Tuesday, 8 March 2016

Football Tactics

Football Tactics

Basic attacking team tactics
The objective of the game is to score goals, but certain variables such as the scoreline can influence a particular team’s desperation to ruffle the net. The following team styles represent some of the methods used to control the game and instigate attacks:

Possession football

For years, the golden rule for coaches everywhere was ‘pass and move’, and this tenet is still enshrined in possession football. Quite simply, teams attempt to hold onto the ball for as long as possible, at all times choosing the easiest possible pass (hence the many times you see defenders passing the ball along the defensive line).
There is logic behind this seemingly banal style though. By keeping hold of the ball, the opponent’s frustration will hopefully draw out certain players from their starting positions, making spaces for killer through-balls which would otherwise be impossible. Moreover, by keeping possession, you encourage the opponent to chase all over the pitch, impacting their stamina and further allowing you to control the pace of the match.

Counter-attacking football

Counter-Attacking Football

With 11 players to get past, scoring a goal is a tricky task at the best of times. However, the beauty of counter-attacking football is to use the other team’s desperation to score to your own advantage.
By withdrawing into your own half, but keeping a man or two further up the pitch, the goal is to take the ball off the opponent while they have players committed to the attack and thus out of position. Once you have the ball in your own half, you have more space to deliver a through-ball for your strikers, who will be lurking around the halfway line and will have fewer players to negotiate.
This tactic, while extremely risky and reliant on solid defending, can render impressive results and is often utilised by teams who are defending a lead or field a 4-5-1 formation (meaning the lone striker can get isolated in front of 4 defenders if both sides are set up properly).

Long-ball/Direct football

Long Ball

Often used to deride ‘boring’ teams, the long-ball style of play is genuine route one football. Rather than spend time on the ball picking the pass, exploiting small gaps in the opposition’s defensive or utilising the flanks, the long-ball is employed as an opportunistic method of attack. By pinging the ball up the field from defense or midfield, the hope is that the strikers will either latch onto the hopeful pass or exploit any mistakes by the defenders. Because the long-ball is dealt with in the air most of the time, any team employing it needs to have a strong target man.

Wide-play and alternating wingers

Wide-Play

Since the days of Stanley Matthews and Jimmy ‘Jinky’ Johnstone, the wings have always been a key part of attacking football. By spreading the ball wide, you allow a different angle of attack and offer a number of opportunities for the winger; take on the fullback and drag central defenders out of position, cut inside and drive forward at an angle, or whip in a cross from deep for the strikers to attack.
A further development in wing-play has been to alternate wingers on the left and right flanks. If a winger is losing the battle with his fullback, switching wings can provide a breakthrough for the team. This was effectively employed by Portugal on their way to the final of the 2004 European Championships, with Luis Figo and Cristiano Ronaldo frequently exchanging wing positions.

Using the set-plays

Set Plays

A common method for technically deficient sides, using the set-plays means exploiting all types of free kicks, throw-ins and corner-kicks. In the absence of quick, skilful players, such sides will use the break in play provided by set pieces to pack the box and attack the ball when it is delivered.


Basic defensive team tactics

The chief distinction in defensive tactics is between individual and team responsibility, reflected in the rise and fluctuating popularity of zonal defense and man-to-man marking.

Zonal defence

Zonal Defence

Zonal defense is basically self-explanatory. To cover for a team’s (or player’s) lack of pace or technique, every defender and midfielder is given a particular zone on the pitch to cover when the opposition has the ball. This is particularly important during set pieces, but does rely heavily on every player fulfilling their duties and keeping their concentration.
Ideally, the opposition will be facing two lines of four players covering the entirety of one half of the pitch. The defensive line is particularly important as, with proper communication and synchronised movement, it can exploit the offside rule and prevent all long-balls and through-balls succeeding. Generally speaking, zonal defense is fundamentally simple but allows sides to deal with all types of attackers on the opponent’s team. However, it can be fraught with danger if any individual fails to cover his area of the pitch.

Man-to-Man marking

Man-to-Man Marking

The term is often associated with continental (and particularly Italian) football and, once again, is extremely simple at its core. Whereas the defenders and midfielders are responsible for zones in zonal defense, man-to-man marking means certain individuals are responsible for guarding a particular opponent. Man-to-man marking is particularly effective alongside a sweeper who has a free role, enabling him/her to support anyone having problems with his opponent and reducing the potency of through-balls and balls played over the top of the defence for forward players to run onto.
However, man-to-man marking requires incredible discipline on the part of the marker, and good decision making on the part of the manager. If a slower defender is matched up with a pacey striker, the results could be grim to say the least!

SEO - Tactics & Methods

SEO - Tactics & Methods


SEO techniques are classified into two broad categories:
  • White Hat SEO - Techniques that search engines recommend as part of a good design.
  • Black Hat SEO - Techniques that search engines do not approve and attempt to minimize the effect of. These techniques are also known as spamdexing.

White Hat SEO

An SEO tactic is considered as White Hat if it has the following features:
  • It conforms to the search engine's guidelines.
  • It does not involve in any deception.
  • It ensures that the content a search engine indexes, and subsequently ranks, is the same content a user will see.
  • It ensures that a web page content should have been created for the users and not just for the search engines.
  • It ensures good quality of the web pages.
  • It ensures availability of useful content on the web pages.
Always follow a White Hat SEO tactic and do not try to fool your site visitors. Be honest and you will definitely get something more.

Black Hat or Spamdexing

An SEO tactic, is considered as Black Hat or Spamdexing if it has the following features:
  • Attempting ranking improvements that are disapproved by the search engines and/or involve deception.
  • Redirecting users from a page that is built for search engines to one that is more human friendly.
  • Redirecting users to a page that was different from the page the search engine ranked.
  • Serving one version of a page to search engine spiders/bots and another version to human visitors. This is called Cloaking SEO tactic.
  • Using hidden or invisible text or with the page background color, using a tiny font size or hiding them within the HTML code such as "no frame" sections.
  • Repeating keywords in the metatags, and using keywords that are unrelated to the website content. This is called metatag stuffing.
  • Calculated placement of keywords within a page to raise the keyword count, variety, and density of the page. This is called keyword stuffing.
  • Creating low-quality web pages that contain very little content but are instead stuffed with very similar keywords and phrases. These pages are called Doorway or Gateway Pages.
  • Mirror websites by hosting multiple websites - all with conceptually similar content but using different URLs.
  • Creating a rogue copy of a popular website which shows contents similar to the original to a web crawler, but redirects web surfers to unrelated or malicious websites. This is called page hijacking.
Always stay away from any of the above Black Hat tactics to improve the rank of your site. Search engines are smart enough to identify all the above properties of your site and ultimately you are not going to get anything.