Trending March 2024 # Google Replaces Title Tags With Site Names For Homepage Results # Suggested April 2024 # Top 5 Popular

You are reading the article Google Replaces Title Tags With Site Names For Homepage Results updated in March 2024 on the website We hope that the information we have shared is helpful to you. If you find the content interesting and meaningful, please share it with your friends and continue to follow and support us for the latest updates. Suggested April 2024 Google Replaces Title Tags With Site Names For Homepage Results

Google appears to have stopped showing title tags for mobile search results for the entire website such as in searches for the name of a website which generally show the home page.

This feature does not work for subdomains.

According to Google’s Search Central documentation for site names:

What’s being shown in mobile searches is just the generic name for a website.

For example, a mobile search for Search Engine Journal shows a search engine results page (SERP) with the generic name of the website, Search Engine Journal.

The title tag for the above home page is:

Non-branded searches for keywords appear to still show the title tags.

Brand name + keyword searches also appear to still show the title tags.

Why Is Google Using Site Names?

Google is using site names in order to make it easier for users to identify the specific website in the search results.

Google’s official announcement explained:

“Today, Search is introducing site names on mobile search results to make it easier to identify the website that’s associated with each result…”

This new feature is available in the English, French, Japanese, and German languages and will begin showing up in other languages over the next few months.

New Feature Doesn’t Always Work

But a search using the compound word domain name HubSpot shows the old version search result with the title tags.

Search Result for Keyword Phrase “HubSpot”

But a search for Hub Spot (with a space between the two words) does work and shows the site name.

Search Result for Keyword Phrase: “Hub Spot”

A search for compound word name “Wordfence” and “word fence” returns the same site name search.

Search Result for keywords “Wordfence” & “Word Fence”

So it appears that Google isn’t consistently returning site name results for HubSpot but is doing it correctly for many other sites.

Structured Data for New Site Names Feature

Google is recommending the use of the WebSite structured data type.

Previously the WebSite structured data site was considered pointless because obviously Google knows a website is a website and it didn’t need structured data to understand that Google was indexing a website.

But that’s changed because Google is now using the WebSite structured data type, specifically the “name” property, to understand what the site name of a website is.

Google published an example of the WebSite structured data with the “name” property in use:

{ “@type” : “WebSite”, “name” : “Example”, }

The above structured data must be shown on the home page.

Google’s Search Central page for site name recommends the following for placement of the WebSite structured data:

“The WebSite structured data must be on the homepage of the site.

By homepage, we mean the domain-level root URI.

What if a Site Has an Alternate Name?

What’s useful about the WebSite structured data is that it offers the opportunity to tell Google what the alternate name of the website is.

Google explains how to do it:

“If you want to provide an alternate version of your site name (for example, an acronym or shorter name), you can do this by adding the alternateName property.

This is optional.”

The structured data for adding an optional name looks like this:

JSON Structured Data for Optional Name

{ “@type” : “WebSite”, “name” : “Example Company”, “alternateName” : “EC”, }

Google Uses More Than Structured Data

The Google documentation on site names explains that Google is using on-page, off-page and meta data information in addition to structured data to determine what a webpage site name is.

This is what Google uses to understand the site name:

WebSite structured data

Title tag

Headings (H1, H2, etc.)

Open Graph Protocol meta data, specifically the og:site_name

Something to take note of is that og:site_name property is an optional but recommended Open Graph property.

The Open Graph notation generally looks like this in the HTML code:

Google Site Names

The new site names feature in Google search looks attractive on mobile devices.

It makes sense to have less clutter in the SERPs for home page brand name searches. although I can see some complaining about the absence of title tag influence in these kinds of searches.

Citations Read the Official Announcement

Introducing site names on Google Search

Read the Search Central Documentation

Provide a site name to Google Search

Featured image by Shutterstock/Asier Romero

You're reading Google Replaces Title Tags With Site Names For Homepage Results

Google Replaces Gmail Video Chat With Google+ Hangouts

Since last Monday, Google has started replacing the Gmail Video Chat with Google+ Hangouts. Because a lot of users are enjoying the direct and personal communication that the feature provides, the search engine giant decided to upgrade it to a “more modern video calling technology”.

“Unlike the old video chat, which was based on peer-to-peer technology, Hangouts utilize the power of Google’s network to deliver higher reliability and enhanced quality. You’ll be able to chat with all the same people you did before—and, in fact, with Hangouts you’ll now be able to reach them not only when they are using Gmail, but also if they are on Google+ in the browser or on their Android or iOS devices.”

Now that Gmail is ditching their video chat feature in lieu of Google+ Hangouts, it’s obvious that the search engine giant is still eager to promote their social network.

Prior to this, Google has attempted to blur the lines between Gmail, Google Map and other Google services users. That’s why if someone is logged in to any of it, he or she is also logged in to Google+.

However, not everyone is pleased with this promotion of Google+. For some users, the search engine giant is forcing them to take a leap on their social network with a barrage of changes on their whole ecosystem. Instead of improving their services, they are working on leveraging Google+ with bits of work and integration here and there.

Google Hangouts as a Superior Technology

The Google+ Hangouts scale a lot better, making it much easier to add new people in the video conference. Audio is also said to be good at long range, making it a best choice for companies looking for a free alternative for video conference software.

Google’s Hangouts feature enables users to chat with up to nine people at once, watch YouTube videos together, collaborate on Google documents and share their screen. The Gmail team also hinted that users can add personal decorations on their video interface such as mustache, beards, halos, as well as cat and dog masks with Google+ Hangouts.

That being said, Google will continue to roll out the Hangouts feature to all Gmail users in the coming weeks.

Google Expands Eligibility For Product Rich Results

Google expanded eligibility for Merchant Listing search experiences and product snippets through the use of structured data. This change affects merchants, product review sites and product information aggregator sites.

Merchant Center feeds are no longer necessary to be eligible for product rich results.

There are also two new reports in Google search console.

Google’s announcement stated:

“Initially, product snippets in Google search results were primarily powered by Product structured data, and merchant listing experiences were primarily powered by product details supplied via a Google Merchant Center feed.

Now merchants can be eligible for merchant listing experiences by providing product data on web pages without a Google Merchant Center account.

This improved eligibility has in part been made possible by recent extensions to product-related properties and types in chúng tôi for areas such as apparel sizing and energy efficiency ratings.”

Enhanced Product Experiences in Search

Enhanced experiences, sometimes referred to as rich results, are search features that can show images and provide more information than a regular search snippet.

When merchants use the appropriate structured data they will become eligible to have their products displayed for sale directly from the search results.

Google highlighted two product related search experiences:

Popular Products

Product Snippet

The popular products search experience displays images of the products right in the search results.

Google published an example of a popular products in search:

The other kind of rich result that has expanded eligibility is called a product snippet.

Example of a Product Snippet

New Search Console Reports

The new reports that are viewable within Search Console are:

Merchant listings report

Merchants that sell products should use the merchant listing report. This report shows structured data issues related to the free listing experiences.

Product snippets report

Sites that publish product reviews or don’t sell products but use product structured data should use this report.

This report shows structured data problems related to product snippets in search.

The product snippets report absorbs the old product structured data report. The data from the old report is now available within this new report.

Free Product Listing Experiences Documentation

Google updated the documentation for the Free Listing Experiences.

The updated documentation now features more information related to how merchants can qualify for free listing rich results through the use of product structured data.

Cited Resources:

Google’s announcement of expanded merchant listings eligibility

Google Product structured data documentation

Featured image by Shutterstock/Ljupco Smokovski

Screenshots by Author

Google Results For Probiotics Are Totally Unreliable

They’re not Goop-level pseudoscience, but most probiotics lack solid scientific evidence in their favor. Supplement brands claim that daily use can ease digestive issues and reduce the risk of colon cancer, among others on a lengthy list of dubious benefits. As shoppers clamor for probiotics to ease stomach woes, the market is predicted to grow by 7.5 percent and reach more than $76 billion by 2024. Yet when consumers seek clarifying information online, the results for probiotics are largely promotional—and they can potentially mislead consumers.

Most interested Googlers encounter information on probiotics exclusively from commercial sources and news outlets, according to a recent Frontiers in Medicine study. These sites often fail to paint a complete picture, so when looking to buy the latest pill or kombucha drink, consumers may miss vital information on side effects and overall efficacy.

“Many websites allude to benefits of probiotics in diseases for which there is not much high-level scientific evidence, other than in mice,” says Brighton and Sussex Medical School Professor Pietro Ghezzi.

Unreliable online results

Probiotics are live microorganisms purported to aid digestion and overall health. We already have digestive systems bustling with approximately 100 trillion bacteria–outnumbering the stars in the Milky Way Galaxy–that break down food, prevent disease, and achieve a healthy gut balance. Though they require further research, probiotics could potentially alleviate symptoms of conditions like Crohn’s disease and irritable bowel syndrome, as well as remedy gut health generally.

But when people are searching for reliable info on whether probiotics really could help them, they’re not finding reputable research.

Ghezzi’s team tested Google’s top-ranking websites for scientific rigor against the Cochrane Library, a systematic medical review database, and deemed initial results as largely unreliable. They note that Google engineers the search results to prioritize websites with complete and scientifically accurate information, particularly online health portals. The search engine’s algorithm prioritizes primary sources and “very high quality” information, according to a September 2023 announcement. Still, this isn’t reflected in actual results.

“The fact that there is such a large amount of commercially oriented information is problematic for consumers who are searching for honest answers,” Ghezzi says.

No two guts are the same

In reality, our guts may resist probiotics entirely. The gastrointestinal tract can block probiotics from colonizing among natural microbes, a September 2023 study found. And despite the common use of probiotics to remedy antibiotic-driven stomach troubles, probiotics could even delay digestive system recovery; after the gut accepts probiotics, the GI tract’s mucous membrane seems to take longer to heal.

Probiotic resistance depends on the individual, due to a combination of their unique genetics, immune system, and picky digestive system microbes. Some bacteria, for example, secrete antimicrobial peptides–basically natural antibiotics–that could either accept or reject popular probiotic strains, depending on the person. Therefore, the ubiquitous supplements on store shelves likely don’t work for everyone.

Scientists don’t fully understand this complex variability, though it’s clear that effective probiotics must be tailored to the individual. In the future, the field of synthetic biology aims to do just that: using cutting-edge tools like CRISPR-Cas, researchers hope to engineer improved probiotic strains.

How To Delete Files With Long Names

How to Delete Files With Long Names [Easy Steps & Tips] Third-party file manager may help you delete the long file names




If you have a lot of files with long file names, it can be helpful to either shorten them or create new ones to make them more manageable.

However, you may have issues deleting long file names at times because your OS fails to process them.

In such a case, a third-party file manager that is capable of deleting the long file names comes in handy.



To fix Windows PC system issues, you will need a dedicated tool

Fortect is a tool that does not simply cleans up your PC, but has a repository with several millions of Windows System files stored in their initial version. When your PC encounters a problem, Fortect will fix it for you, by replacing bad files with fresh versions. To fix your current PC issue, here are the steps you need to take:

Download Fortect and install it on your PC.

Start the tool’s scanning process to look for corrupt files that are the source of your problem

Fortect has been downloaded by


readers this month.

Have you ever run into a file name that was too long to delete or a file extension that was superfluous? This can happen when you’re removing an old file or editing a new file with a long title. Some files in Windows are strange. You may find that the file name is too long to delete or rename.

If this sounds familiar, we’re here to lift that burden. You don’t have to be stuck with a file you want to get rid of. In this article, we shed more light on how to delete files with long names.

What are long file names?

Long file names are file names that exceed the maximum length of 255 characters. You can use long file names as long as you want, but you must be careful to avoid problems when naming your files.

If you try to save a file with a long filename, Windows will automatically truncate the name to 255 characters or less and then save it to disk. A long filename that is too big for Windows to store on disk will result in an error when the user tries to use that file.

Long file names can be used for several reasons:

Why can’t I delete files with long names?

There are many reasons that can prevent you from deleting files with long names. These include:

The file is open in another app – If the file is open in any program or application, the file will not be deleted immediately. 

Not enough permission – Some files require an administrator account to be deleted. If you’re using a standard account, you may need to switch to one with administrator privileges.

You’re deleting a copy – If you try to delete a file that’s been renamed and its original name still exists in your current directory, then Windows will not be able to delete the new name until the original name is deleted first. 

OS can’t process it – The operating system has a limit for the length of the name and if the file has a name that exceeds that limit, it will not be able to delete it.

How do I delete files that are too long?

Before you proceed with any of these steps, we recommend you check the following:

Ensure you have administrative privileges.

Check that you have enough free hard drive space in your PC.

1. Use a third-party file manager

Deleting long file names is a tedious task. It can be done using an automated tool or manually, but the latter is more time-consuming and cumbersome.

A third-party file manager is a great way to delete long file names from your computer. It will allow you to search for and select the files you want to keep, as well as delete them all at once.

Aomei Partition Assistant Professional is a third-party file manager that can be used to manage files and folders in your system. It is also one of the best partitioning software available on the market, so you can easily see what you are doing.

AOMEI Partition Assisstant Professional

Powerful file manager that lets you easily manage your partitions, delete unnecessary partitions, and move and resize partitions.

Free trial Visit website

2. Rename the file

While this method works most of the time, some file names are stubborn and won’t delete. For instance, when you try to delete a PDF with a long file name, you may be unsuccessful since most PDFs don’t allow any edits.

You can choose to install PDF editor software to help you edit the file but most of them are paid for. The free ones may be able to help but a majority of them come with basic features. If this works, you should be able to delete the file but if it doesn’t, proceed to the next step.

3. Delete via Command Prompt

Hopefully, one of these methods has been able to help you get rid of the long file name that wouldn’t delete. Aside from file names, you may also have trouble deleting a folder. If you encounter such an issue, don’t hesitate to check out our expert article on the same.

Still experiencing issues?

Was this page helpful?


Start a conversation

Cybersecurity For Digital Marketers: Discovering Site Vulnerabilities

Security concerns are incredibly common and have the potential to wreak huge damages to a site and its long-term organic performance

Exactly why is cybersecurity important for SEO?

If you’re working closely with a website – for an agency, independently, or in-house – it’s likely you’ve been confronted with a security issue at some point. Though they range in threat-level, security concerns are incredibly common and have the potential to wreak huge damages to a site and its long-term organic performance.

Despite the ubiquitous threat, it seems digital marketers rarely feel the need to delve too deeply into the security space. Many believe it is simply not in their remit or not their problem.

As strategies for SEO and cyber attacks have evolved side-by-side, it’s become clear that security is something that digital marketers need to actively pay attention to. An effective SEO consultant must be well-versed enough to inform their clients on best practices.

Download our Premium Resource – A guide to developing digital skills in your agency

If your agency has a skills gap, then this is both a threat and an opportunity for your agency. A threat if you don’t address it but an opportunity if you put together a skills development plan for the agency and get ahead of your competition.

Access the A guide to developing digital skills in your agency

How will security affect my rankings?

Research shows that most websites will experience an average of 58 attacks per day. As much as 61% of all internet traffic is automated – meaning these attacks do not discriminate based on the size or popularity of the website in question. No site is too small or too insignificant to attack.

Aside from the direct financial loss, a compromised website can result in dramatic traffic implications, distorted SERPs and a range of manual penalties from Google. That’s not to mention the other repercussions; stolen information, compromised databases and potentially de-indexing. 

Not only will this increase the severity of sanctions eventually imposed, gradual changes to your site content, relevancy and architecture will affect your rankings in the meantime. The crucial lesson is this: don’t rely on Google to consistently detect malware.

In other cases, Google may misinterpret activity from a compromised site as a deliberate attempt at cloaking. This can happen on a client’s existing domain, or even on a previous domain that 301-redirects to their current site. Both will result in manual penalties. 

This is especially alarming considering that 9%, or as many as 1.7 million websites, have a major vulnerability that could allow for the deployment of malware. If you’re invested in your long-term search visibility, operating in a highly competitive market, or heavily reliant on organic traffic, vigilance in preventing attacks is crucial.

It’s clear that every effective SEO should be taking some responsibility for site security. If a client has the appropriate tools, resources, and strategies in place, great. But this is often not the case; very few ever deem website security an urgent concern that warrants immediate attention. Likewise, despite its direct impact on their performance, digital marketers often see it as a remote issue outside of their job spec.

Cybersecurity is a complex and multifaceted issue; it can be difficult to know where to start. In this article, we’ll cover some simple strategies for performing basic web security checks with search performance in mind, as well as various resources that can help you further your skillset and get to grips with the basics of website security.

Stages of an attack

In order to identify and respond to attacks, we first need a basic understanding of how they operate. Keep in mind, this assumes the attack is targeted rather than the result of indiscriminate scans. A typical attempt at compromise will have five stages:

Reconnaissance. The attacker gathers as much information about the website as possible. This includes the software your site runs on, plugins, extensions, etc.

Scanning. The website is scanned in an attempt to identify potential vulnerabilities.

Masking activity. The attacker will attempt to cover their tracks to ensure their presence remains undetected for as long as possible.

When trying to secure your site, you can identify vulnerabilities using the same methods as a malicious actor would.

The easiest way to avoid a compromise is to make the preliminary phases difficult; offer as little information about your site and its infrastructure as possible, so those with ill intentions have a much harder time identifying points of access. This will deter the majority of targeted attempts and make automated attacks much more difficult.

Server and CMS varieties

Most attackers will begin reconnaissance by identifying what software the site runs on. Popular software is routinely patched to cover new vulnerabilities, so if your site runs on an outdated version of a given platform, it’s much easier to compromise.

This is also arguably the easiest piece of information to discover. There are multiple ways to do this; online scanners like BuiltWith or WhatWeb will tell you exactly what software and which version powers a given domain.

Once you know this, you should find out what the latest version of the software package is. If you’re using the most recent version, that’s fine. If you’re running an outdated version, it’s sensible to check if there have been any notable vulnerabilities patched in the space between your current version and the latest release.

WordPress exploits

The vast majority of basic WordPress attacks are due to poor login security. If you’re using standard usernames – or your administrator username is still ‘admin’ – you’re running a risk.

It’s also worth changing your site’s login URL. The standard URL (‘wp-login.php’) will be the default URL used by automatic vulnerability scanners.

Overall, the best way to begin approaching WordPress security is to use a security plugin which, if kept updated, will help monitor and protect your site. These tools have a range of features designed to streamline your site’s security. Go through the settings to make sure your website has at least the basic features enabled.

Popular examples include All in One and Sucuri Security, which monitor and scan for potential hacking events and have firewall features that block suspicious visitors on a permanent basis.

Ultimately, it’s important to review, research and update each plugin and script you use. It’s better to invest the time in keeping your plugins updated than make yourself an easy target.

Login folder

Even if your site doesn’t rely on WordPress, that doesn’t mean it won’t be targeted. A custom or proprietary platform can still fall victim to an attack if you’re not following basic security protocols.

For example, it’s fairly simple for someone to find your website’s login URL, which serves as the perfect target for any attacker.

Many websites overtly block the back-end login folder in their chúng tôi file. This might look something like the following:

Given this is a publicly available file, this amounts to broadcasting your login URL to anyone looking to force their way into your website.

Even if you’ve got this covered, another simple Google search can often provide a hacker with this information:

A ‘site:’ search for URLs with ‘login’ or ‘admin’ in them can easily turn up a login page that’s been indexed. Ensure your chúng tôi doesn’t give this away and use ‘noindex’ meta tags on your login pages to prevent them being accidentally indexed.

Shared hosting

Small websites often exist on shared hosting servers. In this case, your site’s security is only as good as the most poorly secured website on the server. If an attacker compromises one, they’re more likely to access the entire server and every site therein.

If you’re unsure, simple tools like SpyOnWeb can help you find out if a particular site is hosted on a shared server. Just input the website’s domain and you’ll get a quick overview of all other domains associated with the same IP address. If these do not all share the same owner, the website is part of a shared hosting server.

Shared hosting is essentially equivalent to putting your website’s safety in the hands of the least capable webmaster on the server.

Typically, dedicated hosting is the way to go. Depending on the vulnerability and volume of sensitive data on your site, it’s wise to migrate to a dedicated server as soon as possible.

Google hacking

In many cases, finding exposed information about a site is as easy as typing the query into Google. With some simple searches, you can find a lot of interesting things; log files, configuration files, indexed PDF documents, SQL error messages (which indicate potential vulnerabilities) and much more.

Websites like PenTest-Tools offer assistance in counteracting this form of reconnaissance. Once you’ve entered your domain name, the tool will pair it with queries such as “directory listing vulnerabilities”, “SQL errors”, “log files exposed”, and many more.

If you can find information on your site from these queries, attackers can too. Subject your site to every one of these searches and work to remove the source of any information that’s readily available.

Aside from “google hacking”, there are plenty of tools available online that you can use to collect certain types of information, including a domain’s open TCP ports, active subdomains, SSL vulnerabilities and more. It’s worth doing your research here; you and your client should know exactly what information is exposed that could be used to inform an attackers strategy.   

SSL updates

HTTPS is important, but it doesn’t necessarily mean you have a secure website. It’s easy to forget that not all SSL certificates are the same.

In recent years, there have been various scares surrounding weaknesses in SSL, most notably the DROWN and Heartbleed attacks. Generally speaking, it’s worth investing in a high-grade certificate that’s fully up to date and has no known susceptibilities. If you’re unsure, you can use the SSL Labs tool to test the quality of the certificate on a certain site.

It’s wise to test your certificate regularly to stay in line with the latest vulnerabilities.

Scanning software

What’s been covered so far will do enough to maintain basic web security and discourage amateurs or automated tools. If you’re targeted by a dedicated attacker, you might not fare so well; there could be a whole host of further vulnerabilities buried in your site.

Tools like Nikto web scanner are free, easily available and will test your site against thousands of known issues. This is a command prompt tool you can download and run yourself; it will run on most PCs though it’s most commonly used on Linux. If you’re not comfortable running the software yourself, there are lots of tools available online that will perform the scan for you.

The bottom line

This article covers some preliminary steps you can use to find common security issues in a website. Holistic cybersecurity is a much larger field composed of multiple specialties, of which website security is just a small area.

SEO is – and has always been – about embracing change. If you want to offer the best service possible and improve your results in the long run, you must learn to adapt to shifting requirements in the field.

Security issues are not going away any time soon. Given their impact on the overall user experience, it’s likely their impact on SEO is only set to grow. Invest in your education now and it will undoubtedly pay off – for you and your clients – in the long-run.

Update the detailed information about Google Replaces Title Tags With Site Names For Homepage Results on the website. We hope the article's content will meet your needs, and we will regularly update the information to provide you with the fastest and most accurate information. Have a great day!