Archive for category Business Intelligence
Today I’m sharing a quick tip: fluid width images.
I’ve been working on a mobile website which requires me to make the site practical and functional across a myriad of devices and their corresponding screen sizes. Usually, this isn’t much of a problem if it’s just text and background colors, because you can just leave the “width” attribute off of your element to have the text & colors fill the screen.
With the New Year off and running, the outlook of the web market is beginning to shape itself. More and more companies are creating mobile web sites and the need for a mobile site is becoming required. This is due to the number of smartphones in the market, a number that will continue to rise this year and is projected to overtake feature phone sales by the third quarter of 2011. During the president’s State of the Union address, president Obama spoke of the mobile market’s growth and stated:
“This isn’t about faster Internet or fewer dropped calls. It’s about connecting every part of America to the digital age.”
The world of Ecommerce is at a unique point in its young life. With the increased focus on web standards and usability, web users are constantly on the lookout for something cutting edge and easy to use. That being said, creating an online shopping presence is becoming an increasingly important avenue for selling your goods. However, without a specific, granular approach to your Ecommerce store, it’s likely that it will produce less than desirable sales, be difficult to maintain and ultimately ineffective for users to perform even basic actions.
There are some fairly fool proof ways to combat common mistakes, however. By following some pretty simple rules within your Ecommerce store, we can improve sales, generate leads and referrals and subsequently increase conversions. Let’s get started!
Read the rest of this entry »
As mobile application acceptance and influence grows, finding better ways to connect information will evolve. That means not only sharing but also accessing information and application interaction on a device level – bridging the divide between print, mobility and infosharing. One of these methods is the QR Code (Quick Response Code). A QR Code is a 2D bar code configured in a matrix; information is stored horizontally as well as vertically. This differs from a traditional bar code which only contains information horizontally. A QR Code uses blocks (called modules) instead of variable width lines. The benefit of this is the ability to store a lot more information. Here is an example.
The basic function of the code is to be scanned (laser based 2D bar code scanner – or more likely, a phone’s camera). On a phone the image is analyzed by a QR Code reading application such as QRdvark and the content, link, and info is then available on the device.
In the article “Understanding the Future of the Web & Your Business,” HTML5 features were discussed and the question was asked: Is your business on the forefront of this new technology? But what businesses are using this technology and is this technology worth jumping into so early in its development?
Early this month, Yahoo launched a new mail HTML5 App. Smartphone users can start previewing and using the new site by going to m.yahoo.com/mail. The new site utilizes the power of HTML5, looks great and is lightning fast. Yahoo was able to create something better then a native application by developing it in HTML5. Last week, YouTube released its new mobile HTML5 App to overwhelmingly positive critical response. People are saying that the mobile site “put the YouTube App to Shame” and “the video quality beats native Apps hands down.” Mobile sites have great advantage over native applications because they allow the developer to update their App in real time, adding new features and new advertisements to generate more revenue.
Recently Comcast Corp. won a case against the FCC barring the FCC from enforcing “net neutrality” regulations. This has set off debate in the political realm of free market vs. regulation as well as on the internet between ISPs (internet service providers) and content providers such as Google, Microsoft and Amazon. The FCC defines net neutrality as:
- Equal access to the lawful Internet content of your choice.
- The ability to run applications and use services of your choice, subject to the needs of law enforcement.
- The ability to connect your choice of legal devices that do not harm the network.
- Competition among network providers, application and service providers, and content providers.
A common issue facing businesses and organizations today is a lost or stolen laptop or PC that contains sensitive data. As a result, many companies are starting to move to on-disk encryption to protect their data. Windows Vista and Windows 7 Ultimate and Enterprise editions contain a feature called BitLocker which protects data by encrypting information over entire volumes.
BitLocker is a full disk encryption program that uses the AES encryption algorithm in CBC(Cipher-block chaining) mode with a 128-bit key. BitLocker is only available on Server 2008 and select editions of Windows Vista and Windows 7. There are 3 different authentication modes that can be used as building blocks to implement BitLocker encryption.
Transparent Operation Mode
Transparent Operation Mode uses a key for the disk encryption. It is encrypted by the Trusted Platform Module (TPM) chip and will only be released to the OS loader code if the early boot files appear to be unmodified. By using TPM, a user can only protect against software based attacks but the computer is still vulnerable to hardware based attacks. An example of such attack would be a cold-boot attack where a user doesn’t let the computer shut down completely. This attack relies on data to be in the RAM after power has been removed.
Recently, I came across an astonishing article written by Ethan Marcotte for A List Apart titled Responsive Web Design. The concept of the article is quite simple: can a website be designed & developed in such a way that it is smart enough to adapt to the size of the window it’s in? Marcotte’s article attempts to answer this question.