Amp - Web Design and Web Development News, Javascript, Angular, React, Vue, Php

568 results for: amp

A beginner’s guide to software vulnerabilities

What are software vulnerabilities The number of devices connected to the Internet is growing every day. And among those devices we find not only computers and smartphones, but also an ever-rising number of cameras, smoke detectors, motion sensors, smart door locks, and let’s not forget that even plant pots. Many households…

Category : Security   17-11-2020   by Iveta Karailievova

The easiest way to align items using flexbox

With the release of flexbox in CSS, it has become an essential tool when placing elements next to each other, since, by default, the children of a display: flexare stacked on the left side taking up the minimum space according to their content. If we want to modify the behavior of…

Category : Css   17-11-2020   by Janeth Kent

Dark Mode on website using CSS and JavaScript

In today’s article we are going to learn how to build pretty much standard these days on the web pages and that is the alternative color mode and switching between them. This is very useful when during night you want the user to be able to NOT suffer by staring…

Category : Css   10-11-2020   by Tibor Kopca

The BleedingTooth vulnerability and other Bluetooth security risks

Have you ever heard of BleedingTooth? And we do not mean the really disturbing looking mushroom which goes by this name and is totally real (we double checked) but one of the lately discovered vulnerabilities in Linux systems. It had hit the tech news recently, when Andy Nguyen, a Google security…

Category : Security   10-11-2020   by Iveta Karailievova

A Java approach: The Cycles - Introduction

Hello everyone and welcome back! Until now, we have been talking about variables and selection structures, going to consider some of the fundamental aspects of these two concepts. Theoretically, to write any kind of program, the notions seen so far might be sufficient. However, a problem arises. How can we…

Category : Java   23-10-2020   by Alessio Mungelli

A Java Approach: Selection Structures - Use Cases

Hello everyone and welcome back! Up to now we have been concerned to make as complete an overview as possible of the fundamental concepts we need to approach the use of conditional structures. We have therefore introduced the concept of conditional structures, outlining the various situations that could arise. We…

Category : Java   20-10-2020   by Alessio Mungelli

JavaScript: Spread and Rest operators

In today’s article we are going to talk about one of the features of the ES6 version(ECMAScript 2015) of JavaScript which is Spread operator as well as Rest operator. These features may be very useful when developing and working with front-end frameworks. We will explain how you can use it in…

Category : Javascript   05-11-2020   by Tibor Kopca

The best tricks and features to master your Android Smart TV

We bring you a collection of the best tricks to squeeze Android TV, the Google operating system designed for televisions. You can find it on smart televisions of some brands, but also on devices that you will connect to the TV. With all of them, you can use different types…

Category : Networking   05-11-2020   by Luigi Nori

A Java approach: boolean variables

The previous time, we talked extensively about Boolean variables, trying to outline the main operations that can be carried out at a practical level.  Of all the cases examined, we have not examined the most important and most recurrent one: the case in which the conditions to be examined are more…

Category : Java   18-10-2020   by Alessio Mungelli

How To Add Filter Effects to Images with CSS

To achieve interesting effects on your images, learn about the 'filter' and 'Backdrop-Filter' properties of CSS. CSS filters are a very attractive feature of CSS that allows you to apply certain image effects, typical of photo retouching applications, such as sepia, variations in brightness or contrast (or others) on the fly…

Category : Css   28-10-2020   by Silvia Mazzetta

Why You Should Hire Node.js Developer for Your Backend Development

When developers are building a new website, they mainly focus on both frontend and backend development. The frontend code helps create the interfaces through which the app interacts with the users while the back-end code interacts with the server to deliver data or content that is displayed to the website…

Category : Javascript   27-10-2020   by Luigi Nori

What's the Difference between Google TV and Android TV?

At the end of September, Google launched the renewal of its classic dongle. The new Google Chromecast didn't arrive alone, but added two very important innovations compared to the devices of previous generations that have been turning normal televisions into smart TVs since 2013. The first of these novelties is the…

Category : Software   27-10-2020   by Silvia Mazzetta

How to watch deleted or private Youtube videos

Today we are going to talk about the technique which you permit to be able to recover videos from Youtube that was deleted, made private or simply blocked by Youtube itself. With this trick you most of the time would do just that. How is this possible we will explain…

Category : Social networks   26-10-2020   by Tibor Kopca

GAN Generated Images

Let’s play a game - can you guess what these portraits have in common?  They all depict non-existent people. All these images were created by artificial intelligence. We could say, that AI “dreamed” those people up.  How can a machine make up people’s faces? The genius idea came from Ian Goodfellow, who was…

Category : Technology   28-10-2020   by Iveta Karailievova

How to prevent your neighbor from hacking your Chromecast

Google Chromecast was born as a device to add Smart TV features to those that were not yet Smart TV, and with WiFi connectivity as one of the key features according to this approach. Now it has evolved and is more complete, and serves equally well on Smart TVs, but…

Category : Networking   26-10-2020   by Luigi Nori

A Java approach: condtional structures

Hello everyone and welcome back! The previous times we have introduced the concept of variable, trying to define some basic concepts about it.  However, some situations suggest that the concept of variable alone is not enough to solve all the possible situations that may arise in front of us. A very…

Category : Java   17-10-2020   by Alessio Mungelli

3 awesome ways technology is helping us combat the COVID pandemic

Times are hard now, that humanity once more stumbled into a terrible pandemic. But in comparison to the poor folks back in 1918 when the Spanish flu was on wreaking havoc, nowadays we have the advantage of cutting edge technology on our side. Here’s a quick list of top three ways…

Category : Technology   28-10-2020   by Iveta Karailievova

How to Deal with Unnatural Inbound Links

A website that has a good rank on search engines, especially Google is a big task. Backlinks or Inbound links are one of the best ways to achieve this ranking. Sometimes in a haste to achieve this goal, websites indulge in underhanded behaviour like unnatural inbound links. These are considered…

Category : Seo & sem   25-10-2020   by Janeth Kent

Hashmap: hashing, collisions and first functions

Today we are going to study some concepts closely related to hashmaps. The concepts we are going to see are hashing and collisions. Hashing The idea of hashing with chaining is to create a sort of array of lists, into which the elements are somehow inserted. We need to map the keys to…

Category : C language   28-06-2020   by Alessio Mungelli

Hashmap: Overflow Lists

In this short series of articles we will go to see how it is possible to create the Hashmap data structure in C. In the implementation we're going to use the doubly concatenated lists as auxiliary data structures. Let's look at a possible implementation.  Header file Let's first have a look to what…

Category : C language   18-06-2020   by Alessio Mungelli

Javascript: what are callbacks and how to use them.

Today we are going to learn about a concept that is widely used in javascript and that is used quite a lot by today's frameworks, libraries, especially NodeJS. This is the use of Callbacks.   What is a Callback?   Simplifying, it is to pass a function as a parameter so that this function…

Category : Javascript   23-10-2020   by Silvia Mazzetta

Data structures in Java - Linked Lists

With 2020 we are going to look at a new aspect of programming: data structures. It is often the case that everyone uses structures provided by the various programming languages. The objective will be to have a general idea of how they work and their internal mechanisms. Often we will…

Category : Java   22-10-2020   by Alessio Mungelli

How to share your location using Plus codes on Google Maps for Android

Do you know what plus codes or plus codes on Google Maps are and what they are for? We tell you how they work and how to get them from anywhere. You may have been sent one and not know very well what it is for. If you have never used them,…

Category : Technology   22-10-2020   by Janeth Kent

A Java approach: variables - use case

Hello all friends and welcome back! After the introduction made on the variables, we try to analyse some critical issues that may arise in quite common situations. Let's start by analysing some practical examples. Example 1: division that returns a non-integer result The first critical case that might arise for those who approach…

Category : Java   22-10-2020   by Alessio Mungelli

Introduction to REGEX - Regular Expression

Today we are going to write about Regular Expressions known as regex or shortened  regexp, a very useful concept of using search patterns. Surely you were in a situation when you need to replace some word for another or character for some else. This and more you can handle with Regular…

Category : Programming   23-10-2020   by Tibor Kopca

A Java approach: variables

Hello everyone and welcome back! Today we will begin a journey that will lead us to study, and possibly review, what are the basics of programming. We will start by talking about variaibli. Introduction Anyone who wants to approach the world of programming will soon realise that coding is not exactly like what…

Category : Java   20-09-2020   by Alessio Mungelli

The new features coming to the Google search engine in autumn 2020

Google has included important improvements in its search engine, applying Artificial Intelligence, to make it easier for users to find what they are looking for. It has also announced new features in Google Lens and other search tools. The main novelties are the following: Many of the announced improvements involve the…

Category : Seo & sem   18-10-2020   by Luigi Nori

MAME Multiple Arcade Machine Emulator: How to download and configure this arcade emulator for Windows

Despite the fact that new state-of-the-art computer games are coming out every so often, the whole retro theme is very appealing to users who are looking to relive the long hours spent in front of a console, such as the NES or SNES, and even in arcades playing arcade machines.…

Category : Software   14-10-2020   by Luigi Nori

How to turn an Android device into a retro game console

If you like retro games and you want to set up your own system at home, a good way to do it is using Android. From emulators for Mega Drive, N64, GBA, PS1 or Super Nintendo, to other systems such as MAME, all of them are available in Android app…

Category : Software   14-10-2020   by Silvia Mazzetta

Network and port scanning with Zenmap

This article goes out to all the computer nerds who are, when it comes to networking, more on the noob-side of the crowd. It does not have to be complicated and everyone with patience and eagerness to learn something new can relatively quickly gain the knowledge necessary to feel more…

Category : Security   08-10-2020   by Iveta Karailievova

HTTP Cookies: how they work and how to use them

Today we are going to write about the way to store data in a browser, why websites use cookies and how they work in detail. Continue reading to find out how to implement and manage them - if you're looking for code! Understanding HTTP COOKIES - What are they? Cookies and other types…

Category : Development   22-10-2020   by Tibor Kopca

SEO in Google News: How to appear in Google News

Google News is a tool, from Google, that spreads current, reliable and truthful content from different websites or portals dedicated exclusively to news. The sites that appear in Google News have a great opportunity to increase traffic to your website and consequently the opportunity to increase your sales through it. If…

Category : Seo & sem   04-10-2020   by Luigi Nori

Google Dorks: How to find interesting data and search like hacker

Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…

Category : Security   22-10-2020   by Tibor Kopca

How to block any website with a password from your browser

We are going to explain how to block any website with a password from your browser, and for this purpose we are going to use an extension called Block Site. This is an extension that has native versions to download in Chrome, Firefox, Microsoft Edge and Opera, although it can…

Category : News and events   30-09-2020   by Silvia Mazzetta

Double VPN: what it is and how it works

Privacy on the web is a very important factor for users and there are more and more tools to help us maintain it. Without a doubt VPN services have had a very important increase in recent times and represent an option to preserve our data when we browse. However, in…

Category : Security   28-09-2020   by Silvia Mazzetta

Jennifer in Paradise: story of the first photo ever edited in Photoshop

A photograph with more than 30 years of history has become an icon in popular culture, or at least it remains in the memory of those who have ever used Adobe Photoshop, the well-known tool for photo retouching. Behind software like Photoshop there are dozens of stories. One of them…

Category : News and events   25-09-2020   by Silvia Mazzetta

Data Scraping and Data Crawling, what are they for?

Right now we are in an era where big data has become very important. At this very moment, data is being collected from millions of individual users and companies. In this tutorial we will briefly explain big data, as well as talk in detail about web crawling and web scraping…

Category : Web marketing   25-09-2020   by Silvia Mazzetta

How to write our own Privacy Policy

In this article we will talk about Privacy Policy statements, how you can write one and implement it on your page. Why did it pop up? These days when we browse on any new page, or when we visit the site for the first time, most of the time we have to…

Category : Development   22-10-2020   by Tibor Kopca

How to securely access the Dark Web in 15 steps. Second part

Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from number 6.   6. Changes the security level in the Tor browser   It is also possible to increase the security level of the…

Category : Security   19-09-2020   by Janeth Kent

How to securely access the Dark Web in 15 steps. First part

The dark web can be a pretty dangerous place if you don't take the right precautions. You can stay relatively safe with a good antivirus and a decent VPN. However, if you want to be completely anonymous and protect your device, you'll need a little more than that. Here there are…

Category : Security   19-09-2020   by Silvia Mazzetta

How to Browse the Internet Anonymously: 6 tips

Most of the actions you take online are not as private as you might imagine. Nowadays, countless people and groups try to follow our online behaviour as closely as possible. Our ISPs, our network administrators, our browsers, search engines, the applications we have installed, social networks, governments, hackers and even the…

Category : Security   16-09-2020   by Silvia Mazzetta

What is a Cryptophone and how it works

The so-called cryptophones, are anti-interception smartphones as they use encryption methods to protect all communication systems. Here are all the details and the truth about these "unassailable" phones. The recent Encrochat affair, recently investigated for illegal activities, has brought to light the so-called cryptophones. They are smartphones - legal in themselves -…

Category : Security   11-09-2020   by Silvia Mazzetta

Free Netflix: everything you can see without subscribing

To view the contents of an audiovisual streaming platform such as Netflix, it is necessary to pay a monthly connection fee. However, the company has enabled a series of contents that can be viewed "for free", without having to pay for them. To view Netflix's free contents it is not necessary…

Category : News and events   09-09-2020   by Luigi Nori

How to comply with Google's quality guidelines in 2020

Google provides a set of guidelines on what your website's content should look like in order to appear in search results. There are several categories within the Google guidelines: Webmaster Guidelines. General guidelines. Content-specific guidelines. Quality guidelines. In this article we will focus on the Quality guidelines. Quality guidelines, describe techniques whose use is prohibited and which,…

Category : Seo & sem   09-09-2020   by Silvia Mazzetta

How to install a Linux partition on a Windows 10 PC

In spite of a past we could say almost confronted, the approach between Windows and Linux is accelerating more and more, drawing a story closer to love than to hate. So much so that Windows 10 already offers support for Linux natively. Creating a subsystem is no longer penalized. A…

Category : Operating systems   06-09-2020   by Luigi Nori

How are businesses using artificial intelligence?

The term Artificial Intelligence (AI), "the intelligence of the machines", unifies two words that, a priori, could not be associated, since the term intelligence is attributed to the faculty of the mind to learn, to understand, to reason, to take decisions and to form a determined idea of the reality. How…

Category : News and events   02-09-2020   by Silvia Mazzetta

What cybersecurity professionals have learned from the lockdown experience

The COVID-19 pandemic has radically changed the rules of the game for most companies and individuals in a very short time; it has also changed the international computing universe. Sudden changes in people's habits as well as in business operations have altered some of the elements that characterize cyber-risk. And…

Category : Security   26-08-2020   by Silvia Mazzetta

5 Remote Careers You Can Start Online in 2020

In 2020, life has moved indoors. School, shopping, entertainment, and work have all moved online to keep up with the fight against COVID-19. And with it came an enormous demand for remote careers. If you are looking to start a new career that you can excel in without leaving the…

Category : News and events   25-08-2020   by Silvia Mazzetta

The most popular Array Sorting Algorithms In PHP

There are many ways to sort an array in PHP, the easiest being to use the sort() function built into PHP. This sort function is quick but has it's limitations, especially when sorting things like dates as PHP usually guesses which value is higher than the other and can produce…

Category : Php   25-08-2020   by Luigi Nori

Matrix. An open network for secure and decentralized communication that you can install in your Ubuntu server

Imagine to have an open platform that is as independent, vibrant and evolving as the Web itself, but for communication. As of June 2019, Matrix is out of beta, and the protocol is fully suitable for production usage. But, what is Matrix? Matrix is an open standard for real-time, interoperable and decentralized communication over…

Category : Networking   25-08-2020   by Luigi Nori

Browse safely and privately from your mobile phone using a VPN

Every day our smartphones suffer attacks, viruses, malware and information theft. In this article you will be able to deduce if you need a VPN in your mobile phone to safely surf the Internet, to avoid possible attacks on public Wi-Fi networks and also to filter out advertising and malware…

Category : Security   25-08-2020   by Janeth Kent

The concept of Model-View-Controller (MVC) explained

In software engineering, we use design patterns as reusable solutions to a commonly occurring problem, a pattern is like a template for how to solve a problem. Model-View-Controller (MVC)  is a software design pattern that divides the related program or web application into three interconnected elements or components. Each of these…

Category : Development   22-10-2020   by Tibor Kopca

The package managers npm and yarn: main differences

Npm and yarn are package managers that help to manage a project’s dependencies. A dependency is, as it sounds, something that a project depends on, a piece of code that is required to make the project work properly. In the past we had only npm but it had so many issues…

Category : Javascript   19-08-2020   by Luigi Nori

The 6 Essentials for Creating a Visually Appealing Web Design

Creating a website might seem like a simple thing. After all, what do you really need besides a good hosting provider and relevant content, right? Well, the reality is quite different. Things might have worked like that in the past, but they are quite different now.   The internet is advancing, and…

Category : Web design   25-08-2020   by Silvia Mazzetta

How to configure Tor to browse the deep web safely

Today we explain how to set up Tor to browse safely, and we'll share some links to safe sites on the deep web to get you started. Many already know that not everything on the Internet appears in Google, Yahoo, Bing or other search engines, and that accessing much of this…

Category : Security   12-08-2020   by Silvia Mazzetta

The Javascript asign() method to merge and clone objects

In this article, we will be covering Object.assign()method in javascript in detail with examples. A javascript object is a collection of key-value pairs. Keys are also known as properties of object. Keys are unique but values may be duplicate. Example of a javascript object is let car = { brand: 'Hyundai', fuel: 'Petrol', model: 'i20' } Here, car…

Category : Javascript   11-08-2020   by Luigi Nori

How to create the perfect hacker-proof password

We have not learned and we still use passwords that are extremely easy to hack and vulnerable to cyber attacks. If you don't want your credentials to end up in the hands of criminals or traded on the dark digital shelves of the Deep Web, we bring you a simple…

Category : Security   11-08-2020   by Silvia Mazzetta

All the javascript functions and methods to manipulate arrays

This article will show that the prominent JavaScript array functions are .map(), .filter(), and .reduce(), and will then go through examples of instances in which .every() and .some() would save computing power over the more prominent solutions. You will learn helpful methods in JavaScript Array, an array is one of the…

Category : Javascript   10-08-2020   by Luigi Nori

How to integrate native images lazy loading in your web projects

Support for natively lazy-loading images is now supported on the web! Look at this demo of the feature From the version 76 of Chrome, you can use the loading attribute to lazy-load images without the need to write custom lazy-loading code or use a separate JavaScript library. Let's dive into the details. Browser compatibility   is supported by…

Category : Programming   07-08-2020   by Luigi Nori

Introduction to Network Theory

Modern network theory was introduced at the end of the nineties by the PhD student Reka Albert and then monopolized by her tutor L.A. Barabasi, who made an empire out of it. The idea was not new, network theory is based on graph theory and graph theory had been already introduced…

Category : Networking   03-08-2020   by Paolo Masucci

7 Killer Strategies to Increase Your Sales Funnel Conversion Rates

Have you been using online sales funnels to grow your business online but it hasn't really worked for you? There's something you are not doing right. Use these strategies to make your sales funnels convert better. We are living in a competitive digital era, and as an entrepreneur, you have to…

Category : Web marketing   23-07-2020   by Janeth Kent

Popular DNS Attacks and how to prevent them

DNS services are essential for web browsing. However, it is one of the most vulnerable to attacks. This guide will detail the most dangerous DNS attacks and some actions that will protect the network infrastructure. One of the reasons why DNS services have some susceptibility to attack is the UDP transport…

Category : Security   20-07-2020   by Silvia Mazzetta

TypeScript: The evolution of JavaScript

When you're involved in the development of a large project, programming languages like JavaScript don't seem to be the best solution. Their lack of elements such as Language Aids has created the need for code-friendly alternatives. Here we tell you about one of these options. TypeScript, is a project developed and…

Category : Javascript   18-07-2020   by Janeth Kent

7 Most Effective Ways to Make Money From Photography

Many people all over the world enjoy photography. At first, it may seem difficult to learn, but once you turn it into a hobby, then it becomes a pleasure rather than a difficulty. And the better you get with photography, the more you understand and want to invest in better…

Category : News and events   15-07-2020   by Janeth Kent

Smishing: risks, examples and how to avoid it

Do you know what smishing is, what risks it involves and how you can avoid it? The cyber-criminals are betting on the technique known as Smishing when it comes to defrauding users through text messages (SMS). The objective of Smishing is the same as that of other types of scams…

Category : Security   16-07-2020   by Silvia Mazzetta

A collection of interesting networks and technology aiming at re-decentralizing the Internet

The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…

Category : Networking   27-08-2020   by Janeth Kent

MySQL 8.0 is now fully supported in PHP 7.4

MySQL and PHP is a love story that started long time ago. However the love story with MySQL 8.0 was a bit slower to start… but don’t worry it rules now ! The support of MySQL 8.0’s new default authentication method in PHP took some time and was added in PHP…

Category : Databases   27-10-2020   by Janeth Kent

Awesome JavaScript Games and Js Software to create Games

Best sites js13kGames 2019 - Highlights from the js13kGames 2019 competition. js13kGames 2018 - 13 Games in ≤ 13kB of JavaScript. js13kGames 2017 - Build a game in 13kB or less with js13kGames. Adventure Triangle: Back To Home - You are lost in the cave. Try to get out and back to home. Sometimes it…

Category : Javascript   30-06-2020   by Janeth Kent

Neumorphism (aka neomorphism) : new trend in UI design

This area, which arises from a basic human need, such as the urge to communicate, is constantly changing thanks to the advances of the technological era. Today, we invite you to reflect on the origin of this discipline and its future challenges. Graphic language has always been present throughout our lives…

Category : Ui/ux design   17-06-2020   by Silvia Mazzetta

What is Machine Learning ?

Artificial Intelligence or AI is a trend in technology and has been the main topic of many philosophical debates as to where this field will lead us as humanity. This time I'm going to focus on a subfield of Artificial Intelligence that is Machine Learning, which I am currently very passionate…

Category : Technology   16-06-2020   by Silvia Mazzetta

How to get notified when one of your WhatsApp contact is online

Privacy is one of the most important aspects among most users of the popular Facebook messaging application. So much so, that many settings have been included in WhatsApp itself to offer users the ability to display their profile picture, status, info, or the time they last connected to the application…

Category : News and events   15-06-2020   by Silvia Mazzetta

Dark Web: how to access, risks and contents

You've probably heard of the Dark Web before, but do you really know what the Dark Web is, or what it consists of? Do you know its risks? Which users use the Dark Web? What content is published? Would you know how to access the Dark Web safely? If you are reading…

Category : Security   13-06-2020   by Silvia Mazzetta

Why do you vote the way you do in the age of misinformation and fake news?

In this context of the electoral campaign in which we are immersed, the 'political hoaxes' are becoming more relevant and it is expected that attacks to destabilize the parties and candidates in order to influence the electorate will increase. As recent examples, let's remember that disinformation campaigns influenced Trump to win…

Category : News and events   11-06-2020   by Silvia Mazzetta

How to change font size and format in WhatsApp

Your WhatsApp messages can be much more original and fun by changing the font, size, or format. Here's how. WhatsApp is the leading messaging app for virtually everyone, with permission from Telegram, Facebook Messenger, or Apple Messages. And while there's a lot to be said for it, it's been getting better…

Category : News and events   04-06-2020   by Janeth Kent

How to move Chrome, Firefox or Edge cache to save space

Caching is a technique used by many programs to improve their performance, especially for applications that run over the Internet, such as streaming programs or web browsers. This technique consists of saving all or part of the information being processed in a directory so that, if we return to it,…

Category : News and events   04-06-2020   by Janeth Kent

How to Take Your Small Ecommerce Business to the Next Level

Running an ecommerce business can be both exciting and financially rewarding. However, as you increase your customer base, it might seem difficult to successfully scale your operations. If your site is growing in popularity, or you want to attract more customers to your online venture, read the below top tips on…

Category : Web marketing   01-06-2020   by Janeth Kent

Step by Step Guide to Successful Social Media Marketing

The most popular social media platforms boast of having hundreds of millions of active users every month. The number itself is more than enough to attract brands in trying to establish themselves as niche authorities on as many different social media websites as they can.   If you are still relatively new…

Category : Web marketing   18-05-2020   by Silvia Mazzetta

Introduction to BEM (Block Element Modifier)

Problems with naming CSS classes I think I might not be the only one with this experience: after finally grasping all the important concepts regarding CSS I wanted to start giving what I thought would be beautiful yet simple style to my HTML code. But suddenly I ended up with class…

Category : Css   23-05-2020   by Iveta Karailievova

Seo: How Search Behavior Has Changed During COVID-19 Pandemic

Google positioning is experiencing a before and after with the coronavirus crisis. The way we search in Google has changed; The way Google the search engine gives us the results has changed ; The tools that webmasters have at their disposal have changed. Google claims that it has never registered as many searches for…

Category : Seo & sem   08-05-2020   by Silvia Mazzetta

How to get into the Deep Web: a guide to access TOR, ZeroNet, Freenet and I2P

We would like to present you with a guide that will allow you to enter the main darknets that make up the Dark Web, colloquially known as the Deep Web, although this last term has another meaning. The hidden Internet or Dark Web is a portion of the network in…

Category : Security   07-05-2020   by Janeth Kent

First steps into JavaScript – a practical guide 3

After we learned the basic ofaccessing DOM elementsandhow to modify them,we are ready for the more exciting parts – handling DOM events. This allows us to make our web way more interactive, and finally we can put our JS knowledge into practice. User input such as keyboard actions or mouse clicks…

Category : Javascript   07-05-2020   by Iveta Karailievova

JavaScript: Promises explained with simple real life examples

Handling asynchronous data flows is complex, who hasn't faced codes like this one?: checkWeather('palma de mallorca', (error, weather) => { if (error) throw error; if (weather === 'well') { return checkFlights('palma de mallorca', (err, flights) => { if (err) throw err; buyTicket(flights, (e, ticket) => { if (e) throw e; console.log('ticket nº…

Category : Javascript   06-05-2020   by Janeth Kent

First steps into JavaScript – a practical guide 2

In the previous aticleFirst steps into JavaScript – a practical guidewe covered the basics of the DOM and its relation to us becoming JS literate. Now that we know how to access DOM elements, we can continue with learning how to change them. But before we start, let's make sure we…

Category : Javascript   06-05-2020   by Iveta Karailievova

First steps into JavaScript – a practical guide

For those who are new to web development, surely the amount of new terminology can sometimes be discouraging. But when it comes to learning JS, some of the first new concepts you definitively should wrap your head around is the Document Object Model and what it implies. To keep it simple…

Category : Javascript   05-05-2020   by Iveta Karailievova

Web shells as a security thread for web applications

Over the past two decades, web applications as an alternative to traditional desktop application have been on to rise. As their name suggests, they are installed on web servers and accessed via a web browser. This gives web apps a rather long list of advantages: multi-platform cross-compatibility, no installation required for…

Category : Security   04-05-2020   by Iveta Karailievova

What is Google My Business and how does it help my local business?

Google My Business is increasingly present in the digital marketing strategies of companies, and this Google tool provides us with various options to better position our business in the search engine.  Through the creation of a business file we can work on the SEO of our brand. Google My Business mixes the…

Category : Web marketing   02-05-2020   by Luigi Nori

Online Marketing Strategies for your Ecommerce

The impetus and desire we have to launch our online store can be counterproductive if we have not defined a pre-launch strategy. If we are determined to launch our ecommerce without having stopped to think if we are doing it right, there is a good chance that we will fail. That…

Category : Web marketing   02-05-2020   by Silvia Mazzetta

Linux For Dummies: Permissions

In the previous articles I made a short introduction to the Unix world and in the following article I have dealt with the basic commands for the file system management. Today we are going to talk about permissions. We are going to take Ubuntu as an example, but in the other distros the working mechanism…

Category : Operating systems   14-03-2020   by Alessio Mungelli

Protect yourself: know which apps have access to your location, microphone and camera

When you install an application on your smartphone, you decide what permissions you give it, but it's not always clear. We tell you how to know if those permissions are too much...   Smartphones have become the target of choice for hackers and criminals who want to make money or extort money…

Category : News and events   20-04-2020   by Silvia Mazzetta

JavaScript Development Services and How It Works

JavaScript is a programming language. This scripting language, however, is used to create features on web pages. As a result, it helps to make web pages alive. All that stuff that you see or do on the internet or websites or web applications is because of JavaScript. It is used to…

Category : Javascript   17-04-2020   by Luigi Nori

The best websites of the Tor Deep Web and Dark Web Network

We already talked about Deep Web more than a year ago, explaining that to open Deep Web (or rather Dark Web) sites you need total and undetectable user anonymity and access to the "onion" network. The Dark Web is much smaller than the Deep Web and is composed mainly of sites…

Category : Security   26-10-2020   by Janeth Kent

import one JS file into another in the plain JS

Until some years ago, it was not possible to import one js file or block of code from one file into another but since 2015, ES6 has introduced useful ES6 modules. With the module standard, we can use import and export keyword and syntax given to include and export the…

Category : Javascript   16-04-2020   by Luigi Nori

The exciting story of JavaScript (in brief)

Javascript is a client-side programming language that has changed the Internet as we know it today. The term "client side" means that it runs on our web browser without the need for a web hosting. Along with html and css it is one of the 3 pillars of web design. It is…

Category : Javascript   13-04-2020   by Silvia Mazzetta

Easy Face and hand tracking browser detection with TensorFlow.js AI and MediaPipe

In March the TensorFlow team has released two new packages: facemesh and handpose for tracking key landmarks on faces and hands respectively. This release has been a collaborative effort between the MediaPipe and TensorFlow.js teams within Google Research. The facemesh package finds facial boundaries and landmarks within an image, and handpose…

Category : Programming   09-04-2020   by Luigi Nori

5 ways to improve your user experience

As a brand, UX is incredibly important when it comes to keeping your customers happy and on your site. Afterall, the longer they are on your site, the more likely they are to spend, and the more likely you are to hit your targets and KPI’s. Also, the better the…

Category : Ui/ux design   09-04-2020   by Silvia Mazzetta

Skyrocket Your Productivity With These Four Tips

The term "productive" can be interpreted in many ways, but it's most commonly associated with a person who's able to complete a large amount of tasks in short amount of time. In general, this is what many people strive to be. While it's a good trait to have, a wrong…

Category : Startups   09-04-2020   by Luigi Nori

JavaScript. What's new in ES2020?

As we discussed in our article about the ES2019 features you should try, ECMAScript's proposals will continue to grow and give rise to new implementations. Therefore, you can already access the new ECMAScript features summarized in ES2020. So, in order not to miss the train, it is worth to be informed…

Category : Javascript   05-04-2020   by Silvia Mazzetta

Amazing Javascript Game Source Codes for Free

  In this article we will share the code to make simple games with Javascript programming language. The games code can later be your reference material for making other simple games. Before you continue do you already know what is javascript programming ?, if you don't know yet, please read the brief…

Category : Javascript   30-03-2020   by Luigi Nori

Best Free Image Optimization Tools for Image Compression

Our monitors are getting better and better and, of course, we want to make them profitable by enjoying images with an increasing resolution when we browse. The problem is that this only increases the weight of the web pages, slowing down their load (and thus degrading the user's experience). Something…

Category : Software   27-03-2020   by Janeth Kent

Can Easier Returns Mean Better Business?

Any eCommerce business owner knows that returns are a part of the packaged deal. At the end of the day, today’s consumer holds all of the power. They are informed, connected, and well-aware that they have a myriad of options for shopping, including being allowed to return products they don’t…

Category : Web marketing   26-03-2020   by Luigi Nori

We use our own and third-party cookies to improve our services, compile statistical information and analyze your browsing habits. This allows us to personalize the content we offer and to show you advertising related to your preferences. By clicking on "Understood" YOU AGREE TO THE USE OF THESE COOKIES. You can also SET OR DISCONTINUE the installation of cookies by clicking on "Settings" or "Reject".


Understood Reject Settings More Info