Where the IT Jobs Are Now

Visual StudioMagazine.com highlights CyberCoders analysis of the top 10 IT programmer’s skills employers demand in 2013. Mobile, cloud and front end development are the most desirable skills to have right now and this trend is likely to continue for the foreseeable future.

Mobile development skills for the platforms of iOS and Android are the most sought after as many businesses want to get their message out to all forms of internet users. As the businesses look for content-rich pages with relatively light code, front end folks that know CSS3, HTML5 and JavaScript are greatly needed too.

CyberCoders CTO Matt Miller says, “A few years ago you could have a great software engineer who could do the back end and work with the database and business logic in the middle tier, and also the front end,” Miller said. “But the front end has become so complex that it has become a specific skillset that people want.”

The current list of the 10 top skills can be found here:
http://visualstudiomagazine.com/articles/2013/05/03/top-10-development-skills.aspx

Posted in Software | Tagged , , | Leave a comment

Great Plug-In for Google Chrome Browser

Anyone who has been using the Google Chrome OS has been able to open Microsoft Office documents in their web browser. Now Google has announced that they will offer a plug-in that allows anyone using a Windows or even Mac OS to have this feature work in their Chrome browser as well.

According to Webmonkey.com, this new feature is still in beta stage and can be used when you have installed Chrome 27 or higher. You would download and install the new Office Viewer (also a beta) right from the Chrome Store. Webmonkey warns us that there are still “rough edges” with the plug-in that need to be addressed before it’s ready for prime time.

The new Office Viewer will be able to open any documents with the extension of .doc, .docx, .xls, .xlsx, .ppt, .pptx. I’d imagine that once the kinks are worked out, this plug-in would eventually be part of most browser’s standard features like the ability to open PDF files already is.

 

For more info see: http://www.webmonkey.com/

 

Posted in Software, Uncategorized | Tagged , , | Leave a comment

Become a Certified Web Developer…on the Cheap!

Were you aware that you too could enter the high tech world of Web Developing for under $100.00? You can get a developer video course that will teach you what you need to know with only 12 hours of content.

According to http://www.cultofmac.com, if you hurry, you can have the entire course for only $69 that was designed by trainer Mark Lassoff. There are over 183 lectures and over 25 “engaging” lab exercises. The instructor is available by email or on specific forums should you ever have a question.

You will learn HTML, Javascript, PHP and MySQL. Upon completion you will be “professionally” certified! Mr. Lassoff will personally sign off on the certificate, and since he’s one of the leading trainers in the industry, you will be ready to start building websites as your new career. Call within the next 10 minutes. Sorry, no C.O.D.

Last Chance: The Become A Certified Web Developer Course [Deals]

Posted in Uncategorized | Tagged , | Leave a comment

Web Hosting Hub in 1st Place for March 2013

According to Web Hosting Report, Web Hosting Hub came in 1st place for domain web hosting for March 2013. Web Hosting Report reviews most of the top web hosts and comes up with a rating every month. The editor of Web Hosting Reports claims that The Web Hosting plans displayed are rated by the best value for the price. Overall value is determined by price, uptime reliability, quality of customer service, and user feedback found on forums.

Unlike Consumer Reports, a company that rates everyday products Americans buy, Web Hosting Reports admits that they “are a professional review site that receives compensation from the companies whose products we review.”  Try to keep that in mind as you look at their scoreboard.

Their #1 Windows-based web host for March 2013 is Lunar Pages (http://www.lpwebhosting.com/). Lunar Pages customer service is ranked very high. Web Hosting Report makes it easy to view some basic categories to compare such as price, storage space, band width and reviews. With one mouse click, they offer specific categories that you may be interested in such as Best Cheap Hosting or Best PHP hosting. If you get a chance, check them out.

Image

Web Hosting Report (www.webhostingreport.com)

 

Posted in Business, Software | Tagged , | Leave a comment

Android Loses it’s Daddy

Many people saw Andy Rubin as Google’s Steve Jobs. He has been removed from the Android product completely. Google tries to spin it differently but since Mr. Rubin doesn’t have a new job yet, he’s been dismissed.

The International Data Corporation (IDC) currently shows Android’s OS with a large lead over Apple in the marketplace but that may change very soon. TechNewsWorld claims that the Android OS is very susceptible to viruses and major tablet and smart phone companies like Samsung are quite upset.

Google has been working with the Android platform for quite some time in addition to it’s very own Chrome OS. With Rubin out of the Android picture with Google, TechNewsWorld sees Google moving to Chrome OS as a mirror image of Microsoft leaving their Windows 98 OS in favor of a total rework to Windows XP. Expect some growing pains.

http://www.technewsworld.com/story/77545.html

Posted in Business, Software | Leave a comment

Apps at Work Lead to Security Breaches

Many companies are finding out that employees that use web applications at work are often compromising corporate data. They are posting on popular sites such as Facebook, Dropbox, YouSendIt and others. The use of laptop, smart phones and tablets at work presents a growing problem that IT managers are not certain how to cope with.

According the New York Times article linked below, once data leaves the corporate network, protecting it becomes much harder. Searching for the name of almost any large company, plus the word “confidential,” yields supposedly secret documents that someone has taken from the company network and published.

“People are going to bring their own devices, their own data, their own software applications, even their own work groups,” drawing off friends and contractors at other companies, said Bill Burns, the director of information technology infrastructure at Netflix. “If you try and implant software that limits an employee’s capabilities, you’re adding a layer of complexity.”

In addition to Chinese hackers, corporate managers in charge of data security are finding that employees can “upload things with one device and then download them to another from someplace else.”

Full Article: http://www.nytimes.com/2013/03/04/technology/it-managers-struggle-to-contain-corporate-data-in-the-mobile-age.html?pagewanted=all

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

48% of UK Online Businesses Will Have Mobile Websites in 2013

Because of the fact that standard e-commerce websites when viewed on a smartphone or tablet can be difficult to navigate, UK businesses are committed to have mobile websites up and running this year. One UK company, Twistfix, will be using Mobile Website Design and Development Company Brickweb to help accomplish this task. Twistfix is an online supplier of masonry crack repair products to the construction, repair and renovation industries, as well as DIY-enthusiasts.

According to PRWeb, this is in direct response to the meteoric rise in popularity of smartphones and tablets, of which there were an estimated 7 billion worldwide at the end of last year.  Customers that cannot properly use a website with their mobile device will often turn to a competitor’s website that supports mobile devices thereby losing business.

This looks like a trend that will probably eventually force any online company to offer a website suited for mobile devices or face the real possibility of becoming extinct.
For more info: http://www.prweb.com/releases/mobile-websites/web-development/prweb9712843.htm

Posted in Uncategorized | Leave a comment

Q & A: Expectations of Privacy, Security and Etiquette in Cyberspace

  1. What are “online communications”?

The term “online communication” refers to reading, writing and communication via networked devices.

  1. What level of privacy can I expect in my online activity?

I like to say, “none.” The exceptions are data you send using standard internet security such as “https” or SSL (secure socket layer) technology. Programs that encrypt your data are also available. Outside industry accepted security features, assume someone can see anything you place online even if you later remove it.

  1. Can online services track and record my activity?

Yes they can. Internet service providers associate your account with a specific IP address. They can see all the IP addresses and site names you visited. Their servers can track any web page you request. Internet Cafes can track all web pages requested also but do not have the name of the specific user because they permit guest or anonymous logins.

  1. What are Cookies?

Cookies are small programs, usually text files sent to you from a website you visited. They usually contain some user information about what pages or items on their site were of interest to you. Credit/debit card information should  never be stored in cookies. They usually have an expiration date where the cookie becomes invalid after a set amount of time.

  1. What are Web Bugs?

Web bugs or tracking bugs are embedded objects usually invisible to the user that allows the sender to check if the reader viewed a web page or email.  What usually happens is that the reader/user will open a page or email and the web bug will request an image of some type to be downloaded from a server. The server will then track/record this activity.

  1. What is workplace monitoring?

Workplace monitoring is a practice where an employer uses cameras, audio monitors, phone and computer monitors to watch over employees and presumably protect the company’s interests.  Many of these practices are legal, and some are not. There are ongoing lawsuits by employees who feel the company has infringed on their reasonable expectation of privacy.

  1. Can an online service access information stored in my computer without my knowledge?

The short answer is “yes they can.” When you request a page or file from the internet, it is possible that you will be sent some computer code or file that you did not expect or want.  Most often this practice is illegal and not done by legitimate companies. However, as mentioned before, the use of “cookies” is a generally accepted way of companies being able to better serve a customer and their use often goes unnoticed unless you block them.

  1. Can hackers get into my computer?

Again, the answer is yes. Quite often you fill see news stories about high security government computers being compromised by hackers. Stay current with all operating system updates and use of strong passwords and virus protection programs can minimize this risk.

  1. What is spyware and how can I know if it’s on my computer?

Spyware is a type of malicious software (malware) installed on your computer without your knowledge or consent. It will attempt to collect data from you such as account information, passwords and even keystrokes. Good anti-malware programs run frequently on your computer should help you detect their presence. One free program that can be downloaded for free is called Malwarebytes.

  1. What can I do to protect my privacy in cyberspace?

There are several things you can do. Have all anti-virus and anti-malware programs current and run frequently. Use strong passwords and change them regularly.  Avoid websites that are known for sending undesirable files to you such as porn and gambling sites. Sites that originate from outside the U.S. are more susceptible to misuse.  Make sure any financial information is only used with a secure website.

  1. What is Encryption?

Encryption is a way to scramble text, audio or video so that it becomes useless without knowing the key to restore the file to it’s original state.

  1. How programs such as PGP can protect your privacy?

PGP stands for “Pretty Good Privacy”. It is a program that can encrypt and decrypt emails and other files so that only you and those whom you designate can read/use them. PGP provides the user with a private and public key. Together they will be used to scramble and descramble emails or files so that they cannot be used or read by anyone else but you and those you wish to read/use them.

  1. What is Netiquette?

Netiquette is a term used to describe generally acceptable ways to communicate to others using the internet. It covers how you should act and treat others in online communications to be considered socially decent. An example is to never type in all capital letters or the reader will assume you are shouting at them. Another example would be refraining from using fowl language on a bulletin board service or chat room unless doing so is a well established norm.

Posted in Uncategorized | Leave a comment

File Compression for Web Design

On the World Wide Web, download speed and file size are everything. Being able to use file compression when developing a website can give your projects an edge. Web Designers are mainly concerned with the size of image files used in their projects. Since a Web Designer’s audience must download web pages, having a huge hard drive available will offer no advantage but file compression will.

There are 3 file types a web designer will most likely be working with. They are the JPG or JPEG, the GIF and the PNG files. We want to make our files smaller so that they load faster in a browser. At the same time we want minimum image degradation. There are generally 2 different types of file compression, lossy and lossless. With lossy, some image data from the original image is lost during compression while lossless does not lose any data.

Instead of getting into the details of compression here, it’s important to know what sort of images are best for each file format so you can balance minimum size and best image quality. GIF must be used with animation. This is also well suited to images that contain line drawings and simple graphics. JPG is good for photographs with limited contrast and screenshots of movies and games. PNG which usually is a relatively larger file size is best suited for photos with high contrasts, transparency or detailed diagrams.

For more detailed information, here is the site I visited for an image compression review: http://www.noupe.com/design/everything-you-need-to-know-about-image-compression.html

Posted in Uncategorized | Leave a comment

Ethics & Copyright

So, just what is copyright and what is that little © symbol we see so often? The symbol © actually represents “copyright”; that a work has been copyrighted. Copyright is the author of a work stating that this work belongs to him/her and do not use it without their permission.

Copyright applies to many things on the web. Software you create, links, images, articles, videos, emails and even html language sequences are protected by copyright. This means that other folks cannot copy or reproduce your work without your permission. Technically, you cannot forward someone’s email to you without permission!

The term, “Fair Use” is used to describe the conditions that you may use an original work without the author’s permission. Generally, when referencing a work such as an article, if you post a short amount of it and give credit to the author, you have not violated copyright. This falls under fair use. To parody a copyrighted character is considered fair use also. Fair use is difficult to fully define. It must ensure that you do not derive or diminish from the original work of the author or degrade the value of the original work.

The use of works clearly marked as for public domain will not constitute copyright infringement. If a copyright term has expired, the author has passed away or has lost copyright protection, it is considered public domain also.  Certain Federal Government documents that adhere to 17USC105 are also in the public domain and may be freely used.

Be careful when using anything you did not create yourself when designing pages for use on the web. Always assume a work is copyrighted if you are unsure. It’s good ethics to give credit to where credit is due and not representing other peoples’ ideas as your own.

~Vaxman2 ©2013

Posted in Uncategorized | Leave a comment