{"id":668,"date":"2015-10-01T09:53:15","date_gmt":"2015-10-01T16:53:15","guid":{"rendered":"http:\/\/www.canirank.com\/blog\/?p=668"},"modified":"2020-11-25T10:50:30","modified_gmt":"2020-11-25T18:50:30","slug":"growth-hackers-stop-spamming","status":"publish","type":"post","link":"http:\/\/www.canirank.com\/blog\/growth-hackers-stop-spamming\/","title":{"rendered":"Growth Hackers. Stop Spamming!"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 0px;margin-top: 0px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"margin-top:0px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div id=\"attachment_670\" style=\"width: 660px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-670\" class=\"wp-image-670 size-full\" src=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/09\/junk-mail.jpg\" alt=\"Growth hacking doesn't equal spamming people\" width=\"650\" height=\"300\" srcset=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/09\/junk-mail-300x138.jpg 300w, http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/09\/junk-mail.jpg 650w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><p id=\"caption-attachment-670\" class=\"wp-caption-text\">Sending tons of cold emails to influencers isn&#8217;t growth hacking, it&#8217;s spamming.<\/p><\/div>\n<p>Lately I\u2019ve been getting more and more cold, salesy emails cluttering up my inbox each day. These are mostly coming from hard working founding teams who are trying to get traction\u00a0for their early stage apps. Obviously, there\u2019s nothing wrong with attempting something new, in fact innovation is supposed to be baked right into <span style=\"font-weight: 400;\"><a href=\"http:\/\/www.startup-marketing.com\/where-are-all-the-growth-hackers\/\">the original idea of Growth Hacking<\/a>.<\/span><span style=\"font-weight: 400;\">\u00a0But I think that because of the ubiquity of apps out there and the reality of people\u2019s limit for signing up for services, some folks are crossing the line into spammy\u00a0practices that will only serve to damage their reputation rather than <a href=\"http:\/\/www.canirank.com\/blog\/successful-influencer-outreach\/\">building positive relationships with influencers<\/a>.<\/span><\/p>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"margin-top:0px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><span class='bctt-click-to-tweet'><span class='bctt-ctt-text'><a href='https:\/\/twitter.com\/intent\/tweet?url=http%3A%2F%2Fwww.canirank.com%2Fblog%2Fgrowth-hackers-stop-spamming%2F&#038;text=...good%20growth%20hacking%20might%20bend%20the%20rules%2C%20but%20it%20really%20doesn%E2%80%99t%20break%20them.&#038;via=canirank&#038;related=canirank' target='_blank'rel=\"noopener noreferrer\">...good growth hacking might bend the rules, but it really doesn\u2019t break them. <\/a><\/span><a href='https:\/\/twitter.com\/intent\/tweet?url=http%3A%2F%2Fwww.canirank.com%2Fblog%2Fgrowth-hackers-stop-spamming%2F&#038;text=...good%20growth%20hacking%20might%20bend%20the%20rules%2C%20but%20it%20really%20doesn%E2%80%99t%20break%20them.&#038;via=canirank&#038;related=canirank' target='_blank' class='bctt-ctt-btn'rel=\"noopener noreferrer\">Click To Tweet<\/a><\/span>\n<p><span style=\"font-weight: 400;\">In this article, I want to go over the definition of growth hacking, explain what it\u2019s not, and finally show you how to practice some good growth hacking tactics to boost your online presence.<\/span><\/p>\n<h2>What is Growth Hacking?<\/h2>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-684\" src=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/bluebell-277699_1280.jpg\" alt=\"What growth hacking is\" width=\"650\" height=\"250\" srcset=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/bluebell-277699_1280-300x115.jpg 300w, http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/bluebell-277699_1280.jpg 650w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><br \/>\n<span style=\"font-weight: 400;\"><strong>Growth hacking is a means of using technology and innovation to reach your business goals more quickly.<\/strong> Growth hackers are known for first coming up with a \u201cWouldn\u2019t it be great if\u2026\u201d idea that, if fulfilled, would help their business grow. Then, they employ technological means to turn that dream into a reality.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the most famous examples of growth hacking is from AirBnB. That company\u2019s business model allows people to advertise properties that they own so that others can rent them for a few days, weeks, or even longer. AirBnB employed several growth hacks to get the word out about its business, but the best one is the company\u2019s <\/span><a href=\"https:\/\/growthhackers.com\/growth-studies\/airbnb\"><span style=\"font-weight: 400;\">use of Craigslist<\/span><\/a><span style=\"font-weight: 400;\"> to advertise rooms for rent.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">AirBnB, as most companies in the startup phase, was interested in reaching a broad audience when it first launched. The company wanted to allow property owners to automatically post their listings to Craigslist when they created a listing on the company\u2019s platform. To that end, AirBnB engineers created software that would handle the process of creating and publishing the post without requiring the user to lift a finger. When that software was finished, the new feature helped propel AirBnB to \u201chousehold name\u201d status.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Pay particular attention to what the AirBnB growth hackers did there. They said: \u201cWouldn\u2019t it be great if we could reach the Craigslist audience?\u201d Then, they used technology to post messages that people on Craigslist would see. It\u2019s a classic example of growth hacking.<\/span><\/p>\n<h2>What Growth Hacking is Not<\/h2>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-685\" src=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/tenerife-571428_1280.jpg\" alt=\"What growth hacking is not\" width=\"650\" height=\"250\" srcset=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/tenerife-571428_1280-300x115.jpg 300w, http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/tenerife-571428_1280.jpg 650w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><br \/>\n<span style=\"font-weight: 400;\">The well-known story of growth hacking that\u2019s brought to us from AirBnB is not without some level of controversy. After all, the company used a bot to post to Craigslist without the permission of Craigslist. However, even though it was automated there was nothing dishonest about it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Some self-described growth hackers, on the other hand, are known to cross the line from clever ingenuity into unethical practices.<\/strong> Instead of being \u201cwise as serpents and harmless as doves,\u201d they opt for easy shortcuts that could end up hurting their business model.\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> For some good ideas, see our article on <\/span><span style=\"font-weight: 400;\"><a href=\"http:\/\/www.canirank.com\/blog\/lean-startup-seo\/\">lean start up SEO<\/a>.<\/span><\/li>\n<\/ul>\n<h2>Email Spam<\/h2>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-686\" src=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/spam-964521_1280.jpg\" alt=\"Stop email spam\" width=\"650\" height=\"250\" srcset=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/spam-964521_1280-300x115.jpg 300w, http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/spam-964521_1280.jpg 650w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><br \/>\n<span style=\"font-weight: 400;\">As an example, some companies buy email lists and send spam. The principles of those companies are apparently under the impression that \u201cmore is merrier\u201d when it comes to email lists and that people will willingly open their emails from unknown sources and respond to whatever call to action is embedded in them. However, it\u2019s more likely that those emails will simply end up in the trash. <strong>Also, the company hurts its reputation by employing spam as a marketing technique.<\/strong> Finally, <\/span><a href=\"http:\/\/blog.hubspot.com\/blog\/tabid\/6307\/bid\/32892\/Why-Purchasing-Email-Lists-Is-Always-a-Bad-Idea.aspx\"><span style=\"font-weight: 400;\">email lists simply aren\u2019t worth the money that people pay for them.<\/span><\/a><\/p>\n<h2>Spammy Backlinks<\/h2>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-696\" src=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/Spam_Can_Nutritional_Label.jpg\" alt=\"make sure your backlinks are valuable\" width=\"650\" height=\"250\" srcset=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/Spam_Can_Nutritional_Label-300x115.jpg 300w, http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/Spam_Can_Nutritional_Label.jpg 650w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><br \/>\n<span style=\"font-weight: 400;\">Other growth hackers sometimes opt for spammed backlinks. The reason they do that is because they\u2019re trying to manipulate the search engines into ranking their website highly for a specific keyword or set of keywords. They know that one of the ways that Google determines where to rank a page for a keyword is based on the quality of the pages that link back to it. Instead of opting for a \u201cwhite hat\u201d method of <\/span><a href=\"https:\/\/blog.kissmetrics.com\/guide-to-guest-blogging\/\"><span style=\"font-weight: 400;\">guest posting to a popular blog<\/span><\/a><span style=\"font-weight: 400;\">, they\u2019ll instead opt for the easy way out and buy software that spams their backlinks all over other sites that allow comments, article submissions, bookmarks, etc. They think they can fool Google that way.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Google isn\u2019t fooled. <strong>It\u2019s often the case that spammy backlinks can be detected by the search engine giant and the site will be penalized accordingly.<\/strong> Anyone who has been through the process of trying to resolve a Google penalty will tell you it&#8217;s not worth it.<\/span><\/p>\n<p>Rather than trying to game the system you should be\u00a0coming up with <a href=\"http:\/\/www.canirank.com\/blog\/find-winning-keywords-2-step-process\/\">a keyword strategy which works with Google<\/a> rather than against it.<\/p>\n<h2>Bought Reviews<\/h2>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-694\" src=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/photo-montage-915133_1280.jpg\" alt=\"Never buy app reviews\" width=\"650\" height=\"250\" srcset=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/photo-montage-915133_1280-300x115.jpg 300w, http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/photo-montage-915133_1280.jpg 650w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><br \/>\n<span style=\"font-weight: 400;\">Still other growth hackers go for the option to buy reviews for their products or services. It\u2019s not difficult to find people online who are willing to write positive reviews for something that they never purchased. In some cases, those reviews are written with very clever prose and anecdotes that convince even the most dubious shopper that they\u2019re for real. The problem with that, of course, is that the review isn\u2019t for real and is a dishonest attempt at using social proof. Again, if the growth hackers are caught trying these underhanded tactics, they\u2019ll hurt their brand and could end up losing their business.<\/span><\/p>\n<h2>Fake Social Media Accounts<\/h2>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-692\" src=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/pablo.jpg\" alt=\"Life is too short for fakers\" width=\"650\" height=\"250\" srcset=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/pablo-300x115.jpg 300w, http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/pablo.jpg 650w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><br \/>\n<span style=\"font-weight: 400;\">Another way that growth hackers try to boost their business is with the use of fake social media accounts. There are a number of people who sell \u201cverified\u201d social media accounts online and some growth hackers are tempted to purchase them and use them to promote the company\u2019s website. It\u2019s an expensive effort, and often futile, because the reality is that they need hundreds of accounts, each with hundreds of followers to generate any kind of decent traffic for their business. Also, if their company is caught using sock puppet accounts for promotional purposes, they\u2019re going to take a PR hit.<\/span><\/p>\n<h2>Excessive Bot Usage<\/h2>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-688\" src=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/Sanko_Seisakusyo.jpg\" alt=\"Excessive bot usage can be spammy\" width=\"650\" height=\"250\" srcset=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/Sanko_Seisakusyo-300x115.jpg 300w, http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/Sanko_Seisakusyo.jpg 650w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><br \/>\n<span style=\"font-weight: 400;\">Finally, some growth hackers take the use of bots to an extreme. Continuing with the previously mentioned example, they\u2019ll buy multiple social media accounts and then use bots to follow people who might be interested in their company\u2019s product or service. The hope is that the people followed will follow back and the company can then promote its product or service to those potential customers. It all looks good on paper, however social media companies have put in place certain checks to prevent their platforms from being used as vehicles for spam. <strong>Bot users will end up getting the accounts that they paid for banned from those sites and will have wasted a lot of precious startup money.<\/strong><\/span><\/p>\n<h2>Good Growth Hacking<\/h2>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-690\" src=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/sunflower-277754_1280.jpg\" alt=\"Aim for positive growth\" width=\"650\" height=\"250\" srcset=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/sunflower-277754_1280-300x115.jpg 300w, http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/10\/sunflower-277754_1280.jpg 650w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><br \/>\n<span style=\"font-weight: 400;\">There are plenty of examples of good growth hacking, though. Some growth hackers don\u2019t settle for cheap shots and shortcuts when it comes to trying to build and online presence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For starters, good growth hacking might bend the rules, but it really doesn\u2019t break them. To continue with the AirBnB example above, the growth hackers their never sought permission from Craigslist for their automated posting system. However, we don\u2019t know that Craigslist expressly prohibited the practice, either. In fact, it\u2019s likely that Craigslist actually benefited from the AirBnB technique.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Growth hacking also takes shortcuts that are ethical. There\u2019s nothing wrong with looking for a way to build the greatest mousetrap, but you shouldn\u2019t do it at the expense of someone else\u2019s time or property. Instead, find clever means to employ technology that doesn\u2019t result in hurting your company\u2019s reputation by hijacking the great work done by somebody else.<\/span><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><style type=\"text\/css\">.fusion-fullwidth.fusion-builder-row-1 { overflow:visible; }<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Lately I\u2019ve been getting more and more cold, salesy emails cluttering up my inbox each day.<\/p>\n","protected":false},"author":5,"featured_media":670,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[62],"tags":[37,84,85],"class_list":["post-668","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-build-your-authority","tag-content","tag-growth-hacking","tag-influencer-marketing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Growth Hackers. Stop Spamming! &ndash; CanIRank Blog<\/title>\n<meta name=\"description\" content=\"Lately I\u2019ve been getting more and more cold, salesy emails cluttering up my inbox each day. These are mostly coming from hard working founding teams who are trying to get traction\u00a0for their early stage apps\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/www.canirank.com\/blog\/growth-hackers-stop-spamming\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Growth Hackers. Stop Spamming! &ndash; CanIRank Blog\" \/>\n<meta property=\"og:description\" content=\"Lately I\u2019ve been getting more and more cold, salesy emails cluttering up my inbox each day. These are mostly coming from hard working founding teams who are trying to get traction\u00a0for their early stage apps\" \/>\n<meta property=\"og:url\" content=\"http:\/\/www.canirank.com\/blog\/growth-hackers-stop-spamming\/\" \/>\n<meta property=\"og:site_name\" content=\"CanIRank Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-01T16:53:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-25T18:50:30+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/09\/junk-mail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:creator\" content=\"@canirank\" \/>\n<meta name=\"twitter:site\" content=\"@canirank\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"7 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"http:\/\/www.canirank.com\/blog\/#website\",\"url\":\"http:\/\/www.canirank.com\/blog\/\",\"name\":\"CanIRank Blog\",\"description\":\"SEO Tips for Small Businesses, Bloggers, and other Non-Spammers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"http:\/\/www.canirank.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/www.canirank.com\/blog\/growth-hackers-stop-spamming\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"http:\/\/blog.canirank.com\/wp-content\/uploads\/2015\/09\/junk-mail.jpg\",\"width\":650,\"height\":300,\"caption\":\"Growth hacking doesn't equal spamming people\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/www.canirank.com\/blog\/growth-hackers-stop-spamming\/#webpage\",\"url\":\"http:\/\/www.canirank.com\/blog\/growth-hackers-stop-spamming\/\",\"name\":\"Growth Hackers. Stop Spamming! &ndash; CanIRank Blog\",\"isPartOf\":{\"@id\":\"http:\/\/www.canirank.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/www.canirank.com\/blog\/growth-hackers-stop-spamming\/#primaryimage\"},\"datePublished\":\"2015-10-01T16:53:15+00:00\",\"dateModified\":\"2020-11-25T18:50:30+00:00\",\"author\":{\"@id\":\"http:\/\/www.canirank.com\/blog\/#\/schema\/person\/9d403d307d3b67062bced250a4b8c95f\"},\"description\":\"Lately I\\u2019ve been getting more and more cold, salesy emails cluttering up my inbox each day. These are mostly coming from hard working founding teams who are trying to get traction\\u00a0for their early stage apps\",\"breadcrumb\":{\"@id\":\"http:\/\/www.canirank.com\/blog\/growth-hackers-stop-spamming\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/www.canirank.com\/blog\/growth-hackers-stop-spamming\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/www.canirank.com\/blog\/growth-hackers-stop-spamming\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"http:\/\/www.canirank.com\/blog\/\",\"url\":\"http:\/\/www.canirank.com\/blog\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"http:\/\/www.canirank.com\/blog\/growth-hackers-stop-spamming\/\",\"url\":\"http:\/\/www.canirank.com\/blog\/growth-hackers-stop-spamming\/\",\"name\":\"Growth Hackers. Stop Spamming!\"}}]},{\"@type\":\"Person\",\"@id\":\"http:\/\/www.canirank.com\/blog\/#\/schema\/person\/9d403d307d3b67062bced250a4b8c95f\",\"name\":\"John McAlester\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/www.canirank.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e12164e091c4c80133548b99ee6b9b3397d69a91c3785d307eb00bfd737c54ed?s=96&d=mm&r=g\",\"caption\":\"John McAlester\"},\"description\":\"John McAlester is a Senior WordPress Developer familiar with all aspects of WordPress from content to code. He has worked on a number of high-traffic WordPress installations along with custom theme and plugin development.\",\"sameAs\":[\"http:\/\/CanIRank.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"http:\/\/www.canirank.com\/blog\/wp-json\/wp\/v2\/posts\/668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.canirank.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.canirank.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.canirank.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"http:\/\/www.canirank.com\/blog\/wp-json\/wp\/v2\/comments?post=668"}],"version-history":[{"count":0,"href":"http:\/\/www.canirank.com\/blog\/wp-json\/wp\/v2\/posts\/668\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.canirank.com\/blog\/wp-json\/wp\/v2\/media\/670"}],"wp:attachment":[{"href":"http:\/\/www.canirank.com\/blog\/wp-json\/wp\/v2\/media?parent=668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.canirank.com\/blog\/wp-json\/wp\/v2\/categories?post=668"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.canirank.com\/blog\/wp-json\/wp\/v2\/tags?post=668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}