hide me

Programming Tic Tac Toe: Magic Square

Programming Tic Tac Toe: Magic Square

There is an expression, “Form follows function” that is often used with architecture, product, and sometimes software design. It suggests a single solution. Depending on the software implementation, its target and the way the problem is perceived, among other variables, the internal “form” can be radically altered. Tic-tac-toe (naughts and crosses) seems to be a […]

Read & Discuss »

How to move a website from one webhost to another

How to move a website from one webhost to another

Most of the time, the first webhost you sign up for, you wind up outgrowing after a year or less.  Most people purchasing webhosting don’t know what factors to look for, and even if they do, it’s difficult to tell the seedy companies from the good ones.  On top of this, any good website should […]

Read & Discuss »

Vulnerable Software and Vindictive Search Engines

Vulnerable Software and Vindictive Search Engines

Technorati, a blog search engine (as opposed to a search engine that indexes all websites), has started taking the easy way out. They’ve started removing websites whose WordPress software has not been upgraded to the latest version shows signs of being compromised.  For our clients, make sure you’ve upgraded to version 2.3.3. Our clients sites […]

Read & Discuss »

Browser competition makes the web better

Browser competition makes the web better

In the browser wars of the early 90’s, competition between Netscape and Internet Explorer brought about proprietary HTML extensions (layers, anyone?), and “This site was built for Netscape Navigator” messages. This time around, there are organizations like W3C, and WaSP to give the competitors a goal to shoot for. The Acid2 test has started to […]

Read & Discuss »