Saturday 4 August 2012
Movement Notification
Thanks for your continuous viewing of this blog. In order to serve you better, a full domain has been registered in which all thoughts, concepts and ideas associated with this gifted group will be shared. We are pleased to announce http://gistgarage.com as the platform for sharing our thoughts. All the posts from http://pelumyuncensored.blogspost.com and http://d-gitz.blogspot.com/2012/06/web-design-103-content-management.html have been migrated to the domain. We are happy to inform you that other aspects of our passion like sports and entertainment will be part of this new platform. Thanks for your loyalty.
Monday 18 June 2012
Web Design 103: Content Management
NB: You are advised to read Website Design 101 and 102
in this blog. Also, the requirement gathering phase on the “moving from
programming to software development as well”
Many website designers have always struggled with the
correct management of contents. Concluding the technology analysis gives you
the platform to move into the designs and expectedly the use of various content
that will give the interface and website usage the feel that users will
appreciate.
This aspect is what display professionalism and the
overall look and feel effect that distinguishes your website. The content of a
website include every bit of information, image, video, widget and others that
make the website. Designing a very good
website require detail and uttermost attention in managing the content. Content define a website and the proper
management is the true mark of professionalism.
Managing content starts from the layout of the web
pages. The layout technically implies how the web pages are divided. It is very
difficult to define this as website designers have shaped the layout in various
ways as ingenuity hold sway in this aspect. It is ideal that relevant and standardized
layout is defined in order to effectively manage the content.
The next content management aspect is the definition
of the web theme. The web theme defines the uniform feature of the website
through the reflection of the development purpose based on the continuity of design
elements. Your theme will guide the use
of the contents including movies, colour usage, text font and size, graphics
effect and other elements on the website.
I will like to talk about colour management. Effective
management of colour is imperative for website design. The colour combination
and the use of different shades of colour should be minded in the course of
designing of websites. The use of colour in text, designs and background should
be blended to give an excellent impression for users. It should also be noted
that the use of movies and heavy images should be sparingly used as it affects
the overall loading time and accessibility of websites.
I admit this article might not provide all the bits
required for proficiency in content management. For further enlightenment on
this particular article, you can contact through pelumiapantaku@gmail.com
Using IP Address to Combat Cyber Crime
Have you been wondering how PayPal, EBay, Google and
other websites have been able to identify your location without asking? How
does the network administrator in your office identify your system among the
numerous ones available? Sometimes, we feel we are anonymous while browsing the
internet because there is no physical monitor or no sense of any monitoring arrangement.
The simple answer is there is no anonymous user on the web because every device
and computers can be identified.
The fact is every device and computers on the
internet have unique address which can be used to trace them. This is popularly
qualified as IP address with some other technical terms like MAC address always
mentioned when describing this unique identification number. The source of scams or illegal and criminal
activity on the internet can be detected through the IP address that often
accompanies mails and other communication on the web. Discovering the IP
address will be conducted through the Internet Service Provider (ISP) who most
times holds the contact address or even residential address of the internet
service used.
I will like to propose that using this means can be
conducted by the implementation of systems where people can report suspected IP
address. The reported IP address or identity of the alleged scammer can be put
on a centralized cybercrime database (it must be developed also) with ISPs
having access. The IP addresses and identities can then be tracked over a
period of time thereby resulting in the overall arrest of the criminals.
I will admit that this process will require a lot of
industrial support and collaboration. Evidence of the successful use of this
means (Facebook and Pentagon) has shown that it is very viable and often lead
to easy arrest of criminals. Also, it requires little technical knowledge as
the ISPs do most of the work.
Monday 4 June 2012
CYBER CRIME EXPLAINED
I
was thinking about writing the first article on combating cybercrime when it
dawned on me that a lot of misconception exists about what this type of crime
implies. A lot of people have this vague idea about the actual meaning of cyber
crime and lack the understanding of cyber crime.
Crime
can be viewed as any action that is regarded as illegal and punishable under the
law of the state. Crime in essence can be viewed as a conduct which portends
harm or negatively affect individuals, animals, society or the environment.
Experience has shown that crime can be committed in error, deliberately or as a
reflex reaction.
Cybercrime
is a type of crime which involves the use of computers, internet/web and other
technological implementations to conduct illegal activity. This type of crime takes
different types of as the web is a wide virtual world where different types of
transactions and interactions can be conducted. For the purpose of
understanding, some of the types on crime that can be conducted on the web
include;
- Spamming: Some of us are ignorant that sending unsolicited send of mail as part of bulk mailing list for commercial purpose is a crime. This practice exploit the mail address by collecting money from commercial firms for the number of mails sent. Some firms even sell CDs containing mail address and claim they are into e-marketing.
SELLING
SOMEBODY ELSE’S MAIL ADDRESS IS A CRIME!
- Content Abuse: this crime represents the communication or transmission of contents that can offend or affect the state of mind of others. This can include racist images or videos, obscene images and other contents that fall into this category.
- Cyber Terrorism: The use of the web for terrorist attack is on as series of deliberated and calculated attempt at destroying the instrument of governance in governments are been targeted using sophisticated technological implementations. Some cases like illegal intrusion into technological infrastructure of government agencies have been recorded in the US and defacing of government related websites in Nigeria is another example.
- Cyber Fraud: This is the most prominent of the crime as various implementations have been deployed in using the web for swindling or deceptively collecting money from victims. This practice can take numerous forms like illegal account access, dishonest use of web interactions, misrepresentation of facts and even betrayal of trust in internet enabled relationships. This type of crime is so wide that it often dwarfs the effort of security agencies as it takes different dimensions. The prominent in developing nations like Nigeria is the popular practice called Yahoo Yahoo where victims are tricked to part with some money based on a juicy business offer or audacious inheritance offer.
This
article cannot exhaust the crimes being perpetrated on the web. However, cyber
crime represents every illegal or harmful use of the web as it relates to
fellow human, animals, society or the environment. We will be exploiting the
ways of combating this crime in subsequent posts.
Please
follow @originaldgitz for serialization of this article and other technological
flakes as required. We will also like you to join the group D-GITZ Media
Friends to be part of the family.
Monday 28 May 2012
Web design 102: Technological Analysis
HTML is the standardized web site
design language. However, rapid technological development has
made the language to take back stage as more focus is placed on web portal development
with extensive use of sophisticated web development tools. As a web designer,
you must conduct technological analysis before developing a website. This exercise is conducted to determine the most relevant
and appropriate technology for the web.Technological analysis is very
important for web design for following reasons;
1.
It allows you to determine the personnel that
will give you the intended input in the development.
2.
It allows you to determine development budget as
it will influence the hosting plan and other costs.
3.
The exercise allows your choices to be based on
factual reasons
4.
Relevant softwares and implementation platforms
can be factored at the development initiation and secured for the actual
development.
Conducting this analysis in
practical terms involve objective analysis of the functionalities desired in
the website coupled with possible technologies that can be deployed for
achieving them. You have to conduct an head-to-head analysis in various aspects
like servers (wamp, apache, IIS and so on, programming languages (JSP, ASP.net,
PHP and so on), image formats (PNG, GIF, JPEG and so on), database engines (MySQL,
SQLserver and so on) and development environment (Visual studio, Dreamweaver, FrontPage
and so on).
Having done this numerous times,
I can boldly claim that the effort is worthwhile as the end result always bring
the most appropriate technologies that will seamlessly integrate for optimum
web functionality. However, conducting a technological analysis must be
conducted without any form of sentiments or else the aim of conducting will be
defeated. Also, interaction with other technologies must be considered while
selecting the appropriate technologies.
I will be discussing Content
layout and interface design in the next lesson. Please don’t miss it.
Combating Cyber Crime
Nigeria is
prominent for cyber crime or scam popularly called Yahoo Yahoo (advanced now is
Yahoo+). It always baffles me how we got to this level coupled with the sheer
societal acknowledgement and uncontrolled manner in which these heinous crimes
are perpetrated. As a professional, I always think this is one of the
easiest crimes to forestall and requires not too sophisticated technological
implementations before a criminal can be arrested.
This crime
has created embarrassment for Nigeria nationals across the globe as major
e-payment services have put the nation on the blacklist. Organisations like PayPal
and EBay has totally stopped any transaction that relates to Nigeria. This scum
is a major challenge in our society as little children even are acquainted with
terms like maga, control number, sequence and so on. The Nigerian entertainment
scene is another breeding ground for these criminals as their act and conquest
are always reflected in songs and even movies. Stopping this is a major step
for policing and crime prevention in Nigeria. Combating cyber crime is a major
branding effort and signal to the world that the nation is serious about
corruption.
Technologically,
we can combat this crime. Ways of combating cybercrime coupled with early
detection will be discussed in subsequent posts. The background to the discussion
is that, your identity on the web can be detected effortlessly. The approach to
be taken the security agencies with intricate analysis will be discussed.
STAY TUNED!
Sorry for
the silence, it was due to commitments and loads of tasks to be executed. Follow us at @originaldgitz on twitter or join D-GITZ Media friends on Facebook.
Monday 14 May 2012
Where are the IT Reporters?
Reading
the Sketch newspaper when I was young is only meaningful from the back page. Sports
news resides there and I am always eager to know the next move of Mary Onyali,
Florence Omagbemi, Rashidi Yekini (RIP), Segun Toriola and the rest. Also, the
Champions league (not easily accessible as it is today) and other sporting
details always had me scamper for my Dad’s newspaper.
Now
my new love which is Information Technology (IT) has got me reading the news
papers once again. Also, listening to the radio and watching the television
always brings a particular question to my mind;
WHERE
IS THE TECHNOLOGY NEWS!
Stations
like CNN, BBC, France24 and others have dedicated time and experts reporting
about the numerous trends in technology. Some websites, bloggers and magazines
are dedicated to this cause as well. No wonder, the level of awareness and
deployment of technology is thriving in developed nations.
COUNTRIES
LIKE NIGERIA ARE MERELY FEEDING ON THE CRUMBS FROM THESE NATIONS.
Sampling
the broadcasting, journalism and reporting landscape of the Nigerian media have
further deepened my concern as there is a colossal dearth of technological
analysis and in depth discussion of technology. The most common technology
reporting are announcement of product rollout, press conference and contract
announcement. It is a pathetic trend and will haunt us for decades to come.
IF
YOU DON’T REPORT, THERE WON’T BE SENSITISATION
The
major challenge in IT development around this part of the world is we have not
drummed this amazing field into the young children. The midget computer schools
have sold wrong information and young citizens have no direct access in the print
and electronic media. In order to drive technology development, I think it is
highly imperative for the Nigerian nation to see technology journalism as a
field to be broadened. Drive IT Home and pack IT in the garage.
WE
NEED TO BRING IT TO PEOPLE’S HOMES!
Please,
comment on our posts because your comments are valuable to us. For further
details, please contact pelumiapantaku@gmail.com
or twitter using @Pelulomo_27
Monday 7 May 2012
Web Design Lesson 1: Concept Development
The first step
in web design is concept development. This process involve the bringing
together of all the features and requirements for the websites. This will
involve the client or the group of people contracting the web design. This
aspect is usually neglected by web designers as they quickly pre-empt the
features which a website should possess.
Another banana
peel in this area is comparative analysis of the features which similar
organization has on their website. Web designers should treat each project as a
unique market. Every organization (as poor as they might be) have unique
selling point or organization structure. Features like product, pricing,
delivery format, human resources and others are different.
Bringing the
concept of designing a website requires brainstorming and discussion with
clients to determine their focus and expectation in a website. This will make
you a professional and also allow you to be unique in the saturated web design
market.
Furthermore,
designing a concept require you discovering the focused market of the website.
For example, an entertainment website normally targets young people thereby
influencing features such as real time audio download, chat engine, musical
chart, blog and so on.
UNDERSTANDING THE TARGET AUDIENCE WILL INFLUENCE EVERYTHING ABOUT THE
DESIGN!
Another aspect
in developing the concept is to understand the business environment of the
organization. There is nothing bad in exploring the client’s competitors’
website to discover their flaws in order have a better design. Doing this will
further increase your value as web designer because you will be more informed
about the than the client expected.
Doing all these
will ensure that the concept of the web site to be designed is based on
concrete information and market based research. This will influence your design
and ensure that you exceed the expectation of the website. The next post will emphasize on another
aspect.
Please,
comment on our posts because your comments are valuable to us. For further
details, please contact pelumiapantaku@gmail.com or
twitter using @Pelulomo_27
Designing a Website
Website
traditionally represents the creation of an online presence for businesses,
groups and individuals. The web has provided a massive opportunity for
organizations to create marketing models that has championed colossal profits.
Globalization and integration of markets has made the web the virtual reality
of wealth creation. Ask Mack Zuckerberg and Larry Page how much money the web
can create.
However,
it is disheartening that web design is dominated by mediocrity or sheer lack of
competence in Nigeria and some other parts of Africa. I see advertisements that
portray web design as a touch and go profession. Many even boast of designing a
web site in 2 hours while some promise to teach web design in one hour and
teach how to make money with it in the second hour. This is evident in the
quality and lack of professionalism in hosted Nigerian websites. A quick survey
of University websites in Nigeria is evidence.
Web
design professionals spend months and even years to learn the process of web
design because it is the online office of any organization. It markets a firm
or group of people even while sleeping. Poor design and concept development
turn viewers off thereby limiting the amount of patronage that is to be
enjoyed.
DESIGNING
A WEBSITE IS A PROJECT!
Web
site are no more designed but developed as dynamism is the order of the day on
the web. A business website on the web these days has so many connections to
the social media, blogs, e-mails and search engines. Assembling all these
features require high level of planning and technical competence. The process
of designing a website requires numerous activities which will be discussed in
subsequent posts.
Please,
comment on our posts because your comments are valuable to us. For further
details, please contact pelumiapantaku@gmail.com
or twitter using @originaldgitz
Wednesday 2 May 2012
The Act of Programming
Programming
has always been characterized with different arguments and perspectives. Some
of the arguments include open source and patent programming, web/mobile and desktop
programming, client-server and business tier programming and the choice of
programming language. Away from all these controversies, new entrants into
programming are usually confused by the best pattern of development in
programming.
Most
of programmers reachable in recent times are mere glorified code writers as
they often exhibit narrow understanding of scenarios. Some have to re-write
codes for a particular problem over and over again. Hence, the frustration of
programmers that even leads to numerous prospective application development
giants abandoning this lucrative aspect of information technology. Here is my
perspective on effective development of programs.
Writing
a program should start from pseudo coding. This aspect often neglected by
programmers because it is elementary. This process requires drafting the steps
required in solving a particular problem which the program is meant to solve
(Even complex programs need this). This can be done using bullet point or
detail outline of steps which the program will implement. Brainstorming is
required at this level to also discover the factors and other vital components
of the program.
Flowcharting
is the next stage. This activity is old but very efficient as it allows you to
transform the pseudo codes into implementation sequence. Flow chart will
describe the flow of the program in order to achieve its goals. Other diagrams
that can be developed include ERD (for databases), Data flow Diagram and UML.
For
advanced programs, it is advisable to develop a use case that identifies the
functionality and privileges of each user and entities associated with the
application. The next phase is what I termed the object specification activity.
This is where you determine the functions, construct, data types and other
nuclear programming features which will be deployed. This phase requires
objective reasoning on how the program will be developed. The flow chart should
be core in this phase. The last activity is the actual coding which is what
most programmers in this part of the world start first.
THINK
FIRST BEFORE YOU ACT (CODE)!
This piece is my contribution to improving the human
capacity in the Nigerian and global IT space. If you have learned something or
you have any corrections, please leave your comments. My name is Pelumi
Apantaku and my twitter handle is @Pelulomo_27
Subscribe to:
Posts (Atom)