Skip to Content

Technology Blog

Technology Blog

Articles by Brian Moloney

Djangonauts and GeoDjango

Many thanks to Joe Jasinski and Eric van Zanten for their presentations on GeoDjango at November's Chicago Djangonauts meetup. Joe kicked off the evening with his presentation, Introduction to GeoDjango.  The presentation was based on his recent blog post GeoDjango Quickstart.  Joe has also provided his presentation slides. After a...

Where Django programming and Google Analytics meet

We just recently discovered an issue where a programming decision affected the ease (or lack thereof) of establishing goal funnels in Google Analytics.  What we also discovered was that it was completely avoidable with a little better communicatioin between our Django programming staff and our analytics staff.  As is typical...

Chicago Djangonauts, reanimated

Having scheduled the first meeting of the reanimated Chicago Djangonauts, I didn't know what to expect.  There were a number of RSVPs on Facebook and a couple through the chicagodjango.com site, but you never know. We ordered three cases of beer from our favorite brewer and 13 pizzas from our...

PyCon, Django in Chicago and general musings

For the fourth year in a row, we have just completed our sponsorship of PyCon.  Each time I return to the office after the conference ends, I am filled with a particular energy.  This year that energy is more pronounced. In many ways, our day-to-day work is done in relative...

New Study: 93% of Passwords Protecting Medical Records Cracked

The study was conducted by researchers at Children's Hospital of Eastern Ontario Research Institute and the University of Ottawa in Ottawa, Ontario.  The test was conducted using files provided by volunteer stakeholders in 15 clinical trials.  And, although the samples were not representative of all clinical trials in Canada, they...

Thoughts on our sponsorship of PyCon

We have just completed our third year as a sponsor of PyCon and I thought I'd take a few minutes to reflect on our use of Python as well as the conference itself. Pretty much everyone I spoke to was impressed that we've been programming Web sites in Python since...

Keep masking passwords, for now

I always find Jakob Nielsen's usability columns interesting. I rarely disagree with his mostly common sense approach, however I found myself at odds with a recent Alertbox column, entitled "Stop Password Masking." In a nutshell, he believes the common practice of displaying dots or asterisks when typing in a password...

The Importance of Daily Briefings

Even as a small company, we face our share of communication challenges. Not a week goes by without someone uttering, "we need to communicate better." Communication struggles cause a myriad of problems - project misdirection, irritations, management involvement. Production makes up the bulk of our staff - programmers, user interface...

Form security, under the hood

I recently wrote a feature article for eHealthcare Strategy & Trends magazine entitled, "How secure are your Web-based forms?" The article explored what happens after you press the submit button. It turns out that lots of things can happen - many of them bad. To clarify, "bad" is the wrong...

New study compares short and long "contact us" form

I've been experimenting with the contact form on our Web site. It is an important - perhaps the most important - aspect of our Web presence. For all the blogging and news releasing and testimonials and marketing, our primary method of gathering online feedback is the contact form. We have...

Who controls your domain name?

Every domain name must be registered. Network Solutions, GoDaddy and examples of domain name registrars. The owner of a domain name is referred to as the Registrant. To check your domain name registration, go to the WHOIS page at Network Solutions. Network Solutions will report on all domains regardless of...

Are Web forms really secure?

So, how secure is that sensitive information? Most people are familiar with the front-line form security - the secure Web page. This is the Web page that contains the form and is characterized by a lock icon appearing on the browser (also indicated in the address bar with https preceding...

Web site accessibility takes a front seat

It is a class action suit brought against Target alleging that target.com is in violation of the Americans with Disabilities Act because the site is not accessible to the blind. Specifically, the site lacked alternative text used by screen reading software. This week a federal judge certified the class action...

The placement of links on a page affects click rates

The Journal of Computer-Mediated Communication is a peer-reviewed Internet journal that contains some deep and informative research papers. To wit, a study released in the January 2006 issue goes into great depth about click habits as they relate to positioning. In short, two experiments demonstrate an increased tendency for visitors...

Back