Thursday 5 January 2017

Leverage Browser Caching with W3 Total Cache

Leverage Browser Caching with W3 Total Cache

About a month ago, I posted on a basic setup of W3 Total Cache, a WordPress plugin designed to decrease page load times to improve user experience and SEO. Based on the needs of visitors here, I thought I would go more in-depth into the browser caching feature of W3TC.

How To Leverage Browser Caching in W3TC

Enabling your WordPress site to leverage browser caching can be done in 5 steps.

Step 1. Enable Preview Mode

Before tweaking any settings within W3 Total Cache, make sure you enable preview mode. This setting will allow you to see how the website performs with the new settings before going live with them. Click the “Enable” button to deploy preview mode on your site. This can be found from the General setting tab.
W3TC Preview Mode

Step 2. Enable Browser Caching

You must enable Browser Caching within W3TC in order to leverage general browser caching. On the general settings of W3TC, scroll down and enable the Browser Cache.
Enable Browser Caching

Step 3. Specify Cache Headers

After you’ve enabled browser caching, click the “Browser Cache” section at the top of the plugin configuration, which will bring you to a page with general and specific settings for different configurations of cache headers. Below is a starting configuration and explanation of settings.
General Settings
These check boxes will toggle these settings for the next three sections down. It is recommended that you check the following 5 boxes (and what those boxes represent).
  • Set expires header – The expires header is an expiration time of an entity of the web, whether an HTML document, CSS file, image, etc. The length specified in this header will control how long the cache of the entity is valid.
  • Set cache control header – The cache control header is an additional header to encourage browser caching.
  • Set entity tag (eTag) – The eTag is a validation tag that makes browser caching more efficient.
  • Set W3 Total Cache Header – This is a header set by W3TC to assist in identifying optimized files.
  • Enable HTTP (gzip) compression – Gzip compression will reduce the download time for text-based files.
Browser cache global settings - W3 Total Cache
Now that you have your global settings enabled for browser caching, it’s time to get more in-depth and specific with different sections.
CSS & JS
If you checked all of the boxes correctly in the general settings above, there will only be one change you need to make in this section. Under the “set expires header” section, change the value in “Expires Header Lifetime” to 604800. This is the amount of seconds that a CSS or JS file will be until a new cache of that file is created. 604800 seconds is the equivalent of two weeks, the minimum recommend time for ideal page speed optimization. You can increase the value here if you wish, but just be sure to clear your cache if you make changes to these files, that way users can be served the most up-to-date version of your site.
HTML & XML
HTML and XML files change much more frequently. There should be no changes made here. Make sure you leave the “Expires Header Lifetime” set to 3600 seconds. This controls elements of an HTML page all the way down to text, so make sure this is short enough to reflect how often a page could be updated. 3600 seconds (1 hour) is standard practice.
Media & Other Files
Mimic the settings of the CSS and JS section as these files rarely change.

Step 4. Save and Preview Your Caching Settings

Save your settings and preview your changes by clicking preview at the top of the plugin settings. This will open up a new browser window or tab. From here, you can check the difference in browser caching and how it impacts page speed. I recommend the Google Page Speed plugin. Install the extension for your browser and run the page speed scripts on your page. There may be a few outside elements (CSS, JS) hosted on other sites that may be out of your control in relation to browser caching. Don’t panic, most of these come from plugins. The majority of the files that you want to cache are already hosted in your server. Check the difference in Page Speed Score by running the scripts on the preview of your cache as well as the version without.

Step 5. Deploy W3 Total Cache Settings

Once everything looks good with the W3TC preview, go back to the plugin settings and click deploy, which will migrate all settings toggled in preview mode over the live version.

Notes on Caching

With the correct implementation of W3 Total Cache, leveraging browser caching will improve the speed of your website, giving users a better experience as well as improving SEO. As a WordPress developer, testing settings and implementing them can be tedious. Always use preview mode when making any changes, as they can greatly affect the way your site performs and even looks. Once you have the process down, you’ll be able to enjoy page speed scores of 90 and above! Good luck!

+Web Solution, Web Design and development Company, India


Wednesday 4 January 2017

IBM Launches New Features for Serverless Cloud Platform

Giant IBM has declared a few new elements for OpenWhisk, the occasion driven and open serverless registering stage worked for its Bluemix open cloud benefit. The new elements, for example, moment troubleshooting with NodeJS, Python, and Swift activities, are intended to help designers investigate their code quicker, better coordinate with outsider instruments and bolster a more extensive scope of programming dialects.

"Engineers are swinging to the cloud for productivity, yet they likewise need decision," said Bill Karpovich, general director for IBM Cloud, in an announcement. "Since we've constructed OpenWhisk with open norms, it's ready to not just settle numerous issues connected with server administration, additionally gives designers the adaptability to pull in outside instruments and information and run code wherever they pick."

Growing Integrations with New Apps 

IBM said it is extending and fixing incorporations with the developing biological system of utilizations encompassing OpenWhisk, which offers an open, non-exclusive motor. By building OpenWhisk with open gauges starting from the earliest stage and establishing its code in dynamic engineer groups, for example, Apache, the organization plans to extend the scope of abilities designers can get to. An open serverless stage additionally gives flexibility to pick where applications can keep running, as indicated by IBM.

OpenWhisk goes about as a basic drive inside applications running on Bluemix, restricting together pertinent occasions and triggers, for example, the transferring of a picture or the clicking of a mouse. At the point when activated by such occasions, OpenWhisk consequently taps cloud benefits as required, for example, subjective insight, Internet of Things (IoT), and examination. IBM said OpenWhisk is intended to make conventional cloud foundation undetectable, empowering engineers to concentrate on composing code as opposed to designing servers.

New Features for OpenWhisk 

Beside the new troubleshooting capacities, IBM likewise declared other new components for the OpenWhisk stage, incorporating reconciliation with MessageHub, a Bluemix-facilitated Apache Kafka benefit for continuous form outs of information pipelines and spilling applications.

The stage will likewise start offering support for new runtimes, for example, Java, Node v6, Python and Swift v3, the organization said, and would incorporate another augmentation for Visual Studio Code. The upgrade likewise highlights an as good as ever UI to disentangle program based advancement and testing.

Bluemix has quickly developed to wind up distinctly one of the biggest open, open cloud arrangements available, as per IBM. The stage depends on open norms and elements more than 150 propelled advances and administrations, including psychological processing, blockchain, Internet of Things, cloud information administrations, DevOps and security.

A few huge organizations have moved to embrace serverless design models, for example, OpenWhisk, to accelerate arrangement and increment proficiency.

"Microservices and compartments are changing the way we construct applications, but since of serverless, we can take that change much further," said Luis Enriquez, head of stage building and design at Santander Group, in IBM's announcement. Santander said it had as of late received the OpenWhisk stage, including that it "gives the moment framework we requirement for extreme assignments and surprising crests in workload, and is a key building hinder as we move to an ongoing and occasion driven engineering."

Tuesday 3 January 2017

New PHP discharge brings another speed help

Form 7.1.0 of the dialect likewise backs nullable sortsThe PHP 7 line, which appeared a year back, has gotten its first point discharge overhaul, enhancing execution and including nullable sorts.

Adaptation 7.1.0 likewise offers capacities like a void return sort and class steady perceivability modifiers. However, a key PHP advocate focused on execution. The update "[provides] up to 35 percent better execution in CPU-concentrated workloads," said Zeev Suraski, CTO at PHP devices maker Zend.

Nullable sorts in 7.1 permits a check sort to be of some sort or invalid. "Sort statements for parameters and return qualities can now be set apart as nullable by prefixing the sort name with a question mark. This connotes and in addition the predefined sort, invalid can be passed as a contention, or returned as an esteem, separately," documentation states.

Variant 7.1 likewise underpins class consistent perceivability to reflect the conduct of strategy and property perceivability. "Class steady might be characterized as open, private or ensured. class constants announced with no express perceivability watchword are characterized as open," as indicated by the proposition.

A "void" return sort in PHP 7.1 makes it clear that a capacity plays out an activity as opposed to delivering an outcome. An iterable pseudo-sort, then, can be utilized as a parameter sort to show that a capacity requires an arrangement of qualities while not thinking about the type of the esteem set. "This sort is practically equivalent to callable, tolerating numerous sorts rather than one single sort," documentation states.

PHP 7.2 is slated to present an Argon2 secret word hash. "Argon2 addresses a few key drawbacks of existing calculations in that it is intended for the most noteworthy memory filling rate, and compelling utilize different figuring units while as yet giving barrier against tradeoff assaults," the documentation states.

Unpatched Vulnerability Affecting PHP 7 Servers 

PHP 7 is influenced by an unpatched helplessness that opens servers running the most recent branch of the PHP programming dialect to assaults.

The powerlessness, yet unpatched is a piece of a trifecta of bugs uncovered amid a presentation by Yannay Livneh, Check Point analyst, at the current year's 33rd Chaos Communication Congress.

Vulnerabilities influence PHP 7's unserialize system 

Every one of the three bugs influence PHP's unserialize component, the way toward changing over a surge of bytes once more into a PHP question.

The CVE recognizable proof markers of the three bugs are CVE-2016-7478, CVE-2016-7479, and CVE-2016-7480.

As indicated by a specialized report discharged by Livneh, the primary bug is a Denial of Service (DoS) issue, however which can be abused remotely and used to bring about a PHP server to expend an excessive amount of memory, hang the site, and even close down the server procedure.

The other two bugs are remote code execution (RCE) vulnerabilities that permit an assailant to execute noxious code on the server, which in a few situations may empower the gatecrasher to assume control over the whole server.

One bug remains unpatched 

Livneh says he educated the PHP group of the issues in August and September this year. The PHP group pushed a bugfix on October 13, with the arrival of PHP 7.0.12, and on December 1, with the arrival of PHP 7.1.0.

The PHP group settled just two of the three issues at the season of composing, with one bug remaining unpatched. Bleeping Computer has connected with Stanislav Malyshev, an individual from the PHP group, to ask about the status of the last bug. As indicated by Malyshev, the PHP group doesn't "typically have particular discharge dates for individual bugs."

"The arrivals of PHP are done like clockwork, with the following one anticipated January fifth," Malyshev said. "Once the settle for the specific bug is prepared, it is discharged in the following planned discharge."

Livneh says the three bugs can be abused utilizing a system he beforehand point by point in August. The specialist has not determined which of the three bugs remained unpatched.

Bleeping Computer has connected with Livneh to ask if there is confirmation that any of the three bugs has been misused in nature.

The unending adventure of serialize/unserialize issues 

The serialize/unserialize component (changing information objects into memory bytes and the other way around) has been a noteworthy reason for issues in prior PHP renditions, and it creates the impression that it will be the same for PHP 7.

A bug in the PHP serialize instrument has already permitted specialists to hack into PornHub.

So also, issues with the unserialize operations additionally influence Java applications, and a noteworthy bug has been utilized to bargain some PayPal administrations this year.

The following is Livneh showing his three issues that influence PHP 7's unserialize component at the current year's Chaos Communication Congress.

Thursday 22 December 2016

Job looking in 2017? the most up to date ability to land you the fattest pay package deal

For those who notion a degree in computer Science, knowledge expertise, or business Economics will mean you can score a job, assume once more!
In October this 12 months, LinkedIn looked at tens of millions of jobs posted on its website online to consider what exactly employers are searching for. They came up with an inventory of high 10 abilities that employers are trying to find in 14 completely different international locations, including India.

So what is going to be the highest tendencies in 2017? Which classes pertaining to what talents must you pursue?
This is an inventory of 10 most up to date talents admired in India for 2017:
1. CLOUD AND DISTRIBUTED COMPUTINGIn cloud allotted computing variation, a couple of computers share the elements of a device gadget. that is web-based and helps give a boost to the overall efficiency and efficiency.
2. USER INTERFACE DESIGN (UI)
UI refers to design of user interfaces for machines and device including computers, mobiles, electronic gadgets, house appliances, and many others, with the focus on maximising usability and consumer experience.
3.  WEB ARCHITECTURE AND DEVELOPMENT FRAMEWORKwebsite online structure focuses on design, planning and technical components of web sites, together with net design & content material, business plan, interaction design, and other practical standards. In building framework, a core construction is utilised to resolve complicated concerns in the context of technical and device.
4. STORAGE SYSTEMS AND MANAGEMENTThe storage administration system makes a speciality of technologies and processes that helps enterprises enhance performance of knowledge storage tools. It contains virtualisation, replication, mirroring, security, compression, traffic prognosis, course of automation, storage provisioning and related tactics.
5. DATA MINING AND STATISTICAL ANALYSISinformation mining appears at discovering patterns and extracting knowledge from massive sets of data. data is on the core of information mining. aside from it, knowledge Mining includes artificial intelligence, machine finding out and database methods, and so on.
6. ALGORITHM DESIGNbecause the title suggests, algorithm design is ready designing explicit remedy issues. It mostly includes arithmetic.
7. NETWORK AND INFORMATION SECURITYcommunity and information safety helps stop unauthorised get right of entry to, misuse and change of computer community and network-available resources.
8. PR & COMMUNICATIONSPublic members of the family (PR) and conversation focuses on skills in communication, data distribution, media management, building relationships with folks/groups. It mostly includes planned action by way of mass media, new media, and so forth.
9. ECONOMICSThe find out about of economics can help college students get jobs in banks and monetary sector.
10. INTERNATIONAL RELATIONS AND PUBLIC POLICY 
Public policy and global Affairs seems at latest public coverage policy the length and breadth of nations, boundaries, international markets, surroundings, change, IT, safety, international ecosystem, how you can toughen members of the family with global entities.

Thursday 15 December 2016

Yahoo Under Scrutiny After Latest Hack, Verizon Seeks New Deal Terms


Yahoo Inc came under renewed scrutiny by federal investigators and lawmakers on Thursday after disclosing the largest known data breach in history, prompting Verizon Communications Inc to demand better terms for its planned purchase of Yahoo's Internet business.
Shares of the Sunnyvale, California-based internet pioneer fell more than 6 percent after it announced the breach of data belonging to more than 1 billion users late on Wednesday, following another large hack reported in September.
Verizon, which agreed to buy Yahoo's core Internet business in July for $4.8 billion, is now trying to persuade Yahoo to amend the terms of the acquisition agreement to reflect the economic damage from the two hacks, according to people familiar with the matter.
The US No. 1 wireless carrier still expects to go through with the deal, but is looking for "major concessions" in light of the most recent breach, according to another person familiar with the situation.
Asked about the status of the deal, a Yahoo spokesperson said: "We are confident in Yahoo's value and we continue to work towards integration with Verizon."
Verizon had already said in October it was reviewing the deal after September's breach disclosure. Late on Wednesday, it said it would "review the impact of this new development before reaching any final conclusions" about whether to proceed.
The company declined to comment beyond that statement on Thursday.
Verizon has threatened to go to court to get out of the deal if it is not repriced, citing a material adverse effect, said the people familiar with the matter, who asked not to be identified because the negotiations are confidential.
No court in Delaware, where Yahoo is incorporated, has ever found that a material adverse effect has occurred that would allow companies to terminate a merger agreement.
Nevertheless, the threat of a court case on the issue has been successfully used by companies to renegotiate deals, and experts said that some concessions from Yahoo are likely, given the magnitude of the cyber-security breaches.
Renegotiating the deal's price tag would be the simplest but also least likely scenario because the impact of the data breaches will not be apparent for some time, according to Erik Gordon, a professor at the University of Michigan's Ross School of Business.
A more likely concession would be for Yahoo to agree to compensate Verizon after the close of the deal, based on the liabilities that occur. The two companies may also agree to extend the close of the deal to allow for more time for information to come in on the impact of the breaches, Gordon suggested.
Verizon shares rose 0.4 percent to close at $51.81, in line with the S&P 500 Index. Yahoo closed down 6.1 percent at $38.41.
Biggest breach
Yahoo said late on Wednesday that it had uncovered a 2013 cyber-attack that compromised data of more than 1 billion user accounts, the largest known breach on record.
It said the data stolen may have included names, email addresses, telephone numbers, dates of birth, hashed passwords and, in some cases, encrypted or unencrypted security questions and answers.

The company added that some of its partners were affected. One such partner, Europe's Sky Plc, said Yahoo provides email services to its 2.1 million Sky.com email account holders, but it was unclear how many of those accounts were affected.
The announcement followed Yahoo's disclosure in September of a separate breach that affected over 500 million accounts, which the company said it believed was launched by different hackers.
The White House said on Thursday the US Federal Bureau of Investigation was probing the breach. Several lawsuits seeking class-action status on behalf of Yahoo shareholders have been filed, or are in the works.
Meanwhile, Democratic Senator Mark Warner of Virginia said he was looking into Yahoo's cyber-security practices.
"This most-recent revelation warrants a separate follow-up and I plan to press the company on why its cyber defences have been so weak as to have compromised over a billion users," he said in a statement.
Warner, who will become the top Democrat on the Senate Intelligence Committee next year, described the hacks as "deeply troubling."
New York Attorney General Eric Schneiderman urged anyone with a Yahoo account to change their passwords and security questions and said he is examining the breach's circumstances and the company's disclosures to law enforcement.
Germany's cyber-security authority, the Federal Office for Information Security (BSI), advised German consumers to consider switching to safer alternatives for email, and criticized Yahoo for failing to adopt modern encryption techniques to protect users' personal data.
"Considering the repeated cases of data theft, users should look more closely at which services they want to use in the future and security should play a part in that decision," BSI President Arne Schoenbohm said in a statement.
The latest breach drew widespread criticism from security experts, several advising consumers to close their Yahoo accounts.
"Yahoo has fallen down on security in so many ways I have to recommend that if you have an active Yahoo email account, either direct with Yahoo of via a partner like AT&T, get rid of it," Stu Sjouwerman, chief executive of cyber security firm KnowBe4 Inc, said in a broadly distributed email.
A Yahoo spokesperson, in response to criticism of the company's security measures, said on Thursday: "We're committed to keeping our users secure, both by continuously striving to stay ahead of ever-evolving online threats and to keep our users and platforms secure."

Tuesday 13 December 2016

Google Penguine Recovery

Google Algorithm Change: Penguin Is Now Real Time Resulting in Faster Google Penguin Recovery 

Upgrades identified with working frameworks (OS), iOS applications and android applications are exceptionally basic. Purchasers expect it, envision it and regularly request it. This is incredible, in light of the fact that in our current reality where needs and needs are continually advancing, the capacity to enhance and roll out improvements on the fly are fundamental. Since more items are living on the web or associated with the web, upgrades are required. There is one organization whose overhauls can bother organizations and incredibly affect sites. Google calculation changes can apparently appear suddenly and recuperation times if punished can take a while.

A Google calculation change can happen at this moment yet due to the nuance, is not discernible to the normal web surfer. In any case, when enormous overhauls happen like Google Panda, Google Hummingbird or Google Penguin, organizations ought to verify that their site isn't influenced. Moz points of interest bigger calculation upgrades inside and out on the off chance that you might want to delve further into Google calculation changes.



Google Penguin 4.0 and Impact 

As of late Google discharged another calculation overhaul to Google Penguin. Google Penguin 4.0 has a similar center capacity of the first Penguin calculation. Initially Google Penguin was taken off to address the developing routine of producing connections unnaturally. These connections frequently originated from spammy destinations that Google is effectively attempting to kill.

Google values client encounters most importantly and will punish sites who are in infringement. Google punishments are unbelievable and have a tendency to have an apparently enduring effect. These punishments result in loss of watchword rankings on internet searcher pages. This is a major ordeal, as an essential catchphrase your organization once positioned on and drove movement and additionally deals could be lost. By 'lost, we imply that Google could significantly frustrate your odds of positioning on a watchword like "extra large flat screen television" or "counseling administration" if punished.

SEM Rush clarifies truly once a site was punished by Google it could take months or even years to recuperate. Google Penguin had an enduring effect as a few sites sat tight years for a Google Penguin Recovery in the wake of rolling out site improvements. This was on the grounds that bigger Google calculation changes and upgrades were somewhat occasional and sites could just recoup after another redesign.

This postponement could mean passing up a major opportunity for significant prospects because of your site falling in the rankings. Presently Google Penguin 4.0 is concentrating on keeping up the uprightness of sites while additionally expanding the speed at which site can recuperate from any potential punishment.

Punishments From Google 

Beforehand, when a webpage got a Google punishment it affected the whole site. Presently Google Penguin 4.0 makes the punishments a great deal more focused on. This implies restricted to the whole site being affected it could simply affect a particular page. Along these lines, it is more imperative to routinely check subdomains and singular site pages to guarantee that no uncommon changes have happened. This isn't extraordinary as you aren't told when you are affected – you simply need to search for the signs.

Signs may change yet a portion of the signs are noteworthy sudden drops in natural catchphrases or/and watchwords dropping in position. On the off chance that you see any of situations transpiring possibilities are your site or site page may have been hit by Google Penguin. These checks can be performed utilizing destinations like Google Analytics and SEM Rush. When you distinguish terrible connections you need to evacuate or deny those connections. On the off chance that you can't evacuate the connections, Google clarifies the deny procedure here. Once these progressions are made your Google Penguin Recovery will be much speedier.

The greatest advantage of this Google calculation change is the speed the punishment can be settled or even actualized. Already when Google Penguin punished a site for spammy joins, it could take a while before Google ran the calculation again to check whether the issue had been rectified. Presently because of the continuous part of this calculation a Google Penguin Recovery can happen decently fast. Also the inverse is valid as an infringement can be found and a page can be affected.

The most straightforward approach to secure yourself is to perform consistent site reviews to ensure that any backlink that you get is valid. While Google rewards quality connections an awful connection can back off the greater part of the diligent work you put into building your online nearness.


Things to Keep in Mind 

In determination here are a couple focuses to recollect when pondering Google Penguin.

The objective is to guarantee a decent client encounter so you ought to dependably compose for your web guests. On the off chance that you are doing this and ensuring your connections are tenable you incredibly minimize the shot of getting hit by Google Penguin 4.0.

Penguin is continuously implying that it is indispensably vital to monitor any backlinks and screen your site pages. Beforehand the entire site would be influenced by Penguin however that at present isn't the situation. While it's awesome to roll out improvements and see Google rapidly quit punishing your website page you should recall the opposite. This implies an if spammy locales started connecting to your site you could be punished.

Utilize devices, for example, Google's Disavow Tool or SEM Rush's Backlink Audit to dispose of any spammy backlinks. You can likewise consider addressing an expert concerning playing out a site review. The critical thing is to frequently check site movement for any abnormal variances.

Friday 2 December 2016

Customizing Software and Services by P&P Infotech, Indore

P&P Infotech is seaward Software improvement Company which conveys uncommon outcomes that drive the estimation of your business. P&P Infotech best creators and programming architects are specialists and they help you in each progression of the product advancement procedure to tackle your most complex issues.

P&P Infotech cooperative approach crosswise over associations encourages innovative feeling that conveys comes about.

Customization Services Provided by P&P Infotech to various Industries:

  • Insurance
  • Healthcare
  • Retail
  • Real Estate
  • Hotel
  • Shipping
  • Logistic
  • E-Learning

      P&P Infotech

  • Java
  • .NET
  • PHP
  • Android
  • WordPresss

Contact Us
Call Us ☎ : 7879740465
Visit our website: http://www.pnpuniverse.com/

What Are Some Tips For Making Marketing Ads?

  Did you know that people who are interested in ads are 50% more likely to buy a product than organic visitors? If you are willing to creat...