Website design Checklist

Planning for a website design? Planning is important for any size of website, whether it’s a 3 page or 50 page website. When building a house, it’s important to have a good plan before beginning any work. In the same way, the planning ahead is important for website design too. A successful website begins with a good plan. Below here is the important checklist for your website design.

  1. Logo: Should be simple and easily recognizable. Click here for the logo design tips and examples.
  2. Domain Name: Domain name is an important part of the overall website design. A name plays an important role when people navigate to your website. It should be easy to spell, pronounce, catchy and memorable.
  3. website design checklistContent: Plan the content for each page including text, images and etc., that will appeal to your readers. Provide value in every page so that your readers will stick to it.
  4.  Images: As much as the attention given to content, so it should be for images on your website. Images should speak clear about your work web site.
  5.  Responsiveness: These days everyone opts for responsiveness. The layout of your website automatically adapts to the size of screen, to fit the various mobile device by giving the best display, which is easy to read and find for the customer.
  6. SEO Optimization: Optimize page titles, descriptions, image alt tags, keywords and URL’s. Use best key words to target to drive traffic from search engines to your website.

This post was posted by Daizy for DMG Weblabs, Toronto. DMG Weblabs is a Toronto based web design company specialized in creating SEO web sites and mobile ready websites. Contact DMG Weblabs for your website requirements.

Apple launches new 12-inch MacBook

Apple launched a new MacBook of 12-inch at their March 9th event in San Francisco.Apple-New-12inch-MacBook

The MacBook weighs just 2 pounds and is Apple’s lightest and thinnest Macbook so far, it is 24% thinner than 11-inch MacBook Air. It features the company’s ultra high resolution with 2304 X 1400 Retina-display, a full-size much thinner keyboard with a new Force Touch trackpad, incredibly compact USB-C port, video out, single connector charging, and a day-long battery life. The device will be available in multiple colors like silver, grey and gold.

The new MacBook is the future of the notebook,” said Apple’s senior vice-president of worldwide marketing Philip Schiller.

The new MacBook pricing will start at $1,299 and will be powered by Intel’s new Mprocessor.

This post was posted by Daizy for DMG Weblabs, Toronto. DMG Weblabs is a Toronto based web design company specialized in creating SEO web sites and mobile ready websites.

Source: http://www.timesofindia.com

Blackberry Touch Screen Phone

Blackberry has announced a touch-screen phone, Blackberry Leap, without physical  keys, at the Mobile World Congress trade show.

The midprice of Blackberry Leap will retail for $275 and has a 5-inch display will be available next month in some countires. The Leap is aimed at ” young professionals and businesses that value security and privacy for the “career-building” and are more accustomed to a touch-screen keyboard.

Ben Wood, from the CCS Insight consultancy said, “Blackberry will find it tough to compete with the iPhone and Android devices, but the Leap will be essential to offer a more rounded portfolio of phones.”, though Blackberry is falling in it’s sales.

Blackberry is planning to launch three more devices in this year, along with Leap.

Blackberry also briefly teased the last device for this year, a more distinctive device at its press conference, a curved-screened phone with a keyboard that slides out from below its screen, though its name & further details are not provided.

This post was posted by Daizy for DMG Weblabs, Toronto. DMG Weblabs is a Toronto based web design company specialized in creating SEO web sites and mobile ready websites.

Source: http://www.bbc.com/; http://www.wsj.com/

Tips to Choose a Right Tablet

Now-a-days as the trend is going on to buy tablets, you should know which tablet is right for you and what you should know. Here are some tips for you to choose from Apple IPads, Android Tablets & Windows model.
The operating system on the iPad Air and iPad mini tablet lines is very clean and intuitive, and the wide selection of iPad apps that you can buy right on your tablet. This is the greatest strength of Apple’s iOS.

Google’s Android mobile OS gives you a choice of hardware from several manufacturers and offers maximum configurability, a top-notch notification system, fast and smooth Web browsing, and seamless integration with Google applications like Gmail, Google Maps, and Hangouts for video chat. Android also includes support for multiple user logins so you can share your tablet with a friend or family member.

Windows 8 comes the closest to offering a traditional computing experience with full x86 support for all of your Windows software. And you can run the full version of Microsoft Office when you buy a Win 8 tablet. Also, connectivity options and hardware add-ons for Windows models are also typically more plentiful than with other tablet types.

This post was posted by Daizy for DMG Weblabs, Toronto. DMG Weblabs is a Toronto based web design company specialized in creating SEO web sites and mobile ready websites.

Source: http://www.pcmag.com/article2/

A Glossary of a hacker’s dictionary

++++Term++++ +++++++++++++++++Definition
Advanced persistent threat (APT): A strategic cyber attack that infiltrates a system and persists over a prolonged period of time, potentially undetected. APTs may be carried out by a nation state or criminal organization to steal sensitive data or compromise a target system.
Botnet: A large network of virus-infected computers that can be used to generate spam, spread viruses, perpetrate click fraud or conduct attacks on other systems.
Bug bounty program: A program where software companies offer cash rewards to hackers to find and report exploitable vulnerabilities before they can be used by cyber criminals. Facebook, Google, Mozilla Firefox and Microsoft have been known to offer thousands of dollars in return for bugs.
Distributed denial of service (DDoS) attack: An attack designed to disrupt a computer system or website service by bombarding the site with so much web traffic that it crashes. Botnets are often used to carry out DDoS assaults.
Ransomware: Malicious software designed to block access to a system or account until a sum of money is paid.
Social engineering: Non-computer methods of manipulation to obtain sensitive personal information, such as birth dates, or social security numbers. Personal knowledge often used to bypass passwords.
Special phishing: An email masquerading as being from a trusted source or person you know sent with the goal of obtaining sensitive information, often by downloading data-sniffing and computer-controlling malicious software.
Zero-day exploit: A previously undetected software vulnerability that is used to hack into affected system before developers or manufacturers can address or fix the problem.

This post was posted by Daizy for DMG Weblabs, Toronto. DMG Weblabs is a Toronto based web design company specialized in creating SEO web sites and mobile ready websites.

Source: The Globe and Mail

Twelve big hacks

Some of the largest hacks in history, by records exposed :

# Name Hacks +++++++++++++++++Expose
1 NYC Taxi & Limousine 173 million Hack exploits poorly anonymized trip details and personal information of drivers
2 Adobe Systems 152 million Hack of company systems exposes informations related to customer orders
3 Shanghai Roadway 150 million Firm may have illegally bought and sold customers’ information
4 eBay 145 million Hack exposes names, encrypted password and personal information
5 Unknown South Korean Firms 140 million North Korean hackers expose e-mail addresses and identification numbers
6 Heartland 130 million Hack/malicious software exposes credit cards at processor
7 Target 110 million Hack exposes customer information by targeting point-of-sale systems
8 Korea Credit Bureau 104 million Insider fraud exposes 104 million credit cards
9 TJX 94 million Hack exposes credit cards and transaction details
10 TRW 90 million Hack exposes credit-reporting database
11 JPMorgan 83 million Hack exposes names, addresses, phone numbers and e-mails of the holders of household and small business accounts
12 Home Depot 56 million Hackers use malware to steal debit and credit card data from point-of-sale systems

This post was posted by Daizy for DMG Weblabs, Toronto. DMG Weblabs is a Toronto based web design company specialized in creating SEO web sites and mobile ready websites.

Source: The Globe and Mail

Facebook creates ‘Safety Check’ tool for disasters

A tool that push users notify friends and family that they are safe during or after natural disasters like Tsunami & Earthquake, is launched by Facebook.Webdesign CompanyToronto_DMGWeblabs

The tool, called ‘Safety Check’, which includes the basic “feature”  phones many people still use to access Facebook, will be available worldwide to the social network’s users on computers and mobile devices, especially in developing countries.

Though the people already use Facebook to tell people they are “OK” after earthquakes and other disasters, the Facebook’s Safety Check tool will make it easier. This tool was created in 2011 by Facebook engineers following the Earthquake and Tsunami in Japan as a disaster message board.

Once users activate the tool, it will determine their location using the city they have listed in their profile, the last location they’ve shared or the city where they are using the internet. If they are in an area affected by a natural disaster, Safety Check will send them a notification asking if they’re safe.

If they say yes, their Facebook friends will be notified. There’s no option to say no. Users can also mark their friends as safe, but the friends have to approve it.

This post was posted by Daizy for DMG Weblabs, Toronto. DMG Weblabs is a Toronto based web design company specialized in creating SEO web sites and mobile ready websites.

Source: “http://timesofindia.indiatimes.com/articleshow/44834579.cms?intenttarget=no”

Ex-Googlers launch an app to make people talk

An app called Cord, developed by two former Google employees, Thomas Gayno and Jeff Baxter, is hoping to let people quickly record and send their brief voice messages lasting no more than 12 seconds to one or several people at the same time with just a single tap.

“Over the past decade, people are speaking to each other less and less,” Gayno told AFP.

“Increasingly they communicate by text — either by SMS, email or instant messaging. We want to tackle that and web design Toronotoget people speaking to each other again.”

To transmit the voice with Cord, users will simply tap on the face of a visible contact placed in a circle, pressing once to listen to a message or to respond without the requirement of any number or text.

This voice enabled app will certainly play a key role in controlling new devices, from smartphones to wearables and other connected objects, as said by Thomas Husson, an analyst with Forrester Research. “However, I doubt that a service based on the promise of voice-services alone can scale – it will have to embedded among other features in an open way to control new devices.”

The two Google Veterans are hoping that this innovative new app will trigger a renaissance in an increasingly unfashionable method of human communication: talking.

This post was posted by Daizy for DMG Weblabs, Toronto. DMG Weblabs is Toronto based web design company specialized in creating SEO web sites and mobile ready websites.

Source: “http://timesofindia.indiatimes.com/tech/tech-news/Ex-Googlers-launch-an-app-to-make-people-talk/articleshow/44500960.cms”

Bash Bug – A New Virus

A new programming flaw known as “Bash Bug” is reported to give a serious threat to the IT world effecting millions of computers and other devices such as home internet routers and even the systems that are used to run factory floors and power plants.

The Bash Bug also known as “Shellshock”, affects a system software called Bash, which is found on a variety of web design TorontoUnix-based systems, potentially allows hackers to take control of a victim’s computer and run almost any operation, from opening, altering and deleting files to shutting down networks and launching attacks on websites.

Bash is found on Unix-based devices that are running the Linux and Mac OS X operating systems. Devices that use Unix in some form include many servers, routers, Android phones, Mac computers, medical devices and even the computers that create bitcoins. Systems running power plants and municipal water systems could also be affected by the bug, though security experts already recommend that these systems remain disconnected from the internet to avoid opening them to such risks.
Bash is a command shell which “tells the computer to do of what you want do”. Thus, the bug in Bash allows the hackers to take control over a victim’s device.

Thus, Bash is believed to be worse than “Heartbleed, which expose passwords and other sensitive data to hackers”.

As we wait for the development of a fix to this bug, it will be always helpful to run up-to-date security software on your devices.

This post was posted by Daizy for DMG Weblabs, Toronto. DMG Weblabs is Toronto based web design company specialized in creating SEO web sites and mobile ready websites.

Source: “http://timesofindia.indiatimes.com/tech/computing/What-is-Bash-Bug-and-should-you-be-worried/articleshow/43501380.cms”, http://www.cbc.ca/news/technology/bash-bug-aka-shellshock-has-no-easy-fix-1.2779383

 

Google to separate photo service from Google+

Google is planning to separate Google+ Photos from the rest of its social network in an effort to draw more users toward the photo platform, sources recently told Bloomberg.

The goal would be to make the photo service more independent, so that the service can still be used without a Google+ profile.Toronto_Webdesign
According to the Bloomberg report, Google seems to give its photos service a more independent role and will allow non-Google+ users to use the photo services. The service, called Google+ photos, would still work with the social network’s users and may be rebranded as partof the move.

The report quotes, The world’s larget search engine grappling with competition from Facebook, Twitter and Yahoo! Inc., is freeing up services from Google+ after spending the past few years encouraging visitors to sign up for the social network. Recently, Google enabled the social network’s Hangouts videoconferencing feature to work for some business customers who aren’t users of Google+.

Google said in an e-mailed statement to Bloomberg, “Over here in our darkroom, we’re always developing new ways for people to snap, share and say cheese.”

Source: “http://timesofindia.indiatimes.com/tech/tech%20news/Google-to-remove-Photos-from-Google-report/articleshow/39469114.cms”,
 http://www.bloomberg.com/news/2014-08-01/google-said-to-plan-separating-photo-service-from-google-.html

This post was posted by Daizy for DMG Weblabs, Toronto. DMG Weblabs is specialized in creating SEO web sites and mobile ready website.