Google num=100 Parameter Removal: What It Means for Your SEO in the AI Age

What Just Happened?

If you track search performance, you felt it. The Google num=100 parameter removal in September 2025 changed how results pages load. It also altered how tools collect data. Google confirmed it no longer supports a results-per-page parameter; in practice, standard pages now show about ten results, not 100. As a result, many sites saw impression counts fall and average position “improve” overnight, even though rankings didn’t actually change.

What changed—plain English

Until mid-September, adding &num=100 to a Google results URL forced 100 listings on one page. Rank-tracking tools and scrapers leaned on that trick; so did some power users. Google stopped honoring it. Industry data shows steep drops in Search Console impressions. These drops are noted in tracked keywords across most properties after the switch. Importantly, the change affects measurement, not your real-world visibility.

Why would Google do this? Several reasons line up:

  • Reduce automated scraping and abuse. Killing num=100 raises the cost of bulk SERP harvesting.
  • Nudge pros to official APIs. Expect heavier reliance on Search Console and Custom Search APIs for data access.
  • Align with answer-first interfaces. Fewer paginated links complement Google’s AI-overview direction. (Industry inference from coverage and statements.)
Google Just killed &numb=100: What it means for SEO in 2025

The impact you’ll actually see

From San Antonio to Corpus and the I-35 corridor, our SMB clients reported the same pattern:

  • Impressions down; average position up. Deep results stopped inflating impression totals; averages look “better” without a ranking lift.
  • Fewer “visible” keywords in tools. Trackers can’t grab 100 at a time; coverage looks thinner unless they paginate more (which costs more).
  • Clicks and conversions steady. Because user behavior didn’t swing, real business metrics didn’t nosedive.

What Texas SMBs should do next

  1. Re-baseline your dashboards.
    Reset “normal” levels for impressions, avg position, and keyword counts from September 2025 forward. Add an annotation in your reporting.
  2. Prioritize top-10 outcomes, not page-3 vanity.
    With fewer results per view, page-one coverage matters even more. Refocus content plans on the queries where you can credibly win the top 3–5 spots.
  3. Measure what pays the bills.
    Shift weight from impression totals to CTR, qualified clicks, leads, and revenue. Build monthly reviews around those KPIs, not around keyword inventory swings.
  4. Ask your tool vendors hard questions.
    How are they adapting collection methods? Are they paginating more, sampling differently, or leaning on official APIs? Demand a methodology note.
  5. Tune content for “answer engines.”
    Structure posts with crisp questions, scannable subheads, summaries, and schema (FAQ, HowTo, Product, Organization). That format feeds AI overviews and rich results. (Industry best practice consistent with the shift.)
  6. Fortify entity and brand signals.
    Strengthen E-E-A-T: author bios, local citations, consistent NAP, and first-party references. In an answer-first world, trusted entities surface more often.
  7. Diversify traffic sources.
    Grow email, referral, and social so a single SERP tweak doesn’t derail pipeline. (Common recommendation as data access tightens.)

What this signals about the future of SEO in the AI era

  • From lists to answers. Google continues to compress choices and elevate summaries. Content that directly answers intent—and marks it up—wins more often.
  • Data will be more gated. Scraping shortcuts will fade. APIs, partnerships, and modeled data will power reporting. Expect some tools to raise prices or reduce depth.
  • Brand and local authority rise. When users see fewer links, trust matters more. Texas-relevant case studies, reviews, and citations become durable moats.
  • UX signals tighten the loop. Engagement and satisfaction correlate with rankings when competition intensifies on page one. Keep pages fast, clear, and persuasive.

How STS will protect your pipeline

  • “No-Surprise” reporting. We’ll annotate September 2025 forward, recalibrate baselines, and center reviews on leads and revenue—not noisy impression totals. (Internal alignment with our reporting standards.)
  • Answer-optimized content sprints. We’ll refactor priority pages with FAQs, concise takeaways, and structured data to support rich results and AI picks.
  • Local proof first. Every campaign gains Texas-centric proof assets: case metrics, ticket MTTRs, backup success %, and security outcomes that convert skeptical buyers.

External source links

  • Google confirms results-per-page parameter isn’t supported (Search Engine Land).
  • Industry data on impressions/keyword visibility drops (Search Engine Land, LOCOMOTIVE).
  • Practitioner analyses of the change (Brodie Clark, ZEO).
  • Rank-tracking/collection changes post-num=100 (SerpAPI).

TL;DR for busy owners

The Google num=100 parameter removal didn’t tank your rankings; it changed what tools can see. Re-baseline reports, double down on page-one content, and measure leads and revenue. We’ll handle the technical shifts, and we’ll keep your pipeline predictable in an AI-first search landscape.


Understanding MSP Jargon, Part 1: 30 Essential IT Security Terms Every Texas Business Owner Should Know

Why This Series Matters

If you’ve ever sat in an IT meeting and thought, “They lost me after ‘endpoint protection,’” you’re not alone.
At SofTouch Systems (STS), we believe transparency starts with understanding. As your Managed Service Provider (MSP), we want you to feel confident. You should know exactly what we mean when we talk about your IT systems and security.

This three-part series breaks down 90 of the most common IT and MSP terms. It starts with the first 30 essential ones below.

Understanding MSP Jargon Pt 1: 30 IT Security and Network Terms Explained

The MSP Essentials (Terms 1–10)

  1. MSP (Managed Service Provider) – A company (like STS) handles your IT systems. It also manages security and network performance. This allows you to focus on running your business.
  2. SLA (Service Level Agreement) – The written promise defining response times, uptime guarantees, and performance standards.
  3. Endpoint – Any device that connects to your network—PCs, phones, tablets, servers, or even printers.
  4. Patch Management – The process of keeping your software up to date with the latest fixes and security improvements.
  5. RMM (Remote Monitoring and Management) – The software MSPs use to watch over your systems 24/7 and respond instantly to alerts.
  6. NOC (Network Operations Center) – The MSP’s command hub where technicians monitor and maintain client systems around the clock.
  7. SOC (Security Operations Center) – A team focused specifically on identifying, analyzing, and responding to cybersecurity threats.
  8. Ticketing System – The help-desk software that tracks your support requests and ensures accountability.
  9. Uptime – The percentage of time your systems are running without disruption (we aim for 99.9%+).
  10. Downtime – Any period when systems are unavailable—often costly for SMBs if not properly managed.

Security Fundamentals (Terms 11–20)

  1. Firewall – A digital gatekeeper that blocks unauthorized traffic and keeps cybercriminals out.
  2. Antivirus (AV) – Software that detects and removes malicious code, viruses, and malware.
  3. EDR (Endpoint Detection and Response) – Advanced threat protection that monitors and isolates attacks in real time.
  4. MFA (Multi-Factor Authentication) – A security method requiring more than one form of verification to log in.
  5. VPN (Virtual Private Network) – Encrypts your internet connection, protecting data when working remotely or on public Wi-Fi.
  6. Phishing – A common cyberattack that tricks users into revealing passwords or clicking harmful links.
  7. Ransomware – A type of malware that locks your files and demands payment for access.
  8. Encryption – The process of converting data into unreadable code to protect sensitive information.
  9. Zero Trust – A modern security approach assuming no user or device is automatically trusted, even inside the network.
  10. Data Breach – When sensitive information is accessed, stolen, or leaked without authorization.

Business Continuity & Backup Terms (21–30)

  1. Backup – A stored copy of your important data used for recovery after loss or corruption.
  2. Disaster Recovery (DR) – A plan that outlines how your business will restore systems and data after a major incident.
  3. BCP (Business Continuity Plan) – Ensures your critical operations keep running during or after a disruption.
  4. Cloud Storage – Off-site servers (like Microsoft Azure or Google Cloud) used to store and access data securely over the internet.
  5. MDM (Mobile Device Management) – Tools that secure and manage company smartphones and tablets.
  6. DNS Filtering – A safeguard that blocks users from visiting known malicious websites.
  7. Dark Web Monitoring – Scans the dark web for your business’s leaked credentials or data.
  8. Penetration Test (Pen Test) – A simulated cyberattack used to identify security weaknesses.
  9. Patch Tuesday – Microsoft’s monthly release of critical updates to fix vulnerabilities.
  10. User Awareness Training – Regular education for staff to recognize phishing, scams, and unsafe online behavior.

How This Knowledge Protects You

Understanding this terminology empowers you to:

  • Ask smarter questions when evaluating IT services.
  • Hold vendors accountable for the protections you’re paying for.
  • Spot weak links before they become security incidents.

At STS, we call this approach “No-Surprise IT”—because clarity, education, and trust are the foundation of every long-term partnership.


Next in This Series

In Part 2, we’ll cover advanced security concepts. We will also discuss cloud computing and compliance terms. Every Texas business owner should understand these before signing their next IT contract.


Confused about your IT contract or service plan?
Book a complimentary “Tech Terms Made Simple” consultation with SofTouch Systems today.
Schedule a Call | Simplifying Technology, Maximizing Results

Windows 10 Nears End-of-Life — and Microsoft Just Broke Its Upgrade Tool

Just when millions of users were preparing to move on, Microsoft pulled a curveball.

Windows 10 will reach end-of-life (EOL) on October 14, 2025. Two weeks prior to this date, Microsoft confirmed that its Media Creation Tool (MCT) might close unexpectedly. This tool is one of the most common ways to create upgrade media for Windows 11. It might display no error message when it closes unexpectedly.

The company quietly listed the issue as Confirmed on October 10. In plain English, that means the very tool designed to help users upgrade… just broke at the worst possible time.

For businesses still running Windows 10, this incident is more than an inconvenience. It’s a wake-up call about planning for system lifecycle management. Businesses need a trusted IT partner to ensure upgrades happen smoothly, securely, and on schedule.

Windows 10 Nears End-Of-Life and Microsoft just broke it's Upgrade Tool

The Clock Is Ticking: Windows 10 End-of-Life Is Here

Microsoft’s own statement spells it out clearly:

“Devices running Windows 10 will no longer receive fixes for known issues, time zone updates, technical support, or monthly security updates containing protection from the latest security threats.”

Once EOL hits, those unpatched systems become prime targets for ransomware and data breaches. Compliance frameworks, like HIPAA, PCI-DSS, and NIST, require supported operating systems. Therefore, staying on Windows 10 could eventually mean falling out of compliance too.

That’s why SofTouch Systems has spends a good percentage of our time helping Texas businesses develop structured upgrade paths. These are not rushed, reactionary upgrades. They are planned migrations designed to minimize downtime and eliminate hidden risks.

Because no one likes “surprises” when their operating system suddenly stops being supported.


What You Can Do Right Now

Even with Microsoft’s Media Creation Tool malfunctioning, there are still safe, verified ways to transition from Windows 10 before EOL:

  1. Use Windows Update
    • Open Settings → Update & Security → Windows Update
    • Click Check for updates and see if the Windows 11 upgrade appears.
    • Note: Some systems won’t qualify due to CPU or TPM requirements.
  2. Download a Bootable ISO Directly from Microsoft
    • Visit Microsoft’s official ISO download page.
    • Under “Download Windows 11 Disk Image (ISO)”, choose your version and language.
    • Use a trusted USB tool (like Rufus) to create installation media — but only if you know what you’re doing.
  3. Evaluate Alternatives for Legacy Hardware
    • If your current system fails Windows 11’s minimum requirements, it may be time to modernize hardware. Alternatively, you can test lightweight Linux distributions that extend the life of older machines.

STS can help you assess compatibility. It can assist in choosing upgrade paths. STS ensures data is migrated safely. This is true whether you’re moving to Windows 11 or evaluating cloud workstations instead.


Why This Matters for Businesses

A broken upgrade tool might be frustrating, but it’s also a reminder that reactive IT is risky IT.

Businesses relying on outdated operating systems or one-click DIY tools often find themselves stuck when things go wrong. Proactive maintenance and lifecycle planning ensure that upgrades happen on your schedule, not Microsoft’s.

That’s why SofTouch Systems’ No Surprise IT approach includes:

  • Flat-rate upgrade planning for servers and workstations
  • System compatibility reports before deployment
  • Automated backups and rollback options
  • Security patch verification for all devices

We make upgrades predictable — and remove the panic moments when vendors pull the rug out days before support ends.


The SofTouch Systems Recommendation

If you’re still running Windows 10, the time to act is now.
Don’t wait for another broken update tool or a missed security patch.

Our team can help you:
Audit your current systems
Develop an upgrade roadmap
Ensure data continuity through every phase
Provide backup verification before and after migration

Get your free “End-of-Life System Check” at SofTouchSystems.com.
We’ll make sure your business stays secure and compliant — long after Windows 10 fades into history.