Home > Blogs > Information Technology

Blog Posts about Information Technology

RSS Feed Subscribe  RSS details

15 Critical SEO Terms

Brad Yale

When you are new to any field, part of playing catch-up is learning the lexicon. Like any other field, SEO -Search Engine Optimization - is full of terminology which might seem like another language yet will prove critical to your ability to carry out everyday tasks of the professional SEO. 

With this said, here is a list of 15 Critical SEO Terms which you need to know. 

Continue reading...

Android Application Battle: Advanced App Killer vs. Task Manager

Brad Yale

I suspect every Android users has, at least once, downloaded the Advanced App Killer. I suspect in an effort to free up RAM and to have more free operational memory allowing the device to run smoother, the idea of the Advanced App Killer appeals to many users. With over 50 million downloads, the Advanced App Killer ranks among the most downloaded applications currently available in the Google Play Store.

Popularity aside, a question needs to be asked: does the Advanced App Killer actually work? When compared to the internal task manager installed in every Android device, is the Advanced App Killer a more efficient avenue to free up memory and RAM?

Is the Advanced App Killer when compared to every Android Task Manager, worth downloading?

Continue reading...

Why Open Source Matters: Musings from All Things Open 2014

Brad Yale

A few months back I wrote a post titled "Why Open Source Matters: Musings from OSCON 2014". The post covered five reasons why Open Source matters. Those reasons were/are:


  1. Code, Glitches and Open Source Security
  2. Open Source Software
  3. GitHub
  4. The Stringent Control of Proprietary Software
  5. The Endless Ability to Test, Play and Alter

While those reasons still ring true, I want to use this space to center in on another topic speaking to why Open Source and OSS matters more than ever: project management and time constraints.

Continue reading...

How the Internet Works: The Deep Web

Brad Yale

The Deep Web. The Deepnet. The Invisible Web. The Hidden Web. 

Maybe you have heard of the Deep Web. Maybe you even know how to access the Deep Web. 

Chances are though, you've never heard of the Deep Web and you have no idea how to access it. The Deep Web sounds mysterious, elusive and somewhat dangerous. By all accounts, it is all these things. 

So, what is the deep web? How does the deep web work? How do you access it?

In this installment of "How the Internet Works", we tackle the mysterious Deepnet.   

Continue reading...

How the Internet Works: A Call for Personal Security

Brad Yale

It's very easy, after reading "The Snappening" Snapchat security breach news, to determine fault lies with users. It would be very easy and convenient to blame the leak not on the leakers, but on the users who sent sexually explicit materials to friends, lovers and strangers. This conclusion is easy to draw yet, it only skims the surface of the true issue at hand.  

Whatever you think of the materials leaked, the larger issue at play in "The Snappening" is how the public relates to, understands and uses public Internet architectures. If anything, "The Snappening" should serve as a beacon call for greater Internet security practice enlightenment. 

In this version of "How the Internet Works" we cover public Cloud architectures and the need for increased Internet security practices learning.  

Continue reading...

Mobile Malware and Fake Apps: Hong Kong, China and The New York Times

Brad Yale

For the past week or so, Hong Kong has erupted with peaceful demonstrations advocating for the ousting of the Chinese premiere and the right to peacefully and openly elect his replacement. While the Chinese premiere, Xi Jinping, looks to be going nowhere one thing has become clear - the mobile devices and Internet connections which helped to grow the nightly demonstrations are quietly suffering an inward meta problem - malware, viruses and fake applications.

As mobile platforms become more prominent and are used more robustly to organize, carry out financial transactions and conduct daily personal business, the time has come to address mobile malware and fake applications.

Continue reading...

The 10 Most Important Linux Commands

Brad Yale

I get it. 

You're new to the Linux Command Line and truth be told, you might be a little intimidated. Coming from the comfort of a PC or Mac desktop, the Linux Command Line (CLI) looks nothing like what you normally use. The Linux CLI is dark, it's secretive, it's bare bones minimal and it's anything but friendly to newcomers. And yet, the Linux CLI is highly useful, essential to using your Linux box or virtual machine and can, if done right, provide you with more insight and practical use than the Windows or Mac desktop ever could.

For those reasons, from someone who was also once a Linux newb, I present the top ten Linux CLI commands you need to master for basic Linux CLI comprehension.

This list will not make your a Linux System Admin however it will get you on your way with your foot in the ocean.

Continue reading...

1830 wasn't so long ago

John  Traenkenschuh

My family and I had a meal in Pigeon Forge, in an old mill building that's quite old, in an area settled in 1830.  Walking in with a MacBook Pro certainly seemed odd to some, but no one noticed my phone offering tethering rights.  And so it was that I posted a blog in a building that dated back 160 or more years ago.

Continue reading...

Google On Air Live Hangout with the Father of C++ Bjarne Stroustrup

Brad Yale

On August 20th, the father of C++, Bjarne Stroustrup led a Google On-Air Live Hangout event in which he talked about everything C++. The event was sponsored by InformIT, Pearson Education and the Google + C Plus Plus Community. 

Continue reading...

The CAPTCHA: A History, A Problem, Possible Solutions

Brad Yale

Everyone, every online user, at some point in time (most probably during a purchase) has outwardly professed "COME ON!" when trying and failing to enter a CAPTCHA. 

There is an old Ellen Degeneres joke which dryly states whoever is in charge of CD packaging must be sarcastically mean. Personally, this is how I feel about the inventor and users of the CAPTCHA.

Where did the CAPTCHA go wrong? How did it start with the best intentions of hackers and grow into a security solution almost guaranteed to cause cart abandonment? Why does the CAPTCHA make me/us so mad? Why hasn't something else come along to replace the CAPTCHA yet? 

In this post, we explore the history of the CAPTCHA, noted issues with the bot/spam tech and possible alternatives. 

Continue reading...

InformIT Labor Day Programming Event

Brad Yale

Welcome to the InformIT Labor Day Event.

From August 28th - September 3rd,  the following deals apply to all ebooks, books, video learning lessons, interactive learning lessons, software and practice tests:

- Purchase three or more titles. Save 55%. 

- Purchase two titles. Save 45%. 

- Purchase one title. Save 35%.

**Free Shipping to all locations in the United States*

*30 Day Trial to Safari Books Online**

Coupon code (Case Sensitive):  LABORDAY

Continue reading...

Full Programming Life Cycle Learning with Pearson Learning Labs

Brad Yale

Here's the thing: I work for Pearson Education and InformIT. As such, I already know anything I say, do or mention that promotes Pearson Education and InformIT products will be looked at as a nod to staying employed. I get that. I do.

But in all honesty, what I am about to endorse is not a product of wanting to stay employed or a product of a forced corporate hand. No. What I am about to endorse is a product which I have used, compared to similar services and have come away impressed.

Code Academy is one avenue. The Flat Iron School is another. All in though, Pearson Education Learning Labs trumps them both in terms of overall programming learning lessons.

Here's why.

Continue reading...

Page 1 2 3 4 5 Next >