WHO AM I?
The effective capture, management and processing of analytics and POS data has become a key success factor for many businesses. Data parsed by C# or PHP powered, back-end applications with web-based UI providing a clear and consistent stream of business facts to customers. Securely delivered to the right people at the right time.
Ask me about:
- Processing, management, storage of structured & fast data.
- Parsing and encryption of point of sale data.
- Custom web design and development.
- Database and server administration.
- Web application security.
MS Azure SQL
Samples of my work, a mixture of ads, banners, book-covers, magazines, websites, cartoons, product labels, logos, etc. are available for preview in my PORTFOLIO . Altough my primary focus for the past few years was solely on web development (mostly mid-sized applications for processing structured data) I still enjoy graphic design work once in a while to feed my creative side.
From time-to-time I tend to publish programming or cyber-security related posts. Feel free to browse.
The SEO Storm is Coming! Are you Penguin 2.0 Ready?
Most website owners, rely on the perks of organically generated traffic from the major search engines like Google. For some it is a matter of life & death for their business to appear at the top of Google search results and every extra upward placement is merrily celebrated. SEO has become one of Read more…
Don’t touch that proxy! You don’t know where it’s been.
Ok I get it, there are times you may feel that certain web pages are better to access without anyone actually knowing it was you. But do you really know the risks that you open yourself to? Simply put, proxy is a server that connects you to your url destination. The proxy accesses Read more…
12 Essential Steps for Public WiFi Hot-Spot Hygiene
Ignorance of the of lack of security at public hot-spots prevails to be bliss. Standing in a line at the local coffee shop, mulling over a variety of caffeine goodness, and selecting from the available Wi-Fi networks to connect to. But today something is different. The network name (SSID) is present twice. Once Read more…
Protect Your E-mails!
How many times during the past 6 months someone I know personally called to tell me “MY E-MAIL ACCOUNT GOT HACKED AND I CAN’T LOG-IN!” The loss of your treasured e-mail history and contacts might easily be remedied with a tub of your favorite Ben & Jerry’s and the reluctant acceptance that you will Read more…