You wouldn’t imagine that to be a good Website developer, you would need to be well versed in astronomy. But in fact, many modern Websites use an astronomical concept to make Websites more dynamic.
In astronomy, “Parallax” is a difference in the apparent position of an object viewed along two different lines of sight. The term is derived from a Greek word “parallaxis” which means alteration. Nearby objects have a larger parallax than more distant objects when observed from different positions, so parallax can be used to determine distances between different objects in the sky.
In Website design, we’ve used Parallax scrolling since 2011, which is where background images move slower on the screen that the foreground content slower than foreground content. Developers use parallax backgrounds as a tool to better engage users and improve the overall experience that a website provides, without having to create costly animations or videos. Basically, it is a cheap and easy way to make movement on your site without having to do a lot of work.
You can see an example in this template – watch how the car background moves at a different pace as the rest of the website as your scroll down. The same is true with the background to the testimonials section further down the page.
Is it Parallax scrolling for Websites a good thing? A study by Purdue University showed that Parallax websites were rated as more “fun” by participants in their study, but there was no overall benefit over Websites that scrolled in a more ordinary fashion. So it isn’t a bad thing, but it doesn’t appreciably change how people use your website either. As time goes by, this technique will probably be replaced with different ideas. And as Website developers, we’ll be here to use them.
As experts at Website development, we need to know whether a Website works well for both genders. The traditional way to do this would be to organize focus groups and show the Website to men and women and gauge their reaction to it. This would be expensive and time consuming. Using Google Analytics, there’s an easy way to do this without meeting anyone in person.
Before we go over the technique, what are some issues that would effect your Website’s performance by gender? Men and women perceive things differently, and this can effect people’s reactions to your products and services. According to Digital Synopsis, men and women have different color preferences. A study in the International Journal of Design, showed that men were more concerned with functionality, women focused on aesthetics more. Men generally preferred sharp lines, women liked rounded corners. All of these generalities are just that, and the only way to know how they impact your business is to test them.
Tools to test a Website for gender issues.
1. A Website
2. Google Analytics Account
To get started, you must configure your Website to use Google Analytics. Then, you need to go to Google Analytics reporting and visit the Audience –> Demgraphic –> Gender report. If you haven’t already, you need to press the “Enable” button for the Demographics and Interest Reports so Google will show you the data. You may need to wait up to 24 hours to see results.
Despite all of the hype, social media isn’t the only way to promote a business. In fact, some businesses, despite whatever efforts they make, won’t get any business as a result of social media activities. For example, B2B (business to business) service businesses, such as lawyers, accountants, and Web site developers won’t likely get much from social media.
That said, all businesses in 2015 ought to have a credible social media presence. Even those that won’t get business from social media should have something out there that looks professional and up-to-date. That’s because people look there from time to time and you ought to look your best as people try and get a background on your business.
Here’s what a credible social media presence looks like:
At least 100 followers/likes/etc. – You want to make sure that if someone goes to your social media pages on Facebook, Twitter, Google Plus, etc, that it appears like more than just and your friend are the ones who are using it. You’ll want these to be real people — so a quick email to friends and clients asking them to “like” your page will usually get you to at least 100.
Branding that matches your Web site and other collateral materials — You want to make sure your social media pages have matching logos and other visuals that look like other materials your company produces.
Updated content — You need to have content that is updated recently to look credible.
Credible content –– You need to have content that is relevant to your business and looks like it was prepared with thought and intention.
In 2014, it has been the year of security for the Internet. Put more correctly, it has been a year of insecurity — very prominent vulnerabilities in major pieces of software, hacks that compromised millions of credit card numbers and lots of activity involving network intrusions.
One part that hasn’t received a lot of attention is the state of insecurity of many Web sites. Since the creation of the modern commercial Internet in the 90’s, sites that have transacted in credit card or other sensitive data have always had a “padlock” symbol in the browser, indicating that the conversation between users and the site were encrypted so no one else could easily see the contents of the conversation.
In the past few years, mostly in response to high profile incidents, major companies have begun encrypting email, search and social media sites – since they contain information that is private in the same way that credit cards are private.
But thanks to an effort underway, it looks like all sites will be encrypted in the near future. Right now, to encrypt, you need to buy a certificate and renew it sometimes yearly. It is a manual process that is annoying to work through. Let’s Encrypt, a non-profit funded by Mozilla, Cisco and others, promises a free and automated process. If that happens — and that new technology gets integrated into all major browsers, you’ll see most sites choose to encrypt and that will mean a safer Internet for everyone. Stay tuned!
Kevin studied fine arts in school with an emphasis in printmaking. In school he took a class on digital art and found that using the computer to make images seemed very similar to printmaking for me. After the internet took off he became interested in HTML but didn’t really become active developing websites until he took a certification program in web design and development. Kevin moved to Seattle from Montana to go to the University of Washington and has never left. He also loves to cook, travel and garden. He believes it is great to go somewhere around the world and try new cuisine and then come home and try to duplicate what you fell in love with on your latest trip.
2014’s Time Person of the Year could very well be the anonymous hacker. After all, this year hackers have compromised private information from Snapchat, Yahoo, Dropbox, Apple, Microsoft Windows among many others. They’ve also compromised credit card data at Chase, Home Depot, Target, and many others. There have also been serious bugs found in Linux, which is the most popular operating system for servers.
Unfortunately, there is no one antidote for all of this. But there is a lesson — 2014 has taught us that companies and individuals need to do a better job securing data and to be more judicious about what we store on online systems.
One way we can all do this is to take advantage of two factor authentication. The idea is that in order to sign into a service for the first time from a device, you need a password and then something else. The “something else” is often a code that is sent via text message or app. That way, if someone gets your password, that isn’t enough for them to get into your account. Here’s a list of popular services, and how you can enable this important service:
Microsoft Accounts: Microsoft’s two-factor authentication sends you a code via text message or email when you attempt to log in from a new machine, though it also works with a number of authenticator apps. You can enable it here.
Yahoo! Mail: Yahoo’s two-factor authentication sends you a 6-digit code via text message when you attempt to log in from a new machine. You can enable it here.
Two Factor won’t fix Internet Security, but it is a prudent step that should help.
I don’t know about you, but my Facebook news feed has been overrun by people (friends, family and celebrities) taking the Ice Bucket Challenge. If you don’t know about it yet, it is about raising awareness and money for research into ALS. You either dump ice water on your self, donate $100 to the ALS foundation, or I’m guessing that some people do both. The foundation has raised millions of dollars from this viral idea, and taught millions about ALS. Mission accomplished.
Of course, there will be other foundations that will attempt follow on promotions that are similar to what was so successful for ALS. There will also be some for profit companies that will attempt (and likely fail) to do similar ideas. Those follow on ideas are reflexive — but not very creative. I’m most interested in the overall lessons this teaches so that my clients can learn from this and apply the concepts to future promotions. Here’s what I see as lessons from the ALS Ice Bucket Challenge:
People want to be involved in helping other people, but would like an easy way to do it. Donating money is hard, sitting at a community festival education people about your non-profit is hard — but dumping cold water is easy.
People want to be part of things others are doing. My neighborhood does a Thriller Flash mob for Halloween every year. The event is successful because it is a bunch of people having fun together — no one wants to dance Thriller by themselves.
Giving people choices is important. The challenge is $100 or dump ice water. The foundation has been successful with both — so I;m guessing some people are dumping water and also donating money. Giving people a choice allowed people to access the promotion at whatever level they wanted.
Imagine this: You are an electrician and you get this message from a prospective customer:
Calling all Electricians:
You could be eligible for a chance to win a trip to Las Vegas and have a display about your business at the MGM Grand during a big event. Simply sign up to run all of the wiring for one of our 100 events around the country. Click on this Web site for more information.
Of course, electricians are never asked to enter contests like this. But graphic designers are asked all of the time. What’s wrong with contests?
They aren’t good for designers: designers need to eat. If they can only get paid if they win a contest, then they can’t eat.
They aren’t good for clients: contests create quantity but not quality. A contest will generate hundreds of designs to choose from. A quality designer will give you far les to choose from, but all of their choices will be good for your business.
Came across a lead that never called me back for help with his Web development project. I called back again today and he said he had hired someone else. I was curious why, so I asked. He said he hired the 1st Web site developer who called.
There are many reasons why you shouldn’t hire the 1st designer who calls you, most are obvious. I guess the best part for me is that the type of client who makes decisions in that manner isn’t the client I’m trying to find for my business!
Web site developers have been able to tell you a lot about users of Web sites. We could tell you:
How they visited the site: When a user visited, How many pages and which pages they visited,
About the user’s computer: What Web browser and Operating System they use, what screen resolution they have
The user’s general location: in what state and city they are located in (or if the user consented, a more specific location)
How they found the site: Did they find it by visiting it directly, clicking on an ad, or visiting a search engine.
There were (and are) limits. Here are some things we couldn’t tell you (unless the person self reported the information):
The user’s name and contact information
Their age or even their gender
Things they are interested in.
We still can’t tell you someone’s name or contact information, but thanks to Google, you can now get demographic information about a significant minority of your site’s visitors. It has some limitations:
Google only has age and gender and interest group information for some users, but not for all users. In my example site, we saw data on about 50% of users. Your mileage may vary.
You can’t see individual user’s data — you can only see an aggregate. You can combine it with other attributes (like # of pages visited) to get more data about each group.