How long has eCreations been in business?
eCreations was founded in Phoenix, Arizona in October of 1997. Steve Tamulewicz, eCreations' managing member, has maintained his Certified Web Professional (CWP) credentials since 1998 and has more than 30…
eCreations was founded in Phoenix, Arizona in October of 1997. Steve Tamulewicz, eCreations' managing member, has maintained his Certified Web Professional (CWP) credentials since 1998 and has more than 30…
Why is responsive web design so important? It’s no secret that people these days seem to be glued to their mobile phones or tablets. Mobile sales and internet usage has exceeded that of desktops over the past few years. Many sites today are seeing 25-30 percent of their traffic come from mobile devices. Having a responsive, fluid layout (according to device width), is essential. Users will visit your site more often because of the legibility, usability, performance, and easy navigation.
For organizations that already have existing sites that lack responsive design, responsive retrofitting is an option to creating better user experience across all devices. This approach essentially works backwards to create responsive design. The most common approach to apply new responsive styles is to link CSS containing a “max-width” media query in individual CSS files. Max width indicates at what screen width certain styles should be applied to. A few common break points are:
320px: Smartphone portrait width
480px: Smartphone landscape width
768px: iPad portrait width
1024px: iPad landscape width
1244px: Desktop/Laptop width
These media queries can also be applied at the bottom of exiting CSS files. The use of using both “max-width” and “min-width” can become necessary and useful to produce certain styles at specific widths.
(more…)
Technology is great, especially wireless technology. RFID, NFC, Bluetooth, Wi-Fi, etc, all allow the transmission of data without the need for cables. When at the register, ready to pay, I…
Sam is an online guru. He is cognizant of the links he clicks on, and the emails he opens, and his passwords are complicated to the point of tedium. Even…
Blogs, commonly WordPress sites, are targets for online hackers. Hackers target blogs for many reasons such as infecting visitors, collecting information (physical location, passwords, favorite places) for identity theft, or…
SQL (often pronounced as sequel) stands for Structured Query Language and is one of the most commonly known programming languages. It is used as an interface for exchanging information between…
Can you remain anonymous online? Limit your online footprint Remaining anonymous online isn’t just for people with things to hide. Normal citizens have become concerned with unwarranted intrusions into their private lives. Organizations…
Hashing Did you ever write a secret, “coded” message? Speak in Pig Latin? Swap “A” with “1″, “B” with “2″? These are all different methods of encryption – and whether it’s ROT-13 (A…
Social Networking: Are you safe? This question is often overlooked and is one that social network users should be asking themselves more often. Social networks are here to stay, and…
How to keep safe with strong passwords -Internet security is based on the “weakest link” principle, and passwords are often times the only method of protection. Passwords are our first…
0 items in your cart ($0.00)