Loading...


I'm always on the lookout for exciting ideas and new technologies to broaden my knowledge of web development and design. Each week, I'll be posting links to articles on development, design and other miscellanious information that I find interesting. What follows are the highlights of the links I've recently discovered. I hope you find them as useful as I did.


I'm always on the lookout for exciting ideas and new technologies to broaden my knowledge of web development and design. Each week, I'll be posting links to articles on development, design and other miscellanious information that I find interesting. What follows are the highlights of the links I've recently discovered. I hope you find them as useful as I did.


Last week, Unleashed Technologies hosted a webinar entitled, “Navigating the Cloud Hype: Get Your Questions Answered.” In that webinar, Ryan Barbera discussed the hype, but also the real benefits that companies have realized when moving their services to the Cloud. As an added value, a substantial amount of time was dedicated during the webinar to answering questions from the audience. Below I have listed some of the most intriguing questions and the answers (paraphrased from our expert) given.


There's been another wave of security breaches, this time affecting users of LinkedIn, Last.fm, and eHarmony. The attackers were able to steal millions of "hashed" passwords. These are supposed to be secure, but in the case of LinkedIn a huge portion were cracked. So how did this happen?

Early on the week of January 23rd, 2012, Google announced a substantial change to their privacy policy across most of their applications. You can read it here. In a nutshell, Google now makes it very clear that that they will collect your name, address, telephone, IP address, device information, location, browser information, search results, and Gmail messages to associate them with one master account. This new privacy policy is a big step because it allows all of Google's applications to share your information liberally. By doing this, Google will know exactly who you are whenever you use its products.

One of the most common things I see amongst clients is there dissatisfaction with a current provider of some sort in the web space. This could be hosting, development, design, account management, and it doesn't stop their. One of the major issues I believe that facilitates this issue is that partners or vendors are "cobbled" together to take care of a single aspect of a project.

In case you haven't heard, Google (and at least 30 other companies) were attacked by hackers in late December (codenamed Operation Aurora).  Although it cannot be publicly verified as 100% accurate, Google announced in a blog post that the "highly sophisticated and targeted attack on [their] corporate infrastructure [had orginiated] from China".  Their primary goal was "accessing the Gmail accounts of Chinese human rights activi