Web Services & nb p; 2.0: Flickr
Every day, Web 2.0 services are becoming more and more. There are even those who have achieved amazing results, and their value is expressed in millions of dollars. The leader…

Continue reading →

"Half a Century in Space - The Epoch of Search"
On the eve of the atrium of the Novinsky Passage shopping center, Google held an exhibition “Half a Century in Space - Search Epoch”, timed to coincide with the 50th…

Continue reading →

Features of network monitoring system Nagio
Probably, any network administrator is familiar with the situation when tasks go one after another, and no other resources are allocated for their solution, except for those already available. And…

Continue reading →

billing information

How to study SEO

If you go to any forum, one way or another in contact with the SEO theme, and ask a question like “how to learn SEO?”, Then in 90% of cases the answer will be: “you need to study the forum materials”. I agree 100% that this answer is correct and that, indeed, studying SEO forums you can gather a lot of useful information, but in my opinion, this is not enough for a full SEO study, not to mention integrated Internet marketing. Continue reading

We build a browser-independent site

The last point requires further explanation. Why is displaying information in a text browser so important? I will answer in monosyllables – if your website is an educational institution or a public organization – this is simply necessary for the simple reason that a blind user can be at the computer. In addition, some servers running UNIX do not require a graphical environment, and sometimes you even have to search for information on the Internet from the server console. On the other hand, displaying information in a text browser indicates consistency of information and design. Continue reading

Zaekranye Facetop: helping hand from otherworldly friend

Imagine that the texts, folders, and other objects on your monitor suddenly became translucent, and you saw that another person was sitting on that side of the glass and, pointing at your screen with a finger, rudely controlled your applications. Carroll through the looking glass? Without this, there were some. Continue reading

We work on a & nb p; secure protocol
Imagine this situation. You have a website located on an external server. You, as an administrator, perform certain actions on it, connecting under a certain login and password. The second…

...

Telegram lock and deadline for memes: 5 of the loudest scandals of the IT industry lately
Last year was rich in various scandals in the world of information technology. What is it worth blocking Telegram Roskomnadzor messenger or data leakage of 87 million Facebook social network…

...

SERM services: how to remove negative reviews at a low price
Reputation is important for every person. But it is no less important for companies engaged in production, sales or services, and for banks offering credit and financial assistance to the…

...

Secrets of profitable online shopping: 6 ways to properly save on the Internet
In online stores now you can find anything from toys to lawn mowers. Often they are cheaper than regular outlets. And the choice is more - in half an hour…

...