23 Things Every Webmaster Should Know About The Behaviour Of Reader’s Eyes

  1. Ads in the top and left portions of a page will receive the most eye fixation.
  2. Ads placed next to the best content are seen more often.
  3. Bigger images get more attention.
  4. Clean, clear faces in images attract more eye fixation.
  5. Fancy formatting and fonts are ignored.
  6. Formatting can draw attention.
  7. Headings draw the eye.
  8. Initial eye movement focuses on the upper left corner of the page.
  9. Large blocks of text are avoided.
  10. Lists hold reader attention longer.
  11. Navigation tools work better when placed at the top of the page.
  12. One-column formats perform better in eye-fixation than multi-column formats.
  13. People generally scan lower portions of the page.
  14. Readers ignore banners.
  15. Shorter paragraphs perform better than long ones.
  16. Show numbers as numerals.
  17. Text ads were viewed mostly intently of all types tested.
  18. Text attracts attention before graphics.
  19. Type size influences viewing behavior.
  20. Users initially look at the top left and upper portion of the page before moving down and to the right.
  21. Users only look at a sub headline if it interests them.
  22. Users spend a lot of time looking at buttons and menus.
  23. White space is good.

What you most need to know

Differences Between The 5 Types Of Archiving And Compression Formats


  • .7z
  • .7z is a compressed archive file format that supports several different data compression, encryption and pre-processing filters. The .7z format initially appeared as implemented by the 7-Zip archiver. Both the 7-Zip program and a library to read the .7z file format are publicly available under the terms of the GNU Lesser General Public License.

    Features of the .7z format are:

    • Open, modular architecture which allows any compression, conversion, or encryption method to be stacked.
    • Compression ratios from about 2 – 10%
    • Ability to compress large files. Largest is about 16 billion GB.
    • Uses a 16-bit code standard for uniform representation of all the character systems in the world, digits, symbols, and control sequences to use when storing data.
    • Support for solid compression, where multiple files of like type are compressed within a single stream, in order to exploit the combined redundancy inherent in similar files.
    • Even archive headers (supplemental data placed at the beginning of a block of data being stored which contain information for handling the data block) are compressed.
    • AES (Advanced Encryption Standard) 256 bit key encryption is used to encrypt filenames.

  • .tar / .gz
  • .tar (tape archive) is actually an archive format only. What it does is only to collate collections of files into one larger file, for distribution or archiving while preserving file system information such as user and group permissions, dates, and directory structures.

    .gz (GNU zip) on the other hand is used to compress files, with no archiving capabilities whatsoever.

    Both formats are usually used together to compress files resulting in .tar.gz or .tgz. This format is commonly known as tarball. The ‘Content-Encoding’ header in HTTP/1.1 allows clients to optionally receive compressed HTTP responses and to send compressed requests. It saves bandwidth as compression ratios can reach up to about 80%

  • .rar
  • Eugene Roshal developed the .rar format, which stands for Roshal ARchive. .7z’s LZMA algorithm is quite similar to RAR in providing extremely high compression efficiency at the cost of compute time to compress and decompress. Both provide among the highest compression efficiency of any popular scheme, with the question of which algorithm is the more efficient compression scheme strongly depending on the files being compressed.

    Notable features include :

    • Ability to split archives into modular pieces called volumes. This is done efficiently with the built-in support for multi-volume files. It enable the unpacking program to simply prompt the user for the next disk, without any hassle of manually copying and then rejoining the pieces, or for extracting a file from a single piece without needing all pieces.
    • Ability to treat all compressed files as a single block, also known as the solid format.
    • Uses the AES encryption algorithm, where encrypted files are only recoverable by dictionary or brute force attacks.
    • Audio compression can hit up to 90%
    • It can even store NTFS streams and security information in the archives, both of which are usually lost upon compression.
    • Password protection can optionally protect filenames, so that the files contained within the archive will not be displayed without the right password.
    • .rar can also be embedded into other filetyps, like .jpeg. Check out this video.

  • .zip
    • Each archived file is compressed separately, allowing the use of different algorithms for a higher compression ratio on different files. The drawback lies in the archive being significantly larger when a large number of small files are compressed together. Contrary to this is the .tar.gz format that comprises of a .tar archive compressed using .gz
    • Files can also be stored uncompressed.
    • The AES encryption method have only been included since May 2003. Prior to that, .zip used a simple password-based symmetric encryption system which is known to be dangerously weak.
    • The uncompressed size of a file, compressed size of a file and total size of the archive was limited at 4 GB. Extensions had to be added to get around the limitations.
    • Unicode compatibility was only added in September 2006.
    • As the Info-ZIP Windows tools supports NTFS file system permissions, it will make an attempt to translate from NTFS permissions to Unix permissions or vice-versa when extracting files which can result in potentially unintended combinations like .exe files being created on NTFS volumes with executable permission denied.

DTI Data Recovery Services Review


data recovery

Imagine working on a special project or writing a document halfway when the monitor displays a blue screen. Imagine your computer not being able to detect the drive after restart. Both events are only 2 of the many that could happen to a hard disk at any time of the day. Imagine losing your system and not knowing how to rectify the issue at hand.

Which is why data recovery is important for business continuity and disaster recovery strategy. Which is where good data recovery services like DTI Data come in.

DTI Data has been on the hard drive recovery scene since 2006 1998, with a list of notable and satisfied past clients which include :

  • Cisco
  • Ford Motor Company
  • Campbell’s Soup
  • NASA
  • United States Army
  • United States Navy
  • United States Air Force
  • United States Marines

Currently, DTI Data has about 51 service areas scattered throughout the United States. Oh, and another surprising thing is that DTI Data’s expertise cover ANY hard drive repair imaginable. Whether if you are on a PC, Linux or Mac, DTI will save your data’s butt. DTI’s engineers are always involved with R&D to keep up to date with the most recent changes in hard drive technology. The R&D team usually develops new technology even prior to its appearance to the public eye.

Here are the 5 simple steps that a customer usually goes through.

  1. Get a quotation.
  2. quote

    Of course you will want to the price for the repairs. A smart person would want to compare the value of services offered by each competing company and a smart company would want to be as clear as possible about the value and price for the services offered. Both customer and company should be fully informed of the recovery process. DTI data’s online quote form is free and do not require any registration. For immediate assistance, there is always the 24 hourly available recovery hotline located at the bottom of the quote form.

  3. Send out for recovery.
  4. box

    They have partners all over the US, which is quite convenient for customers to send in their hard drives. All service centres can be found here. However, there is also another option for sending out the drives for recovery, which is by mail. Just bubble wrap the hardware, print and fill up the order request form and send it to the address at the top of the form.

  5. Diagnose.
  6. diagnose

    DTI Data’s engineers will then take a look at the drive once it arrives. If the damage is irreparable, you pay nuts. They will send it back to you. DTI’s policy is ‘flat rate pricing and a 100% satisfaction guarantee on all your data recovery, free up till the moment your data is recovered’. Cool, isn’t it?

  7. Recovery.
  8. repair

    Once the green light is given, the engineers will work on recovering the lost data. Normal turn around time is between 2 to 5 days from the time the drive is received. DTI also owns a class 100 clean room for data recovery. A clean room is actually an environment, typically used in manufacturing or scientific research, that has a low level of environmental pollutants such as dust, airborne microbes, aerosol particles and chemical vapors.

  9. Get it back.
  10. receive parcel

    Upon completion, recovered data is then sent back to the customer. That’s it.

There is even an interesting data recovery blog that keeps readers informed of the types of data recovery solutions and tips related to data recovery. Do check out the testimonials of previous customers and read what they say. You can even contact them through their website to further evaluate the experience that they had with DTI Data.