Class Assignments

http://www.youtube.com/watch?v=IK4-zPD_25U

How to create a Cascading Menu with CSS.

What it is and how it operates…

http://www.miniclip.com

hiResLogo01

Is a Mobile and  Online Games Site

Was launched in 2001 and is known for having a large and varied collection of games. It is the world’s largest privately owned online gaming website. on a budget of $40,000 and quickly grew. As of 2008, the company has been valued at over $200 million, having been profitable for six of its seven years, with turnovers exceeding $20 million only in the past two years. Miniclip Is available in English, French, Spanish, German, Portuguese, Italian, Polish, Hindi, Romanian, Hungarian, Korean, Chinese, Turkish, and Japanese and has a social system with registered “game players” who play games with each other and play in custom friend leagues together. Services:

  • Game players have their own game profile pages
  • Awards are earned by performing actions on the website
  • The worldwide daily, weekly and monthly leader boards are displayed in games
  • Players are ranked worldwide with a special color – code
  • Players have a games news feed on their profile pages
  • For certain new live multiplayer games there is a real time matchmaking system
  • Avatars are called YoMe’s and can be customized to include many different looks and styles

http://www.yelp.com

yelp

Yelp is an interesting  platform and Application for phones created to find out information

about specific businesses with a focus on user reviews.

At the beginning, (2004) Yepl was proposed as a “Business Incubator Web Site” where users could ask friends for their recommendations on local services via email but,  when its founders noticed the popularity of the “Real Reviews” feature the web site was relaunched in February 2005 with this as one of its key features.

By 2007 the web site had received one million user-submitted reviews of local businesses. The number of reviewers grew from 12,000 in 2005, to 100,000 reviewers in 2006. That year, Yelp began a marketing campaign featuring window stickers for store windows, in 2007 provided access to business listing details, reviews, photos, and ratings and was used to add business information to a website, widget, or mobile application and by 2008, the website had fifteen million visitors per month.

The company’s web site provides specialized search capabilities and provides information about businesses in a given area using address or ZIP code information. Each paid business listing contains a filtered 5-point rating, filtered reviews from other site visitors, and details such as:

  • The business’ address
  • Hours
  • Accessibility
  • Parking
  • Site visitors can update business listings with moderator approval
  • Business owners can access and update their listing information directly.

Listings include stores, service businesses, cultural venues, public places and more. Yelp websites and features are available for many mobile devices.

http://www.scribd.com/

scribd

Scribd is a self-publishing platform that is also an Application for phones where you can not only publish articles, but also share files, like a viral short eBook you created.    This can include articles, eBooks, PowerPoint presentations, newsletters, pictures, and other stuff.

The idea was originally inspired when his founder was at the College and was having difficulties of publishing academic papers. It was easy to find interested in collaborating in the project as well as investors so quickly positioned the company as one of the most popular social networks sites. Now more than 100 media companies use brand readers Scribd to embed source material in his stories.

Supported formats include:

  • Microsoft Excel (. Xls,. Xlsx)
  • Microsoft PowerPoint (. Ppt,. Pps. Pptx)
  • Microsoft Word (. Doc,. Docx)
  • OpenDocument (. Odt, odp,. Ods,. Odf,. Odg)
  • OpenOffice.org XML (. Sxw,. Sxi,. Sxc,. Sxd)
  • Plain text (. Txt)
  • Portable Document Format (. Pdf)
  • PostScript (. Ps)
  • Rich Text Format (. RTF)
  • Tagged image file format (. Tif,. TIFF)

More importantly, it combines the publishing aspect with social marketing.  Scribd is  easy to use. and it’s free. 

http://www.waze.com/homepage/

google-to-buy-social-mapping

WAZE is a GPS Phone  Application which is fed with information provided by its subscribers in real time.

It was created by three Israelites and quickly spread around the world thanks to its benefits in everyday life. Facebook tried to buy it but did not reach an agreement. Then Google negotiated with them for U.S. $ 1.03 billions, thus becoming the technology sales transaction largest in the history of the Republic of Israel. Waze users are called wazers, and software unlike traditional GPS aided navigation, this is maintained by the users, and learns of the routes traveled by users to provide routing information and traffic updates in real time. Waze offers features that include:

  • Spoken turn by turn instructions (speech synthesis)
  • Spoken street names
  • Reports real-time traffic
  • Gasoline prices in real time
  • Possibility of avoiding tolls **
  • Free, regular updates to the map installed and automatically displayed
  • Search fate full address, category, name of the place, points of interest, or by using the contact information.
  • Integrated search target: Google, Foursquare, Bing, Contacts
  • Support for external applications insert targets using
  • multi-language support
  • Integration with social networks (Twitter and Facebook)

http://www.causes.com

causes-com_0

CAUSES is an Application created by Facebook in order to provide “easy-to-use tools” where users can create, join or browse causes focused on issues in which they are interested and is one of its largest applications, currently has the second largest number of monthly active users on Facebook, with over 2,300,000 monthly active users that have started over 350,000 issue-based causes. Of these, almost 40 percent are raising money for a US nonprofit or Canadian charity, with a median donations of $25. With this interesting platform you can customize three different templates: — a petition, pledge, or fundraiser — or just find one that you want to support. Services:

  • No cost email tools
  • Technical support 24/7
  • Uses all the tools of Facebook to spread the word about your Cause.

Through this tool, campaign creators can reach out to their supporters via email – at no cost, anytime. For supporters, managing email subscriptions is a simple, one-click process. Besides, “causes” provides advice to nonprofit organizations on how to how to get more help from the public.

WordPress, Joomla and Drupal

drupal-joomla-wordpressThese are the three largest CMS in the world

What’s a content management system (CMS)?

A content management system is software that keeps track of every piece of content on your Web site, much like your local public library keeps track of books and stores them. Content can be simple text, photos, music, video, documents, or just about anything you can think of. A major advantage of using a CMS is that it requires almost no technical skill or knowledge to manage. Since the CMS manages all your content, you don’t have to. When we are planning to create a website is important to know to choose the most suitable to our needs. According to what I have researched, all three are excellent and all three have very dedicated development teams that give the customer information accurately and efficiently. DRUPAL is a free, open-source web development platform for online content and user communities. Drupal powers some of the busiest sites on the web, and can be adapted to virtually any visual design. Drupal runs over a million sites, including WhiteHouse.gov, World Economic Forum, Stanford University, and Examiner.com but However; its users speak of three levels of difficulty where DRUPAL is geared towards developers and people with broader knowledge in this field. Also I found the link for DRUPAL SPANISH  http://drupal.org.es   for those who needs more info for spain and Latin America. Some DRUPAL web sites http://www.yellowsubmarine.com http://firecore.com http://www.law.stanford.edu JOOMLA  About Joomla is said to be of intermediate difficulty level.  Is an CMS  that allows you to build web sites and powerful online applications. This  web site software contains easy-to-use features and it is freely available.  Joomla is written in PHP for managing content on the web and uses a MySQL database to store content and is released under the GNU General Public License.  The link for JOOMLA SPANISH is http://www.joomlaspanish.org JOOMLA web sites. http://www.halloweenmasksandprops.com http://www.movingmurals.com http://www.mb-photography.com WORDPRESS is the most friendly of the three CMS . Technically, WordPress is an online, open source website creation tool written in PHP. But in non-geek speak, it’s probably the easiest and most powerful blogging and website content management platform (or CMS) in existence today. The link for WORDPRESS SPANISH is http://es.wordpress.org Some WORDPRESS web sites http://www.nasa.gov http://blog.us.playstation.com http://observer.com Here is the best link I found on this topic. Contains information very precise and organized. http://www.rackspace.com/knowledge_center/article/cms-comparison-drupal-joomla-and-wordpress.

thumb8

Client Quest

seoSEARCH ENGINE OPTIMIZATION

A “search engine friendly” website is important because of this, depends on the success of the site. People escape quickly when they do not understand the product and do not know which way to go.

A WEB CRAWLER

A web crawler is a relatively simple automated program, or script, that methodically scans or “crawls” through Internet pages to create an index of the data it’s looking for; these programs are usually made to be used only once, but they can be programmed for long-term usage as well.  

META TAGS

Meta tags are HTML codes that are inserted into the header on a web page, after the title tag. In the context of search engine optimization, when people refer to meta tags, they are usually referring to the meta description tag and the meta keywords tag.   The meta description tag and the meta keywords tag are not seen by users. Instead, these tags main purpose is providing meta document data to user agents, such as search engines.

THE KEYWORDS ATTRIBUTE

The keywords attribute is a Mata Tag parameter that is used to specify keywords associated with the content of a Web page. This makes people find our pages more easily.

DESCRIPTIONS ATTRIBUTE

Descriptions Attribute is a Meta tag parameter that is used to specify a brief description for a Web page which is allows the Web page authors to give a more meaningful description for listings than might be displayed if the search engine was unable to automatically create its own description based on the page content. PAGE TITLE

A web page title is the value you assign the <title> tag  that’s typically found on top of an HTML/XHTML document inside the <head> tag. Is very important that every

DOMAIN NAME

A domain name is  the part of an address than identifies a Web site, an identification string that defines a realm of administrative autonomy, authority, or control on the Internet. Domain names serve, as humanly memorable names for Internet participants, like computers, networks, and services. A domain name represents an Internet Protocol (IP) resource.

SPAMDEXING

Spamdexing, which is a word derived from “spam” and “indexing,” refers to the practice of search engine spamming. It is a form of SEO spamming. SEO is an abbreviation for Search Engine Optimization, which is the art of having your website optimized, or attractive, to the major search engines for optimal indexing. Spamdexing is the practice of creating websites that will be illegitimately indexed with a high position in the search engines. Is a dishonest attempt to manipulate organic search engine rank using hidden code and spamming.

A website is considered “spammy” when hidden text, cloaking, or keyword stuffed content is used. These techniques may bring a temporary increase in organic search engine rank, but eventually the website can be penalized or even removed from large indexes such as Google.

What are natural or organic search results?

In search engines a natural search is one where results are returned based on the natural indexing of the Web site, as opposed to those that are returned based on paid advertising and editorial changes made by the search engine itself. The field of SEO is largely based on making a Web site appear more prominently in organic search results for specific keywords. Also called organic search or unpaid search.

Pay Per Click (PPC)

PPC is an Internet marketing formula used to price online advertisements. In PPC programs the online advertisers will pay Internet Publishers the agreed upon PPC rate when an ad is clicked on, regardless if a sale is made or not.   With pay per click in search engine advertising, the advertiser would typically bid on a keyword so the PPC rate changes. On single website — or network of content websites — the site publisher would usually set a fixed pay per click rate.  Also called cost-per-click (CPC).

PAID INCLUSION A search engine-marketing model in which a Web site pays a fee to a search engine that then guarantees that the Web site will be displayed in the returned search results for specifically named search terms. Examples of paid inclusion include programs where the only sites listed are those that have paid; where paid sites are intermingled among non-paid sites; and where companies pay to have their Web sites or URLs reviewed more quickly, or for more frequent spidering of their Web sites or URLs, or for the review or inclusion of deeper levels of their Web sites, than is the case with non-paid sites.

Video Search Marketing The video search marketing is an incredible online sales tool. strategy and planning, identity, content and message development, script writing, storyboarding, video production (video and audio recording, video editing), web site integration or landing page development, video search engine optimization and distribution. Through the videos made strategically, we can give a product identity and develop messages with high information content.

SPONSORED LISTINGS

Paid ads on the results pages of search engines.  This tool has the ability to target ads by content and audience. You choose where you want to place your ad on the page, and you’ll be able to bid on these placements in the next step. There’s not much risk in trying many different placements — you only pay when someone actually visits your site.

Google-AdSense

Google AdSense is a program run by Google that allows publishers in the Google Network of content sites to serve automatic text, image, video, or interactive media advertisements that are targeted to site content and audience. It works with millions of advertisers, You have control over the types of ads that can appear on your pages, with Insights and metrics you get detailed reports that show just how hard your site is working for you and the best… its free!

WHITE HAT SEO

In search engine optimization (SEO) terminology, White Hat SEO refers to the usage of SEO strategies, techniques and tactics that focus on a human audience opposed to search engines and completely follows search engine rules and policies. For example, a Web site that is SEO optimized, yet focuses on relevancy and organic ranking is considered to be optimized using White Hat SEO practices. Some examples of White Hat SEO techniques include using keywords and keyword analysis, backlinking, link building to improve link popularity, and writing content for human readers White Hat SEO is more frequently used by those who intend to make a long-term investment on their Web site. Also called Ethical SEO.

BLACK HAT SEO

In search engine optimization (SEO) terminology, Black Hat SEO refers to the use of aggressive SEO strategies, techniques and tactics that focus only on search engines and not a human audience, and usually does not obey search engines rules. Some examples of Black Hat SEO techniques include keyword stuffing, invisible text and doorway pages. Black Hat SEO is more frequently used by those who are looking for a quick financial return on their Web site, rather than a long-term investment on their Web site. Black Hat SEO can possibly result in your Web site being banned from a search engine, however since the focus is usually on quick high return business models, most experts who use Black Hat SEO tactics consider being banned from search engines a somewhat irrelevant risk. Black Hat SEO may also be referred to as Unethical SEO or just  spamdexing, as spamdexing is a typical frequently used Black Hat SEO practice.

5 Webmaster Guidelines (Google)  

1.     Make a site with a clear hierarchy and text links. Every page should be reachable from at least one static text link.

2.     Offer a site map to your users with links that point to the important parts of your site. If the site map has an extremely large number of links, you may want to break the site map into multiple pages.

3.     Think about the words users would type to find your pages, and make sure that your site actually includes those words within it.

4.     Make sure that your <title> elements and ALT attributes are descriptive and accurate.   5.     Make pages primarily for users, not for search engines

5 Webmaster Guidelines (BING)  

1.     Provide clear content, deep and easy to find on your website.

2.     Links help Bing find new content and establish a vote of confidence between websites.

3.     Using Social media is something that you have to do today to rank well in search results.  The most obvious part it plays is via influence. These can have an impact on how you rank organically in the long run.

4.     Being indexed is the first step to developing traffic from Bing.

5.     Page Load Time (PLT) This element has a direct impact on the satisfaction a user has when they visit your website.

Construction-Icon

SITE MAINTENANCE

IP Address

Internet Protocol Address (or IP Address) is an unique address that computing devices use to identify itself and communicate with other devices in the Internet Protocol network. Any device connected to the IP network must have an unique IP address within its network. An IP address is analogous to a street address or telephone number in that it is used to uniquely identify a network device to deliver mail message, or call (“view”) a website.

Shared Web Hosting Service

A shared web hosting service or virtual hosting service or derive host refers to a web hosting service where many websites reside on one web server connected to the Internet. Each site “sits” on its own partition, or section/place on the server, to keep it separate from other sites. This is generally the most economical option for hosting, as many people share the overall cost of server maintenance.

A Dedicated Hosting Service

A dedicated hosting service, dedicated server, or Managed Hosting Service is a type of Internet hosting in which the client leases an entire server not shared with anyone else. This is more flexible than shared hosting, as organizations have full control over the server(s), including choice of operating system, hardware, etc.

Domain

Domain Name System, or DNS, is the most recognized system for assigning addresses to Internet web servers (aka “Internet hosts”).  0Somewhat like international phone numbers, the domain name system helps to give every Internet server a memorable and easy-to-spell address. Simultaneously, the domain names keep the really technical IP address invisible for most viewers.

Subdomain

A subdomain is an easy way to create a memorable Web address for unique content areas of your site.  For example, you could create a subdomain for pictures on your site called “pics” that is accessible through the URL pics.example.com in addition to www. Example .com/ pics

 

 

Domain Pointer

Domain pointers allow you to point multiple domain names to a single Web site.

For example:   If your domain is http://www.yourdomain.com and you also have http://www.your-domain.com, by using a domain pointer, you can have http://www.your-domain.com directed to http://www.yourdomain.com allow you to point multiple domain names to a single Web site.

Domain Parking

Domain parking is the registration of an Internet domain name without using it for services such as e-mail or a website i.e. without placing any content on the domain. This may be done to reserve the domain name for future development, to protect against the possibility of cybersquatting, or to engage in cybersquatting. Since the domain name registrar will have set name servers for the domain, the registrar or reseller potentially has use of the domain rather than the final registrant.

Domain Name System

Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they’re easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name http://www.example.com might translate to 198.105.232.4.   The DNS system is, in fact, its own network. If one DNS server doesn’t know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned.

Private Domain Registration

 Private Domain Registration Keeps spammers and scammers away. Personal information, such as name, home address and e-mail keeps out of the public.

Domain Locking

Domain locking prevents unauthorized transfers of your domain to another registrar or web host by “locking” your domain name servers. When your domain is locked, you’ll be substantially protected from unauthorized third parties who might try to misdirect your name servers or transfer your domain without your permission. You will also be unable to inadvertently make changes to your name servers.

URL Forwarding

URL redirection, also called URL forwarding, is a World Wide Web technique for making a web page available under more than one URL address. When a web browser attempts to open a URL that has been redirected, a page with a different URL is opened. For example, http://www.example.com is redirected to http://www.iana.org/domains/example/. URL redirection can be used for URL shortening, to prevent broken links when web pages are moved, to allow multiple domain names belonging to the same owner to refer to a single web site, to guide navigation into and out of a website, for privacy protection, and for less innocuous purposes such as phishing attacks.

Disc Space

The term “disk space” is an amount of computer storage space on random-access memory devices, such as on a hard drive, floppy or USB flash drive.[citation needed] Disk space units are commonly measured in large numbers of bytes, such as kilobytes, megabytes, and gigabytes, with each unit 1024 times larger than the previous unit

Site Admin Control Panel

The control center of your web hosting account is the administrator control panel, or admin panel. You will use the admin panel to manage each and every part of your server.  The admin panel is vital in setting up and managing mail boxes. It also is necessary to assign different domains and subdomains to your server. The admin panel will help you manage password protection of certain directors on your server. You will also use your admin panel to manage databases.

File Transfer Protocol

FTP is an acronym for File Transfer Protocol. As the name suggests, FTP is used to transfer files between computers on a network. You can use FTP to exchange files between computer accounts, transfer files between an account and a desktop computer, or access online software archives. Keep in mind, however, that many FTP sites are heavily used and require several attempts before connecting.

FTP Account

An essential part of the website setup process is publishing it online, which includes uploading its files to a host server where the website is planned to be located. Since in most cases this includes the transfer of many files at a time, utilizing a dedicated FTP program is the quickest and easiest way to do that. In order for the users to be able to connect to the respective host server through an FTP client, they need to have rights to access that server. These authorization access rights are assigned to users by their hosting providers in the form of FTP accounts.

POP E-mail Address

The Post Office Protocol (POP) is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.[1] POP and IMAP (Internet Message Access Protocol) are the two most prevalent Internet standard protocols for e-mail retrieval.[2] Virtually all modern e-mail clients and servers support both. POP has been developed through several versions, with version 3 (POP3) being the current standard. Most webmail service providers such as Gmail and Yahoo! Mail provides both an IMAP and POP3 service.

SMTP E-mail Access

SMTP is a protocol used to send e-mail. It is the language that your e-mail program uses to talk to the mail server whenever you send out e-mail.

When your computer connects to another computer over the Internet, it connects to a certain “port.” Many ports have specific uses; for example, when you view a Web page, your browser connects to port 80 on the Web server. SMTP uses port 25, so when you send out e-mail, you are connecting to port 25 on the mail server.

SSL, The Secure Socket Layer

Is a protocol that was created by Netscape to ensure secure transactions between web servers and browsers. The protocol uses a third party, a Certificate Authority (CA), to identify one end or both ends of the transactions. This is in short how it works.

-A browser requests a secure page (usually https://).

-The web server sends its public key with its certificate.

-The browser checks that the certificate was issued by a trusted party (usually a trusted root CA), that the certificate is still valid and that the certificate is related to the site contacted.

-The browser then uses the public key, to encrypt a random symmetric encryption key and sends it to the server with the encrypted URL required as well as other encrypted http data.

-The web server decrypts the symmetric encryption key using its private key and uses the symmetric key to decrypt the URL and http data.

-The web server sends back the requested html document and http data encrypted with the symmetric key.

-The browser decrypts the http data and html document using the symmetric key and displays the information.

RAW Logs

Raw Log Files are raw copies of the web server log files for your website which such information as web pages downloaded, size of the pages downloaded, referrer (where are people coming from to your site), browser information and more. One way to get access to these files is to download them using an FTP program. To do so, create an additional FTP account that has access to your “Web server logs directory”, then connect to our server using that FTP account.

IP Address Internet Protocol Address (or IP Address) is an unique address that computing devices use to identify itself and communicate with other devices in the Internet Protocol network. Any device connected to the IP network must have an unique IP address within its network. An IP address is analogous to a street address or telephone number in that it is used to uniquely identify a network device to deliver mail message, or call (“view”) a website. Shared Web Hosting Service A shared web hosting service or virtual hosting service or derive host refers to a web hosting service where many websites reside on one web server connected to the Internet. Each site “sits” on its own partition, or section/place on the server, to keep it separate from other sites. This is generally the most economical option for hosting, as many people share the overall cost of server maintenance. A Dedicated Hosting Service A dedicated hosting service, dedicated server, or Managed Hosting Service is a type of Internet hosting in which the client leases an entire server not shared with anyone else. This is more flexible than shared hosting, as organizations have full control over the server(s), including choice of operating system, hardware, etc. Domain Domain Name System, or DNS, is the most recognized system for assigning addresses to Internet web servers (aka “Internet hosts”). 0Somewhat like international phone numbers, the domain name system helps to give every Internet server a memorable and easy-to-spell address. Simultaneously, the domain names keep the really technical IP address invisible for most viewers. Subdomain A subdomain is an easy way to create a memorable Web address for unique content areas of your site. For example, you could create a subdomain for pictures on your site called “pics” that is accessible through the URL pics.example.com in addition to www. Example .com/ pics Domain Pointer Domain pointers allow you to point multiple domain names to a single Web site. For example: If your domain is http://www.yourdomain.com and you also have http://www.your-domain.com, by using a domain pointer, you can have http://www.your-domain.com directed to http://www.yourdomain.com allow you to point multiple domain names to a single Web site. Domain Parking Domain parking is the registration of an Internet domain name without using it for services such as e-mail or a website i.e. without placing any content on the domain. This may be done to reserve the domain name for future development, to protect against the possibility of cybersquatting, or to engage in cybersquatting. Since the domain name registrar will have set name servers for the domain, the registrar or reseller potentially has use of the domain rather than the final registrant. Domain Name System Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they’re easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name http://www.example.com might translate to 198.105.232.4. The DNS system is, in fact, its own network. If one DNS server doesn’t know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned. Private Domain Registration Private Domain Registration Keeps spammers and scammers away. Personal information, such as name, home address and e-mail keeps out of the public. Domain Locking Domain locking prevents unauthorized transfers of your domain to another registrar or web host by “locking” your domain name servers. When your domain is locked, you’ll be substantially protected from unauthorized third parties who might try to misdirect your name servers or transfer your domain without your permission. You will also be unable to inadvertently make changes to your name servers. URL Forwarding URL redirection, also called URL forwarding, is a World Wide Web technique for making a web page available under more than one URL address. When a web browser attempts to open a URL that has been redirected, a page with a different URL is opened. For example, http://www.example.com is redirected to http://www.iana.org/domains/example/. URL redirection can be used for URL shortening, to prevent broken links when web pages are moved, to allow multiple domain names belonging to the same owner to refer to a single web site, to guide navigation into and out of a website, for privacy protection, and for less innocuous purposes such as phishing attacks. Disc Space The term “disk space” is an amount of computer storage space on random-access memory devices, such as on a hard drive, floppy or USB flash drive.[citation needed] Disk space units are commonly measured in large numbers of bytes, such as kilobytes, megabytes, and gigabytes, with each unit 1024 times larger than the previous unit Site Admin Control Panel The control center of your web hosting account is the administrator control panel, or admin panel. You will use the admin panel to manage each and every part of your server. The admin panel is vital in setting up and managing mail boxes. It also is necessary to assign different domains and subdomains to your server. The admin panel will help you manage password protection of certain directors on your server. You will also use your admin panel to manage databases. File Transfer Protocol FTP is an acronym for File Transfer Protocol. As the name suggests, FTP is used to transfer files between computers on a network. You can use FTP to exchange files between computer accounts, transfer files between an account and a desktop computer, or access online software archives. Keep in mind, however, that many FTP sites are heavily used and require several attempts before connecting. FTP Account An essential part of the website setup process is publishing it online, which includes uploading its files to a host server where the website is planned to be located. Since in most cases this includes the transfer of many files at a time, utilizing a dedicated FTP program is the quickest and easiest way to do that. In order for the users to be able to connect to the respective host server through an FTP client, they need to have rights to access that server. These authorization access rights are assigned to users by their hosting providers in the form of FTP accounts. POP E-mail Address The Post Office Protocol (POP) is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.[1] POP and IMAP (Internet Message Access Protocol) are the two most prevalent Internet standard protocols for e-mail retrieval.[2] Virtually all modern e-mail clients and servers support both. POP has been developed through several versions, with version 3 (POP3) being the current standard. Most webmail service providers such as Gmail and Yahoo! Mail provides both an IMAP and POP3 service. SMTP E-mail Access SMTP is a protocol used to send e-mail. It is the language that your e-mail program uses to talk to the mail server whenever you send out e-mail. When your computer connects to another computer over the Internet, it connects to a certain “port.” Many ports have specific uses; for example, when you view a Web page, your browser connects to port 80 on the Web server. SMTP uses port 25, so when you send out e-mail, you are connecting to port 25 on the mail server. SSL, The Secure Socket Layer Is a protocol that was created by Netscape to ensure secure transactions between web servers and browsers. The protocol uses a third party, a Certificate Authority (CA), to identify one end or both ends of the transactions. This is in short how it works. -A browser requests a secure page (usually https://). -The web server sends its public key with its certificate. -The browser checks that the certificate was issued by a trusted party (usually a trusted root CA), that the certificate is still valid and that the certificate is related to the site contacted. -The browser then uses the public key, to encrypt a random symmetric encryption key and sends it to the server with the encrypted URL required as well as other encrypted http data. -The web server decrypts the symmetric encryption key using its private key and uses the symmetric key to decrypt the URL and http data. -The web server sends back the requested html document and http data encrypted with the symmetric key. -The browser decrypts the http data and html document using the symmetric key and displays the information. RAW Logs Raw Log Files are raw copies of the web server log files for your website which such information as web pages downloaded, size of the pages downloaded, referrer (where are people coming from to your site), browser information and more. One way to get access to these files is to download them using an FTP program. To do so, create an additional FTP account that has access to your “Web server logs directory”, then connect to our server using that FTP account.

large_jquery_logo 

JQuery Tutorials

http://blog.themeforest.net/tutorials/jquery-for-absolute-beginners-day-15/ http://blog.themeforest.net/tutorials/jquery-for-absolute-beginners-day-3/ http://www.tumaestroweb.com/html5/video-en-html5-y-controles-personalizados-parte-1/

Flyer & banner

All images contained in this flyer were developed by myself in Photoshop CS5. The characters silhouettes drawings were made freehand with a bamboo tablet.

front_flyer tawwanas_back_flyer res_facility2-banner

Handmade – PhotoshopBaby by Patricia Pinedo

black_itos

Some of my  Photoshop Work

Before and After

Mr Black Before & After Untitled-1 Photoshop by Patricia Pinedo tawanas_client

Color Replacement

reemplazando color color change

Before and after

Halloween Background

This has three merged images where each received new textures, cuts, different illumination; text and other shapes. I also had to rebuild the elbows of the baby because they didn’t appeared in the original pic. The T-Shirt and long hair were removed and her eyes were exaggerated with the pencil tool and liquify tool as well as the rest of the face.

Breast Cancer Button

Made in the tablet freehand drawing.

button for the campaign to fight breast cancer

Thumbnail – Class Identity Image 

Photoshop Animated Banner

Page-Layout-using-only-Photoshop

My Brushes

   

About Brusheezy.com

Stupid Name. Cool Brushes!

Brusheezy is the place to share your free Photoshop brushes and other Photoshop-related resources. Here you can explore and discuss the creations of other artists from around the world, or just find that perfect little freebie for your next Photoshop project. Brusheezy makes it easy to explore thousands of resources created by artists from all over the globe. All the resources are free to download and, depending on the license, free to use in your projects. http://www.brusheezy.com/community 

Simple designs to be shared through facebook.

(before and after) Flyer to promote a “Car Audio Show”  in our shop. This flyer was made with one of the simplest versions of Adobe. (5.0) Testing a label for a degreaser that has the name of our store.  Also made with Adobe 5.0 These tags are placed on images of plastic bottles that were downloaded from google.

Pupped Warp Tool    

Is an excellent tool to bring a touch of attitude.

 

Corporate Identity Using Illustrator ONLY.

 

After Suggestions. 

Logo Cyber Hook Logo-Cyber-Hook-Final rave queen p

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s