for putting something on hold. EX: “I’ve got a lot on my plate right now, so why don’t we table this month’s content strategy and circle back at a later date.” I hate this term!!

Taxonomy – this is the procedure of organizing and categorizing the different web pages on a website. A website’s hierarchy.

TOR – The Onion Router – this is a free software for online anonymity. It let’s users surf the web much like Google or Bing does, but with no threat of placing cookies on your computer or tracking your movements. TOR is often used to surf the Deep Web.

U:

UI/UX – User Interface / User Experience – UI is what we use when we’re doing some type of action online (e.g. – viewing a website, purchasing an online product). UX is the feeling we get from doing those actions.

URL – Uniform Resource Locater – URL’s are a website’s unique address so that it can be found online.

Usability – criteria that assesses how easy a user interface is to use including learnability, efficiency, memorability, errors, and satisfaction. The Nielsen Norman Group has a great post on this topic – Usability 101

User-friendly – this just means that something is easy for us humans to understand! EX: beingajile.com/blog is much easier for us to understand than beingajile.com/wp/13286-aXeS3.3428.php

V:

Virus – much like a cold virus or the flu, a computer virus is a malicious program that likes to harm and reproduce in other hosts (computers).

W:

Webmaster – any person who develops or controls a website.

Widget – a small piece of functionality in WordPress usually found in the sidebar or footer areas.

Wireframe – this is kind of like a blueprint for a website, often done with boxes, it represents a visual framework.

WordPress – an open source content management system designed for developers and non-developers. It has a vast community of developers/non-developers who regularly contribute to making it the best blogging platform out there. It utilizes plugins which are pieces of functionality that help the end user accomplish something (e.g. – embed a twitter feed). This is such an immense platform that the codex has got all the documentation you need to get started.

X:

XML – Extensible Markup Language – defines a set of rules for encoding documents in both human-readable and machine-readable format, it’s also designed to carry and store data.

Y:

Z:

I couldn’t find anything for Y and Z, but I’m sure this will be a constantly updated list. I literally keep a black book of web terms right next to my computer so that when I hear someone say a term I’m not familiar with, I write it down. Please feel free to reach out if you have any input or want to know something more about a certain term. Hope this was helpful.