Here is a very genuine state of emergency which the big pHarma funded legislators do not even acknowledge let alone address!
SEO Glossary of Terms
I was sent a Glossary of SEO Terms that I thought you might find useful:
http://netvantagemarketing.com/blog/seo-glossary
The Dangers of Overpersonalisation
Is Overpersonalisation Killing the Variety and Interest of Your User Experience?
One user even noted that because the content was boring she continued to scroll looking for something that was interesting, “I don’t find anything interesting on Facebook tonight but what’s funny is that I will keep scrolling until I do; it’s addicting.” This behavior is related to the Vortex phenomenon, which refers to people feeling sucked into the online world almost against their will through sticky design techniques (like continuous content feeds). Users seek the emotional payoff they get from a good piece of content. In these cases, the phone turns into a mini slot machine: they keep pulling the lever coming across dozens of losers in hopes of finally getting a winner.
How a 1974 bug still bites Win10 and Azure users
A file naming decision harkening back to the earliest days of personal computing is still very much alive in Microsoft’s Windows 10 and its Azure Functions serverless cloud code execution tool, much to the merriment of geeks old enough to remember the reasons for it.
https://www.itnews.com.au/news/how-a-1974-bug-still-bites-win10-and-azure-users-515102
Intelligent Assistants Have Poor Usability: A User Study of Alexa, Google Assistant, and Siri
Summary: Usability testing finds that both voice-only and screen-based intelligent assistants work well only for very limited, simple queries that have fairly simple, short answers. Users have difficulty with anything else.
https://www.nngroup.com/articles/intelligent-assistant-usability/
Roaming Mantis malware expands its reach
Malware called ‘Roaming Mantis’ that infects smartphones through wi-fi routers is rapidly spreading across the world after first emerging only a couple of months ago.
Through DNS hijacking, the malware uses compromised routers to infect Android smartphones and tablets, redirect iOS devices to a phishing site, and run CoinHive, a cryptomining script, on desktops and computers.
https://www.itnews.com.au/news/roaming-mantis-malware-expands-its-reach-491441
Eight more Spectre-style flaws found in Intel processors
Another reason why I do not trust putting all my data on someone else’s cloud service.
https://www.itnews.com.au/news/eight-more-spectre-style-flaws-found-in-intel-processors-490279
Spectre and Meltdown Attacks Against Microprocessors
The security of pretty much every computer on the planet has just gotten a lot worse, and the only real solution — which of course is not a solution — is to throw them all away and buy new ones.
On January 3, researchers announced a series of major security vulnerabilities in the microprocessors at the heart of the world’s computers for the past 15-20 years. They’ve been named Spectre and Meltdown, and they have to do with manipulating different ways processors optimize performance by rearranging the order of instructions or performing different instructions in parallel. An attacker who controls one process on a system can use the vulnerabilities to steal secrets elsewhere on the computer.
This means that a malicious app on your phone could steal data from your other apps. Or a malicious program on your computer — maybe one running in a browser window from that sketchy site you’re visiting, or as a result of a phishing attack — can steal data elsewhere on your machine. Cloud services, which often share machines amongst several customers, are especially vulnerable. This affects corporate applications running on cloud infrastructure, and end-user cloud applications like Google Drive. Someone can run a process in the cloud and steal data from every other user on the same hardware.
I am sure people thought me weird and old fashioned because I would not subscribe to the Cloud philosophy. This is exactly one reason why. – Tom)
Information about these flaws has been secretly circulating amongst the major IT companies for months as they researched the ramifications and coordinated updates. The details were supposed to be released next week, but the story broke early and everyone is scrambling. By now all the major cloud vendors have patched their systems against the vulnerabilities that can be patched against.
https://www.schneier.com/crypto-gram/archives/2018/0115.html
4 Ways Google is Changing Search Engine Results
If you have a web page, worth reading…
http://www.sitepronews.com/2018/01/08/4-ways-google-changing-search-engine-results/
Do You Know A Youngster Who Wants to Create Better Designs?
Well, UX (User eXperience) is a field set to really take off!
https://www.nngroup.com/articles/100-years-ux/