Ordering a SERM service: the principles of online reputation management and the price of a question
It is quite difficult to earn a good reputation in the market of any company, including financial, and sometimes it takes more than one year. But often the company's brilliant…

Continue reading →

We work on a & nb p; secure protocol
Imagine this situation. You have a website located on an external server. You, as an administrator, perform certain actions on it, connecting under a certain login and password. The second…

Continue reading →

Indices: first step on & nb p; paths to & nb p; speed
Databases are specialized repositories of information, and working with them, we operate with concepts of data sets and operations on these data, forgetting that there is real equipment behind them.…

Continue reading →

as well as expanding

Setting up equipment for Stream
The article by Peter Didenko “Connecting and saving”, published on the pages of our publication, told about how to save money when connecting to the Stream channel. In today's article…

...

7 "hard" examples of how in different countries they are trying to control the functioning of the Internet
Recently, politicians, businessmen and even “media” personalities are talking more and more about various aspects of the Internet and, increasingly, the words about it sound in a positive way. The…

...

How to understand that someone is following our correspondence on the web and take all necessary measures
In recent years, there are more and more scandals associated with data leakage on the Web and spying on people - both for individuals and for companies or even states.…

...

How to increase blog traffic
At this stage of the development of the Internet, the blogosphere is of serious interest from the business. Thus, the value of one unit of the blogosphere, that is, the…

...