349 results for: git
Transitioning from a Home Office to a Virtual Office
The traditional concept of the office has undergone a substantial transformation in recent years. With advancements in technology and changes in work culture, more professionals are embracing remote work options, including the transition from home offices to virtual offices. While working from home has its advantages, such as flexibility and comfort,…
Category : Web marketing 08-03-2024 by Janeth Kent
The demise of Third-Party Cookies could decrease marketing effectiveness by up to 30%
In recent years, the digital advertising industry has been undergoing significant transformations. One of the most impactful changes is the impending demise of third-party cookies, which could potentially diminish marketing effectiveness by as much as 30%, according to Accenture's analysis. The use of third-party cookies has long been a cornerstone of…
Category : Web marketing 08-03-2024 by Janeth Kent
Examine the 10 key PHP functions I use frequently
PHP never ceases to surprise me with its built-in capabilities. These are a few of the functions I find most fascinating. 1. Levenshtein This function uses the Levenshtein algorithm to calculate the disparity or "distance" between two text strings. Named after its creator, Vladimir Levenshtein, it measures how identical two words or…
Category : Php 17-10-2023 by Silvia Mazzetta
How to record TV programs using VLC
VLC is much more than a simple media player. Behind its simple appearance, there are a lot of features, such as the ability to convert videos to audio format, repair corrupt or damaged MP4 videos, or even stream content from other devices over the local Wi-Fi network. Another useful but little-known…
Category : Software 08-06-2023 by Janeth Kent
Why businesses need to be familiar with APIs
APIs serve as intermediaries between software, allowing them to communicate with each other and perform various functions like data sharing or processing. APIs provide the protocols, definitions, tools, and other components essential for communication between apps. Not knowing how to use APIs is not necessarily going to result in the…
Category : Web marketing 13-12-2023 by Janeth Kent
How to Track Flight Status in real-time using the Flight Tracker API
The Flight Tracker API provides developers with the ability to access real-time flight status, which is extremely useful for integrating historical tracking or live queries of air traffic into your website. With this API, you can easily track the status of a flight and access airport schedules. There are several Flight Tracker…
Category : Php 12-06-2023 by Janeth Kent
The Payment Request API: Revolutionizing Online Payments (Part 1)
The Payment Request API has emerged as the new standard for online payments, transforming the way transactions are conducted on the internet. In this two-part series, we will delve into the intricacies of this powerful API and explore how it simplifies the payment experience for both users and merchants. Part 1:…
Category : Javascript 12-06-2023 by Silvia Mazzetta
The Impact of automation and Robots on human jobs: exploring controversies and opportunities
Automation and technological advancements have raised concerns in some sectors about the possibility of robots taking away human jobs. While it is true that robots and artificial intelligence can perform certain tasks more efficiently and accurately than humans, the idea that robots will completely replace human workers is a controversial…
Category : News and events 02-06-2023 by Silvia Mazzetta
Let's create a Color Picker from scratch with HTML5 Canvas, Javascript and CSS3
HTML5 Canvas is a technology that allows developers to generate real-time graphics and animations using JavaScript. It provides a blank canvas on which graphical elements, such as lines, shapes, images and text, can be drawn and manipulated with great flexibility and control. Here are some key concepts about HTML5 Canvas: 1. Canvas…
Category : Web design 01-06-2023 by Janeth Kent
Marketing Trends in Technology 2023: Spotlight on Inflation
Inflation, the general rise in prices of goods and services, is a significant economic concern that impacts various industries, including technology. As we delve into 2023, marketing professionals in the technology sector are facing unique challenges and opportunities due to the rising inflationary pressures. This article aims to shed light…
Category : Web marketing 01-06-2023 by Janeth Kent
The Importance of Maintaining a Crisis-Ready Social Media Strategy: A Closer Look
Social media has revolutionized the way businesses connect with their audiences, allowing for instant communication and unprecedented reach. However, with great power comes great responsibility. As social media platforms continue to evolve, businesses must recognize the importance of being prepared for potential crises that may arise. In today's interconnected world,…
Category : Social networks 01-06-2023 by Janeth Kent
How to generate an SSH key and add it to GitHub
In this short tutorial we are going to see how you can generate a new SSH key and add it to GitHub, so you can access your private repositories and manage them locally or from your server, running the commands git pull, git push and any other that has restrictions. This…
Category : Programming 08-03-2024 by Janeth Kent
How to download an email in PDF format in Gmail for Android
You will see how easy it is to save an email you have received or sent yourself from Gmail in PDF format, all with your Android smartphone. Here's how it's done. Gmail is one of the most used email applications in the world, not only for its good design, good organization…
Category : Technology 16-05-2023 by Janeth Kent
How to download any video from any website
If you have ever seen a video that you really liked and you would have liked to have it on your computer, but you didn't know how, from now on you will know it, since we are going to see which are the tools that allow us to do this…
Category : Technology 16-05-2023 by Janeth Kent
The meaning of negative spaces in web design
As designers we must help others understand why it is important to maintain white space within our website and why it is important to the user experience. As early as the Victorian era, Mario Praz, an Italian critic and researcher associated this fear with the term "Horror Vacui" which was used…
Category : Css 12-05-2023 by Laura Celis Ballesta
How to Grow Your App's Active User Base
META: Read on to find out the best ways to get people engaged – and most importantly, staying – on your app. IMAGE: https://unsplash.com/photos/ZVhbwDfLtYU (Unsplash) A mobile app is nothing without users. There are a lot of ways you can push this number up and up but the approach of “build it…
Category : Web marketing 19-12-2022 by Janeth Kent
How to create PDF with JavaScript and jsPDF
Creating dynamic PDF files directly in the browser is possible thanks to the jsPDF JavaScript library. In the last part of this article we have prepared a practical tutorial where I show you how to implement the library. Below you can see the completed exercise. The client side is gaining ground over…
Category : Javascript 04-12-2022 by Janeth Kent
How to recognise cyber-violence
Cyber-violence, i.e. the digital dimension of violence that mainly affects women and is closely linked to the violence that occurs in the 'real world', is a growing phenomenon that is often neither recognised nor addressed. While it is true that several institutions have started to deal with it specifically, it is…
Category : News and events 08-03-2024 by Janeth Kent
How artificial intelligence design the world
The image you see above was drawn especially for this article, but did not require any artistic skills or vein from its author. It was created by DALL-E, an artificial intelligence that can be asked to draw anything. To visually illustrate the point, the author of this article's lack of…
Category : Technology 17-05-2023 by Janeth Kent
The history of video games: from entertainment to virtual reality
The release of Return to Monkey Island (September 2022) has jogged video game fans' memories back to 1990, when The Secret of Monkey Island debuted, a graphic adventure based on the vicissitudes of Guybrush Threepwood, a somewhat awkward would-be pirate whose story inspired the film Pirates of the Caribbean. While…
Category : Videogames 28-11-2022 by Janeth Kent
AI predicts crimes in the US like Minority Report
As in Spielberg's film based on Philip K. Dick's novel, an AI model was able to predict crimes in some American cities before they happened. However, it also revealed the racism that exists in the police. Once again, a science fiction bestseller has (almost) anticipated the future: in 1956, Philp K.…
Category : Technology 19-09-2022 by Janeth Kent
How to Start a Web Design Agency in 2022
If the last two years have shown us anything, it’s that a good online presence is paramount to success in the modern world of business. Once they have a robust web-based reputation in place, companies have the capacity to disrupt their sectors in an engaging, intuitive, and ultimately profitable fashion.…
Category : Web marketing 25-01-2022 by Janeth Kent
Node.js and npm: introductory tutorial
In this tutorial we will see how to install and use both Node.js and the npm package manager. In addition, we will also create a small sample application. If you have ever used or thought about using a JavaScript-based development tool, you have probably noticed that you need to install…
Category : Javascript 05-11-2021 by Silvia Mazzetta
JavaScript Programming Styles: Best Practices
When programming with JavaScript there are certain conventions that you should apply, especially when working in a team environment. In fact, it is common to have meetings to discuss standards to follow. The reason is that code is much more readable when certain standards are followed. We have already seen…
Category : Javascript 28-10-2021 by Janeth Kent
Secret iPhone codes to unlock hidden features
We love that our devices have hidden features. It's fun to learn something new about the technology we use every day, to discover those little features that aren't advertised by the manufacturer. And unless you spend a lot of time playing around in the Phone app, you probably don't know, until…
Category : Security 22-10-2021 by Silvia Mazzetta
What is a Full Stack Developer?
The demand for the Full Stack Developer is growing exponentially in recent years. Disruptive technology companies and startups are increasingly requesting this type of multipurpose profile that knows multiple programming languages and can assume all kinds of functions within the company. Throughout this article we will tell you what a full stack…
Category : News and events 06-08-2021 by Janeth Kent
Dates in local format with Javascript
In the articles we have about dates in JavaScript we were missing one about how to create dates in local format with JavaScript. That is to say, being able to internationalise (i18n) the date before printing it. Many of you may be saying, "we have already seen this using the…
Category : Javascript 10-06-2021 by Janeth Kent
The ultimate cybersecurity checklist for programmers
In today's digital age, cybersecurity has become an essential concern for programmers. With cyber threats on the rise, it is crucial for programmers to adopt robust security practices to protect their code, data, and systems from malicious attacks. To assist programmers in this endeavor, we have compiled the ultimate cybersecurity…
Category : Security 02-06-2023 by Silvia Mazzetta
Top Javascript Libraries and Frameworks Part 2
What are JavaScript frameworks? JavaScript frameworks are application frameworks that allow developers to manipulate code to meet their particular needs. Web application development is like building a house. You have the option of creating everything from scratch with construction materials. But it will take a long time and can incur high costs. But…
Category : Javascript 06-05-2021 by Janeth Kent
How to Send Email from an HTML Contact Form
In today’s article we will write about how to make a working form that upon hitting that submit button will be functional and send the email (to you as a web creator and to the user or customer as well). If you’re a PHP developer, there's a high probability that you…
Category : Programming 10-05-2021 by
Top JavaScript libraries and frameworks part 1
JavaScript libraries and frameworks make it easy to develop websites and applications with a wide variety of features and functionality, all with dynamic, flexible and engaging features. According to a 2020 StackOverflow survey, JavaScript remains the most widely used programming language (for the eighth year), with 67.7% of respondents using it. Its…
Category : Javascript 06-05-2021 by Janeth Kent
Network attacks and how to avoid them
Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We bring you the most common ones according to the network attack databases, so that we can keep up to date…
Category : Security 03-05-2021 by Silvia Mazzetta
6 Best Alternative Privacy Focused Browsers in 2021
In today's article we take a look at free private browsers which are relevant in 2021. We will compare their advantages and disadvantages, specs, etc. Let's get into it. What are alternative browsers? Alternative browsers are mostly trying to increase browser security, by various methods, such as browser hardening, sandboxing, encryption forcing, etc. When…
Category : Software 22-04-2021 by
Starting with Bootstrap-Vue step by step
Today we will show you how to use BootstrapVue, describe the installation process and show basic functionality. The project’s based on the world's most popular CSS framework - Bootstrap, for building responsive mobile-first landing page and combines it with Vue.js. Bootstrap-Vue does not yet support Vue 3. So if you want to…
Category : Javascript 13-04-2021 by
We Will Soon Be Able To Use Bitcoins With Traditional Visa and Mastercard Cards
Bitcoin is breaking records, surpassing $60,000 and being presented in the media as a revolution in many ways. Industry giants cannot continue to ignore the trend, and now VISA has spoken out. The CEO of VISA commented in Fortune's Leadership Next podcast that they are working to make it possible to…
Category : Technology 22-03-2021 by Janeth Kent
Bootstrap 5 beta2. What offers?
Since the release of the Bootstrap 4 is three years, in this article we will present what is new in the world’s most popular framework for building responsive, mobile-first sites. If you want to know what are the significant changes that come with the next version 5 which is in…
Category : Css 05-04-2021 by
Top Graphic Design e-Books & How to Get them on Your iDevice
Ma-no.org may include links to commercial websites. A commercial website is defined as a business site designed to generate income through the provision of services and products. Where links to commercial sites are included on ma-no.org, this does not indicate or imply any affiliation or endorsement between that commercial entity…
Category : Ui/ux design 03-03-2021 by Luigi Nori
Cybersecurity and Data Privacy: Why It Is So Important
The internet has made it very easy for people all across the world to stay connected with one another. Access to information, services, and people is possible for pretty much anyone with an internet connection today. But while this has brought many positive changes to how people live and connect,…
Category : Security 26-02-2021 by Janeth Kent
Top 7 Potential Tools for Automation Testing
Today's digital economy has significantly changed how organizations deliver products and services. Many organizations are gravitating towards smart methodologies and automated tools to spark customer interest in their products and increase revenue to ensure quality and speedy deliveries. These testing tools help organizations to determine the expected and actual product delivery…
Category : Web marketing 12-02-2021 by Janeth Kent
Graphic design and its impact on Web Development
In today's article we will explain the concept of graphic design, its fundamentals and what it brings into web development. Graphic design is applied to everything visual, believe or not, it can aid in selling a product or idea, it's applied company identity as logos, colors, typography of the company…
Category : Web design 05-04-2021 by
Deepfakes Detection – An Emerging Technological Challenge
It is highly probable that while browsing the Internet, everyone of us has at some point stumbled upon a deepfake video. Deepfakes usually depict well-known people doing really improbable things – like the queen of England dancing on her table or Ron Swanson from Parks and Recreations starring as every…
Category : Technology 27-01-2021 by Iveta Karailievova
Cumulative Layout Shift, what is and How to optimize CLS
Cumulative Layout Shift, one of the new Core Web Vitals metrics, is the first metric that focuses on user experience beyond performance. Unexpected movement of web page content is a major source of irritation for users on the web. The new cumulative design change metric helps developers understand the impact of…
Category : Seo & sem 14-01-2021 by Luigi Nori
Understanding LCP, CLS, FID. All about Core Web Vitals in Google Search Console
A few months ago we talked about certain Google metrics that were displayed in Search Console. The reason for writing another post on this topic is that Google has changed this again, giving priority to other metrics. Interestingly, we thought in that previous study that the FCP and FID were not…
Category : Seo & sem 14-01-2021 by Laura Celis Ballesta
7 Astonishing New Uses of Machine Learning
Recently a strange video published on YouTube caused a controversy – it was a funny take on Queen Elizabeth’s traditional Christmas message created by Channel 4, a British public-service television broadcaster. They used AI to produce a fake video of the Queen making it look very realistic and if the message itself…
Category : Technology 31-12-2020 by Iveta Karailievova
How to use Parallax.js effect on your website
Today, we're going to write about the parallax effect, similar to parallax scrolling, and how to implement it to improve your landing page. In webdev, they say mobile first - well, this engine will react to the movement of a smart device, offsetting layers depending on their depth within a…
Category : Javascript 26-12-2020 by
Read comics online: best websites and apps to download and read digital comics
Comic book lovers (like us), today we're going to give you a special tribute: a small collection of websites and applications to download and read digital comics, both on your computer and on your mobile devices. You'll be able to access a wide collection of free and paid digital comics, and…
Category : News and events 26-05-2023 by Silvia Mazzetta
How to get paid in Bitcoin: CoinBase, CoinGate
After explaining how bitcoins work and how to pay using this cryptocurrency, we will see how to get paid in bitcoin. Below you will find explained in detail how to do it. Many people find the concept of BitCoin virtual currency confusing. We could simply explain that BitCoin is a peer-to-peer financial…
Category : Technology 23-12-2020 by Silvia Mazzetta
Python or Swift: Revealing Benefits and Drawbacks of Each Language and Their Differences
Programming languages constantly evolve to improve software performance and simplify developers’ lives. That’s why the programming languages’ ranking is so unstable. Popular languages change every year. While some become outdated and uninterested due to poor features, others get ahead of the ranking because of frequent updates and outstanding performance. There…
Category : Programming 04-03-2021 by
How to pay in Bitcoin: Hype and Coinbase
Once the wallet is created, let's see how to pay in Bitcoin to buy various products and services. If you have opened a Bitcoin wallet with HYPE, you can send payments using this cryptocurrency very easily. All you need to do is go to the Menu section of the HYPE app, press…
Category : Technology 10-12-2020 by Silvia Mazzetta
Install MacOS on PC - the Ultimate Guide (Hackintosh)
There has always been a belief that the Apple MacOS Operating System could only be installed on computers sold directly by Apple. But on the Internet there is a large community dedicated to Hackintosh. And in this guide we are going to show you today all you need to know…
Category : Operating systems 10-12-2020 by
How to Use Bitcoin: mining, wallets, payments
You have certainly heard of Bitcoin, the virtual currency that periodically makes people talk about itself because of its innovative and particular nature. In this case, you have probably also wondered how it is possible to get and subsequently spend Bitcoins, and if it is something useful, as well as…
Category : Technology 10-12-2020 by Silvia Mazzetta
5 Tips to Bring More Traffic to Your Blog
Publishing a blog on your business website is an effective marketing tool for several reasons. Blog posts are the ideal place to share information about your company, products, services, and showcase your expertise or comment on industry trends. Blog posts also give you a space to express more personality, a sense…
Category : Seo & sem 03-12-2020 by Janeth Kent
Brief History of Biometric Authentication
These days, biometric authentication seems to be part of every little gadget or device we use. You’ve no doubt used it when logging onto your laptop, your tablet, or your cell phone, alongside more ‘old school’ methods like a password or PIN. Governments often use biometric authentication for security access and…
Category : Security 30-11-2020 by Janeth Kent
A beginner’s guide to software vulnerabilities
What are software vulnerabilities The number of devices connected to the Internet is growing every day. And among those devices we find not only computers and smartphones, but also an ever-rising number of cameras, smoke detectors, motion sensors, smart door locks, and let’s not forget that even plant pots. Many households…
Category : Security 17-11-2020 by Iveta Karailievova
The BleedingTooth vulnerability and other Bluetooth security risks
Have you ever heard of BleedingTooth? And we do not mean the really disturbing looking mushroom which goes by this name and is totally real (we double checked) but one of the lately discovered vulnerabilities in Linux systems. It had hit the tech news recently, when Andy Nguyen, a Google security…
Category : Security 10-11-2020 by Iveta Karailievova
A Java Approach: Selection Structures - Use Cases
Hello everyone and welcome back! Up to now we have been concerned to make as complete an overview as possible of the fundamental concepts we need to approach the use of conditional structures. We have therefore introduced the concept of conditional structures, outlining the various situations that could arise. We…
Category : Java 20-10-2020 by Alessio Mungelli
What's the Difference between Google TV and Android TV?
At the end of September, Google launched the renewal of its classic dongle. The new Google Chromecast didn't arrive alone, but added two very important innovations compared to the devices of previous generations that have been turning normal televisions into smart TVs since 2013. The first of these novelties is the…
Category : Software 27-10-2020 by Silvia Mazzetta
How to watch deleted or private Youtube videos
Today we are going to talk about the technique which you permit to be able to recover videos from Youtube that was deleted, made private or simply blocked by Youtube itself. With this trick you most of the time would do just that. How is this possible we will explain…
Category : Social networks 05-04-2021 by
GAN Generated Images
Let’s play a game - can you guess what these portraits have in common? They all depict non-existent people. All these images were created by artificial intelligence. We could say, that AI “dreamed” those people up. How can a machine make up people’s faces? The genius idea came from Ian Goodfellow, who was…
Category : Technology 28-10-2020 by Iveta Karailievova
3 awesome ways technology is helping us combat the COVID pandemic
Times are hard now, that humanity once more stumbled into a terrible pandemic. But in comparison to the poor folks back in 1918 when the Spanish flu was on wreaking havoc, nowadays we have the advantage of cutting edge technology on our side. Here’s a quick list of top three ways…
Category : Technology 28-10-2020 by Iveta Karailievova
How to Deal with Unnatural Inbound Links
A website that has a good rank on search engines, especially Google is a big task. Backlinks or Inbound links are one of the best ways to achieve this ranking. Sometimes in a haste to achieve this goal, websites indulge in underhanded behaviour like unnatural inbound links. These are considered…
Category : Seo & sem 25-10-2020 by Janeth Kent
How to share your location using Plus codes on Google Maps for Android
Do you know what plus codes or plus codes on Google Maps are and what they are for? We tell you how they work and how to get them from anywhere. You may have been sent one and not know very well what it is for. If you have never used them,…
Category : Technology 17-05-2023 by Janeth Kent
Introduction to REGEX - Regular Expression
Today we are going to write about Regular Expressions known as regex or shortened regexp, a very useful concept of using search patterns. Surely you were in a situation when you need to replace some word for another or character for some else. This and more you can handle with Regular…
Category : Programming 23-10-2020 by
Google Dorks: How to find interesting data and search like hacker
Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…
Category : Security 03-12-2021 by
Jennifer in Paradise: story of the first photo ever edited in Photoshop
A photograph with more than 30 years of history has become an icon in popular culture, or at least it remains in the memory of those who have ever used Adobe Photoshop, the well-known tool for photo retouching. Behind software like Photoshop there are dozens of stories. One of them…
Category : News and events 25-09-2020 by Silvia Mazzetta
Data Scraping and Data Crawling, what are they for?
Right now we are in an era where big data has become very important. At this very moment, data is being collected from millions of individual users and companies. In this tutorial we will briefly explain big data, as well as talk in detail about web crawling and web scraping…
Category : Web marketing 25-09-2020 by Silvia Mazzetta
How to write our own Privacy Policy
In this article we will talk about Privacy Policy statements, how you can write one and implement it on your page. Why did it pop up? These days when we browse on any new page, or when we visit the site for the first time, most of the time we have to…
Category : Development 13-12-2023 by
How to securely access the Dark Web in 15 steps. Second part
Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from number 6. 6. Changes the security level in the Tor browser It is also possible to increase the security level of the…
Category : Security 08-03-2024 by Janeth Kent
What cybersecurity professionals have learned from the lockdown experience
The COVID-19 pandemic has radically changed the rules of the game for most companies and individuals in a very short time; it has also changed the international computing universe. Sudden changes in people's habits as well as in business operations have altered some of the elements that characterize cyber-risk. And…
Category : Security 26-08-2020 by Silvia Mazzetta
5 Remote Careers You Can Start Online in 2020
In 2020, life has moved indoors. School, shopping, entertainment, and work have all moved online to keep up with the fight against COVID-19. And with it came an enormous demand for remote careers. If you are looking to start a new career that you can excel in without leaving the…
Category : News and events 25-08-2020 by Silvia Mazzetta
How to create the perfect hacker-proof password
We have not learned and we still use passwords that are extremely easy to hack and vulnerable to cyber attacks. If you don't want your credentials to end up in the hands of criminals or traded on the dark digital shelves of the Deep Web, we bring you a simple…
Category : Security 11-08-2020 by Silvia Mazzetta
How to integrate native images lazy loading in your web projects
Support for natively lazy-loading images is now supported on the web! Look at this demo of the feature From the version 76 of Chrome, you can use the loading attribute to lazy-load images without the need to write custom lazy-loading code or use a separate JavaScript library. Let's dive into the details. Browser compatibility is supported…
Category : Programming 03-04-2023 by Luigi Nori
7 Killer Strategies to Increase Your Sales Funnel Conversion Rates
Have you been using online sales funnels to grow your business online but it hasn't really worked for you? There's something you are not doing right. Use these strategies to make your sales funnels convert better. We are living in a competitive digital era, and as an entrepreneur, you have to…
Category : Web marketing 23-07-2020 by Janeth Kent
Why is Website Performance Important for Online Businesses?
Your web is the site where most individuals will connect with your business. Your digital marketing processes will most probably send customers to your website. It might be to get information concerning your products and services, obtain contact information, or make purchases. Website performance, also known as web optimization, is a…
Category : Web marketing 24-07-2020 by Janeth Kent
Popular DNS Attacks and how to prevent them
DNS services are essential for web browsing. However, it is one of the most vulnerable to attacks. This guide will detail the most dangerous DNS attacks and some actions that will protect the network infrastructure. One of the reasons why DNS services have some susceptibility to attack is the UDP transport…
Category : Security 20-07-2020 by Silvia Mazzetta
How to recover an Instagram hacked account
You can't access your Instagram account. The cybercriminal who probably hacked your profile changed your password. Now what? What to do now? First try to stay calm: unfortunately these things can happen, but there is a solution to everything, and today we will explain how to solve this specific problem. In this…
Category : Social networks 16-07-2020 by Janeth Kent
Smishing: risks, examples and how to avoid it
Do you know what smishing is, what risks it involves and how you can avoid it? The cyber-criminals are betting on the technique known as Smishing when it comes to defrauding users through text messages (SMS). The objective of Smishing is the same as that of other types of scams…
Category : Security 16-07-2020 by Silvia Mazzetta
A collection of interesting networks and technology aiming at re-decentralizing the Internet
The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…
Category : Networking 27-08-2020 by Janeth Kent
Awesome JavaScript Games and Js Software to create Games
Best sites js13kGames 2019 - Highlights from the js13kGames 2019 competition. js13kGames 2018 - 13 Games in ≤ 13kB of JavaScript. js13kGames 2017 - Build a game in 13kB or less with js13kGames. Adventure Triangle: Back To Home - You are lost in the cave. Try to get out and back to home. Sometimes it…
Category : Javascript 30-06-2020 by Janeth Kent
Parenting, pandemic and UX: Learning from design of experiences
After the quarantine, many of us have had to adapt our work and personal routines to the new remote paradigm. As a mother, I decided to share some things I've learned. We've been in total quarantine for weeks. Weeks in which we close the office and live and work in the 4…
Category : Ui/ux design 17-06-2020 by Silvia Mazzetta
Neumorphism (aka neomorphism) : new trend in UI design
This area, which arises from a basic human need, such as the urge to communicate, is constantly changing thanks to the advances of the technological era. Today, we invite you to reflect on the origin of this discipline and its future challenges. Graphic language has always been present throughout our lives…
Category : Ui/ux design 17-06-2020 by Silvia Mazzetta
What is Machine Learning ?
Artificial Intelligence or AI is a trend in technology and has been the main topic of many philosophical debates as to where this field will lead us as humanity. This time I'm going to focus on a subfield of Artificial Intelligence that is Machine Learning, which I am currently very passionate…
Category : Technology 16-06-2020 by Silvia Mazzetta
Dark Web: how to access, risks and contents
You've probably heard of the Dark Web before, but do you really know what the Dark Web is, or what it consists of? Do you know its risks? Which users use the Dark Web? What content is published? Would you know how to access the Dark Web safely? If you are reading…
Category : Security 13-06-2020 by Silvia Mazzetta
What is Cyber Intelligence and how is it used?
What is Cyber-intelligence and what is it used for? This is a question that is usually asked by security, cyber-security and intelligence professionals. Cyber-intelligence is a hybrid concept between these three worlds and professional fields, and therefore it is an opportunity and a necessity to know what it is and what…
Category : Security 11-06-2020 by Silvia Mazzetta
SEO Mistakes that Need to Be Avoided
In today's digital age, search engine optimization (SEO) plays a critical role in determining the success of any online business. However, implementing SEO strategies can be complex, and mistakes are common. To ensure your website achieves optimal performance and ranks well on search engine result pages (SERPs), it is essential…
Category : Seo & sem 15-06-2023 by Janeth Kent
Onion Search Engine: How to browse the Deep Web without Tor
The general recommendation does not change: Anyone interested in entering the Deep Web will get a more complete and secure experience by downloading a copy of the Tor Browser, and modifying various browsing habits. However, the desire to "take a look" is always present, and for those cases there is…
Category : Security 25-05-2020 by Janeth Kent
Seo: How Search Behavior Has Changed During COVID-19 Pandemic
Google positioning is experiencing a before and after with the coronavirus crisis. The way we search in Google has changed; The way Google the search engine gives us the results has changed ; The tools that webmasters have at their disposal have changed. Google claims that it has never registered as many searches for…
Category : Seo & sem 08-05-2020 by Silvia Mazzetta
Web shells as a security thread for web applications
Over the past two decades, web applications as an alternative to traditional desktop application have been on to rise. As their name suggests, they are installed on web servers and accessed via a web browser. This gives web apps a rather long list of advantages: multi-platform cross-compatibility, no installation required for…
Category : Security 04-05-2020 by Iveta Karailievova
What is Google My Business and how does it help my local business?
Google My Business is increasingly present in the digital marketing strategies of companies, and this Google tool provides us with various options to better position our business in the search engine. Through the creation of a business file we can work on the SEO of our brand. Google My Business mixes the…
Category : Web marketing 02-05-2020 by Luigi Nori
Linux For Dummies: Permissions
In the previous articles I made a short introduction to the Unix world and in the following article I have dealt with the basic commands for the file system management. Today we are going to talk about permissions. We are going to take Ubuntu as an example, but in the other distros the working mechanism…
Category : Operating systems 14-03-2020 by Alessio Mungelli
JavaScript Development Services and How It Works
JavaScript is a programming language. This scripting language, however, is used to create features on web pages. As a result, it helps to make web pages alive. All that stuff that you see or do on the internet or websites or web applications is because of JavaScript. It is used to…
Category : Javascript 17-04-2020 by Luigi Nori
How to check if the GPS works
Have you tried to share your location with some friends but couldn't because the GPS on your smartphone looks dead? Don't jump to conclusions - your phone may not be having hardware problems. In fact, GPS malfunctions are often caused by temporary problems due to poor signal reception or poor…
Category : News and events 10-04-2020 by Silvia Mazzetta
Easy Face and hand tracking browser detection with TensorFlow.js AI and MediaPipe
In March the TensorFlow team has released two new packages: facemesh and handpose for tracking key landmarks on faces and hands respectively. This release has been a collaborative effort between the MediaPipe and TensorFlow.js teams within Google Research. The facemesh package finds facial boundaries and landmarks within an image, and handpose…
Category : Programming 09-04-2020 by Luigi Nori
Skyrocket Your Productivity With These Four Tips
The term "productive" can be interpreted in many ways, but it's most commonly associated with a person who's able to complete a large amount of tasks in short amount of time. In general, this is what many people strive to be. While it's a good trait to have, a wrong…
Category : Startups 09-04-2020 by Luigi Nori
Amazing Javascript Game Source Codes for Free
In this article we will share the code to make simple games with Javascript programming language. The games code can later be your reference material for making other simple games. Before you continue do you already know what is javascript programming ?, if you don't know yet, please read the brief…
Category : Javascript 19-07-2022 by Luigi Nori
How to find everything you need on the Deep Web and the Dark Web
How to find everything you need on the Deep Web and the Dark Web Best links, sites, markets what you can find on the Deep Web The Deep Web is also known as the Deep Internet is a sort of layer of content that is not indexed by the search engines…
Category : Security 10-05-2021 by Silvia Mazzetta
Cross-Origin Resource Sharing (CORS) and examples of XSS and CSRF
Cross-Origin Resource Sharing (CORS) enables web clients to make HTTP requests to servers hosted on different origins. CORS is a unique web technology in that it has both a server-side and a client-side component. The server-side component configures which types of cross-origin requests are allowed, while the client-side component controls…
Category : Javascript 30-01-2020 by Luigi Nori
Tips to Maximize Your ROI with Google AdWords
The marketing method you use is not important. What you want is the best possible ROI. The money spent should come back to you tenfold. Well, that might be a bit of an exaggeration, but you get the idea. If you were to try pay per click and Google AdWords in…
Category : Seo & sem 22-01-2020 by Silvia Mazzetta
7 Step Guide to Writing for SEO
SEO optimization is constantly evolving, and it doesn’t include only writing and SEO-friendly blog post. Some of the requirements are a mobile-friendly website, fast loading time, and support for Google crawlers. Let’s say you’ve got that covered. Then It’s time to turn to SEO writing was in the last couple of…
Category : Seo & sem 06-04-2020 by Silvia Mazzetta
How to Stay Safe When Shopping Online
It can seem that not a day goes by when we don’t hear of some new hacking case or people who have had their sensitive date compromised via the internet. It’s true that cybercriminals are always coming up with new strategies to attempt to steal either money or information, but…
Category : News and events 08-01-2020 by Silvia Mazzetta