Most internet users are familiar with internet errors such as 404 Not Found and 403 Forbidden. However, there’s a new internet status code that is being proposed by Tim Bray, a developer advocate – for sites that are blocked for ‘legal reasons’.

 photo 451_zpsc84454ec.jpeg

Bray, who has experience in developing key Internet standards, says, “I’ve been told by the chair of the IETF HTTP Working Group that he’ll give the proposal some agenda time at the next IETF meeting. It’s not a big proposal; shouldn’t take long.”

However, the recognition for the need of a new code first started when Terence Eden tried to access The Pirate Bay to no avail. When the site’s server denied his request, Eden then expressed the need for a new “HTTP code for censorship”, which not only caught on sparking discussions on Slashdot and Hacker News – until the time when Bray agreed to turn the ‘idea’ into reality.

With the code (451) taken aptly from Ray Bradbury’s novel, Farenheit 451, which deals with censorship, the proposal for the error code if approved, will not only furnish the details on the restriction but also mention which legal authority is imposing the restriction as well.

Bray also thinks that once official consensus is reached, there would little or no work on the engineering side in order for servers to provide “explanatory text with a 451”. In the end, of course, this effort is to ensure that when censorship does happen, it takes place out in the open and thus, provides pertinent information for users everywhere.


A question that has been asked about Twitter over the years is whether it is a technology or media company. The answer, in not being so simple, is simply a variation of both – according to Dick Costolo, CEO of Twitter.

null

He explains further, in saying, “I think of us as a technology company because I think the future of the company is in building on an extensible platform that allows third-party developers and companies to add value to Twitter in a way that is accretive to Twitter and is accretive to our users. I don’t need to be or want to be in the content business.”

To support his statement, he also mentioned that is not in the content business because instead of having reporters or a newsroom, almost half of Twitter’s employees [1300 in number] are engineers who are working on building the technology around which Twitter runs on while also continuously creating new features for its users.

In fact, he also wishes to encourage companies and developers to build products and tools inside the Twitter platform – instead of creating external Twitter apps.

Speaking of new features, Twitter as a whole, is also evolving into something different by experimenting with media-like products some of which NASCAR and Olympics-branded pages. Twitter currently also has employees that help V.I.Ts such as athletes, media outlets, politicians and celebrities to use its features well. Thanks to this content available by V.I.Ts, “engagement rates on ads” are also great as opposed to traditional Web ads.

Yet even though Costolo still maintains the fact that Twitter has and always been a communication platform, experts think that these ‘experiments’ being conducted make Twitter more of a media company.


Hello and we would like to thank you for visiting this blog of ours. We really hope you will gain something after reading this technology blog. As we all know, technology is changing drastically. The latest iPhone you are using right now might become just an ordinary iPhone when the latest version come out in the market. We cannot cope with this sudden technologies changes, but we can provide you with the current issues regarding technologies. Hopefully you will keep on visiting this blog of ours. Thanks.

GigaTech.Org


circuit-board2E-beam technology has advanced significantly throughout the years.

Written by: Denton Vacuum, LLC

If you are new to e-beam technology, this article will help provide you with all the information that you need to understand everything that you need to know about e-beam evaporation, application, and methodologies.

About E-Beams

Ebeam evaporation is a process that is similar to thermal evaporation because of its heating capabilities. In thermal evaporation, the source material is heated above its boiling or sublimation temperature and is evaporated to form a thin film on the surface that is scattered with evaporated atoms. This method is also similar in that its’ pore ability covers steps, making it ideal for lift-off processes. Another noticeable advantage of this is that is can add a large amount of energy into the source material. This will yield a higher density film with an increased adhesion to the substrate. Now, because the electron beam can only heat the source material and not the entire crucible, a lower degree of contamination from the crucible will be present. This is highly advantageous for ebeam users at the substrate will have a higher quality output.

Now, because PVD thermal evaporation and ebeam evaporation are so similar, many people can not differentiate the quality output from either one, resulting in a roll of the dice. But, it’s important that you remember that although they are similar in styles, they are also ideal for different processes. For example, e-beam evaporation works best when working within the circuitry and wafering industry.


gigatech2Phishing is a targeted method of infecting someone with malware or a trojan. This type of attack is getting more and more frequent. Especially for business users who deal with financial information. Another type of malware spreading fast is ransomware. When you get infected, the entire computer or your key data directories are all encrypted. The only way to get your data back is to pay a ransom to an anonymous hacker. While some of these attacks can be difficult to avoid, the most basic versions can be mitigated by a set of best practices:

Avoid Links

The most common way to spread malware of any sort is a link. The user needs to click the link and will then be taken to a page which loads the malware onto the phone or computer.

Admin Access

Too many end users give themselves admin access to install applications. The best practice here is to give a separate account admin rights and then use that account when you need to install an application of make system level changes. The windows UAC is helpful in this regard but is also too often switched off.

Malware

It is a good practice to also have a virus scanner like Windows Defender running and updated. Protect yourself from malware that we know about.

OS Updates

Always keep the computer up to date. Whenever updates are available, install them. A lot of flaws are detected and fixed and by keeping your computer updated, a lot of the readily available tools online will be negated.


1Written by Secure Net Shop

There have been a lot of public hacks in the recent past. In those, some of have been for usernames and passwords of users, others have actually involved credit card information. Those users were informed and have taken steps to reissue cards and passwords and accounts. The bad news is that these are only from the attacks that we know of. The problem is that people tend to use one username and password combination across all the sites they use. If a customer’s credit card or account details were compromised elsewhere, and a hacker tries to use that information on your site, that can lead to a lot problems. There are some easy changes that can be done to minimize the possibility of this happening:

Two factor authentication

When a login attempt to the site comes from a new browser or computer, the user is sent a code to his or her mobile device to confirm the identity.

Strong passwords

A lot of sites do not insist on a certain strength when it comes their password policy. Prompt users to enter extremely strong passwords which most likely be different from other sites. This way a compromised account from another site is unlikely to work.

Confirmation emails

Thanks to the shopping cart ecommerce has taken off. This has resulted in a lot of online transactions. One way to stand out is to send confirmation emails for every transaction or change to the user’s account.

____________________________________________________________

Secure Net Shop is an online shopping cart software provider for ecommerce sites.

 


gigatech1Google has finally enabled two of the most requested features for Google Maps: WiFi only mode and the option to download offline maps to the SD Card. It might not seem like something everyone would want but these will be extremely useful to a lot of people. Here is a quick rundown of the two features.

Wifi Only Mode

The description here is pretty straightforward: Google Maps will only attempt data usage when Wifi is available. This will be useful for users who travel a lot and have very limited or expensive data plans when they roam. Often metropolitan areas around the world have a lots of free Wifi hotspots or services that offer cheap wireless. This will allow the phone and maps to use those as the user walks around rather than using mobile data. Even large offline map downloads will queue and download when wireless access is present.

SD Card downloads

Entry level smartphones come with as little as 8GB of storage. Some models might even go up to 32GB. When you factor in images, app data, application installs and music that storage quickly dries up. These phones also tend to have SD card slots of storage expansion and this feature will allow the user to choose the location where map data is stored. The maps for large areas can take a fair amount of space, and if you have multiple offline maps this is the only viable way for those on low storage smartphones.

 


When well over 570 websites and 70 new domains are created with every passing day, the only way that your online content can get a healthy flow of traffic is by maintaining a high search engine ranking through a top-notch SEO campaign. Generally speaking, investing in professional help from a search marketing agency will be the best way to run an effective campaign.

canstockphoto6612297

Due to the extreme density of new web content getting generated by the second, the Google Search Algorithm (also known as Googlebot) must be very discretionary in choosing what content it chooses to index. Upon identifying a website to analyze, the search algorithm scrutinizes every relevant bit of data on its webpages (also known as crawling) in order to try and ascertain its purpose.

There are many different methods to having your webpages communicate value and purpose to the algorithm. A search engine marketing firm specializes in determining the best ways that any company can fine-tune the presentation of its web content to give the Google Search Algorithm a positive impression.

Should the algorithm get a strong impression of both the website’s purpose and its potential relevance in any given category (based on a number of metrics, such a backlinks to other pages of high authority) it will compile the website into its index and give it a search engine position ranking for the appropriate amount of exposure.

After you’ve whittled down the focus of your business into a strong proposition within a clearly defined niche, get in touch with a search engine marketing agency to start optimizing your content for the search engine traffic it needs.
—————————————————————————————————-
Sticky Web Media is a search engine marketing agency that specializes in optimizing content for better search engine rankings.