A closer lookMonday, June 15th 2020 It is natural to approach a new project with the finish line in your sights, and in our experience that always leads to wasted money and time. We always recommend a modular build strategy where features are split into different development phases. Why? Let’s take a look at the top 4 modular strategy advantages.
Unforeseen options. During the design process it is inevitable that there will be changes in features, specifications, and even sometimes products themselves—it is difficult to anticipate every possible outcome and useful to be able to change gears without undoing hours of project management and product scope. Read More
A closer lookFriday, June 12th 2020 Most people know that website visits are logged and things like locations and IP addresses are stored in logs somewhere in a dusty corner of the internet. The fact of the matter is that this is just the surface of a complex and fascinating world of web traffic analysis.
Details about the device you are using are logged, including: your operating system, browser, browser plugins, CPU, GPU, and battery levels. But it gets even more interesting from there because systems are now collecting an excellent log of human behavior. Read More
Polygraph Side ChatsThursday, June 11th 2020 During childhood we are taught to mask our feelings to be polite and socially graceful. Our facial expressions, voice tone, arms, hands are just a few of the things we quickly learn to control. Feet motion, however, is usually not something that a parent would correct and thus we rarely learn to control our feet and their various forms of expression.
Entire volumes could be written on the body language of feet, but let’s keep it to three interesting ways feet express how people really feel.
A closer lookWednesday, June 10th 2020 Everyone knows you have to be careful with links sent via email, but most people don’t know exactly why. Let’s take a closer look.
First, it’s important to know that it is still relatively easy to make an email appear to come from someone else. This is called spoofing, and allows unscrupulous people to send an email that appears to come from your bank, your credit card, your web host, or anywhere else. Read More
A closer lookMonday, June 8th 2020 Email tracking, or sometimes called pixel tracking, is a way to determine if someone has read an email after you have sent it. Once sent, an email is delivered to servers which you have no access to, making it difficult to determine when it is opened. There’s a solution though: using remote content, usually a small 1px by 1px transparent image. These images are tiny and clear so they don’t get in the way.
But what good does a tiny invisible image do? The answer is beautifully simple. It acts as a link back to a server to which you have access. When email newsletters are sent, an image with a unique ID is added to each individual email. Example: The email sent to Zakk may have an ID of 1234. Now whenever the server gets a request for image 1234, we can tell that Zakk has opened his email. Read More