Although major Search Engines have been trying to improve algorithm. But many times Search Engines are showing irrelevant results. Black Hat SEO specialists are responsible for this. They are using tricks like Keyword Stuffing, Hidden Text, Doorway Pages, Scraper Site, Article Spinning, Link-building Software, Link Farms, Hidden Links, Sybil Attack, Spam Blogs, Page Hijacking, Buying Expired Domains, Cookie Stuffing, Forum Spam, Cloaking etc. So, alternative methods are proposed here, which should be available beside conventional Search Engine.
Category: Information Technology
Standard dimension for monitor and photo
We are using monitor for different purposes: mobile screen, computer, television etc. But there is no fixed dimension or ratio. Simply think about a mobile phone monitor. Sometimes it is too large or sometimes it is too small. As the manufacturers failed to reach agreement, we are being harassed for this. Both users and website/applications developers are being disturbed. Here a standard dimension for monitor is proposed. Remember, it is the dimension of screen, not of device. And all screens must be of 3:2 ratios. All video recordings, TV channel broadcast, movie making etc. will follow 3:2 ratio.
OpenID’s advantages, disadvantages, solution and up-gradation plan
To use fingerprint as password is the final solution against security threat on Internet. Before making it possible ‘mobile phone code verification’ system and ‘OpenID login’ are the alternatives. OpenID provides the opportunity to enter a website with the help of another website without ID & password. For example, you are logged in to Google, now go to http://www.mail.yahoo.com and click on ‘Sign in with Google’ icon; you will be able to log in to Yahoo without id/password. To make it possible, you will have to connect one Google account to one Yahoo account only for one time.
Continue reading OpenID’s advantages, disadvantages, solution and up-gradation plan
New Method for Online Registration
When a website admin tries to get an email account or social networking page matched to his or her domain (or person’s name or business’s name) but fails as someone else has chosen that username already. If any person or organization named ‘xyz’ want to get a specific username blank in every email service and social network for branding, then radical reform is required for current registration process. There are more problems here. A lot of people have the name of more than two, three or four words. For example, Colombian pop star Shakira’s official nick name is ‘Shakira’ and official full name is ‘Shakira Isabel Mebarak Ripoll’. Former Secretary of State of USA Hillary’s full name is ‘Hillary Rodham Clinton’. Everyone does not have the name of two words only that they will use the method of ‘First name- Last name’ at the time of registration. Sometimes organizations are signing up registration forms; they do not have first name or last name. Even, they do not have birth date but establishment date. Now, what’s the solution?
best way to avoid spam call and email !!
State of the art security for Twitter, GoDaddy, Paypal, LinkedIn, Odesk, Wikipedia, Everyone, Alexa with Google and Facebook
COMPUTER FOR ALL
At 21st century, everyone should know how to use computer. Not for a job, not to earn money; it is important to color our life. Everyone does not need to be an expert bur all should know the basic. Now what is the basic for all ?