A few years ago, I asked on my blog what people would like from Google’s free webmaster tools. It’s pretty cool to re-read that post now, because we’ve delivered on a lot of peoples’ requests. At this point, our webmaster console will alert you to manual webspam actions that will directly affect your site. We’ve […]

Click to continue reading “What would you like to see from Webmaster Tools in 2014?”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=8cd59c5133b73a32260de8dfba3c1f66be03c9d1f20df7f41b4d0f9ce084ad59a0c61d600ce75d7dceabbc0d7a4d6776cb88c7c47db204f952ee08f5af4272b7fbe98c7be6c13aa65810c848d7081d55d1832a7d5dbf9c573a9d983281c367437da7a41cb81c4118f8d451c67444f1d98983bf5a12366bc79ed0500c31c0316f7e1c92ef3f12b61bf78d6863b68d63b1dce23f8331a9b7f5608b0aa0e0df95dc814b97abb801f2712563aaca42511374127b2b310d025d2ec50923de5164ee9edc78c3bcd357245520811179d0f49046ea81390424608a9e5204bc10e5634da592d115e64d1eb2006c57c9cfa97525cb1e372c0950594dfc65e915b03db64b0d529ed080562fbf8642ca7003af31779ebc51b23b85d578b45f9934e295ca768c811f51acb389cd17340acd86219a76fdfb6253ff92a7a62cfa61279518509c27749c3f32948b237be02ce140c7582d0717a05a3c1ab2dda0817589425ea7f077ee6edabac1258ccefdb9787073c73f84f06b96bbc887ee677e984038833b07f7aabea329d447ea075e3b6d23cf80febab28e8212aa350a2fe649e7b1745fde3e661a6b4c928f380a56c673111b740c8178e3784fa535c3141e0c848edc13e578f14068807ccfc79e2f27b2f1c21f467dd169d0e2bef19df5939896f593994d[[T_F]]

For the folks that don’t know, I’ve been out for a couple weeks and I’ll be on vacation the rest of November. If you’ve tried to contact me recently and haven’t heard back, that’s probably the reason. Added: if you enjoy watching our webmaster videos, you can follow @googlewmc to hear as soon as we […]

Click to continue reading “On vacation the rest of November 2013″



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]

On April 21st, 2014, I’m going to run the Boston Marathon. If you want to show your support, please donate to a good cause for cancer research. Anyone who wants to give is welcome. So many people have been affected by cancer, including members of my own family. The Dana-Farber Cancer Institute funds basic and […]

Click to continue reading “Please help me run the Boston Marathon”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=8cd59c5133b73a32260de8dfba3c1f66be03c9d1f20df7f41b4d0f9ce084ad59a0c61d600ce75d7dceabbc0d7a4d6776cb88c7c47db204f952ee08f5af4272b7fbe98c7be6c13aa65810c848d7081d55d1832a7d5dbf9c573a9d983281c367437da7a41cb81c4118f8d451c67444f1d98983bf5a12366bc79ed0500c31c0316f7e1c92ef3f12b61bf78d6863b68d63b1dce23f8331a9b7f5608b0aa0e0df95dc814b97abb801f2712563aaca42511374127b2b310d025d2ec50923de5164ee9edc78c3bcd357245520811179d0f49046ea81390424608a9e5204bc10e5634da592d115e64d1eb2006c57c9cfa97525cb1e372c0950594dfc65e915b03db64b0d529ed080562fbf8642ca7003af31779ebc51b23b85d578b45f9934e295ca768c811f51acb389cd17340acd86219a76fdfb6253ff92a7a62cfa61279518509c27749c3f32948b237be02ce140c7582d0717a05a3c1ab2dda0817589425ea7f077ee6edabac1258ccefdb9787073c73f84f06b96bbc887ee677e984038833b07f7aabea329d447ea075e3b6d23cf80febab28e8212aa350a2fe649e7b1745fde3e661a6b4c928f380a56c673111b740c8178e3784fa535c3141e0c848edc13e578f14068807ccfc79e2f27b2f1c21f467dd169d0e2bef19df5939896f593994d[[T_F]]

For Halloween 2013 I decided to be the Dread Pirate Roberts from the movie The Princess Bride: I even grew a slight moustache to help make the character believable: But to be clear, I wasn’t just any old Dread Pirate Roberts. I decided to be the Silk Road Dread Pirate Roberts. So if you want […]

Click to continue reading “Halloween costume for 2013: Silk Road Dread Pirate Roberts”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=8cd59c5133b73a32260de8dfba3c1f66be03c9d1f20df7f41b4d0f9ce084ad59a0c61d600ce75d7dceabbc0d7a4d6776cb88c7c47db204f952ee08f5af4272b7fbe98c7be6c13aa65810c848d7081d55d1832a7d5dbf9c573a9d983281c367437da7a41cb81c4118f8d451c67444f1d98983bf5a12366bc79ed0500c31c0316f7e1c92ef3f12b61bf78d6863b68d63b1dce23f8331a9b7f5608b0aa0e0df95dc814b97abb801f2712563aaca42511374127b2b310d025d2ec50923de5164ee9edc78c3bcd357245520811179d0f49046ea81390424608a9e5204bc10e5634da592d115e64d1eb2006c57c9cfa97525cb1e372c0950594dfc65e915b03db64b0d529ed080562fbf8642ca7003af31779ebc51b23b85d578b45f9934e295ca768c811f51acb389cd17340acd86219a76fdfb6253ff92a7a62cfa61279518509c27749c3f32948b237be02ce140c7582d0717a05a3c1ab2dda0817589425ea7f077ee6edabac1258ccefdb9787073c73f84f06b96bbc887ee677e984038833b07f7aabea329d447ea075e3b6d23cf80febab28e8212aa350a2fe649e7b1745fde3e661a6b4c928f380a56c673111b740c8178e3784fa535c3141e0c848edc13e578f14068807ccfc79e2f27b2f1c21f467dd169d0e2bef19df5939896f593994d[[T_F]]

Someone recently asked me how I manage my to-do list, so I thought I’d write up the software that I use. Fundamentally I use Google Tasks as the backend, but with extensions and apps that improve on the basic functionality in Google Tasks. Chrome I use a couple different extensions for Chrome: – Better Google […]

Click to continue reading “Getting things done with Google Tasks”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]