Categories
Marketing

Google+ Brand Pages

Vic Gundotra, Google’s Senior Vice President of engineering, was a speaker at the recent Web 2.0 Summit in San Francisco. He reportedly stated that brand pages will be arriving on the platform soon. Adding business pages will only add to the allure of using Google+ both for users and businesses.

This will be great not only for businesses wishing to advertise/promote with a page, but also for users who frequently connect with businesses on social networks such as Facebook. These sort of public platforms allow for both negative and positive reviews which help better the product.

Google+ was launched in June and now claims to have 40 million users. Ford was one of the first brands to try the network for marketing purposes. Over 21,000 people have the Ford test account in their circles. The new pages do not have anything exciting currently, but I’m sure they will be rolling out more updates in the future.

Currently, I am still using Facebook over Google+, but Google has impressed me over the last week or two, and I can’t wait to see what they roll out next.

http://www.marketingmagazine.co.uk/News/MostDiscussed/1099937/Google+-nears-brand-pages-launch

(Source: Skynet Solutions)

By Ryan Williams

Categories
Design

Typeface Dilemma

A part of my Identity Process includes time to look into Typefaces that match the clients’ needs or what I feel best expresses their visual message. What is a Typeface you may ask? A Typeface is a family of character design ie. Helvetica, Georgia, Futura, Baskerville, etc. You may call them Fonts, but a Font is actually a variation of a Typeface: Helvetica Bold, Georgia Italic, Baskerville medium book. I’ll step down from my terminology soap box for now and get back to the meat and potatoes of this blog post.

I am sure that most designers out there are like me and have a plethora of Typefaces on their machines. Sifting through them can be a long process causing a lot of wasted time. Until I found this handy dandy online Web App that can save lots of time for any designer.

This site is fairly simple and easy to implement. You can type in a word at the top center, click the ‘load more fonts,’ (I know, I know) and it will load a preview of these on the page. You can continue to load more until you are through all of your own installed Typefaces. You are able to make filters for your displaying Typefaces, change the size, and flip the positive-negative areas.

It is a great alternative to my old method of doing things, and I thought I would share this link so all could benefit from increased productivity during the Identity Process.

http://wordmark.it/

(Source: Skynet Solutions)

By Clint Smith

Categories
Support

Top 5 Network Security Breaches

  1. Open Ports – Ports are different doors to your computer. Each computer on the internet has an IP Address that is that computers unique Address. Similar to each house in the US has a unique mailing address for its zip code. Once you talk to a computer there are several ports or doors that are used to access it. For instance port 80 is for internet content, port 3389 is for remote desktop communications, port 21 is used for FTP.

    A good firewall is the best way to protect yourself from hacking attempts that take advantage of unguarded ports.

    A firewall is your first line of defense and it is very important in a business environment.

    There are three main types of firewalls you can use:

    • Software Firewalls like the one built into windows or Zone Alarm

      This type of firewall is better than nothing but it can easily be compromised via the other security breaches I will describe below.

    • Hardware based firewall built into your router

      This type of firewall is generally sufficient for the home network. Depending on the brand they can be difficult to configure or lack some protection so you should always do your research and make sure you do not buy the cheapest one you can find. You get what you pay for.

    • Enterprise/Commercial hardware based firewall

      The most superior of them all. This high end firewall is very complex and not something you should just purchase and try to setup yourself. These firewalls also have VPN support built in so multiple business locations can securely be on the same private network over the internet without fear of data snooping or loss.

  2. Malicious websites – Websites can actually install spy-ware, Trojan horses and tracking cookies without your consent.

    Spy-ware is software that is classified as any piece of software that basically takes control of your computer behind the scenes to do anything from tricking you into buying fake anti virus software to sending emails to everyone in your list to spread itself.

    Trojan horses do as the name suggests, they allow a hacker direct access to your computer without your consent. From there they can snoop through your files, delete things pretty much anything you could do.

    Tracking cookies track your whereabouts and utilize that information to target pop-up ads while browsing the internet.

    The best way to protect yourself is to only access business oriented websites on your business network. Yes this sounds obvious but so many people think sites like MySpace, Face-book and other sites they happen upon via Google are safe.

    The next step is to always make sure your operating system and internet browser have the latest updates. Microsoft releases updates EVERY Tuesday. If you don’t notice an update being installed at least once a month you should make sure Automatic Updates is turned on. There are constant security fixes being implemented in all browsers.

    A popular misconception is that Apple computers have no worries. This is not true, so few people use Apples the average hacker is not targeting them because its a waste of their time. As Apple takes a bigger chunk of the market via phones, tablets and computer sales there will be a bigger threat. You should always been on guard.

    In a business environment you need a content filter. The content filter has very flexible settings. The filter works off national black lists that block users from accessing known dangerous sites. Also the filters can have white lists and restrict content on broad topics like gambling, nudity, games, etc..

  3. Email Links – To this day malicious software installed on computers via links in email is still a huge problem. These links take you to those malicious websites I already spoke about and install things on your computer.

    The number one way to fix this is not to open emails from people you do not know or businesses you have never heard of.

    In a business environment an advanced firewall can also automatically filter out malicious emails.

  4. Viruses – These days viruses are getting harder and harder to come by and usually are transmitted via one of the above security breaches. However these can still be transferred via files sent to you by people who do not know they are infected.

    A good virus scanner is the best way to protect yourself. AVG is a very reliable anti-virus and it is free. Microsoft has recently introduced Microsoft Security Essentials, which is currently rated #1 and recommended for all home use by Skynet Solutions.

    In a business environment we recommend purchasing AVG and utilizing the built in scanning of viruses in emails via an enterprise firewall.

  5. Wi-fi – Yes your Wi-fi is not safe. Anyone sitting within range can break your encryption. Modern day encryption used by 802.11n is very strong and it would take 2 hours of sniffing your constant traffic to crack. However, it is possible and the risk should not be taken lightly.

    A good best practice is to limit the connections to your Wi-fi via Mac Address. This is just a barrier that will help. This again is not fool proof and only slows the hacker down.

    In a business environment there are two things you can do.

    • Setup a separate zone that is isolated from your internal network so even if compromised the hacker would not have access to your internal network.
    • Setup an encryption rotation server that will rotate the encryption key every 15-30min making it virtually impossible for any hacking attempt to succeed. This method requires a server and a domain controller.

(Source: Skynet Solutions)

By Jed Parmenter

Categories
Support

Laravel Review

While at Tulsa Tech Fest, I attended a class that introduced a small framework, Laravel. Laravel is a “Clean & Classy PHP Framework, which offers a bit more than I expected. I’ll quickly go over a few things I like and dislike about this framework.

One neat feature I like is that it supports custom “routes”. The current version doesn’t use the URI to find the controller; instead it looks through all the routes you already set up until it finds a match. This unique feature gives you a bit more control over the client visible URI. After speaking with the creator, he did confirm that the custom routes and using the URI to find the controller will both be in the next version of Laravel.

I find it difficult to extend the core. One of the first things I wanted to try was to add MSSQL Database support to the framework. After looking around, I realized I would need to modify a core page and add another file. It would be a bit nicer if the database “drivers” were in a separate folder, and it simply scanned and cached this or looked for the file when it was needed. That way anybody can add the driver without modifying core code. This could possibly be fixed by adding “hooks” inside of the core code as well and putting all drivers in an array.

(Source: Skynet Solutions)

By Blaine Schmeisser

Categories
Design

Color Scheme Designer

The design process can be a long and arduous road with many bumps along the way. Every bump affects each designer differently ie. typography, layout, content, color…DING! DING! I would sometimes spend more time than necessary deciding what colors to use in a web or logo design. I have found this handy web application developed by Petr Stanicek. It’s called Color Scheme Designer. I use it to quickly grab colors that are a part of a color family and continue with my process. The online application has several other features and functions to experiment with also.

http://colorschemedesigner.com/

(Source: Skynet Solutions)

By Clint Smith

Categories
Marketing

Google+

There is a new social media outlet, Google+, that will surely be very popular. Google+ is still in Beta, but has pretty much opened the door to anyone with a will to join. They are still adding new features every day, and working out the kinks with existing features. Google has quite a following, is the number one all-time search engine, and every smart phone purchased these days gets set up with a free Gmail account. Google has the resources to reach a large number of people very quickly. The real question is will people feel compelled to switch to Google+.

Google has a “stream,” of information, much like the news feed on Facebook, to share information with your friends. However on Google+ you can only post on your own stream. If a friend makes a post, you can then comment on it. Happy Birthdays, and random posts of affection or appreciation are commonplace on Facebook “walls,” but at least for now, you won’t see them on Google+.

You can tag your friends in posts you make with Google+ by starting their name with an @ sign similar to Twitter’s method.

The reason Google+ does not have messaging and other services is most likely because they want to integrate their other products, such as Gmail, with it so they have more to share in other areas as well.

You can download all your contacts on Google+. You can also download your “profile” and “photos” and other information Google collects on all its applications. Facebook has a similar feature but does not collect as much information on you since it is just the social network aspect of it.

You can download contacts into your GMail account simply by clicking “contacts”. It’s also very easy to download your other data by going to any Google Page with the “Google+ bar.” (This is the new black bar at the top of the page.) Next, you need to click your name “John Smith,” then “Account Settings,” and then “Data Liberation.”

(Source: Skynet Solutions)

By Ryan Williams