1% rule in Internet culture

|

(Graphic showing the proportion of lurkers, contributors and creators.) In cyberspace, the assumption of 1%, also called rule or law of 1%, or 90-9-1 principle, reflects the fact that participation and earnings are highly uneven in an online community. Thus, … Read More

Impact and management of online reputation

|

For individuals Today managing online reputation is likely to apply to all types of entities: little-known citizens, celebrities in their media exposure or their political commitment, but also companies and brands. The discovery of e-reputation appeared with the phenomenon of … Read More

Marketing of online reputation

|

The issue of trust can arise when it comes to completing a transaction online, with a particular (selling a used object, apartment rental) or a business (e-commerce). According to some sociologists, digital trust depends primarily on the level of sociability … Read More

Reputation management

|

The online reputation, sometimes called web reputation, or digital reputation, is the reputation, the common opinion (information, advice, discussions, comments, rumors …) of a web entity (brand, person, legal (business) or physical (individual), real (represented by a name or pseudonym) … Read More

User-generated content

|

The user-generated content refers to a set of media whose content is primarily product directly influenced by end users. It is opposed to the traditional content, sold or distributed by traditional media companies. The term became popular during 2005 in … Read More

Web 2.0 technologies

|

The infrastructure of the Web 2.0 is complex and changing in nature, but it always includes: server software, content syndication, messaging protocols, navigation standards various client applications (plug-ins, or grafts, non-standards are generally avoided). These complementary approaches provide Web 2.0 … Read More

Domain name speculation

|

Domain name speculation refers to buying domains with the intent of selling them later for a higher price. The speculative element can be linked to news and current events, though the period during which such domains can be sold or … Read More

Privacy on the Internet

|

As the protocols used for e-mail, HTTP uses broadcast of its messages clearly, making it vulnerable to even novices attackers. A simple solution to ensure the privacy of navigation is using an extension protocol called HTTP Secure or HTTPS. Addresses … Read More

Proxy servers

|

There are increasingly many companies which, along with the use of a firewall equipment, use for HTTP proxy servers. They are designed to be intermediate between the client and the web server, making connections on their behalf. Usually they contain … Read More

Web browsers

|

In terms of investigations, it should be noted that the accessed links are generally temporarily stored in the client programs. This feature called History – history of navigated pages, and can be a very useful tool for research pages that … Read More

Web address – URL

|

Generally, the transfer begins with a request that the client makes to the server as a result of a user action such as entering an address or clicking on a link. The addresses are also denominated as URL, acronym for … Read More

HTTP

|

Hyper Text Transport Protocol (HTTP) is the core of traffic on the World Wide Web (or WWW) on the Internet or private networks, and is basically a very simple protocol. It establishes a connection, and it asks for a document, … Read More

1 2 3 4 5 6 9