Invest Your Home in the Stock Market
(Author’s Note: Although the stock market returns illustrated in this article are an obvious example of Greenspan’s “irrational exuberance” of 1997-2000, the concept is still valid. However I would caution anyone against investing more than they feel comfortable losing and strongly urge investors to spread their investments among other classes of assets such as real estate, bonds, precious metals, etc.)
How To Send Email With Perl, Part III
Part I contained an introduction and a working Perl script for sending email. Part II showed how to send either plain text or HTML email. This Part III will demonstrate how to send both plain text and HTML formats into one email.
Understanding The Flow of Internet Traffic, to Attain Website Traffic
To attain visitor traffic to your website you must understand how traffic flows throughout the internet. This understanding stems from the basic algorithm of the Internet and the goals of it’s original creators.
Sitemaps and Hypertext Links: “Food” for Search Engine Robots
Sitemaps and hypertext links are “food” for search engine robots. We will look at the value of text links for optimal spidering, and the importance of using a sitemap in order to help search engine robots reach your website’s deeper pages.
Jekyll & Hyde Customer Service
I just got off the phone with a credit card account company. I was closing a merchant account that I no longer used. A simple transaction, or so I thought.
Cash Advance Loans: Loan Sharks In Disguise?
You have seen them on the corner and in the poorer parts of town with names like “Quick Cash”, “Quick Loan”, “Payday Loans”, “Car Title Loans”. They are starting to sprout up all over the country and will soon rival Starbucks for sheer number of locations.
Personal Finance 101
The subject of personal finance is very broad, but as a beginning, I would like to discuss what I consider the foundations of personal finance: Security, Stability, Growth and Protection & Management.
Web Services Architecture
We can understand without difficulty why Web Services are produced if we will look at the computer and software world. There are many systems and platforms out there on the Internet and there are even more applications that are living on these systems and platforms. If we need more explanation about this, there are many technologies to connect clients to servers- including DCOM, CORBA and others, with Web Services growing on a new and much simpler type of connectivity, based on open standards such as HTTP, XML and SOAP.
Authenticating by Public Key (OpenSSH)
SSH is a protocol for secure, remote logins and file copying; and OpenSSH, provided with most Linux distributions, is its most popular implementation. This recipe, selected from Chapter 6 on “Protecting Outgoing Network Connections,” shows you how to use public-key authentication to prove your identity to a remote OpenSSH server, a technique more secure than using login passwords.
Cascading Style Sheets (CSS); Backgrounds (part 2 of 2)
Part 1 focused on the many ways to specify web page backgrounds with CSS. This part 2 addresses these subjects: The background of divisions of the web page, within DIV tags.
The background of tables.
The background behind sections of text content.
The background behind INPUT and TEXTAREA form elements.
The background behind ordered and unordered lists.