Originally designated Shefford & District Upper School, it was as Samuel Whitbread Upper School that it opened on a purpose-built site on the 4th September 1973, as part of Bedfordshire County Council's re-organisation into a 3-tier, non-selective school system. Adult education provision was in place from the beginning under Mr Gordon Ainscough, but the name of the institution was not changed to Samuel Whitbread Upper School and Community College until 1975 (when the 'Headmaster' became the 'Head') and it became Samuel Whitbread Community College, (led by a 'Principal') at some point in the late 90s.
The Headmaster when the school opened was Mr Kenneth Dodsworth, and the Chairman of Governors was Alderman W. Inskip.
The original intention was for the school to have an eventual roll of 1100, drawn from the existing secondary modern schools Robert Bloomfield and Etonbury, which were to become middle schools, and from 1975, a planned purpose-built Henlow Middle School.
There were 457 pupils when the school was opened: 249 in what was then '3rd Year' (now known as Year 9) from the Robert Bloomfield and Etonbury Schools; 94 in the '4th Year' (Year 10) and 117 in the 5th Year (Year 11) who were from Robert Bloomfield only. A vestigial 6th Form of 5 former Robert Bloomfield pupils was enrolled, although 6th form courses were not yet in place.
30 teachers were employed in September 1973, the last of whom retired in 2007, at that time there were 25 support staff, including 8 cleaners and 9 kitchen assistants.
Thursday, April 29, 2010
Awards, decorations and vexillology
Eagle Scout (Boy Scouts of America) · Flag of Armenia · Flag of Australia · Flag of Belarus · Flag of Canada · Flag of Germany · Flag of Hong Kong · Flag of Japan · Flag of India · Flag of Lithuania · Flag of Mexico · Flag of Portugal · Flag of Singapore · Hero of Belarus · Hero of Ukraine · History of merit badges (Boy Scouts of America) · Medal of Honor · National emblem of Belarus · Order of the Bath · Order of Canada · Order of the Garter · Order of St. Patrick · Order of the Thistle · Victoria Cross · Victoria Cross (Canada) · Victoria Cross for Australia · Victoria Cross for New Zealand · Wood Badge
Art, architecture and archaeology
7 World Trade Center · An Experiment on a Bird in the Air Pump · Angkor Wat · Anthony Roll · Bronwyn Bancroft · The Battle of Alexander at Issus · Felice Beato · Belton House · Bodiam Castle · Borobudur · Boydell Shakespeare Gallery · BP Pedestrian Bridge · Bramall Hall · Matthew Brettingham · Brougham Castle · Buildings of Jesus College, Oxford · Buildings of Nuffield College, Oxford · Bruce Castle · Sir William Bruce, 1st Baronet, of Balcaskie · Buckingham Palace · Buildings and architecture of Bristol · Campbell's Soup Cans · Castle · Catherine de' Medici's building projects · Chicago Board of Trade Building · Cloud Gate · Crown Fountain · Deconstructivism · Lisa del Giocondo · The Disasters of War · John Douglas (architect) · Dürer's Rhinoceros · El Greco · Greece runestones · Adolfo Farsari · Fort Ticonderoga · Fountain of Time · The Four Stages of Cruelty · Four Times of the Day · Freedom Monument · Caspar David Friedrich · Funerary Monument to Sir John Hawkwood · The Garden of Earthly Delights · Heian Palace · Ima Hogg · Holkham Hall · House with Chimaeras · Hoysala architecture · IG Farben Building · Jay Pritzker Pavilion · Joseph Priestley House · Paul Kane · André Kertész · Las Meninas · El Lissitzky · Maiden Castle, Dorset · Mary Rose · McCormick Tribune Plaza & Ice Rink · Michigan State Capitol · Henry Moore · Sylvanus Morley · Benjamin Mountfort · Museum of Bad Art · Makinti Napanangka · Oregon State Capitol · Palazzo Pitti · Palladian architecture · Robert Peake the elder · Pennsylvania State Capitol · Francis Petre · Point Park Civic Center · Portrait of a Lady (van der Weyden) · Prince's Palace of Monaco · Queluz National Palace · Quiriguá · The Raft of the Medusa · Restoration of the Sistine Chapel frescoes · Rokeby Venus · Pierre Rossier · Sanssouci · Scottish Parliament Building · Shotgun house · Shrine of Remembrance · Sicilian Baroque · St. Michael's Golden-Domed Monastery · Stanford Memorial Church · The Swimming Hole · Takalik Abaj · Tech Tower · Templon · The Third of May 1808 · Three Studies for Figures at the Base of a Crucifixion · Tomb of Antipope John XXIII · Triptych, May–June 1973 · Trump International Hotel and Tower (Chicago) · Vasa (ship) · John Vanbrugh · Roman Vishniac · West Wycombe Park · Western Chalukya architecture · John Michael Wright
Web Hosting
In the web hosting industry, the term is used to describe a situation in which a company provides hosting plans that are unsustainable if every one of its customers uses the full extent of services advertised. The term is usually referred to the web space and bandwidth transfer allowance. A hosting company may offer unlimited space and unlimited bandwidth, however, they put other restrictions in place such as CPU usage or inode limit. They may have onerous restrictions and one-sided contracts that lets them cancel the hosting of anybody that puts a strain on their system or fully uses their claimed allotments.
This practice usually incurs little ill-effect since most customers do not use any significant portion of their allocated share. If a customer has a small, low-traffic site serving static HTML pages, few resources will be used. If a customer wishes to run a high-traffic, professional, or business website an oversold hosting account can be detrimental. In these cases, a shared hosting provider that does not oversell, a virtual private server or dedicated server is a preferred option.
This practice usually incurs little ill-effect since most customers do not use any significant portion of their allocated share. If a customer has a small, low-traffic site serving static HTML pages, few resources will be used. If a customer wishes to run a high-traffic, professional, or business website an oversold hosting account can be detrimental. In these cases, a shared hosting provider that does not oversell, a virtual private server or dedicated server is a preferred option.
Internet connectivity
ISPs regularly sell more bandwidth or connectivity than they have. One of the most successful dial-up providers America Online had an extremely high subscriber-to-line ratio of 20:1.[1] While initially relying almost solely on overselling, broadband providers have recently been pushing hard to get out of that business model. They wish to prevent commoditization as users become more elastic to available bandwidth.
Hosting environment
Hosting Environment is a term used in telecommunication and Internet businesses.
Hosting is a relatively new form of business between a vendor and a telecom operator.
The vendor normally sells equipment and services to a telecom operator. The equipment and services sold are used to provide a consumer service, like picture mail or download of ring back tones.
Due to the changing telecommunications business and a burst of a very large number of new consumer services, new business models are being created. The common two are revenue share and managed service hosting. This is where the term Hosting Environment comes from.
Hosting environment is the physical environment where hosting services are offered from. Typically hosting environment in telecommunication terms would be a Network Operating Centre (NOC) housing the equipment needed to host a service.
This can be broken down to include all hardware, including servers, routers and their cabinets. In most cases the equipment would be rack mounted and connected through one or more LANs. In order to provide security and allow multiple operators to use the same infrastructure, firewalls and sub-LANs may be used. The hosting environment would also include support systems like billing, and provisioning systems as well as Operation and maintenance system.
Further this environment would provide connectivity to one or more telecom networks through gateways. The gateways in a hosting environment would indicate which telecom networks or systems can use the hosted services. As an example if the gateway is connected to a GSM MSC through an E1 connection then this hosting environment would provide hosted services to a GSM network. Similarly if the gateway has connectivity for CDMA or WCDMA then the hosting environment would have services for CDMA and 3G networks as well.
The quality of hosting environment would depend on the level of redundancy and high-available configurations. In best of environments, perhaps a remote site is configured in case of disaster. In simpler environment, one may not even have mirrored disks. The same goes for O&M equipment and alarm handling. Companies offering telecom grade hosting environment will certainly provide more than 99.99% availability, redundant LANs and a robust SAN (Storage Area Network).
An operator would have the greatest of interests to find out about the hosting environment of a vendor before making managed service hosting deal.
Hosting is a relatively new form of business between a vendor and a telecom operator.
The vendor normally sells equipment and services to a telecom operator. The equipment and services sold are used to provide a consumer service, like picture mail or download of ring back tones.
Due to the changing telecommunications business and a burst of a very large number of new consumer services, new business models are being created. The common two are revenue share and managed service hosting. This is where the term Hosting Environment comes from.
Hosting environment is the physical environment where hosting services are offered from. Typically hosting environment in telecommunication terms would be a Network Operating Centre (NOC) housing the equipment needed to host a service.
This can be broken down to include all hardware, including servers, routers and their cabinets. In most cases the equipment would be rack mounted and connected through one or more LANs. In order to provide security and allow multiple operators to use the same infrastructure, firewalls and sub-LANs may be used. The hosting environment would also include support systems like billing, and provisioning systems as well as Operation and maintenance system.
Further this environment would provide connectivity to one or more telecom networks through gateways. The gateways in a hosting environment would indicate which telecom networks or systems can use the hosted services. As an example if the gateway is connected to a GSM MSC through an E1 connection then this hosting environment would provide hosted services to a GSM network. Similarly if the gateway has connectivity for CDMA or WCDMA then the hosting environment would have services for CDMA and 3G networks as well.
The quality of hosting environment would depend on the level of redundancy and high-available configurations. In best of environments, perhaps a remote site is configured in case of disaster. In simpler environment, one may not even have mirrored disks. The same goes for O&M equipment and alarm handling. Companies offering telecom grade hosting environment will certainly provide more than 99.99% availability, redundant LANs and a robust SAN (Storage Area Network).
An operator would have the greatest of interests to find out about the hosting environment of a vendor before making managed service hosting deal.
Limitations
Many providers do not allow IRC (bots, clients or daemons). This is due to rogue IRC users triggering DDoS attacks against the provider, which may overwhelm their networks, lowering service quality for all customers.
Adult content is disallowed by many providers as it may either be of questionable legality or consume large amounts of bandwidth.
Copyright violation Hosting copyrighted material of which you do not own the copyright to is against the terms of service of most hosting companies.
Adult content is disallowed by many providers as it may either be of questionable legality or consume large amounts of bandwidth.
Copyright violation Hosting copyrighted material of which you do not own the copyright to is against the terms of service of most hosting companies.
Software
Providers often bill for dedicated servers on a fixed monthly price to include specific software packages. Over the years, software vendors realized the significant market opportunity to bundle their software with dedicated servers. They have since started introducing pricing models that allow dedicated hosting providers the ability to purchase and resell software based on reduced monthly fees.
Microsoft offers software licenses through a program called the Service Provider License Agreement. The SPLA model provides use of Microsoft products through a monthly user or processor based fee. SPLA software includes the Windows Operating System, Microsoft SQL Server, Microsoft Exchange Server, Microsoft SharePoint and shoutcast hosting, and many other server based products.
Dedicated Server Providers usually offer the ability to select the software you want installed on a dedicated server. Depending on the overall usage of the server, this will include your choice of operating system, database, and specific applications. Servers can be customized and tailored specific to the customer’s needs and requirements.
Other software applications available are specialized web hosting specific programs called control panels. Control panel software is an all inclusive set of software applications, server applications, and automation tools that can be installed on a dedicated server. Control panels include integration into web servers, database applications, programming languages, application deployment, server administration tasks, and include the ability to automate tasks via a web based front end.
Most dedicated servers are packaged with a control panel. Control panels are often confused with management tools, but these control panels are actually web based automation tools created to help automate the process of web site creation and server management. Control panels should not be confused with a full server management solution by a dedicated hosting provider.
Microsoft offers software licenses through a program called the Service Provider License Agreement. The SPLA model provides use of Microsoft products through a monthly user or processor based fee. SPLA software includes the Windows Operating System, Microsoft SQL Server, Microsoft Exchange Server, Microsoft SharePoint and shoutcast hosting, and many other server based products.
Dedicated Server Providers usually offer the ability to select the software you want installed on a dedicated server. Depending on the overall usage of the server, this will include your choice of operating system, database, and specific applications. Servers can be customized and tailored specific to the customer’s needs and requirements.
Other software applications available are specialized web hosting specific programs called control panels. Control panel software is an all inclusive set of software applications, server applications, and automation tools that can be installed on a dedicated server. Control panels include integration into web servers, database applications, programming languages, application deployment, server administration tasks, and include the ability to automate tasks via a web based front end.
Most dedicated servers are packaged with a control panel. Control panels are often confused with management tools, but these control panels are actually web based automation tools created to help automate the process of web site creation and server management. Control panels should not be confused with a full server management solution by a dedicated hosting provider.
Security
Dedicated hosting server providers utilize extreme security measures to ensure the safety of data stored on their network of servers. Providers will often deploy various software programs for scanning systems and networks for obtrusive invaders, spammers, hackers, and other harmful problems such as Trojans, worms, eggdrops and crashers (Sending multiple connections). Linux and Windows use different software for security protection.
Management
To date, no industry standards have been set to clearly define the management role of dedicated server providers. What this means is that each provider will use industry standard terms, but each provider will define them differently. For some dedicated server providers, fully managed is defined as having a web based control panel while other providers define it as having dedicated system engineers readily available to handle all server and network related functions of the dedicated server provider.
Bandwidth and connectivity
Bandwidth refers to the data transfer rate or the amount of data that can be carried from one point to another in a given time period (usually a second) and is often represented in bits (of data) per second (bit/s). For example, visitors to your server, web site, or applications utilize bandwidth as the traffic moves from your server to the Internet and vice versa. Connectivity refers to the “access providers” that supply bandwidth, or data transfer rate, through various connection points across a network or footprint to one or multiple data centers where dedicated servers are housed.
Bandwidth measurements are defined (per telecom standards) as the following:
First – 95th (measured using average bits and speed of transfer)
Second – Unmetered (measured in speed or bits)
Third – Total Transfer (measured in bytes transferred)
95th Method: line speed, billed on the 95th percentile, average or peak usage, refers to the speed in which data flows from the server or device. Line speed is measured in bits per second (or kilobits per second, megabits per second or gigabits per second).
Unmetered Method: The second bandwidth measurement is unmetered service where providers cap or control the “top line” speed for a server. Top line speed in unmetered bandwidth is the total Mbit/s allocated to the server and configured on the switch level. For example, if you purchase 10 Mbit/s unmetered bandwidth, the top line speed would be 10 Mbit/s. 10 Mbit/s would result in the provider controlling the speed transfers take place while providing the ability for the dedicated server owner to not be charged with bandwidth overages. Unmetered bandwidth services usually incur an additional charge.
Total Transfer Method: Some providers will calculate the Total Transfer, the measurement of actual data leaving and arriving, measured in bytes. Measurement between providers varies, though it is either the total traffic in, the total traffic out, whichever is the greater or the sum of the two.
One of the reasons for choosing to outsource dedicated servers is the availability of high powered networks from multiple providers. As dedicated server providers utilize massive amounts of bandwidth, they are able to secure lower volume based pricing to include a multi-provider blend of bandwidth. To achieve the same type of network without a multi-provider blend of bandwidth, a large investment in core routers, long term contracts, and expensive monthly bills would need to be in place. The expenses needed to develop a network without a multi-provider blend of bandwidth does not make sense economically for hosting providers.
Many dedicated server providers include a service level agreement based on network uptime. Some dedicated server hosting providers offer a 100% uptime guarantee on their network. By securing multiple vendors for connectivity and using redundant hardware, providers are able to guarantee higher uptimes; usually between 99-100% uptime if they are a higher quality provider. One aspect of higher quality providers is they are most likely to be multi-homed across multiple quality uplink providers, which in turn, provides significant redundancy in the event one goes down in addition to potentially improved routes to destinations.
Bandwidth consumption over the last several years has shifted from a per megabit usage model to a per gigabyte usage model. Bandwidth was traditionally measured in line speed access that included the ability to purchase needed megabits at a given monthly cost. As the shared hosting model developed, the trend towards gigabyte or total bytes transferred, replaced the megabit line speed model so dedicated server providers started offering per gigabyte.
Prominent players in the dedicated server market offer large amounts of bandwidth ranging from 500 gigabytes to 3000 gigabytes using the “overselling” model. It is not uncommon for major players to provide dedicated servers with 1Terabyte (TB) of bandwidth or higher. Usage models based on the byte level measurement usually include a given amount of bandwidth with each server and a price per gigabyte after a certain threshold has been reached. Expect to pay additional fees for bandwidth overage usage. For example, if a dedicated server has been given 3000 gigabytes of bandwidth per month and the customer uses 5000 gigabytes of bandwidth within the billing period, the additional 2000 gigabytes of bandwidth will be invoiced as bandwidth overage. Each provider has a different model for billing. As of yet, no industry standards have been set.
Bandwidth measurements are defined (per telecom standards) as the following:
First – 95th (measured using average bits and speed of transfer)
Second – Unmetered (measured in speed or bits)
Third – Total Transfer (measured in bytes transferred)
95th Method: line speed, billed on the 95th percentile, average or peak usage, refers to the speed in which data flows from the server or device. Line speed is measured in bits per second (or kilobits per second, megabits per second or gigabits per second).
Unmetered Method: The second bandwidth measurement is unmetered service where providers cap or control the “top line” speed for a server. Top line speed in unmetered bandwidth is the total Mbit/s allocated to the server and configured on the switch level. For example, if you purchase 10 Mbit/s unmetered bandwidth, the top line speed would be 10 Mbit/s. 10 Mbit/s would result in the provider controlling the speed transfers take place while providing the ability for the dedicated server owner to not be charged with bandwidth overages. Unmetered bandwidth services usually incur an additional charge.
Total Transfer Method: Some providers will calculate the Total Transfer, the measurement of actual data leaving and arriving, measured in bytes. Measurement between providers varies, though it is either the total traffic in, the total traffic out, whichever is the greater or the sum of the two.
One of the reasons for choosing to outsource dedicated servers is the availability of high powered networks from multiple providers. As dedicated server providers utilize massive amounts of bandwidth, they are able to secure lower volume based pricing to include a multi-provider blend of bandwidth. To achieve the same type of network without a multi-provider blend of bandwidth, a large investment in core routers, long term contracts, and expensive monthly bills would need to be in place. The expenses needed to develop a network without a multi-provider blend of bandwidth does not make sense economically for hosting providers.
Many dedicated server providers include a service level agreement based on network uptime. Some dedicated server hosting providers offer a 100% uptime guarantee on their network. By securing multiple vendors for connectivity and using redundant hardware, providers are able to guarantee higher uptimes; usually between 99-100% uptime if they are a higher quality provider. One aspect of higher quality providers is they are most likely to be multi-homed across multiple quality uplink providers, which in turn, provides significant redundancy in the event one goes down in addition to potentially improved routes to destinations.
Bandwidth consumption over the last several years has shifted from a per megabit usage model to a per gigabyte usage model. Bandwidth was traditionally measured in line speed access that included the ability to purchase needed megabits at a given monthly cost. As the shared hosting model developed, the trend towards gigabyte or total bytes transferred, replaced the megabit line speed model so dedicated server providers started offering per gigabyte.
Prominent players in the dedicated server market offer large amounts of bandwidth ranging from 500 gigabytes to 3000 gigabytes using the “overselling” model. It is not uncommon for major players to provide dedicated servers with 1Terabyte (TB) of bandwidth or higher. Usage models based on the byte level measurement usually include a given amount of bandwidth with each server and a price per gigabyte after a certain threshold has been reached. Expect to pay additional fees for bandwidth overage usage. For example, if a dedicated server has been given 3000 gigabytes of bandwidth per month and the customer uses 5000 gigabytes of bandwidth within the billing period, the additional 2000 gigabytes of bandwidth will be invoiced as bandwidth overage. Each provider has a different model for billing. As of yet, no industry standards have been set.
Operating system support
Availability, price and employee familiarity often determines which operating systems are offered on dedicated servers. Variations of Linux and Unix (open source operating systems) are often included at no charge to the customer. Commercial operating systems include Microsoft Windows Server, provided through a special program called Microsoft SPLA. Red Hat Enterprise is a commercial version of Linux offered to hosting providers on a monthly fee basis. The monthly fee provides OS updates through the Red Hat Network using an application called yum. Other operating systems are available from the open source community at no charge. These include CentOS, Fedora Core, Debian, and many other Linux distributions or BSD systems FreeBSD, NetBSD, OpenBSD.
Support for any of these operating systems typically depends on the level of management offered with a particular dedicated server plan. Operating system support may include updates to the core system in order to acquire the latest security fixes, patches, and system-wide vulnerability resolutions. Updates to core operating systems include kernel upgrades, service packs, application updates, and security patches that keep server secure and safe. Operating system updates and support relieves the burden of server management from the dedicated server owner.
Support for any of these operating systems typically depends on the level of management offered with a particular dedicated server plan. Operating system support may include updates to the core system in order to acquire the latest security fixes, patches, and system-wide vulnerability resolutions. Updates to core operating systems include kernel upgrades, service packs, application updates, and security patches that keep server secure and safe. Operating system updates and support relieves the burden of server management from the dedicated server owner.
Dedicated hosting service
A dedicated hosting service, dedicated server, or managed hosting service is a type of Internet hosting in which the client leases an entire server not shared with anyone. This is more flexible than shared hosting, as organizations have full control over the server(s), including choice of operating system, hardware, etc. Server administration can usually be provided by the hosting company as an add-on service. In some cases a dedicated server can offer less overhead and a larger return on investment. Dedicated servers are most often housed in data centers, similar to colocation facilities, providing redundant power sources and HVAC systems. In contrast to colocation, the server hardware is owned by the provider and in some cases they will provide support for your operating system or applications.
Wednesday, April 28, 2010
Social software
This article is about computer software. For the study of social procedures from a computer science perspective, see Social software (social procedure).
Social software encompasses a range of software systems that allow users to interact and share data. This computer-mediated communication has become very popular with social sites like MySpace and Facebook, media sites like Flickr and YouTube as well as commercial sites like Amazon.com and eBay. Many of these applications share characteristics like open APIs, service-oriented design and the ability to upload data and media. The terms Web 2.0 and (for large-business applications) Enterprise 2.0 are also used to describe this style of software.
The more specific terms collaborative software and groupware are usually applied narrowly to software that enables collaborative work. Distinctions among usage of the terms "social", "trusted" and "collaborative" are in the applications or uses, not the tools themselves, although some tools are used only rarely for collaborative work.
Social software encompasses a range of software systems that allow users to interact and share data. This computer-mediated communication has become very popular with social sites like MySpace and Facebook, media sites like Flickr and YouTube as well as commercial sites like Amazon.com and eBay. Many of these applications share characteristics like open APIs, service-oriented design and the ability to upload data and media. The terms Web 2.0 and (for large-business applications) Enterprise 2.0 are also used to describe this style of software.
The more specific terms collaborative software and groupware are usually applied narrowly to software that enables collaborative work. Distinctions among usage of the terms "social", "trusted" and "collaborative" are in the applications or uses, not the tools themselves, although some tools are used only rarely for collaborative work.
Instant Messaging
An instant messaging application or client allows one to communicate with another person over a network in real time, in relative privacy. Popular, consumer-oriented clients include AOL Instant Messenger, Google Talk, ICQ, Meebo, MSN Messenger, Pidgin (formerly Gaim), Skype and Yahoo! Messenger. Instant messaging software designed for use in business includes IBM Lotus Sametime, XMPP and Microsoft Messenger.
One can add friends to a contact or "buddy" list by entering the person's email address or messenger ID. If the person is online, their name will typically be listed as available for chat. Clicking on their name will activate a chat window with space to write to the other person, as well as read their reply.
One can add friends to a contact or "buddy" list by entering the person's email address or messenger ID. If the person is online, their name will typically be listed as available for chat. Clicking on their name will activate a chat window with space to write to the other person, as well as read their reply.
Kinds of tools for online communication
Social software applications include communication tools and interactive tools. Communication tools typically handle the capturing, storing and presentation of communication, usually written but increasingly including audio and video as well. Interactive tools handle mediated interactions between a pair or group of users. They focus on establishing and maintaining a connection among users, facilitating the mechanics of conversation and talk.
Social software
This article is about computer software. For the study of social procedures from a computer science perspective, see Social software (social procedure).
Social software encompasses a range of software systems that allow users to interact and share data. This computer-mediated communication has become very popular with social sites like MySpace and Facebook, media sites like Flickr and YouTube as well as commercial sites like Amazon.com and eBay. Many of these applications share characteristics like open APIs, service-oriented design and the ability to upload data and media. The terms Web 2.0 and (for large-business applications) Enterprise 2.0 are also used to describe this style of software.
The more specific terms collaborative software and groupware are usually applied narrowly to software that enables collaborative work. Distinctions among usage of the terms "social", "trusted" and "collaborative" are in the applications or uses, not the tools themselves, although some tools are used only rarely for collaborative work.
Social software encompasses a range of software systems that allow users to interact and share data. This computer-mediated communication has become very popular with social sites like MySpace and Facebook, media sites like Flickr and YouTube as well as commercial sites like Amazon.com and eBay. Many of these applications share characteristics like open APIs, service-oriented design and the ability to upload data and media. The terms Web 2.0 and (for large-business applications) Enterprise 2.0 are also used to describe this style of software.
The more specific terms collaborative software and groupware are usually applied narrowly to software that enables collaborative work. Distinctions among usage of the terms "social", "trusted" and "collaborative" are in the applications or uses, not the tools themselves, although some tools are used only rarely for collaborative work.
Geo targeting of web content
Geo targeting of web content in internet marketing and geo marketing is the method of determining the geolocation (the physical location) of a website visitor with geolocation software and delivering different content to that visitor based on his or her location, such as country, region/state, city, metro code/zip code, organization, Internet Protocol (IP) address, ISP or other criteria.
Content management
Because websites are often complex, a term "content management" appeared in the late 1990s identifying a method or in some cases a tool to organize all the diverse elements to be contained on a website. [5] Content management often means that within a business there is a range of people who have distinct roles to do with content management, such as content author, editor, publisher, and administrator. But it also means there may be a content management system whereby each of the different roles are organized whereby to provide their assistance in operating the system and organizing the information for a website.
Even though a business may organize to collect, contain and represent that information online, content needs organization in such a manner to provide the reader (browser) with an overall "customer experience" that is easy to use, the site can be navigated with ease, and the website can fulfill the role assigned to it by the business, that is, to sell to customers, or to market products and services, or to inform customers.
Even though a business may organize to collect, contain and represent that information online, content needs organization in such a manner to provide the reader (browser) with an overall "customer experience" that is easy to use, the site can be navigated with ease, and the website can fulfill the role assigned to it by the business, that is, to sell to customers, or to market products and services, or to inform customers.
Content is king
The phrase can be interpreted to mean that - without original and desirable content, or consideration for the rights and commercial interests of content creators - any media venture is likely to fail through lack of appealing content, regardless of other design factors.
Content can mean any creative work, such as text, graphics, images or video.
"Content is King" is a current meme when organizing or building a website[3] (although Andrew Odlyzko in "Content is Not King" argues otherwise). Text content is particularly important for search engine placement. Without original text content, most search engines will be unable to match search terms to the content of a site.[4]
Content can mean any creative work, such as text, graphics, images or video.
"Content is King" is a current meme when organizing or building a website[3] (although Andrew Odlyzko in "Content is Not King" argues otherwise). Text content is particularly important for search engine placement. Without original text content, most search engines will be unable to match search terms to the content of a site.[4]
A wider view of web content
While there are many millions of pages that are predominantly composed of HTML, or some variation, in general we view data, applications, E-Services, images (graphics), audio and video files, personal web pages, archived e-mail messages, and many more forms of file and data systems as belonging to websites and web pages.
While there are many hundreds of ways to deliver information on a website, there is a common body of knowledge of search engine optimization that needs to be read as an advisory of ways that anything but text should be delivered. Currently search engines are text based and are one of the common ways people using a browser locate sites of interest.
While there are many hundreds of ways to deliver information on a website, there is a common body of knowledge of search engine optimization that needs to be read as an advisory of ways that anything but text should be delivered. Currently search engines are text based and are one of the common ways people using a browser locate sites of interest.
HTML web content
Even though we may embed various protocols within web pages, the "web page" composed of "html" (or some variation) content is still the dominant way whereby we share content. And while there are many web pages with localized proprietary structure (most usually, business websites), many millions of websites abound that are structured according to a common core idea.
Blogs are a type of website that contains mainly web pages authored in html (although the blogger may be totally unaware that the web pages are composed using html due to the blogging tool that may be in use). Millions of people use blogs online; a blog is now the new "home page", that is, a place where a persona can reveal personal information, and/or build a concept as to who this persona is. Even though a blog may be written for other purposes, such as promoting a business, the core of a blog is the fact that it is written by a "person" and that person reveals information from her/his perspective.
Search engine sites are composed mainly of html content, but also has a typically structured approach to revealing information. A search engine results page (SERP) displays a heading, usually the name of the search engine, and then a list of websites and their addresses. What is being listed are the results from a query that may be defined as keywords. The results page lists webpages that are connected in some way with those keywords used in the query.
Discussion boards are sites composed of "textual" content organized by html or some variation that can be viewed in a web browser. The driving mechanism of a discussion board is the fact that users are registered and once registered can write posts. Often a discussion board is made up of posts asking some type of question to which other users may provide answers to those questions.
Ecommerce sites are largely composed of textual material and embedded with graphics displaying a picture of the item(s) for sale. However, there are extremely few sites that are composed page-by-page using some variant of HTML. Generally, webpages are composed as they are being served from a database to a customer using a web browser. However, the user sees the mainly text document arriving as a webpage to be viewed in a web browser. Ecommerce sites are usually organized by software we identify as a "shopping cart".
Blogs are a type of website that contains mainly web pages authored in html (although the blogger may be totally unaware that the web pages are composed using html due to the blogging tool that may be in use). Millions of people use blogs online; a blog is now the new "home page", that is, a place where a persona can reveal personal information, and/or build a concept as to who this persona is. Even though a blog may be written for other purposes, such as promoting a business, the core of a blog is the fact that it is written by a "person" and that person reveals information from her/his perspective.
Search engine sites are composed mainly of html content, but also has a typically structured approach to revealing information. A search engine results page (SERP) displays a heading, usually the name of the search engine, and then a list of websites and their addresses. What is being listed are the results from a query that may be defined as keywords. The results page lists webpages that are connected in some way with those keywords used in the query.
Discussion boards are sites composed of "textual" content organized by html or some variation that can be viewed in a web browser. The driving mechanism of a discussion board is the fact that users are registered and once registered can write posts. Often a discussion board is made up of posts asking some type of question to which other users may provide answers to those questions.
Ecommerce sites are largely composed of textual material and embedded with graphics displaying a picture of the item(s) for sale. However, there are extremely few sites that are composed page-by-page using some variant of HTML. Generally, webpages are composed as they are being served from a database to a customer using a web browser. However, the user sees the mainly text document arriving as a webpage to be viewed in a web browser. Ecommerce sites are usually organized by software we identify as a "shopping cart".
The page concept
Web content is dominated by the "page" concept. Having its beginnings in an academic settings, and in a setting dominated by type-written pages, the idea of the web was to link directly from one academic paper to another academic paper. This was a completely revolutionary idea in the late 1980s and early 1990s when the best a link could be made was to cite a reference in the midst of a type written paper and name that reference either at the bottom of the page or on the last page of the academic paper.
When it was possible for any person to write and own a Mosaic page, the concept of a "home page" blurred the idea of a page.[1] It was possible for anyone to own a "Web page" or a "home page" which in many cases the website contained many physical pages in spite of being called "a page". People often cited their "home page" to provide credentials, links to anything that a person supported, or any other individual content a person wanted to publish.
Even though "the web" may be the resource we commonly use to "get to" particular locations online, many different protocols[2] are invoked to access embedded information. When we are given an address, such as http://www.youtube.com, we expect to see a range of web pages, but in each page we have embedded tools to watch "video clips".
When it was possible for any person to write and own a Mosaic page, the concept of a "home page" blurred the idea of a page.[1] It was possible for anyone to own a "Web page" or a "home page" which in many cases the website contained many physical pages in spite of being called "a page". People often cited their "home page" to provide credentials, links to anything that a person supported, or any other individual content a person wanted to publish.
Even though "the web" may be the resource we commonly use to "get to" particular locations online, many different protocols[2] are invoked to access embedded information. When we are given an address, such as http://www.youtube.com, we expect to see a range of web pages, but in each page we have embedded tools to watch "video clips".
Beginnings of web content
While the Internet began with a U.S. Government research project in the late 1950s, the web in its present form did not appear on the Internet until after Tim Berners-Lee and his colleagues at the European laboratory (CERN) proposed the concept of linking documents with hypertext. But it was not until Mosaic, the forerunner of the famous Netscape Navigator, appeared that the Internet become more than a file serving system.
The use of hypertext, hyperlinks and a page-based model of sharing information, introduced with Mosaic and later Netscape, helped to define web content, and the formation of websites. Largely, today we categorize websites as being a particular type of website according to the content a website contains.
The use of hypertext, hyperlinks and a page-based model of sharing information, introduced with Mosaic and later Netscape, helped to define web content, and the formation of websites. Largely, today we categorize websites as being a particular type of website according to the content a website contains.
Web content
Web content is the textual, visual or aural content that is encountered as part of the user experience on websites. It may include, among other things: text, images, sounds, videos and animations.
In "Information Architecture for the World Wide Web" (second edition, page 219), Lou Rosenfeld and Peter Morville write, "We define content broadly as 'the stuff in your Web site.' This may include documents, data, applications, e-services, images, audio and video files, personal Web pages, archived e-mail messages, and more. And we include future stuff as well as present stuff."
In "Information Architecture for the World Wide Web" (second edition, page 219), Lou Rosenfeld and Peter Morville write, "We define content broadly as 'the stuff in your Web site.' This may include documents, data, applications, e-services, images, audio and video files, personal Web pages, archived e-mail messages, and more. And we include future stuff as well as present stuff."
Drop registrar
A drop registrar is a domain name registrar who registers expiring Internet domain names immediately after they expire and are deleted by the domain name registry. A drop registrar will typically use automated software to send up to 250 simultaneous domain name registration requests in an attempt to register the domain name first.[1] They usually work for a domain back-order service, and receive a percentage of the final auction price.
Note that a registrar is not considered a drop registrar if they also sell domains retail or through resellers. Individuals also try their hand at acquiring expiring domain names by paying for lists of domains that are going to expire in the very near future, unless the current owner decides to renew their registration with the registrar. There are sites that do this for free, such as expiringlookup.com [2]; the down side is that everyone will have the list as well.
Note that a registrar is not considered a drop registrar if they also sell domains retail or through resellers. Individuals also try their hand at acquiring expiring domain names by paying for lists of domains that are going to expire in the very near future, unless the current owner decides to renew their registration with the registrar. There are sites that do this for free, such as expiringlookup.com [2]; the down side is that everyone will have the list as well.
Tuesday, April 27, 2010
Obtaining hosting
Web hosting is often provided as part of a general Internet access plan; there are many free and paid providers offering these services.
A customer needs to evaluate the requirements of the application to choose what kind of hosting to use. Such considerations include database server software, scripting software, and operating system. Most hosting providers provide Linux-based web hosting which offers a wide range of different software. A typical configuration for a Linux server is the LAMP platform: Linux, Apache, MySQL, and PHP/Perl/Python. The webhosting client may want to have other services, such as email for their business domain, databases or multi-media services for streaming media. A customer may also choose Windows as the hosting platform. The customer still can choose from PHP, Perl, and Python but may also use ASP .Net or Classic ASP. Web hosting packages often include a Web Content Management System, so the end-user doesn't have to worry about the more technical aspects.
A customer needs to evaluate the requirements of the application to choose what kind of hosting to use. Such considerations include database server software, scripting software, and operating system. Most hosting providers provide Linux-based web hosting which offers a wide range of different software. A typical configuration for a Linux server is the LAMP platform: Linux, Apache, MySQL, and PHP/Perl/Python. The webhosting client may want to have other services, such as email for their business domain, databases or multi-media services for streaming media. A customer may also choose Windows as the hosting platform. The customer still can choose from PHP, Perl, and Python but may also use ASP .Net or Classic ASP. Web hosting packages often include a Web Content Management System, so the end-user doesn't have to worry about the more technical aspects.
Types of hosting
Internet hosting services can run Web servers; see Internet hosting services.
Hosting services limited to the Web:
Many large companies who are not internet service providers also need a computer permanently connected to the web so they can send email, files, etc. to other sites. They may also use the computer as a website host so they can provide details of their goods and services to anyone interested. Additionally these people may decide to place online orders.
Hosting services limited to the Web:
Many large companies who are not internet service providers also need a computer permanently connected to the web so they can send email, files, etc. to other sites. They may also use the computer as a website host so they can provide details of their goods and services to anyone interested. Additionally these people may decide to place online orders.
Hosting reliability and uptime
Hosting uptime refers to the percentage of time the host is accessible via the internet. Many providers state that they aim for at least 99.9% uptime (roughly equivalent to 45 minutes of downtime a month, or less), but there may be server restarts and planned (or unplanned) maintenance in any hosting environment, which may or may not be considered part of the official uptime promise.
Many providers tie uptime and accessibility into their own service level agreement (SLA). SLAs sometimes include refunds or reduced costs if performance goals are not met.
Many providers tie uptime and accessibility into their own service level agreement (SLA). SLAs sometimes include refunds or reduced costs if performance goals are not met.
Service scope
The scope of hosting services varies widely. The most basic is web page and small-scale file hosting, where files can be uploaded via File Transfer Protocol (FTP) or a Web interface. The files are usually delivered to the Web "as is" or with little processing. Many Internet service providers (ISPs) offer this service free to their subscribers. People can also obtain Web page hosting from other, alternative service providers. Personal web site hosting is typically free, advertisement-sponsored, or inexpensive. Business web site hosting often has a higher expense.
Single page hosting is generally sufficient only for personal web pages. A complex site calls for a more comprehensive package that provides database support and application development platforms (e.g. PHP, Java, Ruby on Rails, ColdFusion, and ASP.NET). These facilities allow the customers to write or install scripts for applications like forums and content management. For e-commerce, SSL is also highly recommended.
The host may also provide an interface or control panel for managing the Web server and installing scripts as well as other services like e-mail. Some hosts specialize in certain software or services (e.g. e-commerce). They are commonly used by larger companies to outsource network infrastructure to a hosting company.
Single page hosting is generally sufficient only for personal web pages. A complex site calls for a more comprehensive package that provides database support and application development platforms (e.g. PHP, Java, Ruby on Rails, ColdFusion, and ASP.NET). These facilities allow the customers to write or install scripts for applications like forums and content management. For e-commerce, SSL is also highly recommended.
The host may also provide an interface or control panel for managing the Web server and installing scripts as well as other services like e-mail. Some hosts specialize in certain software or services (e.g. e-commerce). They are commonly used by larger companies to outsource network infrastructure to a hosting company.
Subscribe to:
Posts (Atom)