Jun 19

The leading SEO (Search Engine Optimization) sites will tell you that placing an ad after the first post in your blog’s home page is particularly effective.  This is because the ad is essentially embedded in the blog content, hence your readers are less likely to develop “ad blindness” and skip over the ad as usual.

To place an ad after the first post in your WordPress blog main page:

Continue reading »

Tags: , , , , , ,

Jun 14

Have you ever tried to find your Internet Explorer 7 (IE7) cookies or temporary files on disk using Windows Explorer?  Chances are Explorer is configured to hide system files, which is how Microsoft has designated the folder that contains its IE7 files.

Continue reading »

Tags: , , , , , , ,

Jun 14

Blogs are becoming an important and prevalent method for software developers to share knowledge, tips and code.  Unlike code-sharing sites that have publication guidelines and restrictions, blogs are typically privately-owned, which gives developers freedom to deliver and format their content in many ways.  But this freedom can also result in a poor experience for the blog reader, ranging from code samples that won’t compile, to the equivalent of a messy desk where nothing useful can be found.

Following are several tips for software developers to write and manage their blogs, and to make the blogs easier to use and navigate for their readers.

Continue reading »

Tags: , , , , , , , , , , , , ,

Jun 13

Many applications store data in the “My Documents” folder.  Unfortunately, by default this folder is buried at “C:Documents and SettingsUserNameMy Documents”.

A smarter approach is to separate your programs and data.  For example, I store the operating system and programs on my C: drive and all data on my D: drive. 

But simply moving your data is not enough–you need to tell applications and the operating system where to find it.

Continue reading »

Tags: , ,

Jun 05

Copyright infringement is the sincerest form of flattery.

What’s a Splog?

A splog or “spam blog” is a blog that steals content from other web sites, then aggregates and republishes all or some of the content on its own blog.

Splogs are created to promote and increase search engine ranking of affiliated web sites, and/or to make money from ads shown on the splog.  Typically splogs are automated, but they can also be manual copy & paste.  A recent study indicated that 56% of all blogs are spam, and there are over 575 thousand splogs reported.

Continue reading »

Tags: , , , , , , , , , , , ,

Jun 02

If you are a .NET developer, how would you feel if your original C# or VB source code was published on the Web for the world to see?  That’s exactly what happens if you release your .NET software without obfuscation.

Continue reading »

Tags: , , , , , , , , , ,

Jun 02

About one-third of all software installed on personal computers globally in 2006 was pirated, according to a study from IDC.  This resulted in a worldwide software revenue loss of $40 billion, an increase of more than $5 billion or 15% over 2005.  The software piracy rate exceeded 60% in more than half of the 102 countries studied, and exceeded 75% in about one-third of the countries.

Continue reading »

Tags: , , , , ,