Blog

Written by: Dan C, on 2017-03-21

Job Description This is a chance for a Mid Backend PHP developer to work on some of the latest frameworks for high profile projects/clients. Responsibilities will include working in a team, developing backend components for mid-large projects. You will be working in a highly motivated, performance driven and agile environment. What you need: 3+ years […]

Written by: Dan C, on 2017-03-19

Job Description This is a chance for a Mid Front-End JavaScript developer to work on some of the latest interactive technology for high profile projects. Responsibilities will include implementing visual elements and their behaviors with user interactions. You will be working in a highly motivated, performance driven and agile environment. What you need to know: 3+ years […]

Written by: Dan C, on 2016-08-17

Version 4.6 of WordPress was named “Pepper” in honor of jazz baritone saxophonist Park Frederick “Pepper” Adams III. WordPress 4.6 “Pepper” features include: Streamlined Updates You can stay on the same page while you update, install, and delete your plugins and themes. Native Fonts The WordPress dashboard takes advantage of the installed fonts making it […]

Written by: Dan C, on 2016-05-05

Web design and development is a collaborative process and it needs your client’s involvement in all stages. Learning what your potential clients wants in a website takes time and client questionnaires should focus on: – What the site’s supposed to do for the client. – What the site will look and feel like. 1. Why […]

Written by: Dan C, on 2016-03-29

iOS 9.3 has been in beta since January, and it adds a number of new features to the iPhone and the iPad. One of the biggest user-facing features is Night Shift, a feature that will change the colors of the light emitted by your iOS device, depending on the time of day. While Apple’s iOS 9.3 […]

Written by: admin, on 2016-03-08

Ransomware is a type of malware that infects your computer, encrypts your data and refuses to give you the key unless you pay its makers a sum of money. According to the Palo Alto Networks security company, the first fully functional ransomware that operates on Apple’s OS X has been discovered and named “KeRanger”. There goes the myth that […]

Written by: Dan C, on 2016-03-03

The Facebook-owned mobile messaging service WhatsApp is finally rolling out the document sharing feature to iOS and Android apps (the feature is unfortunately limited to only PDF files at this time). A number of WhatsApp users have already seen the feature pop up alongside the other sharing options. The feature will work the same on both iOS and […]

Written by: Dan C, on 2016-02-26

Why was AMP created? Access to information is at the heart of Google’s mission. When it comes to speed, the mobile web isn’t living up to the expectations people have for getting the information they need. Data shows that visitors abandon websites after just three seconds if the content doesn’t load quickly – which is […]

Written by: Dan C, on 2016-01-07

Beginning January 12, 2016, only the most current version of Internet Explorer available for a supported operating system will receive technical support and security updates. Internet Explorer 11 is the last version of Internet Explorer, and will continue to receive security updates, compatibility fixes, and technical support on Windows 7, Windows 8.1, and Windows 10. […]

Written by: Dan C, on 2016-01-07

CSS stands for Cascading Style Sheets and it describes how HTML elements are to be displayed on screen. CSS is used to define styles for your web pages, including the design, layout and variations in display for different devices and screen sizes. PUN is a play on words, which, when used correctly, can bring one a load […]

Written by: admin, on 2015-12-08

Website size has increased about 25 percent from 2014 – today’s website is averaging 2162 KB and it’s showing no signs of stopping. In the past five years, websites have grown over 200 percent. But what are the main reasons to this growth and how can they be handled? Reason #1: Content Overload Implementing a […]

Written by: Dan C, on 2015-11-10

Last month, a Bug bounty challenge was announced by Zerodium for finding a hack that must allow an attacker to remotely compromise a non-jailbroken Apple device through: A web page on Safari or Chrome browser, In-app browsing action Text message or MMS. An unknown group of hackers has just sold a zero-day vulnerability to Zerodium, a […]

Written by: admin, on 2015-11-09

Android devices are know to experience serious security problems. Most of the Android malware is outside the Google Play Store but the biggest problem is that many Android devices don’t get security updates and Android antivirus apps aren’t a solution to these problems. How does an antivirus work on Windows – Windows provides the antivirus […]

Written by: Dan C, on 2015-10-15

According to an Adobe Security Bulletin, a critical vulnerability (CVE-2015-7645) has been identified in Adobe Flash Player 19.0.0.207 and earlier versions for Windows, Macintosh and Linux. This zero-day exploit can cause a crash and potentially allow attackers to take control of the affected systems. So far, the attacks are known to target only government agencies as […]

Written by: Dan C, on 2015-10-15

JPEG images may soon have copy protection! The Joint Photographic Experts Group recently launched a Privacy & Security initiative that potentially brings digital rights management (DRM) to regular JPEG images, not just the specialized JPEG 2000 format. JPEG Privacy & Security – a new activity launched by the JPEG committee – aims at developing a […]