1 - Web Design and Web Development News, Javascript, Angular, React, Vue, Php

67 results for: lists

The JavaScript forEach loop

We have already talked about how to handle some of loops  types in Javascript including for, for-in and for-off loops. In the case of today we are going to see how we can make a foreach loop in Javascript. A foreach loop helps us in a simple way to go through the…

Category : Javascript   20-05-2021   by Janeth Kent

Top Javascript Libraries and Frameworks Part 2

What are JavaScript frameworks?   JavaScript frameworks are application frameworks that allow developers to manipulate code to meet their particular needs. Web application development is like building a house. You have the option of creating everything from scratch with construction materials. But it will take a long time and can incur high costs. But…

Category : Javascript   06-05-2021   by Janeth Kent

7 Astonishing New Uses of Machine Learning

Recently a strange video published on YouTube caused a controversy – it was a funny take on Queen Elizabeth’s traditional Christmas message created by Channel 4, a British public-service television broadcaster. They used AI to produce a fake video of the Queen making it look very realistic and if the message itself…

Category : Technology   31-12-2020   by Iveta Karailievova

The best free tools for linkbuilding

Linkbuilding is one of the main factors in improving the SEO positioning of a page. Having a profile of inbound links from pages with great authority can mean the difference between appearing at the top of the search engine or not. However, practicing linkbuilding, both in text and images, is one…

Category : Seo & sem   23-12-2020   by Janeth Kent

Dark Web: the creepy side of the Internet is not as dark as believed

People who surf the Dark Web are not necessarily looking for something illegal. Most people want to protect their privacy. And according to a recent study, 93 percent only use websites that are freely accessible. It is almost impossible not to leave traces on the Internet and therefore reveal a lot…

Category : Security   22-12-2020   by Silvia Mazzetta

Python or Swift: Revealing Benefits and Drawbacks of Each Language and Their Differences

Programming languages constantly evolve to improve software performance and simplify developers’ lives. That’s why the programming languages’ ranking is so unstable. Popular languages change every year. While some become outdated and uninterested due to poor features, others get ahead of the ranking because of frequent updates and outstanding performance. There…

Category : Programming   04-03-2021   by

Website Traffic Getting Low? 4 Immediate Action to Take

If you have created a website, I am sure your end objective is to create a strong brand presence, boost engagement, and multiply revenue. An interesting statistic showed that there were 22.31 million internet users at the start of the year, in Australia. This means that there are ample opportunities to…

Category : Web marketing   04-12-2020   by Luigi Nori

The BleedingTooth vulnerability and other Bluetooth security risks

Have you ever heard of BleedingTooth? And we do not mean the really disturbing looking mushroom which goes by this name and is totally real (we double checked) but one of the lately discovered vulnerabilities in Linux systems. It had hit the tech news recently, when Andy Nguyen, a Google security…

Category : Security   10-11-2020   by Iveta Karailievova

Hashmap: hashing, collisions and first functions

Today we are going to study some concepts closely related to hashmaps. The concepts we are going to see are hashing and collisions. Hashing The idea of hashing with chaining is to create a sort of array of lists, into which the elements are somehow inserted. We need to map the keys to…

Category : C language   28-06-2020   by Alessio Mungelli

Hashmap: Overflow Lists

In this short series of articles we will go to see how it is possible to create the Hashmap data structure in C. In the implementation we're going to use the doubly concatenated lists as auxiliary data structures. Let's look at a possible implementation.  Header file Let's first have a look to what…

Category : C language   18-06-2020   by Alessio Mungelli

Data structures in Java - Linked Lists

With 2020 we are going to look at a new aspect of programming: data structures. It is often the case that everyone uses structures provided by the various programming languages. The objective will be to have a general idea of how they work and their internal mechanisms. Often we will…

Category : Java   22-10-2020   by Alessio Mungelli

Google Dorks: How to find interesting data and search like hacker

Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…

Category : Security   16-04-2021   by Tibor Kopca

How to securely access the Dark Web in 15 steps. First part

The dark web can be a pretty dangerous place if you don't take the right precautions. You can stay relatively safe with a good antivirus and a decent VPN. However, if you want to be completely anonymous and protect your device, you'll need a little more than that. Here there are…

Category : Security   04-05-2021   by Silvia Mazzetta

What is a Cryptophone and how it works

The so-called cryptophones, are anti-interception smartphones as they use encryption methods to protect all communication systems. Here are all the details and the truth about these "unassailable" phones. The recent Encrochat affair, recently investigated for illegal activities, has brought to light the so-called cryptophones. They are smartphones - legal in themselves -…

Category : Security   11-09-2020   by Silvia Mazzetta

What cybersecurity professionals have learned from the lockdown experience

The COVID-19 pandemic has radically changed the rules of the game for most companies and individuals in a very short time; it has also changed the international computing universe. Sudden changes in people's habits as well as in business operations have altered some of the elements that characterize cyber-risk. And…

Category : Security   26-08-2020   by Silvia Mazzetta

A collection of interesting networks and technology aiming at re-decentralizing the Internet

The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…

Category : Networking   27-08-2020   by Janeth Kent

The best websites of the Tor Deep Web and Dark Web Network

We already talked about Deep Web more than a year ago, explaining that to open Deep Web (or rather Dark Web) sites you need total and undetectable user anonymity and access to the "onion" network. The Dark Web is much smaller than the Deep Web and is composed mainly of sites…

Category : Security   25-04-2021   by Janeth Kent

How the Java Swing is Worthy in Designing the Photo Editing App

When social media is reigning over the world, no wonder photography is one of the crucial factors in today’s field of personal or professional recognition. Tons of applications. Still, the demand is far from ending. Online queries are swarming with searches for better graphics toolkit. The better the framework, the…

Category : Java   27-01-2020   by Janeth Kent

Java Sorting Algorithms: Merge Sort

Today we are going to analyze one of the most used sorting algorithms: the Merge Sort. It is part of the Divide and Conquer family, just like the  Quick Sort. Merge Sort offers a better performance despite of the Quick Sort since its complexity remains O(n log n) keeping performances. It is also called "algorithm by fusion" The main defect of the Merge…

Category : Java   14-12-2019   by Alessio Mungelli

The best Internet search engines used by hackers

Today, many users wonder what tools hackers use to look for different vulnerabilities on devices that are connected to the Internet. Normally, everyone uses specific tools, but there are search engines that are specifically designed for security researchers. Although many users think that a hacker is a hacker, the reality is…

Category : Security   07-01-2021   by Silvia Mazzetta

10 Open source tools for security operations (SOC)

As we know, there are many moving parts to building a Security Operations Centre (SOC). From a technological point of view, it is very important to count on open source to identify threats and reduce costs. From a DiD (Defense in Depth) point of view, there are many devices and…

Category : Security   29-11-2019   by Janeth Kent

How to Find Trending Topics for Your Blog?

One of the huge determinants of a blog’s success is the content. Trending blogs with useful contents are always amazing. On the other hand, a blog with content that does not change or improve lives is useless. One of the key responsibilities of any blogger is to create content that…

Category : Seo & sem   19-08-2019   by

Implement Internationalization in Javascript (a headache for developers)

Definitely, programmers living in the U.S. (and few additional locations in Mexico and Canada) are luckier than us about the age-old problem of internationalizing methods. This makes their life so much easier because they don't have to think about internationalization: not about converting to distinct date formats, not about the idiosyncrasies…

Category : Javascript   12-07-2019   by Janeth Kent

Progressive Web Apps Directory: The Best Collection of Resources

Get started with progressive web apps and learn things in depth, this page will list the best resources we know of to help you understand Progressive Web Apps (PWAs) . Make sure to bookmark this page, as this is a living document that we’ll be adding to from time to time.Progressive…

Category : Javascript   20-06-2019   by Janeth Kent

How to Create your own custom Linux system, step by step

Here is some information where you can learn step by step how to customize a Linux distribution to create your own Linux. If we follow the steps, even the less experienced will be able to create their own Linux to their liking. Personalizing a distribution not only serves to have a…

Category : Operating systems   14-06-2019   by Janeth Kent

Rare earths: here is the 'endgame' threat of China that led to the immediate freezing of the U.S. ban in Huawei

The US move to put Huaweion its so-called Entity List — requiring American companies to obtain a government licence to sell to it — is a pivotal moment for the global technology industry. The action against the Chinese telecoms flagship has made global noise, monopolizing not only the political or economic news but…

Category : Technology   23-05-2019   by Janeth Kent

What You Need to Know When Sending a Press Release to Newswire

What You Need to Know When Sending a Press Release to Newswire

A newswire or a press release distribution service helps businesses in improving their online visibility and web presence. If you haven’t used it before, there are many things you need to know prior to using any platform. What is a newswire? Newswire or wire services syndicate your story across different sites and…

Category : News and events   25-02-2019   by Janeth Kent

Best Javascript front-end hacking cheatsheets

Best Javascript front-end hacking cheatsheets

JavaScript has a extremely high potential to build cutting-edge web applications. But it's really hard to memorize it by heart. The JavaScript cheat sheets therefore act perfectly as a reminder and a comprehensive reference for developers. All popular and special purpose cheat sheets have been discussed above. You now have…

Category : Javascript   06-05-2020   by Janeth Kent

Superior React-Native Courses for Mobile Application Developers

If you are a web developer who wants to cross the massive world of mobile app development, but does not want to spend time learning Java or Kotlin for Android development, or Objective C or Swift for iOS development, then React Native could be a great tool for you. The React…

Category : Programming   24-11-2019   by Janeth Kent

A Guide to the new Google Search Console

A Guide to the new Google Search Console

Google Search Console, before known as Webmaster Tools, is a decisive tool created to easily track the performance of your website, but also to improve its visibility and usability. Over the last year, the new Search Console has been growing and growing...Now you're wondering how to use the new Google…

Category : Seo & sem   29-01-2019   by Janeth Kent

Four of the Biggest Reasons Your Emails are Sent to Spam

Four of the Biggest Reasons Your Emails are Sent to Spam

Email marketing still plays a huge part in getting the word out to potential and existing customers, but according to a study carried out by Return Path in 2015, only 79% of marketing emails will actually land in the recipient’s inbox. As a result, one in every five emails will…

Category : Web marketing   14-08-2018   by Janeth Kent

How to Set up a Fully Functional Mail Server on Ubuntu 16.04 with iRedMail

How to Set up a Fully Functional Mail Server on Ubuntu 16.04 with iRedMail

Setting up your own mail server from scratch on Linux is complex and tedious, until you meet iRedMail. This tutorial is going to show you how you can easily and quickly set up a full-fledged mail server on Ubuntu 16.04 with iRedMail under 30 minutes. What is iRedMail? iRedMail is a shell…

Category : Networking   08-08-2018   by Janeth Kent

How to Become a Full Stack Developer in 2018

How to Become a Full Stack Developer in 2018

A full stack developer is someone who can work on the development of all layers of an app or program. That means that they are familiar with both the front end and back end aspects of programming. For example, full stack development would involve the development of the user interface, the…

Category : Programming   22-03-2018   by Janeth Kent

Increase the Number of Backlinks to Your Site the Right Way

SEO is important, however, the algorithms used and the techniques you need to use are changing every day. RankBrain is Google’s newest invention that has once again changed the face of traditional SEO tactics. Thankfully, however, one of the best methods of increasing your website’s ranking has remained: link backs.…

Category : Seo & sem   18-03-2020   by Janeth Kent

11 Guides for Front-end Developers

11 Guides for Front-end Developers

Enjoy our Guides series for for Front-end Developers and don’t forget to let us know in the comments of any others that we haven’t yet included. 1. Can I animate…? Can I animate?” is a site inspired by Can I use, but focused specifically on CSS animations and transitions. The aim is to provide…

Category : Web design   12-12-2016   by Janeth Kent

Ubuntu servers security: 25 security tools to armor your system

Ubuntu servers security: 25 security tools to armor your system

The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc.   1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…

Category : Servers   14-09-2016   by Janeth Kent

PHP7: Guide and References to all the changes between version 5.x and 7 of PHP

PHP7: Guide and References to all the changes between version 5.x and 7 of PHP

PHP 7 was released on December 3rd, 2015. It comes with a number of new features, changes, and backwards compatibility breakages that are outlined below. Performance Features Combined Comparison Operator Null Coalesce Operator Scalar Type Declarations Return Type Declarations Anonymous Classes Unicode Codepoint Escape Syntax Closure call() Method Filtered unserialize() IntlChar Class Expectations Group use Declarations Generator Return Expressions Generator Delegation Integer Division with intdiv() session_start() Options preg_replace_callback_array() Function CSPRNG Functions Support…

Category : Php   27-12-2015   by Janeth Kent

8 Social Media Monitoring Tools 

8 Social Media Monitoring Tools 

We think that a combination of quick response, easy use and functionality is what a company need in order to effectively run a social media campaigns. There are many tools that let you manage multiple accounts, respond quickly and stay on top of real-time information.  We evaluate 8 of the best free tools for social media monitoring,…

Category : Social networks   22-10-2015   by Janeth Kent

Google's 200 Most Important Ranking Factors

Google's 200 Most Important Ranking Factors

  Domain Factors   1. Domain Age: In this video, Matt Cutts states that: “The difference between a domain that’s six months old verses one year old is really not that big at all.”. In other words, they do use domain age…but it’s not very important. 2. Keyword Appears in Top Level Domain: Doesn’t give the…

Category : Web marketing   27-04-2014   by Janeth Kent

Isomorphic JavaScript: a new paradigm

Isomorphic JavaScript: a new paradigm

Spike Brehm, in a article written for http://venturebeat.com, explains that at Airbnb, they have learned a lot over the past few years while building rich web experiences by dividing into the single-page app world in 2011 with their mobile web site, launching  Wish Lists and their newly-redesigned search page. Each of these is a…

Category : Javascript   27-11-2013   by Janeth Kent

How Companies can Drive Engagement with Blogs: 50 tips

How Companies can Drive Engagement with Blogs: 50 tips

Companies can benefit by maintaining a blog: it helps drive engagement, can promote products and visibility in the market. A survey conducted by Hubspot, a marketing software company, indicates that more companies are adopting a blog and find it to be “critical” and “useful” to their business. Their survey has reported positive…

Category : Web marketing   21-08-2013   by Janeth Kent

12 Must Read Tips and Tricks For Web-Design And Web-Dev Addicts

12 Must Read Tips and Tricks For Web-Design And Web-Dev Addicts

Today, websites are often sophisticated and complex. Web sites often act as business partners, perform complex tasks that help run and even improve a business or personal enterprise. Most programmers are not just desktop programmers , web programmers or scripting gurus – often have to master many different skills. Over time, most software…

Category : Web design   16-07-2013   by Janeth Kent

Social Networks for Artists and Designers

Social Networks for Artists and Designers

Are you an artist or a designer? The power of social networks is being harnessed to help artists and designers come together in new ways. Community is one of the major features of a social network. People go to where the people they want to contact are. So if you want…

Category : Social networks   11-07-2013   by Janeth Kent

50 tools to reinvigorate your content marketing efforts

50 tools to reinvigorate your content marketing efforts

2012 has been the year of growth for content marketing. Brands have begun to embrace the discipline as a vital part of their overall strategy. What was once a conversation on “why content marketing” has turned into a conversation on “how to.”  The current focus on social media advertising is pulling marketing attention…

Category : Web marketing   03-07-2013   by Janeth Kent

Setup SSL Certificate on Apache and Ubuntu 12.04

Setup SSL Certificate on Apache and Ubuntu 12.04

How to Create a SSL Certificate on Apache for Ubuntu 12.04   About SSL Certificates A SSL certificate is a way to encrypt a site's information and create a more secure connection. Additionally, the certificate can show the virtual private server's identification information to site visitors. Certificate Authorities can issue SSL certificates that…

Category : Networking   02-07-2013   by Janeth Kent

71 Social Media Monitoring Tools

71 Social Media Monitoring Tools

If you want to monitorize the "social world web" you need social media monitoring tools. Before you reach for your wallet and start to spend money try out some of the free social media monitoring services. We have collected Free social media monitoring tools.  In the first group are the most popular Social Media Monitoring…

Category : Social networks   27-06-2013   by Janeth Kent

20 Open Source Scripts Applications for Web Developers

20 Open Source Scripts Applications for Web Developers

Open source applications and tools can be handy for web designers and developers on a budget. Nowadays most of the tools and applications are increasingly either employing open source or are built entirely on it. And all of this adds up to an increasing premium on web development skills and…

Category : Programming   11-08-2016   by Janeth Kent

25 Useful HTML5 Tools For Web Designers & Developers

25 Useful HTML5 Tools For Web Designers & Developers

The latest version of HTML – HTML5, adds many new elements to the applications that are being developed. It's very important important for the web developers and web designers to learn and use the elements of HTML5 to develop web apps and sites. Here we have some fresh and news HTML5 resources which are…

Category : Web design   29-05-2013   by Janeth Kent

50 Top Tools for Social Media Monitoring, Analytics, and Management

50 Top Tools for Social Media Monitoring, Analytics, and Management

To start a business that will succeed in today's connected world, we need to build a community around our company, brand, and products. It can be noticed how, the last decade, social media monitoring has become a primary form of business intelligence, used to identify, predict, and respond to consumer behavior. Listening to what our…

Category : Social networks   15-05-2013   by Janeth Kent

The HTML Working Group has announced their decision to release a First Public Working Draft of the Encrypted Media Extension (EME) specification

The HTML Working Group has announced their decision to release a First Public Working Draft of the Encrypted Media Extension (EME) specification

The W3C announced today that it intends to publish the controversial Encrypted Media Extensions (EME) specification despite highly outspoken resistance, paving the way for native web DRM: > On 01/22/2013 01:03 PM, Paul Cotton wrote: >> This is a Call for Consensus (CfC) to publish as a First Public >> Working Draft (FPWD)…

Category : News and events   10-05-2013   by Janeth Kent

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

One of the most sophisticated web server backdoors ever seen has spread fast and is now sitting on hundreds of webservers running some of the most popular websites in the world, researchers have warned. One expert told TechWeekEurope the Cdorked backdoor, brought to light in April, is almost as smart as Stuxnet, the malware which disrupted…

Category : Security   09-05-2013   by Janeth Kent

Enhance Your Google+ Experience With These Fantastic Tools

Enhance Your Google+ Experience With These Fantastic Tools

  This article was written for Inspirationfeed by Shay Wright. Shay loves reading, writing, and discussing pretty much anything Internet marketing related. He is a Senior SEO Strategist at SEO.com. Learn how to create and optimize a Google+ page for business with our great new ebook! When Google first introduced Google+ to the world less than 2 years ago,…

Category : Social networks   08-05-2013   by Janeth Kent

How to improve security in Firefox, Chrome, and IE

How to improve security in Firefox, Chrome, and IE

Malware is most likely to reach your computer via your browser, according to the most recent Microsoft Security Intelligence Report. (Credit: Microsoft Security Intelligence Report, Vol. 14) Like their counterparts in the real world, computer criminals are always looking for vulnerabilities they can exploit. Instead of an open window or unattended wallet,…

Category : Security   07-05-2013   by Janeth Kent

Content Knowledge Is Power

Content Knowledge Is Power

“Content matters!” “Comp with real copy!” “Have a plan!” By now, you’ve probably heard the refrain: making mobile work is hard if you don’t consider your content. But content knowledge isn’t just about ditching lorem ipsum in a couple of comps. Countless organizations now have a decade or two’s worth of Web content…

Category : Web marketing   06-05-2013   by Janeth Kent

Summer 2013: Upcoming Social Media & Tech Events

Summer 2013: Upcoming Social Media & Tech Events

It's Monday, which means it's time for Ma-No’s guide to upcoming social media and web events, parties and conferences. For more upcoming event listings, check out the list:  May 01 Email Insider Summit   Three days of cutting-edge content and a world-class island resort await you at MediaPost's incomparable Email Inside... more May 06 Event Marketing…

Category : Web marketing   29-04-2013   by Janeth Kent

Ubuntu Releases 13.04

Ubuntu Releases 13.04

The release demonstrates consistently faster boot speeds than earlier versions — down to about 40 seconds on Intel and AMD-based Acer Veriton desktop machines — shrinks memory usage by as much as 50MB, reduces image size and cuts power consumption, according to Canonical, the company behind Ubuntu. "We've been driving Ubuntu to be a coverged OS across different…

Category : Operating systems   25-04-2013   by Janeth Kent

Top Resources For Bootstrap

Bootstrap is an interactive front-end web development framework, designed to facilitate the development of applications and other elements. The latest version of Bootstrap, Bootstrap 4, combines JavaScript, HTML and CSS allowing you to create an active, fast and efficient web page. The design of a responsive web page is one…

Category : Web design   17-05-2020   by Janeth Kent

Redis: installation and usage on Ubuntu/Debian

Redis: installation and usage on Ubuntu/Debian

About Redis Redis, developed in 2009, is a flexible, open-source, key value data store. Following in the footsteps of other NoSQL databases, such as Cassandra, CouchDB, and MongoDB, Redis allows the user to store vast amounts of data without the limits of a relational database. Additionally, it has also been compared…

Category : Databases   01-07-2013   by Janeth Kent

10 Killer SEO Landing Page Tips

10 Killer SEO Landing Page Tips

When we talk landing pages, most online marketers think pay-per-click, where the input of a destination URL into Google's or Bing's paid search offerings allow marketers to drive keyword-targeted traffic to (hopefully) optimized pages. My previous article extolling the death of keywords talked about developing intent-based topics and building content that connects with…

Category : Web marketing   15-04-2013   by Janeth Kent

13 Top Free Android Productivity Apps

13 Top Free Android Productivity Apps

If you are an android user and a blogger, then this post is for you. We have listed the top free 13 android apps for productivity. 1. Google Goggles Search the real world by taking a picture. Search by taking a picture. Goggles uses image recognition technology to recognize objects and return relevant…

Category : Software   15-04-2013   by Janeth Kent

Penguin 2.0 Forewarning: The Google Perspective on Links

Penguin 2.0 Forewarning: The Google Perspective on Links

This article represents my opinions, but my company has worked on helping large numbers of sites get Google penalties removed. The hardest part of these projects is always to get the client to understand what constitutes a bad link. This starts at the very core of how they think about online marketing and…

Category : Web marketing   11-04-2013   by Janeth Kent

20 Best Wireframing Tools for Web Designers and Developers

20 Best Wireframing Tools for Web Designers and Developers

A website wireframe also known as a page schematic or screen blueprint, is a visual guide that represents the skeletal framework of a website. Wireframes are created by User Experience professionals called Interaction Designers. The interaction designers who have broad backgrounds in visual design, information architecture and user research, create…

Category : Web design   11-04-2013   by Janeth Kent

Transform A Simple Website in Vibrant Ecommerce Portal

Web Design with respect to internet has never been limited to any barriers or disciplines, which is why attractive design in combination with online marketing has successfully created something known as ‘Ecommerce’. Readying an ecommerce portal is much more than just development or designing alone, it includes enough brain-work too.…

Category : Web design   04-05-2020   by Silvia Mazzetta

10 Tools for Evaluating Web Design Accessibility

10 Tools for Evaluating Web Design Accessibility

Testing for web accessibility (how usable a website is by individuals with disabilities) is an often neglected part of web design and development. Web accessibility is important not only because your content will reach a wider range of audience, but also because correcting web accessibility issues have secondary benefits such…

Category : Web design   11-04-2013   by Janeth Kent

Google Keep, a New Service for Taking Notes

Google Keep, a New Service for Taking Notes

Google just launched a new notes service called “Keep.” It works kind of like Evernote or Apple’s Notes, allowing Android users to jot down thoughts or reminders, which they can store on their phone or access through Google Drive. It looks pretty useful, judging by the official blog post announcing the…

Category : News and events   11-04-2013   by Janeth Kent

PHP-MongoDB Beginners Guide

PHP-MongoDB Beginners Guide

Over the last year or so, there's been a small revolution taking place in the database world, with the advent of "schema-less" database systems like Apache CouchDB. These databases follow a different approach to data storage as compared to the traditional relational model, and they're quickly becoming popular with Web…

Category : Databases   11-04-2013   by Janeth Kent

A list of Great PHP libraries and classes you should know

It is an exciting time to be a PHP developer. There are lots of useful libraries released every day, and with the help of Composer and Github, they are easy to discover and use. Here are 24 of the coolest that I’ve come across. Your favorite is not on the list? Share it in…

Category : Programming   26-03-2021   by Janeth Kent

We use our own and third-party cookies to improve our services, compile statistical information and analyze your browsing habits. This allows us to personalize the content we offer and to show you advertisements related to your preferences. By clicking "Accept all" you agree to the storage of cookies on your device to improve website navigation, analyse traffic and assist our marketing activities. You can also select "System Cookies Only" to accept only the cookies required for the website to function, or you can select the cookies you wish to activate by clicking on "settings".

Accept All Only sistem cookies Configuration
q=lists