The complimentary one-year domain name that web hosts use to lure new customers too often has a downside (or two). They range from inconvenient to security risks. But the most frustrating: failure to provide specific information on the "temporary" location of the website. …continue reading →
There are two sides to the Google+ coin: making it easy for readers to share your content on GooglePlus ... and having your Google+ profile show up in search results. We'll tackle both here. This post assumes you already have a Google+ profile. …continue reading →
The White House made a big statement about (digital) identity theft on Friday, with U.S. Secretary of Commerce Gary Locke announcing a public-private sector effort, National Strategy for Trusted Identities in Cyberspace (NSTIC). "The administration hopes to see a robust trusted ID market in the U.S. in three to five years," according to PC World.
The trusted ID technologies described in NSTIC would allow online users to dump passwords in favor of credentials that can be used on multiple websites. The Obama administration hopes that multiple trusted ID technologies will emerge, officials said.In order to justify this initiative, the Commerce Department presented faulty "logic" which was regurgitated by PC World: …continue reading →