Latest Stories
Most recently published stories in 01.
Closed Captioning Offers Accessibility For Online Learning
The world is switching to online communication and learning. As the global pandemic continues, classrooms and meetings are moving to online platforms. One of the most popular online platforms for video conferencing is Zoom. But video conferencing can be difficult for those with hearing loss or for whom English is a second language. How can we make sure it is accessible for everyone?
By Jenny Beck6 years ago in 01
Is SearchMine a Virus?
As more and more people look to the internet for entertainment and information, more people are opening up themselves and their computers to the possibility of being hacked. Having your computer doesn't always mean that your files and personal data will be put at risk; however, it does usually mean that you are in for a range of annoyances.
By Marshall Stevenson6 years ago in 01
Found a 404 on Your Blog? Here is How to Fix It
You’ve been getting notifications that your website doesn’t work and you want to act quickly. But how when you have no idea how did it emerge in the first place? What went wrong? Did someone plant this? How the hell do you remove it? Stay calm, everything is under control, we’ll comb through this together and get a fix once and for all!
By EmmaWilliams6 years ago in 01
What is ASPX File? Its Advantages and How to Open One
Websites are a bit intricate and require several configuration files like ASPX to operate. You could be asking, what is ASPX file? Well, it merely stands for Active server pages used by web servers to run Microsoft ASPX.Net web forms. It essentially directs the browser on which element to fetch from the server, including images, text, and other assets. It contains several scripts that get processed into HTML by the server then sent to the user's web browser to help in communicating on how to open and display a page. Have a look into details of what it entails.
By Chatwalee Pingks6 years ago in 01
5 Ways to Stay Protected from Advanced Phishing Threats
line users care to look at the padlock icon that differentiates HTTPS protocol sites from the illegitimate sites. That means that there is an urgent need for users to be educated on the importance of HTTPS protocol in the fight against phishing attacks. That is not all. Users must also be encouraged to adopt safe online practices both on their computers and their smart devices.
By Flora Mayer6 years ago in 01
Domain Driven Design — Domain Model and its Components
In my last story , I had gone through what are domains . Domains as a recap are core functionalities of the current business model . Most of the time, domain experts spend a lot of effort discovering in-depth about domains in the business ecosystem to help identify the problem in detail.
By Harish Subramaniam6 years ago in 01









