Whereas the Roman numeral one and the capital letter “I” share the same identical symbol shape (complete with serif and sans-serif options), it is the Ayes and Nays of a municipal meeting that are at the heart of being in possession of an open system of observation over political events and absent of discrimination.
This demo does not display reasoning to eliminate the use of columns entirely, but to use a column formation with Section Headers on one side of the page and content on the other is entirely unacceptable as it relates to delivering an honest and accurate read both by the human eye as well as the eye of a spider.
Also, this demonstration isn’t the easiest of reads, but this is a favorite examination method of those who focus on diciplines such as Search Engine Optimization and Reputation Management as it relates to online publishing activities being indexed and is part and parcel to the indexing process.
Therefore, The Village of Crestwood continues to use a two-column format that unfortunately creates an entirely different read when an algorithm attempts to read the text and poses further risk of unreasonable disconnection from Section Headers and the corresponding content. It should be noted that they are by no means the only municipality applying this technique to their record-keeping obligations.
For example, let’s say I was to have scanned their meeting minutes and then converted it into a .pdf file for anyone to access. One facet of the .pdf format is that the proprietary reader will permit the copy/pasting of the content without losing one “I” to the letter “L” or some other character as is frequently the case when using OCR software to extract text content from an otherwise graphic file. This can be quickly examined and tested via any of the Village of Alsip meeting minutes from 2005 (the date and time stamp will virtually never be picked up in the format of which the information was affixed).
Instead, it is of a similar issue with any application of column formatting, irrelevant of what goes in the left column and what goes in the right column. At the beginning of the web development craze, frames were a favored way to deliver split screen abilities and tables were not entirely impossible, but very troublesome to say the least.
As legal issues began cropping up as it related to a variety of copyright issues (seeing an advertisement at the top of my email account screen for the competitor of my service provider seems a little odd), it still remained a challenge for web developers to provide content in a divided manner. Many blog services fill this gap, but without any html structure to contain content, any use of the space bar to create the appearance of a table creates an entirely different read to the various indexing spiders used by both the public and the private sector.
This demo sets forth a display of how the content of the October 4, 2012 meeting minutes for the Village of Crestwood Board of Trustee would be read using a simple filter to eliminate all of the spaces and to then make a straight read from left to right and then line by line. If there was a setting on this filter to command all underlined and capitalized text to remain together and with spacing issues added, it would be possible to extract and separate the content to where it looked like the original document.
There are three parts to this demo:
Part 1 – Straight left to right read with capitalization, underlining and punctuation kept intact. This report helps view how disruptive the design is to virtually any auditing software, including a mini-demo displaying unacceptable application of the dash. Search engines treat this symbol as a signal to subtract some measure of distance to the right of the symbol, which significantly alters the read.
Part 2 – Straight left to right read, no punctuation, underlining, all lower case letters.
Part 3 – Partial list of unique strings extracted
Cloud computing relies on a mathematical design intended to reduce and expand on command and demand of the end-user. Since all commerce sectors have been impacted by the shift towards cloud computing as a means of significantly reducing storage space without sacrificing actual content.
As encryption methods tend rely on an Alice and Bob call and respond environment to impose and implement a unique key known only to Bob and Alice, theoretically producing measures of security to block all other readers other than Alice and Bob from viewing the virtual content at all points of crafting, delivery, receipt and the read by either Bob or Alice is fine if encryption is intended, but not when dealing with public documentation intended on being distributed without hesitation or reservation, let alone enduring any and all annotations, notations, citations and/or any other attachment someone might want to affix to text already bought and paid for with taxpayer dollars.
This list of unique strings creates a circumstance in which if someone was turning to the digital form of this particular document to perform a search for the string “Trustee Wasag,” a string found throughout the document from a manual paper perspective, but in its digital form, there would be at least one “Trustee Wasag” entry absent from the results, which is because the words “Board Minutes” from the left column interrupts the flow of text from one line to another so that the string actually reads “Trustee BOARD MINUTES Wasag.”
Perhaps he has a new nickname he is applying to his political identity or perhaps it was an inadvertent result of the technique chosen by the Village of Crestwood that created this new identity. Either way, unique string creation via public documentation already bought and paid for with taxpayer dollars unnecessarily messes with the mathematics of a search providing what can be reasonbly trusted…and a search result that is literally guaranteed to provide false results, such as demonstrated with the potential of Wasag truly having elected to adopt such a nickname for his public persona.
Personally, I’m still a little curious what the “Chairman Hirsch Ordinance” is all about, but for all I know, it never existed until I pulled it into this particular demonstration and provided awareness to the association.
Part 4 – Sample search engine subtraction results
As demonstrated in the sample in Part 1, the application of the dash and/or hyphen, the symbol can be static or it can act as a mathematical operator for a string of characters.
This is a partial list of existing chains and the probable read by the major search engine indexes.