Page 31 of 108

Announcing the Microsoft Wireless Display Adapter

Have you ever had something on your phone that you really wanted to show to your friends and family, but they had to huddle around you and your PC, tablet, or smartphone just to show them? This happened to me last weekend when my parents were visiting from out of town and I wanted to show them photos from my wedding this last summer our photographer took. Today we’re announcing the Microsoft Wireless Display Adapter, which connects to an HDTV, monitor, or projector and will let you easily share content from any Miracast-enabled device – including many PCs and Tablets running Windows 8.1. With the Wireless Display Adaptor, I don’t have to worry about getting everyone to huddle around a device. All the content I …

Continued here:

Announcing the Microsoft Wireless Display Adapter

How to Use KISSmetrics to Improve an E-commerce Checkout Funnel

One of the great things about KISSmetrics is that it helps you continually optimize your business. From revenue reports that tell you which ad campaigns bring the most customers to cohort reports that track critical metrics like login retention over time to many other insight-driven reports, KISSmetrics delivers pretty awesome tools for any marketer or manager. We couldn’t possibly cover all the benefits of KISSmetrics in one post. We would have to write a book. So, in this post, we’ll concentrate on one key feature of KISSmetrics – the funnel report. Specifically, we’ll focus on improving your e-commerce funnel. We’ll begin by viewing a funnel report and finding areas that need improvement. Then, we’ll form a hypothesis setting out changes …

Original post:

How to Use KISSmetrics to Improve an E-commerce Checkout Funnel

Announcing Keyless SSLâ„¢: All the Benefits of CloudFlare Without Having to Turn Over Your Private SSL Keys

CloudFlare is an engineering-driven company. This is a story we’re proud of because it embodies the essence of who we are: when faced with a problem, we found a novel solution. Technical details to follow but, until then, welcome to the no hardware world. (Update: The post with the technical details is now online.) Fall in San Francisco The story begins on a Saturday morning, in the Fall of 2012, almost exactly two years ago. I got a call on my cell phone that woke me. It was a man who introduced himself as the Chief Information Security Officer (CISO) at one of the world’s largest banks. “I got your number from a reporter,” he said. “We have an incident. Could you and some of…

Read article here:

Announcing Keyless SSLâ„¢: All the Benefits of CloudFlare Without Having to Turn Over Your Private SSL Keys

How to Do Link Building for a Brand New Website

FacebookTwitterGoogleLinkedin It’s done. After months of dreaming, planning, sketching, wireframing, designing, and developing, your brand new website is alive. But now what? Now that your website is live, the real work has begun—the work of building links and authority. Your website is only as awesome as it is authoritative. So, how do you take your shiny new website from its new-kid-on-the-block status and give it some link love? Don’t Do Link Building Like This First, there are some ways to not to do link building. Most of these are obvious, but let me just run through the basics. Don’t use a link network Don’t buy links Don’t exchange links Don’t do directory submissions Don’t be…

Originally posted here:

How to Do Link Building for a Brand New Website

TrueCrypt Getting a New Life

TrueCrypt will stay alive, thanks to devotees who are forking the encryption program’s code. ‘Cleaned up’ code will get a new name, CipherShed, and a different open source license. When the developers of TrueCrypt delivered the bombshell that they were abandoning their popular open source encryption program, it left many organizations in a hugely difficult position. Should they continue to use it, or heed the developers’ advice that it was no longer secure and switch to another encryption product? On the face of it, the decision should be an easy one: If the developers of something as security sensitive as an encryption program say that their program is no longer secure, surely it would be rash not to heed the warning. But with TrueCrypt, nothing is quite …

See original article:

TrueCrypt Getting a New Life

© 2025 Paul Parisi

Theme by Anders NorénUp ↑