The ideal form of authorization - how to do it is not necessary
Recently, we posted a number of useful tips on creating effective registration forms on the site, and today we want to talk about the authorization / login block. Recently, a…

Continue reading →

All the information about you is ... on the Internet
The fact that computers have long and reliably entered the lives of almost every person no longer surprises anyone. This “iron” makes us capable of many things: it allows us…

Continue reading →

Interesting features of UI design in different countries
When you create an interface design for applications / sites operating in different countries, you should take into account the peculiarities of national cultures and traditions of the corresponding target…

Continue reading →

rather the opposite

5 examples of designer pain: the most common phrases coming from customers and clients

No matter how many years have passed, and TK for the designer always remains a topic of discussion. Yes, what! Everything can be perfectly painted: what kind of pictures, fonts, colors, icons, buttons, etc. are needed. But rarely when the customer understands what he will get in the end. The fact is that each person has his own design formed in his head. The customer has one, the designer the other, Vasya Ivanov the third. Sometimes it takes hours to understand what exactly the client wants. It seems that you figured it out, just understood the essence of the technical task and worked out every detail. It remains only to send the finished layout and wait for praise from the customer, how smart and creative you are. Alas … In fact, it turns out that the client did not want this at all. Why? “Make the logo larger”, “let’s try to change the color”, “turn the photo in the other direction” … Yeah, somewhere we’ve heard that before. =)

We present to your attention the top 5 phrases that will make even the most seasoned designer cry and will figure out what each of them actually hides. Let’s start with the classics … Continue reading

PPTP VPN
This protocol allows you to implement a secure point-to-point connection by creating a tunnel in an insecure network. The work of PPTP is to implement PPP frames in IP packets…

...

Overview of modern antiviruses
Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns…

...

Internet Marketing Cost Effectiveness
What are the main steps in the online sale process? Advertising tools attract potential customers to the site. Tools can be different: seo, contextual advertising, display advertising, advertising on social…

...

Creating an Effective Hero Image Image for a Website
Does the user only need 50 milliseconds to form an opinion on any site? Web developers and designers really have very little time to make a good impression on a…

...