Web Design Reports

Just about web design info

Latest Posts

Html5 – Not Designed For Business Applications

HTML5 – Not Designed for Business Applications

HTML5 is the next version of HTML to come along since version 4.0 in 1997.

HTML is an acronym for Hyper Text Markup Language and HTML elements are the basic building-blocks of web pages. The Internet would not exist as we know it today without HTML.

But HTML is not a programming language at all. This concept is confusing to some people. Web pages rely on a scripting language such as JavaScript in order to respond to user input. Think of it as HTML being a car and JavaScript being the engine.

JavaScript was introduced in 1995 by Netscape and coincidentally, that’s when the web started to really “take off”. This is an important fact to consider before we dig deeper into HTML5.

The open source nature of HTML and JavaScript has contributed to the growth of the Internet as a whole. Source code and design ideas are often borrowed from around the web and even from competitor’s web sites. This is facilitated by the fact that HTML and JavaScript are impossible to hide or protect.

HTML5 is no different!

There has been a lot of talk about HTML5 over the past couple of years and developers think that HTML5 is “cool” and “fun” to work with. But the logic ends there.

As usual with most new technologies, there has been confusion and misinformation over when HTML5 should be used and for what purpose. We aim to enlighten you about what HTML5 can and can’t do in this article.

New Features Same Old Concept

HTML5 includes new features such as the “Canvas” element, along with audio, video and Scalable Vector Graphics (SVG) content, some of which replace the “object” tags of HTML4. There have also been some modifications and standardization of tags such as (a, cite, menu) but the basic concept of HTML remains the same in HTML5.

Who’s Promoting HTML5?

HTML5 was originally proposed by Opera Software (makers of the Opera web browser) and designed by the World Wide Web Consortium, also known as W3C.

An important point is that the W3C has been criticized as being dominated by larger organizations and thus writing standards that represent their interests.

The large organizations (Apple, Microsoft, Adobe, Google and Facebook) have promoted HTML5 as the most up to date technology for web development. In fact the late Steve Jobs termed HTML5 as the win-win solution for consuming any kind of web content on all types of web platforms. But it is important to note that Apple, Microsoft, Google and Facebook each have an incentive for promoting HTML5; each own and operate very profitable “app” stores such as the Windows Marketplace, Google App Store, iTunes App Store, Facebook Canvas Apps, etc. Protection of intellectual property and trade secrets is of little or no concern to those companies and in fact it is almost a conflict of interest.

Fact #1: HTML5 is based on JavaScript, which is impossible to protect. Yes, that’s a fact!

As we discussed a moment ago, JavaScript is the core “language” of HTML5, whose source code is impossible to protect. The most evident reason is that anyone can view HTML5 and JavaScript source by just a simple click. JavaScript was never intended to be anything more than an engine for client-server communication and re-useable web content, including menus, buttons, tabs and the like.

Developers may argue that they can mangle JavaScript source code by obfuscation and pseudo-encryption (such as “minification”, where the code is compressed and “minified”). But this is a dangerously false sense of security. Any skilled developer can reverse engineer a “minified” or “obfuscated” JavaScript application. By design, JavaScript cannot be encrypted and it cannot be hidden. JavaScript files must be downloaded in order to run in a web browser.

To make matters worse, JavaScript also cannot be locked down to a specific web domain.

The code is accessible to be hacked by any competitor. No matter how many steps are taken to hide the JavaScript, the web browser eventually downloads the JavaScript file to run it within the client’s web browser.

For comparison, hacking a Flash or Silverlight application just by viewing the source is not very easy but anyone with a little knowledge of HTML5 can do it in minutes.

The hacks of famous HTML5 games like AngryBirds, Texas Holdem and many others are excellent examples of the insecure techniques employed by HTML5 developers. All security measures are useless once the code has been obtained and reverse engineered. No matter what any HTML5 or JavaScript developer may claim, these facts are true and irrefutable!

Fact #2: The concept of HTML5 Canvas is nothing new.

As we discussed already, HTML5 is based on the same concepts of HTML4. The most useful and talked about feature of HTML5 is the new “Canvas” object. Canvas makes it easy for JavaScript developers to “paint” within a web browser, simplifying the design of applications that utilize graphics. But you may be surprised to know that this functionality has been available in a simulated manner with very little attention since the release of HTML4.

Fact #3: There is a widespread misconception about HTML5

HTML5 has been labeled as a “cross platform programming language” which is a serious misconception. It is true that HTML5 is capable of running on all types of platforms such as Windows, Linux, Android and other mobile operating systems but let’s not forget that HTML5 is nothing more than web page markup, which is controlled by JavaScript. Classifying HTML5 and JavaScript as a true programming language would be incorrect. It is a browser integrated language that cannot utilize all the features of the underlying operating system.

When Should You Use HTML5?

The answer is quite simple. Use HTML5 when you do not care about your source code, intellectual property, or trade secrets. If you do not care that a competitor may steal your source code after it has been uploaded to your web site then use HTML5. As you can see, HTML5 is perfect for buttons, menus and website specific content, for which it was designed.

The Bottom Line – Better Options Available

The bottom line is that HTML5 and JavaScript are great for a lot of things, but you can’t effectively protect anything that you develop with them. This clearly doesn’t add up if you are using these technologies for developing business applications, which they were not designed for.

If you are developing a web application then consider using Flash or Silverlight, both of which run in all popular web browsers for desktop operating system, including Windows, Mac and Linux.

If you are developing a mobile application, there are far better options for iPhone, iPad and Android development that afford better protection of trade secrets, better security, performance and usability for the end user and also allow you to take advantage of the native features of the underlying operating systems. For iOS (iPad and iPhone), use the Object C programming language. For Android, use the Java programming language.

For Windows development, consider C++, C#, Delphi or other proven languages.

Although slightly more difficult to develop with, Objective C, C++, C#, Java and other low level languages are always the best option no matter if you are developing desktop, web, or mobile applications.

Permission to Redistribute

Copyright (c) 2012 by Modulus Financial Engineering, Inc. http://www.modulusfe.com All rights reserved. Permission is hereby granted to redistribute the article providing this copyright notice remains in place.

About the Author

Richard Gardner is Founder/CEO of Modulus Financial Engineering, Inc. In addition to his leadership role of the firms team members, Richard is an influential member of the financial technology industry at large, a globally-respected professional trader and software engineer, a guest speaker at industry conferences and among the inventors on over 70 technology patents.

Web Design Melbourne How Your Online Business Can Be Transformed Into A Thriving Cash Cow

If you plan to enjoy any online success, it is vital that you have a well-designed website. Such a site will look clean, neat and professional, and it will attract visitors. Sites that are well designed will leave a good impression with your customers, and it will be this impression that will keep them coming back to you repeatedly. If you do not want to spend time working on web design, or if you do not possess a whole lot of web design experience, then it is essential that you hire professionals to do the work. If you are starting an online business and are in need of top-of-the-line web design services and you reside in the Melbourne area, web design Melbourne companies will be able to provide you with what you need to succeed on the net.

A quality web design Melbourne company will make sure your site is designed to your specifications. However you want the web design company to construct your site let them know. They will make your dreams come to life on the web. The staff at a top notch web design Melbourne company are well trained in all web design and development languages, thus nothing will be too difficult for them to accomplish.

Another benefit to having your site built by a Web design Melbourne company is that your website will also be SEO friendly. Part of a good SEO campaign is to have your site designed in such a way that the search engines will be able to easily read it. This means that your site will have a properly designed sitemap, pages that are written in clean HTML, metatags, keywords in anchor text and headings, keywords in bolded text and keywords in the URL as well as the links. When your site is designed in this fashion, the rest of the SEO campaign will be a cinch. All you will need to do in order to obtain outstanding SEO results is focus on building your backlinks and come up with a strong off site SEO strategy. Then, you will be able to expect your profits to soar.

When you have a professional web design Melbourne company build your website for you, you will have the peace of mind knowing that your site is done right. You can also count on your site being search engine friendly, enabling it to be properly optimized for SEO campaigns. Your well-done, professionally designed, attractive website will be transformed into a thriving cash cow, as customers will come and want to remain your customer for life. They will refer others to you also, allowing your business to grow substantially.

Web Design Manchester

Web design is used as a general term to describe any of the various tasks involved in creating a web page. More specifically,Web design is the process of planning and creating a website. Text, images, digital media and interactive elements are used by web designers to produce the page seen on the web browser. Web designers utilize markup language, most notably HTML for structure and CSS for presentation as well as JavaScript to add interactivity to develop pages that can be read by web brows.As a whole, the process of web design can include conceptualization, planning, producing, post-production, research, and advertising. The site itself can be divided into it pages. The site is navigated by using hyperlinks commonly these are blue and underlined but can be made to look like anything the designer wishes. Images can also be hyperlinks.Web design is used as a general term to describe any of the various tasks involved in creating a web page.Web design is used as a general term to describe any of the various tasks involved in creating a web page. More specifically,Web design is the process of planning and creating a website. Text, images, digital media and interactive elements are used by web designers to produce the page seen on the web browser. Web designers utilize markup language, most notably HTML for structure and CSS for presentation as well as JavaScript to add interactivity to develop pages that can be read by web brows.As a whole, the process of web design can include conceptualization, planning, producing, post-production, research, and advertising. The site itself can be divided into it pages. The site is navigated by using hyperlinks commonly these are blue and underlined but can be made to look like anything the designer wishes. Images can also be hyperlinks.Web design is used as a general term to describe any of the various tasks involved in creating a web page.Web Design Manchester company in the UK offering Manchester Web Design Best Priced Websites Guaranteed. Web Design at affordable prices only at Web Design Manchester. Try it here.

Laptop Theft – Analysis

Statistics

*A laptop is stolen every 53 seconds in the USA – Symantec
*Over 600,000 laptops are stolen each year in the USA – Safeware Insurance Agency
*97% of these laptops are never recovered – FBI
*The second most common crime, just after identity theft, is laptop theft – FBI
*Lost or stolen laptops are the top culprit of data leaks/breaches, accounting for 45% (of all the incidents studied) – The Identity Theft Resource Center
*Laptops are the number-one item stolen in San Francisco – San Francisco Police Department

The Fear of Theft

As laptops become more common, the laptop theft rate is also rising at an alarming pace. Laptops are a favorite item among thieves due to the ease in which they can be transported and resold.
*Portability and complacency make laptops an easy steal – Montreal Mirror, October 5, 2006
*Laptops have legs. You need to keep them chained (even at home) – Safety tip from a personal blog

Where Laptops are Stolen – Locations

Nowadays people take their laptops with them everywhere. In addition to work, school and travel, the proliferation of wireless internet hot zones have people bringing laptops out in the street, using them in public cafes.
*Police say normally quiet cafes are becoming hunting grounds for laptop bandits – San Francisco Chronicle, April 8, 2006
*”Where else do you have a thousand-dollar item sitting on a table in a coffee shop?” – San Francisco Chronicle, April 8, 2006
*University campuses are turning out to be a crook’s best friend. Jacques Lachance, a security investigator at Concordia University, estimates that one laptop a week is stolen at the University. – Montreal Mirror, October 5, 2006
*Thieves are also making a killing stealing laptops from cars. According to the Montreal Police Service, 3,928 portable computers were stolen from vehicles last year, up from 2,870 reported thefts the year before. “Sometimes students will lock their laptop in their car but it’s still visible,” Lachance says. “Or they’ll think it’s secure in the trunk, but people watch them go to their car, and later they’ll just break through the trunk.” – Montreal Mirror, October 5, 2006
*Many airports are full of professional thieves who make a living from stealing laptops and selling the content of the hard drive to the highest bidder. – Traveling Light, The Entourage Help Page

Aftermath

Once your laptop is stolen, the likelihood of recovering anything from your loss is quite slim. Losing your laptop is devastating and quite costly when you consider the priceless photos, files and personal information you have stored, in addition to the expensive hardware.
*There is nothing that can prepare you for the feeling of loss and the dread that comes with knowing that your personal data is gone forever. While it is very inconvenient and can be very expensive to replace the laptop itself, NOTHING can replace the hours of hard work that is stored on your computer. – The UK Web Design Company
*”Three months after I lost my laptop and started rebuilding my files, I still have only one third of my data recovered,” says Ms. Gilbert. “It will be at least six months before I will reach full productivity, and I’ll never have everything back”. She lost sleep and spent countless anxious weeks worrying about client information and how she was going to stay on top of her projects. “I never want to go through it again,” says Gilbert. – Lessons in Data Loss: A Case Study, Data Deposit Box
*For personal computer users there are mp3 playlists, emails, personal photo albums, and other important files. For the professional computer user, the stakes are higher…perhaps it’s the accounting data for your company’s 3rd quarter earnings, the PowerPoint presentation you will be giving to the CEO on Thursday afternoon, or the proposal that needs to be sent to the European office A.S.A.P. There are some real horror stories about the financial impact to a corporation of having its entire five-year marketing plan stolen along with someone’s laptop. – The UK Web Design Company
*Dr Chetan Ruprai, 28, a specialist registrar in the maternity ward at York Hospital, is desperate to get her laptop back. The machine contains three years worth of painstaking medical research which cannot be replaced and is vital to her career. “This is very distressing and I will do anything to get it back” she said. – The Press, January 27, 2007
*I was out the cost of the laptop plus I had to redo 3 websites I built. Backups were stolen too. The theft of my laptop cost me thousands. – Personal blog post
*Of course I filed a police report, but I’ve already said goodbye to years and years worth of memories. Photos, videos, documents… some (very few) of which were backed up but most are now in the hands of a thief. – Personal blog post

Besides storing all your invaluable data, laptops also serve as an extremely important work, communication and entertainment tool. In our computer dependent society, it’s not surprising that victims of laptop theft often feel an immense sense of loss and anguish.
*Losing a laptop is a traumatic experience… I know it was a total disaster for me. All my email was gone, my photos from the Russia/Ukraine holiday, the new OKS features I wrote on the plane coming here, and so on. Of course, I was left without my slides for my meeting the next day, and with no laptop to conduct my course Wednesday-Friday. – Personal blog post
*After my laptop was stolen, I definitely had a good cry. There’s a feeling of depression perhaps and certainly futility. I miss the first computer that was truly mine. I liked that laptop! I’m missing my pictures and notes. I’m missing the Mac software I had figured out how to use. Without a computer, I can’t send email or blog. I can’t watch videos. Having my laptop stolen affected my lifestyle, my community, my mental and emotional wellbeing. I was mad that my family and I had to pay the price for someone else’s actions with both time and money… – Personal blog post
*You can steal my car, my money, my shoes, I don’t really care, but don’t steal my damn laptop! – Personal blog post
*Oh I had insurance. Insurance doesn’t cover weeks of modeling time done on my laptop, or a sketchbook nearly filled with drawings or notes. So as all the other architecture students are looking forward to a break from the studio, a time to spend with family at the dinner table enjoying Thanksgiving and in front of the TV enjoying football and beer, I look forward to 100 hours in front of a drafting table and a laptop borrowed from the school, drafting and CADing to my hearts content. Why me? Why now? What did I do to deserve this? – Personal blog post
*I’m a graduate Professional Writing student at USC. I write fiction, nonfiction and screenplays. As a result of the theft of my laptop, I lost some pieces I had written, I had to buy a new laptop, and I was pained emotionally because of the incident. I felt, and still feel very wronged, and taken. It makes me sick to know someone has my laptop with my personal files. – Personal blog post
*It was like you cut off my arm. I had my whole life on my laptop. Two novels, years of photos, work files, and more. Since I’m a full-time volunteer these days, I have no money to buy a new computer. – Personal blog post
*As I slept, someone entered the house and stole my laptop, backpack, wallet, cell phone, and iPod. All while I slept. My life revolves around that laptop and the loss is monumental to me. – Personal blog post
*Fortunately, whoever entered my abode and took my possessions didn’t kill or maim me. But the loss of my LIFE, which was entirely wrapped up in that laptop, is almost too much for me to bear. All day I’ve been making phone calls, leaning on good friends for support, and changing what passcodes I can in an attempt to thwart the upcoming identity theft, or whatever else the thief decides to do with my personal information. – Personal blog post

Small businesses might have the most to lose when a laptop goes missing. The loss of vital data such as client information, accounting records or business plans could all spell disaster for a small business.

*The day my laptop was stolen almost killed my business. The laptop can be replaced. However the loss of critical DATA was the biggest risk my business has ever faced. – The UK Web Design Company
*Users today store more mission-critical data than ever before, so a lost laptop is a huge issue for a small business owner. In total, 7 out of 10 small businesses go bankrupt within a year of experiencing a major data loss. – Lessons in Data Loss: A Case Study, Data Deposit Box

As seen in the news recently, even large companies such as Boeing and Fidelity are not immune to theft. Both have had laptops stolen from employees that contained very critical data pertaining to hundreds of thousands of people, putting these innocent victims at risk for identity theft, credit card fraud and a slew of other dangers.
*”2006: The Year of the Stolen Laptop” – Forbes, September 7, 2006
*Boeing disclosed that files containing Social Security numbers, names and home addresses of 382,000 current and former employees were compromised when an unencrypted laptop was stolen from an employee’s car. – MSNBC, December 13, 2006
*The University of California, Berkeley, is warning more than 98,000 people that the theft of a laptop from its graduate school admissions office has exposed their personal information. Files on the laptop contained names, dates of birth, addresses and Social Security numbers of 98,369 graduate students or graduate-school applicants. The files go back three decades in some cases. – CNN, March 28, 2005
*Financial services giant Fidelity Investments confirmed that a laptop containing the personal information of almost 200,000 Hewlett-Packard employees was stolen from its property. – CNN, March 23, 2006
*Georgia-based Emory Healthcare reports that a laptop containing information on 38,000 of its patients was stolen. The missing laptop contained information on patients who had been treated for cancer at Emory Hospital, Emory Crawford Long Hospital, and Grady Memorial Hospital. The data included names, addresses and Social Security numbers.
The theft of patients’ medical records is a growing concern, particularly as these records can be used to engage in “medical identity theft”. Thieves can use stolen identities not only to obtain credit and loans, but to get expensive medical procedures that they might not have otherwise been able to afford, running up thousands in debt in the process.
Patients who have been hit with medical identity theft can find their insurance premiums skyrocketing, and can face large medical bills for procedures they never had. – ConsumerAffairs.com, January 8, 2006

Without a doubt laptop theft is a real concern, but you can minimise the risk by using one of the secure laptop bags with built-in anti-theft features that are available from Pacsafe. They have models available for both men and women, if you are concerned about the risk of your laptop being stolen then take a look at the MetroSafe 300 Secure Laptop Case.

Googles Newsshow Wizard

Google always comes up with the best toys for your website. The latest is what is called NewsShow Wizard (http://code.google.com/apis/ajaxsearch/documentation/newsshow/wizard.html) This little tool helps you build the code to embed a Google NewsShow on your website. This is a slideshow of news that Google compiles for you based on different parameters that you choose yourself before Google writes the code for you. Lets look at how it works.

At first site of the page, you will see several fields that you can fill. Among these are style (size and shape), search expressions, search topics, News edition, User interface language, and result set size. After youve made all the decisions, the code is right there for you to copy and paste.

The value of this tool is what? Not only is it neat to offer your visitors a little bit of news and culture while they view your products or services, but if you are entering the right search expressions and topics, it could draw new visitors that otherwise would not have seen your website. For example, a website like CODANKs would use the terms Charlotte Web Design or Charlotte Technology News. This would lead to news stories about our industry eventually ending up on the page. Also, if you have a new website and not much content, Googles NewsShow is a neat, clean way to spruce it up a little and add some more filler to your website.

Googles NewsShow is not for everybody. It is always nice to see what Google is coming up with though and who knows maybe having a scrolling news marquee is exactly what you were looking for to add some goods to your current web design. Its also important to mention that for javascript and programming experts, the sky is your limit for this tool. Google provides extensive information and tips on how to make this work for your custom needs. CODANK is the leader of Charlotte Web Design and is ready to help meet your needs today. Give us a call!