Category: General
-
Make the Breakup with Internet Explorer 8 — TODAY!
Yes, there is an official site urging you to break up with IE8. Not just to make us developers lives so much easier — and one less browser to test — but because, little one, it’s definitely way past time. They even make it fun! Start the breakup today! From the official site: #BREAKUPWITHIE8 You’ve…
-
Social Presence v. Website Presence
A social business or organization presence is a great idea. You can listen to what people say and think and you can get in contact with like-minded groups and/or individuals. This allows you to share your passion, learn from others, and share resources. For many, social media is fun, and not a chore. The main…
-
4 Stats to Make You Rethink Your Web Design Plan
By Lindsay Silberman Business on Tapp, 101 [su_quote cite=”By Lindsay Silberman” url=”https://www.tapp.com/101/4-stats-to-make-you-rethink-your-web-design-plan”]And now, for a mouthwatering thought experiment… You’re going out to dinner and deciding between two restaurants. When you visit the restaurant sites, option A takes forever to load, and when it finally does, you can’t find the menu anywhere. Option B is beautifully…
-
How the US’ Requests for Linked-In Member Info Measures Up Worldwide
So I just got the notification that Linked-In had changed their privacy and transparency policy so I took a minute to see what the changes were. During my perusal I see a link to their Government Requests Transparency Report. It’s interesting to see how many more requests the US makes of Linked-In than any other…
-
The New Calculator Speller: Hex Codes!
An upgrade with a little twist to calculator spelling.
-
The JAVA Security Risk
Why everyone should be concerned about Java An article by Woody Leonhard, Microsoft Office Expert Woody Leonhard is a Windows Secrets senior editor and a senior contributing editor at InfoWorld. His latest book, the comprehensive 1,080-page Windows 8 All-In-One For Dummies, delves into all the Win8 nooks and crannies. His many writings tell it like…
-
PWN — The New Term In Town
So you may have been seeing this word “pwn” in articles regarding security and hacking and thought it was a typo and it should have read “own.” Well you’re partly correct. Pwn (pronounced “powned”) “is an leetspeak (elite speak) term meaning to appropriate or to conquer or gain ownership. In hacker-ese, it means to compromise…
-
What is Two-Factor Authentication? Why Should You Care?
What is two-factor authentication? According to Wikipedia: Two-factor authentication (TFA, T-FA or 2FA) is an approach to authentication which requires the presentation of two or more of the three authentication factors: “something the user knows”, “something the user has”, and “something the user is”. There are three generally recognized factors for authentication: something you know…
-
Taken Over
According to Neil J. Rubenking taking over your computer remotely appears to be ridiculously, as long as you’re a bit gullible and don’t have any antivirus productions. Apparently he’s done it, along with several other tech journalists as part of a recent McAfee Consumer Journalist Day at McAfee Headquarters in Santa Clara. Each of hte…
-
A Clever Idea for Your Phone Camera
There are a lot of things you use your phone for, but have you considered you can use it as a reminder? Using your phone camera makes remembering things a breeze. You’re at Disneyland and you’ve parked in some character’s colored section — take a snapshot of where you parked!