Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Video site



  Advantages Associated with Semantic SEO Searches

Today, all businesses are aware of the fact that SEO is an integral part of their online endeavors. However, some of them do not really know or understand the way SEO works and how things are changing in the SEO landscape. Do you have any idea about some positive effects of SEO and how this specific shift has affected the way people search online and exactly how search results would be ranked? SEO has been there for decades now. However, only since the year 2000 onwards, Google has proactively ...

   ALGORITHM,SEO,SEMANTIC SEO,ADVANTAGEST,HUMMINGBIRD     2018-08-14 01:02:16

  Reasons to use blue in design

Blue color is used in many product designs and logo designs such as Facebook, Microsoft, Twitter and our site. Why do companies choose blue color in their design? It's not a coincidence for them to choose blue. One saying is the color blue is associated with trust, efficiency, clarity and simplicity. Beside this reason, are there other reasons? From an interface design standpoint, blue is an incredibly useful color. Among the dark colors designers have in their toolbox, red, orange and green al...

   Design,Blue     2013-12-13 07:13:22

  Web Technologies Need an Owner

Many people seem to assume that the Web will one day become the one and only client computing platform on Earth, therefore it must not be controlled by anyone. This is a dangerous assumption. The HTML, CSS, and JavaScript triumvirate are just another platform, like Windows and Android and iOS, except that unlike those platforms, they do not have an owner to take responsibility for them.The Web has no one who can ensure that the platform acquires cutting edge capabilities in a timely manner (came...

   Web domain,Owner,Lead,Change,Innovation,     2011-09-28 09:12:12

  Speed Hashing

A given hash uniquely represents a file, or any arbitrary collection of data. At least in theory. This is a 128-bit MD5 hash you're looking at above, so it can represent at most 2128 unique items, or 340 trillion trillion trillion. In reality the usable space is substantially less; you can start seeing significant collisions once you've filled half the space, but half of an impossibly large number is still impossibly large. Back in 2005, I wondered about the difference between a checksum and...

   Speed hashing,Security,MD5     2012-04-07 10:35:15

  HeartBleed: OpenBSD now starts to clean up OpenSSL

Since the disclosure of HeartBleed bug in OpenSSL, some arguments emerge around the safety of OpenSSL, the largest open source SSL/TLS library used by large number of servers, applications. Some people are even starting to create their own version of SSL library. This includes OpenBSD, a famous Unix like open source operating system. Just a few days after the HeartBleed bug, OpenBSD forked a new branch of OpenSSL and started to clean up the forked branch and plans to merge it to its own cod...

   HeartBleed,OpenBSD     2014-04-15 04:21:26

  PHP to get access token for Twitter app

Previously we wrote an article about getting access token for Facebook app--PHP to get access token for Facebook app. Today we will introduce how to get access token for Twitter app using PHP. Since now Twitter is also using OAuth 2.0 to allow some web apps to access some users information on behalf of one user. They provided some APIs for developers to easily get them integrated with their own websites. The first step to get all these done is how to get the access token, the access token seems ...

   Twitter,OAuth,access token,PHP     2013-03-03 03:49:26

  Returning To Work After COVID-19: How To Ensure Your Employees Are Ready

Every aspect of our day-to-day lives has been impacted by the Internet, whether it be work or personal time. Since nations enforced strict lockdowns, employees have mostly been working remotely. Now that the world is slowly getting back on its feet after the lockdown, employers are evaluating their options and planning strategies to ensure employee safety after returning to the physical office.  With some restrictions remaining, companies must consider not just the workplace, but employees'...

   TRAINING,COVID-19,REMOTE WORK     2022-03-29 08:35:08

  Native Audio with HTML5

Once upon a time, audio on the web lived primarily in the world of third-party browser plug-ins like Flash, QuickTime and Silverlight. This was not a bad world, but it had its issues.For one, most plug-ins require the user to install them, but not all users are willing (or able) to install them. Also, many players built with these plug-ins are inaccessible, making it difficult for folks who use assistive technologies to access the audio or alternative content.Then there are the front-end design ...

   Audio,HTML5,Built in,Audio tag,Video     2011-10-13 13:04:07

  Execute PHP from a .html File

How can I execute PHP code on my existing myfile.html page?:When a web page is accessed, the server checks the extension to know how to handle the page. Generally speaking if it sees a .htm or .html file, it sends it right to the browser because it doesn't have anything to process on the server. If it sees a .php extension (or .shtml, or .asp, etc), it knows that it needs to execute the appropriate code before passing it along to the browser. Here is the problem: You find the perfect ...

   PHP,HTML,PHP in HTML,AddType     2011-12-26 14:01:20

  Let browser prompt for storing password when doing AJAX login

In Web 2.0 era, more and more web applications are using AJAX to replace the traditional HTML form element to perform user login. This usually provides a better user experience than form submission. But it also brings a side effect to the end users. That is the browser will not prompt the user whether s/he wants to save the password so that s/he no needs to enter the username/password again when visiting the same site next time. Below is the code snippet which does the AJAX login.  <scri...

   AJAX,Browser,Login,Password     2015-06-04 10:02:46