You are on page 1of 4

Running head: CLOUD-BASED REPUTATION 1

Personalized devices

Student Name

Course Name

Date
CLOUD-BASED REPUTATION 2

Reputation can securely be retrieved using couple of proven methods that does not reduce the

speed of accessing the web, which might lead to undesired user experience. It however,

important for bother the user and the writers to come into an agreement about the security

posture held by such methods. This means that an intense level of secret ought to exist, to ensure

security of both parties. It becomes unsafe if hackers are tipped with the knowledge that a

particular malicious website has undesirable reputation. The hacker can intend to change the

domain of such sites and as a result, plot malicious attacks.

The other manner in which the reputation can be retrieved without interfering with the speed of

browsing that can create poor reputation to users is overhaul hosting. It is worth noting that set-

ups that are used constantly, that is, before and after growth customized into the latest and more

reliable version of the platform. The intentions of the initial set-ups are not up-to-date with the

current functionality or the high traffic thereby may slow down and fail to function altogether.

Such failures or slow operations will affect the users, especially when there is an overload in the

website, by registering poor performance experience.

Creating a streamline of the design of the site ensures that reputation is securely retrieved

without slowing the web down to an extent of giving users a poor experience. The design

recommends simplicity of the web pages for easy access. As part of making the page simpler,

actions like clearing the script to do away with unwanted entries in the process identified as

minification, as pointed by Gerlitz et al (2016), is necessary. The page can also be made simpler

by the user uploading media through the image optimizer. It is also important for users to

completely ignore and avoid sites that are redirected from the original sites. The users should
CLOUD-BASED REPUTATION 3

also opt to reduce the use of plugins in the content management system surfaces, as way of

optimizing the speed of site access.

The customer experience can be boosted hence securely retrieved reputation, by maximizing

content delivery. In cases of high traffic webs, users usually opt to use content delivery network

(CDN) in a bid to maximize the delivery of content (Shanmugam et al, 2013). In such cases,

CDN applications proves reliable to users in their locales. Such acts are a deviation from the

scenario where the site contented is located on a single server rendering users incapable of

accessing the site content, depending on their location, thereby a reduced speed for users in far

areas.

To ensure that reputation is securely retrieved without interfering with web access speed that

affects the experience of users, improved workability can be ensured through caching. Caching

helps in clearing the cumulated requests in the servers that are recorded in the storage systems of

the site, whenever users visit and makes entries in the website. Some of the ways of clearing

static asset cache are through the use of content delivery network (CDN) and ensuring up-to-date

expirer header of the web files.

Organizations and web designers put ruthless efforts to ensure that reputation is securely

retrieved but the high speed of website access maintained so that users can be given the best

experience while accessing sites. This can be done through compressing of files in a single file

zip. This kind of action reduces the number of regularity of content delivery. In order to

complete the action, tools like JScompress, packer and Google Closure compiler can be used to

decrease the number of recurring entries and ensure compact organization of the codes. To
CLOUD-BASED REPUTATION 4

ensure speedy delivery of content, the above mentioned tools can be used to squeeze the script

files. The actions mentioned above will ensure speedy content deliver and user satisfaction.

References

Gerlitz, C., Helmond, A., van der Vlist, F., & Weltevrede, E. (2016). App Studies: Platform

Rules and Methodological Challenges: panel overview.

Shanmugam, K., Golrezaei, N., Dimakis, A. G., Molisch, A. F., & Caire, G. (2013).

Femtocaching: Wireless content delivery through distributed caching helpers. IEEE

Transactions on Information Theory, 59(12), 8402-8413.

You might also like