Archives for June 2017

Coding on your morning commute

Many find that coding on the train during their commute is an excellent way to get some extra work done. Dev Randhawa suggests it’s also a great way to earn freelance income while you travel. However, there are security risks to be aware of. Consider three common risks and the measures you can take to mitigate them.

  1. Hacking via public WiFi

This is one of the biggest risks to coding on the train, as hackers will often try to use public WiFi to connect to your device and steal your information. Fortunately, there are things you can do to reduce the risk. If possible, use a VPN when connecting to your business network. Only visit websites that offer SSL connections. Turn off sharing when connected to a public network, and keep your WiFi turned off when not in use.

  1. Breach of confidentiality

A less common but nevertheless real risk is that someone looking over your shoulder will view confidential information on your computer or mobile device. To counteract this risk, avoid working on anything sensitive when in public (if you can help it). You might also consider privacy shields, which come in a variety of models and often help prevent snoopers from see things they should not.

  1. Physical theft

This is perhaps the least likely risk, but it is one to be concerned about nonetheless. Never underestimate the damage that can be done if your laptop or other device is stolen out of your hands. Keep it within sight at all times, and use a strong password in case the worst happens.

Important features to look for a shopping cart

Here are some important features that should be a part of any shopping cart services you select for your e-commerce operation:

Payment options

Consumers are no longer hesitant to use their credit cards online, and every shopping cart system supports cards. However, what you need to look for a is a system that supports other online payment methods. PayPal and Google Checkout are just two examples of services that consumers like to use as a security precaution against credit card fraud. Some providers like SecureNetShop.com can give you a merchant account in as little as 24 hours.

Search

When you use a shopping cart system, the user moves off-site and is within the store. Any search operations are now part of the store and not the main website. The quality of the search engine is important since there should be as little friction as possible for customers to find what they want.

Reviews

Studies show that sites with user-generated reviews generate more sales than sites do not. The increase in sales does come at a price. When users can enter their reviews, the system is then open to abuse. Preventing comment spam and abuse requires comment and review moderation teams. If you have the time and resources, then user moderation is a killer feature.

Real-time inventory

The worst thing that can happen from the perspective of a customer is to find a product, go through the long process of placing the order, only to be told that the product is no longer available. The chances are that customer will never return and encourage people to avoid the site for that same reason. Real-time inventory management is critical, especially for larger stores.

 

Data center or server room: Which is better for your business?

It wasn’t very long ago that all servers were entirely in-house. The company invested in the server room, the backup systems and security. Also, the company hired staff with specific skills to manage the different systems. Today, the story is very different, with cloud hosting or an LA data center, these same organizations have the option to stay in-house or move everything out. Here is a quick look at the advantages and disadvantages of maintaining your server room:

Advantages:

The main advantage is that you own all the systems. Everything happens on your schedule, and any costs can be deferred or incurred as you see fit. It is a lot of work, but it comes with the sort of customization that is difficult in most third-party environments. You can modify or change any component of the system to your needs, where in any other setting it might clash with the policies of the host or the requirements of other clients.

Disadvantages:

There are two big disadvantages. The first issue is with the resource requirements. You want your IT staff working on solutions and improvements to the technology related to running the business, rather than working to keep the data center running. The other is security. According to Rack Alley, there is an ever-increasing threat of new and advanced malware, viruses and malicious Internet traffic, which requires the sort of security expertise that is expensive to maintain in-house.