Late last week reports were circulating that Google and Verizon were in secret talks regarding net neutrality. It appears today that those reports were half right. They have been involved in private meetings trying to reach an agreement but their goal according to a joint announcement today is actually for net neutrality.
It all started when the New York Times published an article alleging the two were in cahoots and attempting to work out an agreement after their group meetings with the FCC and other Internet service and content providers like AT&T and Skype were getting them nowhere. It made sense that perhaps it would be in Google’s best interest to garner a deal with one of the leading ISPs in the business considering Google is one of the largest providers of content on the web and the Google owned YouTube is an easy target for ISPs claiming it slows their service to customers. But Google has been pro net neutrality since the argument began.
While working on a project I was challenged to build a table that showed only the columns of data associated with the current family of data. The challenge was the database I was pulling from had over a hundred columns and hundreds of rows. I only wanted to show the columns associated with the products showing in the table so I needed a way to remove the unneeded columns from the table. This could be done by hiding the unneeded columns after the data was retrieved but it was time intensive to pull all the columns and then hide some of them. What I chose to do was to build the table completely during the SQL call using Dynamic SQL methods.
The world of Ecommerce is at a unique point in its young life. With the increased focus on web standards and usability, web users are constantly on the lookout for something cutting edge and easy to use. That being said, creating an online shopping presence is becoming an increasingly important avenue for selling your goods. However, without a specific, granular approach to your Ecommerce store, it’s likely that it will produce less than desirable sales, be difficult to maintain and ultimately ineffective for users to perform even basic actions.
There are some fairly fool proof ways to combat common mistakes, however. By following some pretty simple rules within your Ecommerce store, we can improve sales, generate leads and referrals and subsequently increase conversions. Let’s get started!
Read the rest of this entry »
As mobile application acceptance and influence grows, finding better ways to connect information will evolve. That means not only sharing but also accessing information and application interaction on a device level – bridging the divide between print, mobility and infosharing. One of these methods is the QR Code (Quick Response Code). A QR Code is a 2D bar code configured in a matrix; information is stored horizontally as well as vertically. This differs from a traditional bar code which only contains information horizontally. A QR Code uses blocks (called modules) instead of variable width lines. The benefit of this is the ability to store a lot more information. Here is an example.
The basic function of the code is to be scanned (laser based 2D bar code scanner – or more likely, a phone’s camera). On a phone the image is analyzed by a QR Code reading application such as QRdvark and the content, link, and info is then available on the device.
It’s my third day in Toledo and I’ve experienced an atmosphere at AVATAR that can only be described as the genuine small business experience. On one end, you have an engaged business, but given the opportunity for playtime, the gang will not hesitate to poke fun at each other and engage in office shenanigans all in the name of fun. For example, today I decided to eavesdrop on a conversation between Robert and Damon with Damon accusing Robert of eating his last dinosaur Silly Bandz bracelet. Watching this exchange I was reminded of similar situations on the hit TV series “The Office.” This exchange was certainly something that you wouldn’t want to miss! But what’s great is how work still gets done in this atmosphere. One end of the office could be in the middle of a rubber band war while I am sitting across from Kristin and Stephanie who are meeting to discuss AVATAR’s next big step in the social media arena. Moments of raucous fun are quickly followed by the sounds of feverish typing and clicking with everyone hard at work. In short, AVATAR is a small business atmosphere upheld by close-knit friends seldom seen at your typical nine to five job.
Reflecting on my visit so far, I’d say that two very valuable things have come of it to this point. First, I’ve learned quite a bit about web development. Second, don’t try something just because someone tells you that it tastes good — you may regret it the following morning.
In the article “Understanding the Future of the Web & Your Business,” HTML5 features were discussed and the question was asked: Is your business on the forefront of this new technology? But what businesses are using this technology and is this technology worth jumping into so early in its development?
Early this month, Yahoo launched a new mail HTML5 App. Smartphone users can start previewing and using the new site by going to m.yahoo.com/mail. The new site utilizes the power of HTML5, looks great and is lightning fast. Yahoo was able to create something better then a native application by developing it in HTML5. Last week, YouTube released its new mobile HTML5 App to overwhelmingly positive critical response. People are saying that the mobile site “put the YouTube App to Shame” and “the video quality beats native Apps hands down.” Mobile sites have great advantage over native applications because they allow the developer to update their App in real time, adding new features and new advertisements to generate more revenue.
Recently Comcast Corp. won a case against the FCC barring the FCC from enforcing “net neutrality” regulations. This has set off debate in the political realm of free market vs. regulation as well as on the internet between ISPs (internet service providers) and content providers such as Google, Microsoft and Amazon. The FCC defines net neutrality as:
- Equal access to the lawful Internet content of your choice.
- The ability to run applications and use services of your choice, subject to the needs of law enforcement.
- The ability to connect your choice of legal devices that do not harm the network.
- Competition among network providers, application and service providers, and content providers.
A common issue facing businesses and organizations today is a lost or stolen laptop or PC that contains sensitive data. As a result, many companies are starting to move to on-disk encryption to protect their data. Windows Vista and Windows 7 Ultimate and Enterprise editions contain a feature called BitLocker which protects data by encrypting information over entire volumes.
BitLocker is a full disk encryption program that uses the AES encryption algorithm in CBC(Cipher-block chaining) mode with a 128-bit key. BitLocker is only available on Server 2008 and select editions of Windows Vista and Windows 7. There are 3 different authentication modes that can be used as building blocks to implement BitLocker encryption.
Transparent Operation Mode
Transparent Operation Mode uses a key for the disk encryption. It is encrypted by the Trusted Platform Module (TPM) chip and will only be released to the OS loader code if the early boot files appear to be unmodified. By using TPM, a user can only protect against software based attacks but the computer is still vulnerable to hardware based attacks. An example of such attack would be a cold-boot attack where a user doesn’t let the computer shut down completely. This attack relies on data to be in the RAM after power has been removed.