Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Affordable Search Engine Placement – a Must in Today’s Marketing Strategy

This blog post is provided courtesy of Noxster SEO Company

custom resized 0a2bf1e2 1738 4584 9b94 2b3b735216c3Whether you’re running a global business that routinely takes orders online from all around the world or you’re a mom and pop with an old-fashioned brick and mortar business just trying to stay competitive in an evolving market, it’s critical that you have an SEO strategy that works for you. And at any level, that needs to include affordable search engine placement.

Continue reading
0 Comments

Your Business Can Learn a Thing or Two From Nuclear Power Plant Security

b2ap3_thumbnail_nuclear_it_security_400.jpgWe talk about a lot of frightening technology scenarios for businesses; data loss, identity theft, and expensive hardware failures that can inflict substantial downtime and, therefore, cripple the ability of your business to sustain operations. One industry that has changed the way they manage risk, specifically the potential failure of important security systems, is the nuclear power industry. Any business can learn how to mitigate disaster by looking into the specifics of the two most horrendous nuclear meltdowns in history, the meltdown at Chernobyl in 1986, and the tsunami-induced disaster at Fukushima in 2011.

Continue reading
0 Comments

Tip of the Week: Easily Add a New Gmail Account to Your Android Device

b2ap3_thumbnail_email_android_400.jpgAndroid smartphones are well known for taking advantage of the plethora of applications developed by Google, like your calendar and Google Drive. One of the best ways you can get the most out of your Android device is by using its Gmail application. We’ll walk you through how to add a new Gmail account to your device, and how to switch between your multiple Gmail accounts.

Continue reading
0 Comments

REST Services

    REST is short for ‘Representational State Transfer’. REST is resource-based rather than action based like some other service systems. In a SOAP based system you would typically call a method that performs an action like GetUser. In a REST service you would simply identify the resource you needed, a User, and the HTTP verb describes the action to be taken with that resource. These resources are identified by URI’s. The resource exists on the sever and a representation of that resource is sent to the client, often in JSON format. The representation can be all or part of the resource and may include additional meta data about the resource. So you may have multiple representations of a resource. Restful architecture is based on six constraints. While there are different technologies that can be used to meet these constraints I will use the more common technologies to describe each of the constraints.

Here are the Six Constraints:

  • Uniform interface
  • Stateless
  • Client-server
  • Cacheable
  • Layered system
  • Code on demand

    Uniform Interface: A defined and standardized interface between the client and server. This simplifies and decouples the interface. Typically HTTP fills this roll. The HTTP verbs are used to define what action is to be taken, URI’s are used to identify the resource that is being worked with, and the HTTP response, both status and body, are used for sending the results to the client. Since HTTP is so ubiquitous it provides a very uniform interface that is accessible from almost any type of client.

    Stateless: Every request to the server should be stateless, meaning all of the information required to carry out the request should be included in the request itself. There server should not have to retain or know anything about the client or any previous requests in order to complete the current request. Any state information will be the client’s responsibility.

    Client-server: The relationship between the client and server should be disconnected, the client should not rely on a persistent connection to the server. This provides a separation of concerns with the client focused on the user interface and the server providing services.

    Cacheable: The representations that are sent back to the client should be cacheable. There are three different flavors of cacheable representations. First is implicitly, if no other information is returned about the caching of the representation then it is implicitly cacheable. It could be explicitly cacheable meaning the server will return information about the age or duration of the cacheable representation. The third is a negotiated cacheable representation between the client and the server.

    Layered System: A layered system should be assumed by the client. Meaning the client should not assume a direct connection to the server. There could be a number of layers, both hardware and software between the client and server. The client could receive a cached response from one of these layers and in fact may not reach the server at all. This provides for a very scalable system.

    Code on demand: This is an optional constraint. This is when the server extends the client software by providing executable code, for example a piece JavaScript code.

    By following these constraints restful services are scalable, simple, easily modified, visible, portable, and reliable. 

Continue reading
0 Comments

Design it First

    Traditionally software development has begun with gathering the requirements. This is and always will be a very important step in software design. How can you ever hope to build a successful application unless you first know what the client wants? So you start meeting with different users and stakeholders slowly collecting requirements and features that the new application should have. More times than not this process produces a list of requirements or sometimes a multilevel list showing the different areas of the application and how they may relate to one another. Now the architect takes the requirements and, using his or her experience in software design, starts to decide just how the application should be built, what structured and what foundations it may need for today and in the future. At this point the developers can start coding up the new application following the structure the architect has provided while meeting all of the requirements from the clients. Now we have a functioning application but it just doesn't look real pretty. Coders are usually more concerned about the esthetics of the code rather than that of the screens. So the process of applying look-and-feel begins.

    But instead of waiting until the end of the project cycle to apply the look-and-feel why not start with that. Making mockups can be fast and simply, sometimes as simple as paper and pencil. But there can be a big difference from drawing what you would like to have verse trying to make a list of what you would like. When listing items and features out it is all too easy to miss things. With a visual mock everything is right there in front of you. If you don't see it, it's not included. Also the usability of the application is addressed up front. Not only are you defining how everything should look, you are also defining how the different pieces should work with each other. Usability is often the most important thing to the end users. Whereas the code is the most import thing to the developers. Now the architect and developers can work from the mockups and deliver exactly what the client wants and nothing else. Because for better or worse a lot of code is written because you may need it later or in order to make extending the application easier in the future. But truth be told often this extra code is never truly needed. Start with a good visual design and everything else will fall into place.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftSoftwareBusiness ComputingBusiness ManagementHackersGoogleEfficiencyProductivityHosted SolutionsBackupManaged Service ProviderUser TipsBusinessInnovationWorkplace TipsMalwareMobile DevicesIT ServicesComputerHardwarewindowsUpgradeNetwork SecurityIT SupportSaving MoneyMiscellaneousEmailDataSmartphonesWindows 10VirtualizationSmartphoneCommunicationAppsBusiness ContinuityGadgetsVoIPDisaster RecoveryProductivityMicrosoft OfficeMobile Device ManagementServerNetworkBrowserMobile ComputingInformation TechnologyTech TermSmall BusinessQuick TipsPasswordsAndroidSocial MediaHealthCybersecurityGoing GreenHolidayOperating SystemData BackupMobile OfficeChromeAppOfficeOffice 365ApplicationAlertBest PracticeCollaborationspamSave MoneyCybercrimecommunicationsRansomwareEmployer-Employee RelationshipData SecurityBYODLaw EnforcementMarketingManaged IT ServicesWindows 10Data RecoveryOutsourced ITAppleUsersVendor ManagementWiFiInternet of ThingsRemote ComputingTabletSearchWearable TechnologyThe Internet of ThingsHistoryFacebookUser ErrorRemote MonitoringBring Your Own DeviceMobilityAntivirusUnified Threat ManagementAvoiding DowntimeiPhoneRisk ManagementCost ManagementMoneyIT SupportHackingMaintenanceSaving TimeRouterWireless TechnologyPhishingBDRGovernmentBandwidthHard DrivesOffice TipsPasswordIT SolutionsTech SupportComputersBig DataData ManagementEncryptionSocialTelephone SystemsCustomer Relationship ManagementOneNoteProactive ITFirewallArtificial IntelligenceBudgetLithium-ion batteryCurrent EventsPhone SystemAutomationWirelessVPNTwo-factor AuthenticationHumorWebsiteNet NeutralityUpdateUnsupported SoftwarePrinterSocial NetworkingCloud ComputingWi-FiShortcutOutlookVulnerabilityGmailUSBNetworkingPowerPointAnalyticsGoogle DriveStreaming MediaDisasterTrendingApplicationsAuditManaged ITIntranetRecoveryLaptopBlockchainAugmented RealityPersonal InformationContent FilteringIdentity TheftInformationManaged IT ServicesIT COnsultantTelevisionEducationRetailExcelComputer RepairWork/Life BalanceMobile DeviceTravelPoliticsVirusadministrationSocial EngineeringAccess ControlHuman ResourcesMobile SecurityDDoSInstant MessagingEmailsWannaCryData BreachProject ManagementOnline CurrencyTouchscreenCortanaSportsEntertainmentWindows 8EvernoteSamsungBenefitsComputer AccessorieseWasteBatteryValueSaaSAutomobileCleaningPoint of SalePrinter ServerHaaSSave TimeData ProtectionTwitterComputer CareWordProgrammingManaging StressStorageGoogle AssistanthackerDisplayAmazonManaged ServicePaperless OfficeDevicesLegalTransportationHosted SolutionPatch ManagementEnd of SupportBusiness IntelligenceFax ServerCommerceMeetingsFlexibilityCustomer ServiceComputingTelephonyBiometricsFraudUninterrupted Power SupplySalesGoogle DocsHard DriveVirtual RealityPrivate CloudScamBusiness TechnologyData StorageHIPAAWireless ChargingInternet ExlporerCiminalSurge ProtectorEmployer Employee RelationshipAdobeText MessagingIT consultingTestingScreen MirroringConsultantFile SharingTouchpadFinancialBooksCastAdminReliable ComputingCameraComplianceIdentityDebateHelp DeskDistributed Denial of ServiceBlack MarketElectronic Medical RecordsBloatwareHybrid CloudMonitorsIT budgetKeyboard ShortcutsLicensingProjectsInbound MarketingData PrivacyWebinarLegislationFilesSafetyOperating SysytemVirtual AssistantCommunityNanotechnologyWorkersPayrollTrainingTabletsBrandingISPWindows 7IntrantetMouseChromebookIT solutionsComparisonChromecastHBOAlexa for BusinessRoot Cause AnalysisUpdatesLifestyleBloggingIdentitiesSecurity CamerasTutorialCompany CultureNFLWIndows 7Co-Managed ServicesNetwork CongestionPrintingWindows 10sSpecificationsReputationRegulationsMicrosoft WordLanguageMachine LearningBluetoothTelephoneAdministratorjunkSolid State DriveConferencingWorker CommuteKeyboardIT ManagementCamerasSoftware as a ServiceCo-managed ITSettingsDevice SecurityWindows InkSharePointVideo GamesUserHyperlinkAccessfilterComputer ForensicsHard Disk DriveGiftsHiring/FiringWIndows Server 2008Virtual DesktopPresentationNokiaGift GivingProactivePrint ServerGoogle MapsTeamworkOneDriveBest AvailableWasting TimeScienceManagementYoutubeCredit CardsSmart TechnologyVendorSpywareEbayWebsitesMicrobloggingData LossAccessoryRobotWireless InternetFAQSyncBuisnessAdvertisingEmployee-Employer RelationshipData TheftRunning CableScalabilityPeripheralData storageGamificationiOSChargerExperiencePDFNear Field CommunicationEdgeApp storeWebinarUpgradesMicrosoft ExcelImagesHow To3D PrintingMemoryComputer FanMusic