How many websites has eCreations designed and developed?
Each year, we take appoximately 50 websites from concept to launch and we currently actively support more than 250 websites. Find out more about our Web Design & Development services >
Each year, we take appoximately 50 websites from concept to launch and we currently actively support more than 250 websites. Find out more about our Web Design & Development services >
eCreations was founded in Phoenix, Arizona in October of 1997. Steve Tamulewicz, eCreations' managing member, has maintained his Certified Web Professional (CWP) credentials since 1998 and has more than 30…
Why is responsive web design so important? It’s no secret that people these days seem to be glued to their mobile phones or tablets. Mobile sales and internet usage has exceeded that of desktops over the past few years. Many sites today are seeing 25-30 percent of their traffic come from mobile devices. Having a responsive, fluid layout (according to device width), is essential. Users will visit your site more often because of the legibility, usability, performance, and easy navigation.
For organizations that already have existing sites that lack responsive design, responsive retrofitting is an option to creating better user experience across all devices. This approach essentially works backwards to create responsive design. The most common approach to apply new responsive styles is to link CSS containing a “max-width” media query in individual CSS files. Max width indicates at what screen width certain styles should be applied to. A few common break points are:
320px: Smartphone portrait width
480px: Smartphone landscape width
768px: iPad portrait width
1024px: iPad landscape width
1244px: Desktop/Laptop width
These media queries can also be applied at the bottom of exiting CSS files. The use of using both “max-width” and “min-width” can become necessary and useful to produce certain styles at specific widths.
(more…)
Technology is great, especially wireless technology. RFID, NFC, Bluetooth, Wi-Fi, etc, all allow the transmission of data without the need for cables. When at the register, ready to pay, I…
Sam is an online guru. He is cognizant of the links he clicks on, and the emails he opens, and his passwords are complicated to the point of tedium. Even…
Blogs, commonly WordPress sites, are targets for online hackers. Hackers target blogs for many reasons such as infecting visitors, collecting information (physical location, passwords, favorite places) for identity theft, or…
SQL (often pronounced as sequel) stands for Structured Query Language and is one of the most commonly known programming languages. It is used as an interface for exchanging information between…
Can you remain anonymous online? Limit your online footprint Remaining anonymous online isn’t just for people with things to hide. Normal citizens have become concerned with unwarranted intrusions into their private lives. Organizations…
Hashing Did you ever write a secret, “coded” message? Speak in Pig Latin? Swap “A” with “1″, “B” with “2″? These are all different methods of encryption – and whether it’s ROT-13 (A…
Social Networking: Are you safe? This question is often overlooked and is one that social network users should be asking themselves more often. Social networks are here to stay, and…
0 items in your cart ($0.00)