10/09/2015

Tips to vetting and varifying fake Social Media Posts

Social Media can be a great and wonderful way to get information out to Friends and Family quickly, unfortunately it also is a place with plenty of false and misleading messages. Messages that have been posted with the intent of getting a message across, that is if they are posted with good intent. 

The problem with a lot of these messages is that many are shared with inaccurate information, and some are even flat out lies being released into the wild in order tug on heart strings, and in the process evoke a response based off of either fear or a sense of social responsibility  that leads to them being shared.

Today I thought it might be helpful to write up a post with some tips on ways one can validate posts before sharing.

1. CHECK THE SOURCE

Every post out there has a source and be it that story on the negative aspects of a product, or that click bate style headline that reads something along the lines of 

“this mother poured milk into a sock, why she did it will amaze you” 

One thing will be in common, it will have a source. 

So, how does one check the source? Well the odds are if the post is on one of your Social Media sites, they have a page or profile that you can track back to.  Heading back to the origin page will allow you to get some insight into who is posting and as such will allow you to ask questions like

“Why does this page want to post this?”
“Is the history of their posts consistent?”
“What do they benefit from the topic of the post?”

2. SEARCH THE TITLE
Every modern Web Browser has the ability to use the mouse, trackpad or finger in order to highlight text. Use this feature to your advantage and run the title or topic of a post through Google or Bing.  Searching titles or topics will let you find any news articles or blog posts that support or debunk the topic.  Failing to have an actual topic can bring us to  the next point

3. SNOPES, HOAX-SLAYER AND THAT’S NONSENSE

If one can’t find a specific title for a post, the next best thing is to scan a post for any of the following
1. A date
2. A company
3. A City
4. A Celebrity 

basically any person place or thing which you can then place in the search window at Snopes.com hoax-slayer.com or thatsnonsense.com, all sites which do a wonderful job of curating details on social media hoaxes

and 

4. REVERSE SEARCH THE PHOTO
If you happen to be using Google’s Chrome browser this is as easy as right clicking on a image and selecting search Google for this image. However if you are looking for an even deeper search, as in the case of those Bill Gates “Share and get Money” images, you can either install a plug in called Tin Eye or go to Tineye.com and point it’s search to the address of the image.


Using Tin Eye’s search will not only tell you where else the photo is, but allow you to sort results by biggest change, oldest posting and other features.

Of course, the most important thing when you come across a story that has been proven as fake is to let others know. Never hesitate to share a short note with links that support it being such.

While some may get mad at you because they feel stupid for it being pointed out that they shared a fake story, the majority of users in My experience, is that most are glad you did.

10/07/2015

iOS Data Saving should not stop with turning off Wi-Fi Assist

With the release of iOS 9 many articles have been written about turning off Wi-fi Assist, and they all are relative when it comes to helping save you’re Cellular Data usage. 

For a quick refresher on this part of thing, the instructions on turning off Wi-fi Assist is as simple as 

settings > Cellular > Wi-Fi Assist and make sure the toggle is not green, as seen in this image



















However, while you, the user, are in the Cellular menu, this might be a good time to also do a full audit of just what does use Cellular Data on an app by app basis

As you can see in this image below, A number of your Apps all have the available option to use your data or turn it off so that it only connects when on Wi-Fi, with each App having it’s own toggle switch. 


















This allows one to see not only which apps are using Data, but if you have an app that you know you do not use when out of the house or office you can turn off Data while keeping the option to reactivate Data when needed. A good example of this from the image being the Chromecast app.

As the Chromecast App is used to control one’s Chromecast device on their home Wi-Fi network, it really serves no purpose having Cellular Data information turned on.


So, go ahead, take a moment to audit your Data permissions on your iOS device and I think you will find some savings to your Data usage.

8/05/2015

My First 24 Hours with Windows 10, And They Didn't Suck

Being a Web Designer comes with a rather unique side effect. We have to be comfortable working with all types of environments and platforms, and while We each have our personal preferences (in My case Apple) one common thing is Our Designs have to look right on any platform a user might consider using.

This, of course, brings us to the New Kid on the Block, Windows 10. Windows 10, right from announcement has felt like it almost had a mentality of "One Platform to Rule them all" to it, and honestly in that aspect it lived up to the hype.

For This Designer, the first experience with Windows 10 came via the free upgrade offered on My HP Stream 7 Tablet. The install process was a breeze, clocking in at a little over 2GB and completing install in less than one hour's time frame.

Once inside the environment, changes were easy to notice and very welcome as tap targets seemed to respond better, and the returning Start Menu delivered on its promise of a Windows 7 like experience, at least in "Desktop Mode". In Tablet Mode things skew more to an android like feel to the interface, with your Start Menu automatically displaying as you close an app and your task bar having shortcuts for a virtual back button, search and multiple desktops.

A stylus may still be a wise investment for those who have a device with a 7 Inch screen size.

Bloatware was present, with the most annoying aspect being the bundled install of Candy Crush Saga. There were also links, via "Live Tiles" encouraging the download of specific Microsoft Apps including Office 365 This however was quickly addressed, along with privacy settings in the control panel.

For those who are wondering about the reports of having to pay for Solitaire, lets address that. the App itself is Free in the Windows Store, however there are small ads bundled into the menus, but when actually playing a game none are to be seen. Your scores with Solitaire, much like Microsoft Mahjong, Minesweeper and Puzzles, can be linked to your Xbox Gaming ID for achievements and cloud backup of your games. 

Cortana, Microsoft's new virtual assistant named for the AI Character in Halo,  was unable to be tested as it appears it has not been rolled out to all markets. This was to be expected as Cortana is on a slow deployment in select markets to start.

Of course, with tweaking and set up done, as a Designer My next step was to jump into playing around with Microsoft's new Browser "Edge" (formerly codenamed Spartan). Websites I had designed, including inertialzendesigns.com displayed flawlessly and even reformatted as coded to account for the changes from portrait to landscape viewing. 

The ability to share a Website to email from directly within the browser could potentially be a benefit for users, depending on options of what email services can be set up and a full service, split screened code inspector that can be deployed in one menu click is very welcome for those moments of troubleshooting Web Code.

Overall first impressions of Windows 10 is pretty good. I would advise using the custom settings instead of express settings while installing if privacy is a concern, could have used a bit less bloatware (hopefully a Microsoft Signature Series version will be made available through the Microsoft stores) and battery life has taken a welcome improvement vs that of Windows 8.1.


So, as I said in the title Windows 10, at least on first impression, does not suck.  If your Windows Device qualifies for the Free Upgrade, I would recommend that you take the time and install it.

7/07/2015

Reasons why going local is usually for the best

Monday morning I recieved a email from a firm out of India who was making the claim that they could design My business a Website for a cost of $12 an hour.  Part of their claim was that they could 

Create Websites from Photoshop Documents using HTML and CSS
produce Wordpress Pages in a turn around of 5-10 Days 
produce a Magneto Site in 3-4 Days
Quality bug free sites

Well, My response to this email was to thank them for the offer, however I too am a Designer and code from the ground up using W3C Standard compliant, Responsive Design code. This actually lead to them offering up the propopsal of them doing Search Engine Optimization for My project.

Again, I thanked them for the offer, but declined. These two messages got Me to thinking about reasons as to why having a local Designer can actially be a beneft for a Company's Website Design Project.

Firstly, There is time zone issues. For a North American company, having a Design firm in india means that you are looking at w time difference of anywhere from 8 to 12 hours.  This means that if you want to conference with your Designer, you better bank on being awake at the wee hours of the morning.

Next, Firms like the one which contacted Me, advertise on the benefit that they are cheaper and you wont be paying taxes. Factoring in the time zones and the use of templates, sure your site IS cheaper but ask yourself the following

-Is the inconvience of time zones worth is?
-Do you have an expense that you can declare as a business expense?
-Have you taken into account the fact that the 5% GST in Canada paid on the project can be deducted from the GST your company pays?

Next, lets look at the options of having a Photoshop document turned into a Website.  This is actually something known as "Slicing", which is a technique that has boxes drawn around elements of the image and with the tap of a Menu command generates HTML code.

This technique is actually taught in Web Design course, but highly discouraged due to the fact that the code Photoshop generates is not W3C valid. This will be be explained a bit later in this posting as We look at SEO reasons.

A Photoshop generated Website also means that your site is image heavy and loads slower.

Next. lets look at the use of "Template Design". Your business is unique, you have your own logos, colors and business personality that you want to showcase to your potential clients. A template design tends to result in your Company's website looking exactaly like any of the number of competitors' Websites which you are attempting to stand out above.

And now lets get to Search Engine Optimization, or SEO. SEO is considered this magical art that when applied to a Website gets it onto Page one of Google Results.  The facts when it comes to SEO is that there is a lot of factors Google weighs in the ranking of your Site. Over 200 Factors actually with some of the most important ones being

-Standard Compliant Code (This is where the Photoshop Generated Code factors in the first time)
- Textual content of the site (Google's spiders can not index text inside a image file, your Photoshop code just struck again here)
- Having Social Media Presence (Facebook , Goggle Plus, Youtube, Linked in all score you credibility)
- Mobile Ready Design
- HTTPS certified 
- Quality, Organic backlinks (You can lose ranking by buying links)
- Age of your Website Domain (A one year old site with a short term owner registry wont rank anywhere near as high as a 10 year old site with registry for the next 10 years of ownership)

Overall, in the Financial aspect of Website creation, yes there are services who can offer you up cheap design fees and quick turn around, but ask yourself if in the long run what do you end up losing out on with yournsite by going cheap?


6/08/2015

WWDC 2015 Highlights


OS X -named El Capitan
  • new split screen and full screen tools
  • Brings the Metal API from iOS to desktops
  • Unreal Game Engine available for Mac

Launched today For Developers, Available: Fall for public

iOS 9

  • Better battery, performance and security
  • new Seri interface with proactive content in Music ,Email and Search

  • Privacy for the user is on device level, not linked to 3rd parties

ApplePay
  • -expands to include Discover Card
  • -Square mobile payment will include apple pay
  • -expanding to the UK
  • -Store credit/debit card and loyalty card support
  • -passbook renamed wallet

Apps
  • Photos, drawings and links added to notes app
  • Maps adding  public transit app using internal mapping to give exact travel times
  • Find locations from search
  • New app called  News, personalized News Reader



Multitasking
  • Quicktype keyboard includes shortcuts and a trackpad feature
  •  full screen previews of open tasks
  • split view multi app and touch support, with resizable app windows
  • keeps playing video as a picture in picture format 
  • supports iPad mini 2 and up
  • low power mode extends battery life by 3 hours when activated
  • access your smart home via iCloud
  • wireless support for Carplay

Available : Fall will work on all devices that support iOS 8-1.3 gb update size

swift programming language is now open source including Linux


Watch OS
  • Use photos as your watch face
  • Native watch apps
  • use digital crown to "time travel"
  • nightstand mode
  • additional Apple Pay support
  • Transit info to the watch
  • Apps wont need to depend on phone for processing
  • Audio/video playback , Facetime audio, healthkit , homekit on Watch Face

Available to public this fall

One More Thing...Apple Music Streaming Service
  • Beats 1 World Radio Station 24/7 Live
  • Connect: Direct Artist  Connection linking Facebook, Twitter 
  • First 3 Months Free, $9.99 Monthly for single user Account, $14.99 for Family Account (up to 6 users)
Available: End of June

Think your password is the only thing at risk in Social Media

Most people might not even consider this, but in the Modern Social Media era We all live in the biggest concern when it comes to your account is not exactly the risk to your password but rather your over all Personal Identity.

the threat that people need to be concerned about is actually "Profile Spoofing" (BBB.org article). The Spoofing of ones Social Media account is becoming more of an issue due to just how much We as users actually have attached to those Facebook and Google Plus accounts.

The "Bad Actors" of the internet enabled world tend to have a number of insidious reasons why they want at our user accounts. From access to linked accounts elsewhere, the hopes that we have banking and credit cards attached or even to use the information to go after others, the end user has to be on guard.

in fact, in this last week I personally saw an attempt at the spoofing of a Family Member's Facebook account, when the "People you may know" suggestion service suggested a profile for this family member, whom I already have on My friends list.

Naturally suspicious, since the suggested profile had matching information for the user's name, birthday, current city and 2 mutual friends yet was missing a photo or any links to their spouse or kids profiles, I contacted the person on the existing profile and upon confirming they had not created it alerted the two mutual friends about the account and reported it to Facebook, whom it appears took it offline rather quickly.

Later over the weekend, a friend of Mine had posted up a list of "fill out and share" questions as a status message. Questions that included 


  • Their full name
  • date of birth
  • nickname
  • type of cell phone and charge remaining
  • who they last texted and
  • name of their pet growing up

Upon seeing this post I commented that due to privacy concerns I would not be sharing this status, as it prompted others to do, to which they expressed that most of it was pretty much common knowledge and that their password was safe.

The post, however quickly got deleted by My friend when I pointed out that with the info available anyone could create a email address, I used an example of combining the nickname with the battery percentage, at a service like Google Mail, then spoof the friend's Facebook profile and eventually have the potential to gain access to the user's original profile.

The moral of all this people, be careful with your information online. Try to avoid those cute "Answer these questions" status messages and use a service like Tineye.com to occasionally reverse your images to make sure others are not trying to pass your likeness off as their online representation. it is the most valuable asset you own.  

5/01/2015

The Difference between a Web Designer and a Hacker


Being  a Professional Web Designer can at times be a very trying time when it comes to interacting with friends, family and the general public.

So much has shifted from traditional ways of being accomplished to being handled online that the general view has been unable to catch up. So, what really is the differentials between what a Web Designer does and what qualifies a person as a "Hacker" anyway?

First, lets take a look at the Web Designer. A question I get asked often is "What does a Web Designer actually do?"

 My solution to explaining this actually hit me a couple years ago when My parents relayed me the detail that they were having a tough time explaining to My elderly Grandmother what I do.

Lucky for me, since My Grandmother had, years earlier, helped in the publication of a book that chronicled the local history of My home town. I told My parents to describe it as being like a layout editor on a book, only instead of physical photos, paper and using scotch tape, my workspace is a computer screen and the published work is read like reading something on a TV.

Now, lets be honest, that is a pretty basic description as Web Designers work with many programs, platforms and coding languages. Those coding languages is really the common ground between a Web Designer and a Hacker however.

Hackers come in three classifications. White Hat, Grey Hat and Black Hat Hackers, and yes the descriptions are very much like the wild west with the White Hats working to expose problems in coding platforms and the Black Hats exploiting those code issues for their own gain.

Many of them have knowledge of the same programming languages that us Web Designers do, as well as many languages, software and hardware tools that the average Digital Publisher, and lets be honest, really that is what a Web Designer is, would use in day to day activities.

Web Designers, are a unique breed, We spend our days positioning images, creating interactive elements and positioning images in order to get our customer's messages out to their intended target audiences.  As such, We come equipped with knowledge of multiple platforms. We write code that allows content to resize to what ever size screen the end user is accessing information on.

as for the interaction with our code and Hackers, there are limits as to just what the public facing Web Designer can account for. Most of the exploits that place user information in danger of being exposed occur at the platform level, usually due to a hole in a Flash, Javascript or other platform- including the programming code of the browser or even the Operating System.

Hackers, be they White Hats, Black Hats or the line balancing Grey Hats, serve a valuable purpose. They cause evolution of programming platforms and languages, leading to the patching of holes in code or, in some cases, the retirement of a platform all together.

More information on the Hacking Lifestyle, ways to keep yourself safe and other questions can always be researched online. Two suggestions I would Make is to look up the websites of Steve Gibson's GRC research and Darren Kitchen's hak5.org


Dave for Inertial Zen Designs  

4/29/2015

Legacy and building your Social Media Online Brand

Recently, a friend of mine went through a career change, one that seen her go from holding a representation as a regional Crown Holder to breaking into the world of Film Acting.  In the process of this transition, She deactivated her Group and Fan Pages that had been created as part of her Pageant Run.

The deactivation of these pages are perfectly ok for a user to do, but they also create a very interesting detail that may not have been taken into account at the time of their deactivation.

In the Technology world, there is a well known concept, known as Legacy Interaction. Legacy Interaction can allow for Designers to bring forward aspects of a program or application that has been beneficial in the success of a Company's existing success.

This same concept can actually be applied to one's Social Media presentation. be it Company who is being bought out by another company, or, as in the case of My friend making the transitioning from Beauty Pageant Contestant to Actress one thing that should be an important aspect to focus on is that you have created a presence online, and that presence has generated a collection of fans and supporters of said online presence.

When transitioning from one element of your online Social Media Presence to another, one of the strongest elements working in your favour is the supporters you have built with your existing brand, how you transition from one part of your social Media Presence to the new venture can either make or break the new venture.

People have invested in your online presence, they believe in it and have come to support it. They want to grow with you, continue to support you and become brand ambassadors who can give the public confidence in what you are selling.

That product can be anything from the newest Widget, a clothing line, Software App, or in the caee of My friend a successful career on the silver screen. What one needs to remember is that this can't happen if your audience is given the chance to follow your evolution and are invited to follow along before changes are made to the Social Media Platforms.

This means that to make a successful transition one really should do the following

1. Select a specific Date of when your existing Social Media Profiles will go dark

2. Set up your new Social Media Profiles-pages, groups, twitter etc.

3. Make the public aware of the new Profiles and invite them to follow you over to the new Profiles

4. Be thankful and make your supporters feel that you are grateful for their support, Let them come along with your established brand as you build it into a much stronger brand

5. Reap the reward of being able to walk into your new endeavour with a established audience that you can offer the support of to new contacts.

Using this five simple steps will allow your Social Media Presence, providing that  nothing already has happened to damage your brand, to leverage the legacy you have established as a foundation which will allow for a successful building of a very successful brand.

4/19/2015

When Malware on Windows can cause a headache on OS X (and even possibly your tablets)

The idea of Cross Platform is a beautiful one. The idea of starting a movie on Netflix on one device and picking up on another, or being able to research something at the office, fire up your browser at home and continue to look at the same site through a feature that sync’s your browser over any device sounds great and can be very handy.

But, as with many other things in the modern cloud based connected world we live in, there is a underlying dark side to the force that every so often rises up and causes problems.

That very dark side hit me over the weekend when I launched up Google Chrome on my Windows based tablet, only to find that one of those nasty little silent drive by installs has performed a browser highjack.  

My search engine was changed from Google to some ad spewing site as well as my home pages being changed from a combo of Facebook, Google Plus and inertialzendesigns.com tabs to the website for this hijacking piece of malware.

Not a problem I figured, I’ll just log into the Mac and search up how to clean this little annoyance up, a practice I’ve been used to doing over the years as even with Anti-Virus and Firewall softwares, sometimes these little annoyances get through. But then it hit Me

My Mac got hit with the SAME CHANGES TO THE HOMEPAGE AND SEARCH ENGINE SETTINGS!!!

You see, Google’s Sync settings worked too well, without realizing it the checkboxes were set to sync the options for search engine and home page on all devices  along with allowing cross platform sync’ed tabs and history were checked. As such, the result were what they were.

So, just how do you, My fellow users of the Internet, make sure the same thing does not happen to you?

With these steps is how:
1. Open Google Chrome and type in chrome://settings into the search bar

2. click on Advanced sync settings





3. Change just what you want to allow Chrome to Sync, in the case of making sure that Malware remains isolated to only the infected device, the areas where is it wise to uncheck are your settings and extensions, consider your History as well if you are extra cautious.














Finally click ok and resume your activities knowing you are a little bit safer.


4/06/2015

Building a Website, or putting the puzzle together.



Since I first started getting introduced to Web Design, back in the mid 90's , I have heard many say the following

"Web Design isn't THAT hard to do..."

and they usually follow it up with something like

"All you do is drag that image here, place that youtube video there, write up some text and publish it"

If only the truth of Web Design was REALLY  that simple. What a Designer does is actually more like trying to build a fairly advanced puzzle from the ground up.  To help with understanding this lets just break down a few things about the anatomy of a Web Designer, shall we.

First, unlike many programers, Web Designer's do not have the ability to pick only one language to work with. Sure there are programming languages people know about, but here is a short list of the areas a modern Web Designer should have a working knowledge of

  • HTML -Hyper-Text Markup Language
  • CSS - Cascading Style Sheets
  • Java
  • Javascript
  • PHP
  • Python
  • Ruby
  • Sql
  • Flash (although this is going the way of the dodo bird thankfully) 


Each of these languages carry their own formats on how they are written, and in the caee of some like CSS and Javascript the Designer can actually end up writing one language inside the carrier of another. Usually this is done as inline entries in the HTML document.

The next part of the puzzle that a Designer has to figure out is just how will the final Design be viewed. Sure there are standards in how the above languages are written, but deployment is not always handled the same way depending on options the end user picks from those listed below


platform: Windows, OS X, Linux, Android, iOS, Xbox 360/Xbox One, PS 3/PS 4, or Chrome OS

browser: Internet Explorer, Safari (Mobile or Desktop), Firefox, Opera, Chrome (mobile or Desktop)

connection speed: Dial Up, Mobile  or Broadband

screen size: Ranging usually from a 4" Smartphone Screen up to 80" Television screens thanks to System on a Stick computers that plug into TV's HDMI Port, like the Chromebit  and the Intel Windows 8.1 Stick

With sub categories for some of these, Windows 98 vs Windows 7 for example, the list goes on.  

Then there is the Multimedia aspects, Photos may need to be processed in Photoshop at different resolutions in order to deliver crisp looking images that load on a page in 5 seconds of landing so that a quick, accessible and eye pleasing experience occurs.

We Designers also have to stay up to date with what formats platforms are supporting, a long standing example of this being the fact that Google and Apple have different views on the now retired mobile version of Adobe Flash. Apple has always stuck to supporting HTML based implementation of graphics, electing to promote using things like GIF  files or embedded movie files in place with a linked embed code. 

On the other hand, Google elected to develop their own version of Flash, called "Pepperflash", to handle what Adobe's format used to.


Web Design does not stop with all the above back end coding though. With all this to take into account the Designer then has to reformat a Client's content, in the process coming up with an efficient layout which delivers said content in a manor which is both meeting the client's vision while delivering a usable and engaging website for the end user. 

Of course, we are not forgetting the detail of "Search Engine Optimization".  SEO, as has been discussed in other blog entries, is the practice of finding the correct search terms so that a Website ranks as highly as possible, coupled with factors like Domain Age and Link Back scores (the number of websites Google considers relevant that host links to your website).

Websites, in many countries, are expected to meet accessibility standards so that users with accessibility issues, like those who are visually impaired, can use the Website. All of the above also is expected to meet W3C Standards and be wrapped into a format that is visually pleasing to the end user regardless of the device used.

So, to bring us back to the original statement of "Web Design isn't that hard to do..." Permit me to say that by the elements, this is indeed true, and through the use of products that allow Drag and Drop design, or "What you see is what you get" results this statement is indeed correct. However when looking at using the WYSIWYG method the results are in line with expecting the quality of a high end  sports car at the cost of a entry level import.

3/18/2015

Down the Great SEO Rabbit Hole

Search Engine Optimization

The very term has become a buzzword in Website Design as every Expert says one of the following collection of phrases

  • Your Website needs it
  • Your Website doesn't need it
  • Some aspects rank higher than others when applying SEO
  • Doing SEO is a waste of time as it's useless


and the list of opinions go on as Web Designers pound our heads against the keyboards of our Design Rigs looking for that magical answer of just how to land up on page 1 of Google's results.

This exercise is one I've first hand been going through with the inertialzendesigns.com website. Hours upon hours being spent making minute adjustments in the code that powers the back end of the Site. Adjustments like 

  • Making sure every image file was properly Tagged
  • Using Keywords in the Site's Meta Tags description data
  • Optimizing images, code and copy for speed while balancing image quality
  • ensuring that the Website is Mobile Friendly and coded with Responsive Design
  • Staying to W3C coding standards where ever possible within the limits of any code being entered for plugins.  


Everything above is in fact elements of good responsible design, and yet still the Website does not return a perfect score when tested for SEO. 

So, what is a Web Designer to do in a situation like this, you might ask. The answer is you do what any good company does, research your competition and see what is working for them.

The elements for this research were quite simple, and as follows

Search Google for a list of Web Designers in My local Community

Armed with this knowledge pull up the following two Websites
      seositecheckup.com to check the score for each site
      smallseotools.com to check backlinks and Site Age

Using these tools and a spreadsheet program chart the results.

With My Company's Website, and the competition list in hand, the results of this exercise becomes very telling, as you can see by the image of the spreadsheet below (Results that if you have the desire to replicate, you can using the sites listed above)



The competition for the purpose of this research is listed in order of Google's returned listing, below the listing for inertialzendesigns.com . Besides each site is their score on SEO site checkup based on the 45 Metric Test each site faced. Also listed is the age of the Website and where available the number of Sites pointing towards any given site.

So what exactly did I end up learning from this little experiment?   

  • Website Age appears to have been weighed high in the ranking, even if a site's SEO Checkup Test scored lower than My Company's site
  • Backlinks, while important, are not everything when it comes to SEO
  • Good Coding Practices that meet W3C Standards will allow your Website to have a fair User Interface when it comes to ease of use, and following the standards will not really harm your ranking in SEO, on the other hand the jury is still out if it actually helps


It should also be pointed out that not all "suggested" metrics of SEO are a win-win, take for example the suggestion that CSS should be put minified to "speed up" the website.  

Minifying one's CSS code is the practice of shortening hex codes and removing white space from the document prior to uploading. In the case of inertial Zen Designs' Website code doing this actually knocked the elements of Mobile Friendliness and Responsive Design offline, which in turn caused the Mobile Browsers to render the Desktop version and Google's Web Developer Tools interface docking points due to the site not being Responsive.

So, just what is the answer to the question of how to handle SEO for a website? That is going to be a ongoing debate for some time to be honest. However, as a Web Designer how can one handle this aspect of Website Design?

In My opinion. Code for creating a user accessible experience, keep your client's message consistent across all platforms, make sure the project is well tested on multiple platforms while meeting the standards of good coding and advise your client that if they want to rank high on Google that time, patience and getting their site into the public's view space are going to play major factors.

If you have any questions about this posting, please leave comments and I will do My best to answer them



3/15/2015

One wrong Social Media Post can risk derailing your campaign

Take a moment to look at the image below this opening paragraph. Ask yourself what  it makes you feel as you look at it, then ask yourself this follow up question

“Would I care enough to throw My support behind this cause based off this image?”



I can tell you my answer to that question was 

“Why would I bother? If I have already lost all Privacy and am being told to get over it then why even stand up in support of a movement that claims it wants to speak for protecting one’s privacy?”

There is a lesson to be taken from this posting by Canada’s OpenMedia.ca watchdog group. A lesson that any business who is looking into the design of a Website and a Social Media Campaign, and it’s a simple two word lesson at that

CONSISTANCY COUNTS


The traffic you desire to have driven to your Website is looking for a consistent presentation by your organization. they want to feel that the message being delivered remains steady over the posts and the calls to actions that your Business is promoting to potential clients and supporters.

Now, since this image ends up being a factor for OpenMedia because they linked to a blog article by Michael Geist, this actually becomes a rather unfortunate side effect of the way Facebook shares links mixed with OpenMedia’s Social Media team potentially having missed taking one step that could have seen them share the article without the image Mr Geist chose to have a company what is a otherwise a very insightful and well written article.

You see, We live in a modern culture of sound bytes and memes. The end user is likely going to spend anywhere up to 15 seconds on a modern website , 55% of users according to a March 2014 post by hubspot.com.

In fact the Hubspot article actually lists the following Data Points as take aways from the statistical information found in the article

1. People Engage with Newsworthy Content more than Evergreen Content
2. Social Media has little Effect on reading Engagement
3. Banner Ads Don’t Work

Now lets take points 1 and 2, apply them to the above image and again ask yourself, if this crossed your social medial stream, would you care enough to get involved?

I know how I would answer, but how would you? 


1/08/2015

It’s not your ISP giving your information away but your Torrent File

“Notice and Notice system broken in 8 days” read the headline linked to the story about how scare tactics were being employed to convince Canadian Internet Users that downloading but one song file illegally could cost them $150,000.00 for doing so. Copies of the message ISP’s are asked to forward from representation of specific artists and labels.

In fact, there is a sample of the very letter that can be found in an article by Michael Geist  here. This article was actually shared by Canada watchdog Openmedia.ca on their Facebook page and returned comments like this one in the feedback

“Thank you!!! Now, Canadians should be asking why companies are getting ISPs to let them sniff your data traffic…”

Honestly, the MPAA and RIAA don’t actually HAVE to get companies to sniff our data traffic to get the information, because it’s already openly accessible to them thanks to they very device being used to download that file…the Torrent file.

Torrents, inherently in the way they have been designed, take small blocks of a file from every user who is sharing it and rebuilds it on the end user’s computer. For this to happen the Torrent needs to know where to seek out these blocks so it does the following,

-Computer 1 sends out a request for information to a central hub

-Hub looks around the other computers connected to it and says “Yes I can pull information from computers 2-100 (or however many there are with the information available)

-that information is then reassembled like a star trek transporter does on computer 1’s system, with computer 1 now hosting the file with the other computers for additional users.

The way the Industry manages to get this information without having to go through the ISP’s for data sniffing is they send out the same request that computer 1 did and use the same protocol, only they have protocols in place that let them read the addresses of the postal system.

you see the internet in many ways works like a big digital version of the snail mail postal system we all know, Computer 1 is your home represented with an Internet protocol address, much like a house number, written in blocks of 3 digits on the back end of systems.

When you request something from a site like Facebook or Amazon, the system says “Hey 123.456.789.000 can you hand us information to send to 000.987.654.321” or what ever your specific computer has been handed for an address.

Torrents work the same way, so along with that bit of that Taylor Swift song that is requested by your computer adds this address information to the data footprint of the song.

Once the Industry has that information saying that X number of data blocks came from your computer they can run that through a IP trace and be told that you IP Address is in a specific city and with a specific service provider, then they contact that service provider and have them forward to you the notice of copyright infringement.

So as you can see, the stool pidgin is not your Internet Service Provider, but in fact the very software that you are using, the message of infringement is only sent through your ISP because they have the information of who is at what address.

1/05/2015

A new year of Technology awaits

Welcome back to the blog and Inertial Zen Designs hopes everyone had a happy and safe holiday season with family and friends.

As is the usual in January We are now on the eve of the annual CES event in Las Vegas. Many hints have already been released as to what We the users can expect from our technology for the 2015 year. Curved TVs and SSD drives seem to be highlighting the reports so far, computer technology continues to get smaller and more powerful and the battle lines are still drawn in Operating Systems as Samsung has already started to take the first steps in breaking away from Google's Android.

All these changes in technology of course means new ways that consumers will have new and unique ways to access connected technology. as things transition from tablets and smartphones to potentially focusing on more wearable devices.

This should be an exciting time for technology. Hope you all stay on to enjoy the ride

Happy 2015 Everyone