1 - Web Design and Web Development News, Javascript, Angular, React, Vue, Php

121 results for: operation

Misinformation also attacks Wikipedia

Wikipedia contains over 55 million articles in more than 300 languages spoken worldwide. In just 21 years, Wikipedia has become a global phenomenon, a reference point on all human knowledge, with 18 billion hits per month and the fourth most visited site on the planet. It is therefore not surprising that…

Category : News and events   13-07-2022   by Janeth Kent

JavaScript Programming Styles: Best Practices

When programming with JavaScript there are certain conventions that you should apply, especially when working in a team environment. In fact, it is common to have meetings to discuss standards to follow. The reason is that code is much more readable when certain standards are followed. We have already seen…

Category : Javascript   28-10-2021   by Janeth Kent

What is a Full Stack Developer?

The demand for the Full Stack Developer is growing exponentially in recent years. Disruptive technology companies and startups are increasingly requesting this type of multipurpose profile that knows multiple programming languages and can assume all kinds of functions within the company. Throughout this article we will tell you what a full stack…

Category : News and events   06-08-2021   by Janeth Kent

Strings in JavaScript: What they are and how to use them

In this tutorial we are going to explain what strings are and how they are used in JavaScript. The tutorial is intended for people who are learning to program in JavaScript. You will learn how to create strings, how to display the content of strings, how to concatenate strings and…

Category : Javascript   22-06-2021   by Janeth Kent

Why E-Commerce Businesses Should be Using Cloud Computing

Cloud computing is the on-demand delivery of computer system resources via the internet. The resources offered in a cloud computing solution include data storage applications, servers, databases, software, and networking tools. Cloud computing seems like it’s been created specifically for businesses like e-commerce stores, as it offers increased flexibility and…

Category : Web marketing   01-06-2021   by Silvia Mazzetta

What are React Hooks and what problems they solve

Working with React, - and before the release of Hooks in version 16.8 -  there was always the possibility to create components in three different ways based on a number of suspects and needs: 1. Elementary components - These components are the simplest ones, they are characterized by being mere variables that…

Category : Javascript   13-05-2021   by Janeth Kent

Advanced Android tutorial: discover all your phone's secrets

It is highly probable that you are not taking advantage of even half of the potential that your Android device has to offer. These small pocket computers, which we call smartphones, have increasingly advanced and powerful hardware that, together with the possibilities offered by an operating system as flexible as…

Category : Mobile   06-05-2021   by Janeth Kent

How to Send Email from an HTML Contact Form

In today’s article we will write about how to make a working form that upon hitting that submit button will be functional and send the email (to you as a web creator and to the user or customer as well). If you’re a PHP developer, there's a high probability that you…

Category : Programming   10-05-2021   by Tibor Kopca

Top JavaScript libraries and frameworks part 1

JavaScript libraries and frameworks make it easy to develop websites and applications with a wide variety of features and functionality, all with dynamic, flexible and engaging features. According to a 2020 StackOverflow survey, JavaScript remains the most widely used programming language (for the eighth year), with 67.7% of respondents using it. Its…

Category : Javascript   06-05-2021   by Janeth Kent

Network attacks and how to avoid them

Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We bring you the most common ones according to the network attack databases, so that we can keep up to date…

Category : Security   03-05-2021   by Silvia Mazzetta

How to multiply matrices in JavaScript

It may seem strange to want to know how to multiply matrices in JavaScript. But we will see some examples where it is useful to know how to perform this operation and how useful it is when handling coordinates as matrices, which we will see in a following article. But let's…

Category : Javascript   30-04-2021   by Janeth Kent

How to improve customer experience through speech recognition

Voice of the Customer (VoC) is essential to a successful customer experience (CX) programme. However, VoC data is often disparate, making it difficult to use. Service organisations looking to make more informed decisions about customer experience (CX) investments and improvements should implement a consistent voice of the user (VoC) strategy,…

Category : Technology   27-04-2021   by Janeth Kent

The best free tools to Transcribe audio to text

With this article we bring you a list of the best tools for transcribing audio to text, offering you some that simply do it with dictated audio, but also others capable of loading audio files. The collection is varied, and we have mobile applications, web pages, and computer programs capable…

Category : Software   15-04-2021   by Janeth Kent

Elon Musk To Found Starbase, A City In Texas To House His Companies And Projects

Elon Musk's initiatives hardly go unnoticed, either because of how curious, innovative and/or eccentric they can be. Recently, SpaceX's CEO confirmed that it is getting into a new business: building cities.  An announcement of few words that generated a lot of buzz. Lately, Elon Musk has opted for terse messages on Twitter, playing…

Category : Technology   05-03-2021   by Janeth Kent

Top 7 Potential Tools for Automation Testing

Today's digital economy has significantly changed how organizations deliver products and services. Many organizations are gravitating towards smart methodologies and automated tools to spark customer interest in their products and increase revenue to ensure quality and speedy deliveries. These testing tools help organizations to determine the expected and actual product delivery…

Category : Web marketing   12-02-2021   by Janeth Kent

Interesting and Helpful Google Search Features You’ll Want to Start Using

Google – THE search engine for many internet users. It has been with us since its launch back in 1998 and thanks to its simplicity of use and genius algorithms, it grew so popular, that most of us cannot imagine our day-to-day life without it. Many petty arguments between friends…

Category : Software   31-01-2021   by Iveta Karailievova

What is DNS Blockchain and how to use it

To be able to navigate the Internet, to enter a website and have it show us all the content we want and search for, certain functions and characteristics are necessary. One of these key points is the DNS. It is what translates domain names into IP addresses, which prevents us…

Category : Security   28-12-2020   by Janeth Kent

A FULFILLED PROMISE - Using the FETCH API to make AJAX calls

In this article we talked about what AJAX calls are and how to use them in a traditional way, by using the XMLHttpRequest (XHR) object. In short, thanks to AJAX calls a web page can be partially updated without having to reload the whole content. This leads to better loading…

Category : Javascript   26-12-2020   by Iveta Karailievova

How to pay in Bitcoin: Hype and Coinbase

Once the wallet is created, let's see how to pay in Bitcoin to buy various products and services. If you have opened a Bitcoin wallet with HYPE, you can send payments using this cryptocurrency very easily. All you need to do is go to the Menu section of the HYPE app, press…

Category : Technology   10-12-2020   by Silvia Mazzetta

How to Use Bitcoin: mining, wallets, payments

You have certainly heard of Bitcoin, the virtual currency that periodically makes people talk about itself because of its innovative and particular nature. In this case, you have probably also wondered how it is possible to get and subsequently spend Bitcoins, and if it is something useful, as well as…

Category : Technology   10-12-2020   by Silvia Mazzetta

A Java approach: The Cycles - Introduction

Hello everyone and welcome back! Until now, we have been talking about variables and selection structures, going to consider some of the fundamental aspects of these two concepts. Theoretically, to write any kind of program, the notions seen so far might be sufficient. However, a problem arises. How can we…

Category : Java   23-10-2020   by Alessio Mungelli

The best tricks and features to master your Android Smart TV

We bring you a collection of the best tricks to squeeze Android TV, the Google operating system designed for televisions. You can find it on smart televisions of some brands, but also on devices that you will connect to the TV. With all of them, you can use different types…

Category : Networking   05-11-2020   by Luigi Nori

A Java approach: boolean variables

The previous time, we talked extensively about Boolean variables, trying to outline the main operations that can be carried out at a practical level.  Of all the cases examined, we have not examined the most important and most recurrent one: the case in which the conditions to be examined are more…

Category : Java   18-10-2020   by Alessio Mungelli

What's the Difference between Google TV and Android TV?

At the end of September, Google launched the renewal of its classic dongle. The new Google Chromecast didn't arrive alone, but added two very important innovations compared to the devices of previous generations that have been turning normal televisions into smart TVs since 2013. The first of these novelties is the…

Category : Software   27-10-2020   by Silvia Mazzetta

A Java approach: condtional structures

Hello everyone and welcome back! The previous times we have introduced the concept of variable, trying to define some basic concepts about it.  However, some situations suggest that the concept of variable alone is not enough to solve all the possible situations that may arise in front of us. A very…

Category : Java   17-10-2020   by Alessio Mungelli

Hashmap: hashing, collisions and first functions

Today we are going to study some concepts closely related to hashmaps. The concepts we are going to see are hashing and collisions. Hashing The idea of hashing with chaining is to create a sort of array of lists, into which the elements are somehow inserted. We need to map the keys to…

Category : C language   28-06-2020   by Alessio Mungelli

Hashmap: Overflow Lists

In this short series of articles we will go to see how it is possible to create the Hashmap data structure in C. In the implementation we're going to use the doubly concatenated lists as auxiliary data structures. Let's look at a possible implementation.  Header file Let's first have a look to what…

Category : C language   18-06-2020   by Alessio Mungelli

Javascript: what are callbacks and how to use them.

Today we are going to learn about a concept that is widely used in javascript and that is used quite a lot by today's frameworks, libraries, especially NodeJS. This is the use of Callbacks.   What is a Callback?   Simplifying, it is to pass a function as a parameter so that this function…

Category : Javascript   23-10-2020   by Silvia Mazzetta

Data structures in Java - Linked Lists

With 2020 we are going to look at a new aspect of programming: data structures. It is often the case that everyone uses structures provided by the various programming languages. The objective will be to have a general idea of how they work and their internal mechanisms. Often we will…

Category : Java   22-10-2020   by Alessio Mungelli

A Java approach: variables - use case

Hello all friends and welcome back! After the introduction made on the variables, we try to analyse some critical issues that may arise in quite common situations. Let's start by analysing some practical examples. Example 1: division that returns a non-integer result The first critical case that might arise for those who approach…

Category : Java   22-10-2020   by Alessio Mungelli

Introduction to REGEX - Regular Expression

Today we are going to write about Regular Expressions known as regex or shortened  regexp, a very useful concept of using search patterns. Surely you were in a situation when you need to replace some word for another or character for some else. This and more you can handle with Regular…

Category : Programming   23-10-2020   by Tibor Kopca

A Java approach: variables

Hello everyone and welcome back! Today we will begin a journey that will lead us to study, and possibly review, what are the basics of programming. We will start by talking about variaibli. Introduction Anyone who wants to approach the world of programming will soon realise that coding is not exactly like what…

Category : Java   20-09-2020   by Alessio Mungelli

MAME Multiple Arcade Machine Emulator: How to download and configure this arcade emulator for Windows

Despite the fact that new state-of-the-art computer games are coming out every so often, the whole retro theme is very appealing to users who are looking to relive the long hours spent in front of a console, such as the NES or SNES, and even in arcades playing arcade machines.…

Category : Software   14-10-2020   by Luigi Nori

Mobile cryptophones on the market (legals)

As we have said, it is a market often at the borders of legality, also because these devices are particularly used by criminals. Some models, however, are also available through standard commercial channels, while others are sold through direct distributors and cash payment. We list some of them here, with the…

Category : Security   15-09-2020   by Silvia Mazzetta

What is a Cryptophone and how it works

The so-called cryptophones, are anti-interception smartphones as they use encryption methods to protect all communication systems. Here are all the details and the truth about these "unassailable" phones. The recent Encrochat affair, recently investigated for illegal activities, has brought to light the so-called cryptophones. They are smartphones - legal in themselves -…

Category : Security   11-09-2020   by Silvia Mazzetta

How are businesses using artificial intelligence?

The term Artificial Intelligence (AI), "the intelligence of the machines", unifies two words that, a priori, could not be associated, since the term intelligence is attributed to the faculty of the mind to learn, to understand, to reason, to take decisions and to form a determined idea of the reality. How…

Category : News and events   02-09-2020   by Silvia Mazzetta

How to setup an Android TV with androidtv.com/setup or the Google application

Android TVs and players are a good investment if you want to have all the entertainment at your fingertips. However, they require an installation that, although simple, has several ways to run. We show you how to set up your Android TV without complications and in less than five minutes. Android…

Category : Operating systems   26-10-2020   by Janeth Kent

What cybersecurity professionals have learned from the lockdown experience

The COVID-19 pandemic has radically changed the rules of the game for most companies and individuals in a very short time; it has also changed the international computing universe. Sudden changes in people's habits as well as in business operations have altered some of the elements that characterize cyber-risk. And…

Category : Security   26-08-2020   by Silvia Mazzetta

How to clone objects in JavaScript

Primitive and referenced values (objects) behave very differently when we want to make a copy of them. Primitive values Let's suppose a variable name that has a primitive value associated with it (number, string, boolean, undefined and null). If we make a copy of this variable name to another variable name2, any…

Category : Javascript   11-05-2021   by Luigi Nori

Popular DNS Attacks and how to prevent them

DNS services are essential for web browsing. However, it is one of the most vulnerable to attacks. This guide will detail the most dangerous DNS attacks and some actions that will protect the network infrastructure. One of the reasons why DNS services have some susceptibility to attack is the UDP transport…

Category : Security   20-07-2020   by Silvia Mazzetta

A collection of interesting networks and technology aiming at re-decentralizing the Internet

The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…

Category : Networking   27-08-2020   by Janeth Kent

Dark Web: how to access, risks and contents

You've probably heard of the Dark Web before, but do you really know what the Dark Web is, or what it consists of? Do you know its risks? Which users use the Dark Web? What content is published? Would you know how to access the Dark Web safely? If you are reading…

Category : Security   13-06-2020   by Silvia Mazzetta

What is Cyber Intelligence and how is it used?

What is Cyber-intelligence and what is it used for? This is a question that is usually asked by security, cyber-security and intelligence professionals. Cyber-intelligence is a hybrid concept between these three worlds and professional fields, and therefore it is an opportunity and a necessity to know what it is and what…

Category : Security   11-06-2020   by Silvia Mazzetta

How to Take Your Small Ecommerce Business to the Next Level

Running an ecommerce business can be both exciting and financially rewarding. However, as you increase your customer base, it might seem difficult to successfully scale your operations. If your site is growing in popularity, or you want to attract more customers to your online venture, read the below top tips on…

Category : Web marketing   25-01-2022   by Janeth Kent

WhatsApp: How to View Deleted Messages

Words are carried away by the wind, as long as they are not written on WhatsApp. Sending it was like getting a tattoo, something you'll always like, or yet it'll be there for years to remind you of a mistake. Then came the option to delete sent messages, a white card…

Category : News and events   25-05-2020   by Janeth Kent

What is Google My Business and how does it help my local business?

Google My Business is increasingly present in the digital marketing strategies of companies, and this Google tool provides us with various options to better position our business in the search engine.  Through the creation of a business file we can work on the SEO of our brand. Google My Business mixes the…

Category : Web marketing   02-05-2020   by Luigi Nori

Linux For Dummies: Permissions

In the previous articles I made a short introduction to the Unix world and in the following article I have dealt with the basic commands for the file system management. Today we are going to talk about permissions. We are going to take Ubuntu as an example, but in the other distros the working mechanism…

Category : Operating systems   14-03-2020   by Alessio Mungelli

The best websites of the Tor Deep Web and Dark Web Network

We already talked about Deep Web more than a year ago, explaining that to open Deep Web (or rather Dark Web) sites you need total and undetectable user anonymity and access to the "onion" network. The Dark Web is much smaller than the Deep Web and is composed mainly of sites…

Category : Security   25-04-2021   by Janeth Kent

The exciting story of JavaScript (in brief)

Javascript is a client-side programming language that has changed the Internet as we know it today. The term "client side" means that it runs on our web browser without the need for a web hosting. Along with html and css it is one of the 3 pillars of web design. It is…

Category : Javascript   13-04-2020   by Silvia Mazzetta

How to check if the GPS works

Have you tried to share your location with some friends but couldn't because the GPS on your smartphone looks dead? Don't jump to conclusions - your phone may not be having hardware problems. In fact, GPS malfunctions are often caused by temporary problems due to poor signal reception or poor…

Category : News and events   10-04-2020   by Silvia Mazzetta

Coronavirus: Citizen Science projects to help research from home

The term "citizen science" is used to define the involvement and active and conscious participation of people of different ages, education and social backgrounds in scientific research activities: students, simple enthusiasts, retired people and amateur scientists, not included in academic structures. In other words, everyone is invited to contribute. No specific…

Category : News and events   02-04-2020   by Silvia Mazzetta

How to find everything you need on the Deep Web and the Dark Web

How to find everything you need on the Deep Web and the Dark Web Best links, sites, markets what you can find on the Deep Web The Deep Web is also known as the Deep Internet is a sort of layer of content that is not indexed by the search engines…

Category : Security   10-05-2021   by Silvia Mazzetta

Best ways to start a video conference without registration

Nowadays it is very easy to make a video conference without using Whatsapp, Skype or any of those platforms that require user registration, phone, email and so on. Today we will talk about three options that allow video conferencing in a few seconds, being only necessary in most cases to inform…

Category : Multimedia   21-04-2020   by Silvia Mazzetta

Linux for Dummies: Ubuntu Terminal

I introduced in the previous article, available here, the basic concepts concerning the Linux world. Today we are going to have a look to some basic operations that we can perform using the terminal in an Ubuntu-like operating system. What is the command line? Shell, terminal and command line are words that commonly stand for a…

Category : Operating systems   27-02-2020   by Alessio Mungelli

Linux for Dummies: Introduction

If you have thought about migrating from Windows to a Unix operating system, or Linux specifically there are things you should know. The goal is to give essential information (and not) to take the first steps in the world of the "penguin". What is Linux? With the word Linux we commonly refer…

Category : Operating systems   21-08-2020   by Alessio Mungelli

Tips to Maximize Your ROI with Google AdWords

The marketing method you use is not important. What you want is the best possible ROI. The money spent should come back to you tenfold. Well, that might be a bit of an exaggeration, but you get the idea. If you were to try pay per click and Google AdWords in…

Category : Seo & sem   22-01-2020   by Silvia Mazzetta

How to Stay Safe When Shopping Online

It can seem that not a day goes by when we don’t hear of some new hacking case or people who have had their sensitive date compromised via the internet. It’s true that cybercriminals are always coming up with new strategies to attempt to steal either money or information, but…

Category : News and events   08-01-2020   by Silvia Mazzetta

Java Design Pattern: Builder Pattern

Today we are going to talk about a creational pattern that in many situations can represent a useful alternative to the construction of the objects using the constructors: the Builder Pattern. The need to introduce alternative mechanisms to those provided by Java for the creation of objects is originated from the fact…

Category : Java   22-12-2019   by Alessio Mungelli

Java Sorting Algorithm: Selection Sort

Today we are going to analyze a sorting algorithm that is not very efficient but often used in various fields. We are talking abou the Selection Sort. Let's have a look. Intuition The idea behind it is to divide the array to sort into two sub-arrays: the first that contains the sorted data…

Category : Java   22-12-2019   by Alessio Mungelli

Java Sorting Algorithm: Bubble Sort

Programming, the need to order the collections of data or objects that must then be manipulated often arises. Ordering a list can be useful in cases where you have to do very quick searches. We will see later on how to maintain an ordered list is useful to carry out dichotomous…

Category : Java   15-12-2019   by Alessio Mungelli

Java Sorting Algorithms: Merge Sort

Today we are going to analyze one of the most used sorting algorithms: the Merge Sort. It is part of the Divide and Conquer family, just like the  Quick Sort. Merge Sort offers a better performance despite of the Quick Sort since its complexity remains O(n log n) keeping performances. It is also called "algorithm by fusion" The main defect of the Merge…

Category : Java   14-12-2019   by Alessio Mungelli

Java Sorting Algorithms: Quick Sort

Welcome back to this overview about the Java world! Today, we are going to talk about a renowned sorting algorithm: the Quick Sort. The Quick Sort is not very suitable for educational purposes because its implementation may not be trivial, but at the performance level it offers some advantages that are not indifferent, unlike…

Category : Java   14-12-2019   by Alessio Mungelli

Future of Artificial Intelligence for Startups

With how far-reaching the scope of Artificial Intelligence (AI) is, it is bound to make an enormous impact in the lives of people — the realm of startups is no exception.   Whether you’re looking to improve your omnichannel marketing or you want to make your website more accessible to people with…

Category : Technology   11-12-2019   by Silvia Mazzetta

The best Internet search engines used by hackers

Today, many users wonder what tools hackers use to look for different vulnerabilities on devices that are connected to the Internet. Normally, everyone uses specific tools, but there are search engines that are specifically designed for security researchers. Although many users think that a hacker is a hacker, the reality is…

Category : Security   07-01-2021   by Silvia Mazzetta

10 Open source tools for security operations (SOC)

As we know, there are many moving parts to building a Security Operations Centre (SOC). From a technological point of view, it is very important to count on open source to identify threats and reduce costs. From a DiD (Defense in Depth) point of view, there are many devices and…

Category : Security   29-11-2019   by Janeth Kent

DevOps, Agile Operations, and Continuous Delivery

  Source: Pixabay   Companies and enterprises across the globe have successfully implemented the Agile methodology of developing software and witnessed many benefits regarding smaller development times. Agile also helped to streamline the processes in various multilevel software development teams. The methodology creates feedback loops all while driving the peace that goes with…

Category : Programming   26-09-2019   by Silvia Mazzetta

CRUD Operations Using Vue.js: a basic example

In this tutorial, we show you how to create CRUD application using vue js. here is very basic and simple example of vue.js crud app. using this vuejs crud (create read update delete) you can easily implement with php mysql or also in laravel or codeigniter framework. So it is a…

Category : Javascript   23-05-2020   by Luigi Nori

React: 4 types of components to rule them all

If you have already worked with React, you will probably have found terms like "dumb components", "stateless components" or "high order components" which serve to describe different ways of defining and creating components in an application. The aim of this article is to explain the different types of components we can…

Category : Javascript   20-08-2019   by Janeth Kent

The history of software development in two minutes: a century of logic, languages and code

The video shows the hyper-compressed history of software development and programming beginning in 1912 with Bertrand Russell and Alfred North Whitehead and their work on formal logic and type theory. Then came the first electromechanical calculators from IBM and others. Turing laid the foundations for programming in 1930 and by 1940…

Category : Programming   20-08-2019   by Janeth Kent

How to conditionally build an object in JavaScript with ES6

The arrival of ES6 brought us, among many other news, the spread syntax, which, as you will already know, allows us to save a few lines of code and improve legibility. Specifically, this syntax allows us to destructure the parameters that we pass to a function so that our code goes…

Category : Javascript   09-08-2019   by Janeth Kent

10 Javascript tips and tricks you should know

Javascript is the most widely used language in fullstack development thanks to the boom in recent years in libraries and frameworks such as NodeJs (backend) and React/Angular/Vue (frontend). However, regardless of which one you use to develop, there are a number of tricks and tips common to all of them…

Category : Javascript   08-08-2019   by Janeth Kent

RCS: Everything you need to know about the successor to the SMS

What is RCS? What is it for? Discover everything about this system that Google has been promoting for some time and the future it could have. Messaging in the handset market has changed dramatically over time. For many years SMS was the way most people used to be in contact with…

Category : Mobile   18-06-2019   by Janeth Kent

7 Useful tricks for writing more concise and performant JavaScript

When we started writing about JavaScript, we created a list of every time-saving trick we discovered in the code of other people, on websites, and anywhere other than the tutorials we used. Since then, we've been contributing to this list and now we are going to share 11 triks  that strike us as particularly smart or helpful.…

Category : Javascript   04-06-2019   by Janeth Kent

Unlock Hidden SmartPhone Features with these Secret Codes

Unstructured Supplementary Service Data (USSD), sometimes known as "quick codes" or "feature codes", is an extra-UI protocol, which allows people to access hidden features. This protocol was originally created for GSM phones, but can be found on CDMA devices as well (if that's a bunch of acronym gibberish to you,…

Category : Security   22-06-2022   by Janeth Kent

5 Strategies For Improving Brand Reputation

In order for a business in any industry to succeed, it is essential that they have a good reputation. Your target customer needs to see your brand as an authoritative source in the industry and a company that they can trust. This will help you to stand out from the…

Category : Web marketing   15-05-2019   by Janeth Kent

How the Internet has Influenced Businesses

How the Internet has Influenced Businesses

The internet has transformed the way that people live their lives. You can access a wealth of knowledge from a device that fits in your hand. Yes, it’s used for pleasure and leisure, but it has made the most impact on businesses, driving growth with innovations and advances in technology. The…

Category : News and events   22-03-2019   by Janeth Kent

How to  Successfully Promote Your Healthcare Business

How to Successfully Promote Your Healthcare Business

When it comes to running a healthcare business, you have to find a way of making it stand out from the crowd if you want it to be successful. People often choose to go with recommendations when it comes to choosing a healthcare professional. However, more typically, they turn to…

Category : Web marketing   20-03-2019   by Janeth Kent

JavaScript: Variables & Scope. A Visual Guide.

JavaScript: Variables & Scope. A Visual Guide.

We often speak of discrepancies between var, let and const But more often than not, we still see developers struggling to fully grasp the idea of how everything works. That's because concepts are rarely visualized. Let's catch a glimpse. Not all scopes are identical. Do not memorize scope rules for each type of scope. Try…

Category : Javascript   13-05-2019   by Janeth Kent

Best Javascript front-end hacking cheatsheets

Best Javascript front-end hacking cheatsheets

JavaScript has a extremely high potential to build cutting-edge web applications. But it's really hard to memorize it by heart. The JavaScript cheat sheets therefore act perfectly as a reminder and a comprehensive reference for developers. All popular and special purpose cheat sheets have been discussed above. You now have…

Category : Javascript   06-05-2020   by Janeth Kent

Tips for JavaScript Developers

Another year is over and JavaScript is constantly changing. However, there are some tips that can help you write in 2019 clean and efficient code that scales. Below is a list of 9 pragmatic suggestions.   async / await   Are you still trapped in callback hell? Don't use callbacks unless it's completely necessary, such…

Category : Javascript   08-06-2020   by Janeth Kent

JavaScript Basis: Syntax & Structure

JavaScript Basis: Syntax & Structure

Programming languages are defined by rules. The syntax is what we follow when we write our code, which forms the logical structure of our programs. Let's dive right into the basic components of JavaScript. We will look at values, unicode, semi-colon, indentation, white spacing, commentary, case sensitivity, keywords..ect. By taking the time…

Category : Javascript   07-02-2019   by Janeth Kent

6 JavaScript Utility Libraries you Should Know in 2019

6 JavaScript Utility Libraries you Should Know in 2019

Nowadays Javascript is the most popular and widely used programming language, so the ecosystem around it constantly grows. However, it is expected that the small "standard library" of Javascript will remain so. To fill this gap, many of the most popular utility libraries have grown on GitHub. Here is a short…

Category : Javascript   18-01-2019   by Janeth Kent

A Guide to Moving IT Services During an Office Relocation

A Guide to Moving IT Services During an Office Relocation

Relocating a business from one office to another can be stressful. You can’t afford any loss of productivity and given that there are so many things that can go wrong, it is wise to plan everything down to the last detail. Moving desks and other office furniture is relatively straightforward. A…

Category : News and events   21-08-2018   by Janeth Kent

Tips on How to Prevent Data Loss for Your Business

Tips on How to Prevent Data Loss for Your Business

Data is information stored electronically that makes the world go round, and for businesses, in particular, it could include sensitive information about its finances, customers, and employees. The majority of businesses rely on data stored on computers and hard drives, yet this is at risk of being lost due to…

Category : Databases   21-06-2018   by Janeth Kent

How JSON data types work in mysql

First introduced in MySQL 5.7.8, the JSON data type is a specialized binary column type, similar to a blob , but with added machinery to optimize the storage and retrieval of values from a column typed as json . Javascript Object Notation or more commonly known as JSON, is a  modern…

Category : Databases   30-09-2019   by

Useful technical SEO checklist for developers

Let's start from the beginning. What is SEO? When we talk about SEO we are talking about Search Engine Optimisation: we are talking about the organic positioning of a web page in search results. And when we say organic positioning we mean unpaid positioning. SEO is a discipline, strategy or set…

Category : Seo & sem   09-06-2021   by Janeth Kent

5 best open source version control systems tools for sysadmins

5 best open source version control systems tools for sysadmins

As a system admin, the chances are you collaborate with multiple people across the company, therefore you will probably know the stress of constantly transferring files and version controlling the changes. Version control tools are a great way to enable collaboration, maintain versions, and track changes across the team. Perhaps the…

Category : Software   13-05-2017   by Janeth Kent

Facebook Prepack, The Next Big Thing In The JavaScript World

Facebook Prepack, The Next Big Thing In The JavaScript World

In the last days, the social networks were crazy about Prepack. Probably you still haven’t heard about it. It’s reasonable! It has been an open source only a few days ago. Prepack has developed by Facebook and it is under active development. It’s experimental and still in very early stage,…

Category : Javascript   11-05-2017   by Janeth Kent

How to Improve Communication with Suppliers

How to Improve Communication with Suppliers

A supplier is more than just a company you have hired for a service. They can be integral to the development and growth of your business. It is therefore essential to embark with a mutually beneficial relationship, as both companies are as important as each other for achieving their business…

Category : Web marketing   22-03-2017   by Janeth Kent

How to Connect to a Remote Server via SSH from a Linux Shell

How to Connect to a Remote Server via SSH from a Linux Shell

Introduction Secure Shell (SSH) is a UNIX-based command interface and protocol for securely getting access to a remote computer. SSH is actually a suite of three utilities - slogin, ssh, and scp - that are secure versions of the earlier UNIX utilities, rlogin, rsh, and rcp. SSH commands are encrypted and…

Category : Servers   16-02-2017   by Janeth Kent

Getting started with Node.Js

Node.js is a JavaScript runtime environment (hence its .js termination in reference to the JavaScript language). This real-time runtime environment includes everything you need to run a program written in JavaScript. It also brings many benefits and solves many problems, so it would be more than interesting to take our…

Category : Javascript   06-05-2020   by Janeth Kent

Install Memcache in Ubuntu 16.04

Install Memcache in Ubuntu 16.04

Memcache is an in-memory key-value store that is ideal for speeding up infrastructure. Perhaps a slow operation needs access to rarely-changing data, or files are accessed on slow storage systems. By integrating Memcache, the result of slow queries or reads can be keyed to a unique value, and future accesses…

Category : Databases   28-09-2016   by Janeth Kent

Ubuntu servers security: 25 security tools to armor your system

Ubuntu servers security: 25 security tools to armor your system

The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc.   1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…

Category : Servers   14-09-2016   by Janeth Kent

Install HHVM + Nginx on Ubuntu 14.04

Install HHVM + Nginx on Ubuntu 14.04

  The LEMHH software stack is a group of software that can be used to serve dynamic web pages and web applications. This is an acronym that describes a Linux operating system, with an Nginx web server. The backend data is stored in MySQL and the dynamic processing is handled by…

Category : Networking   12-05-2017   by Janeth Kent

PHP7: Guide and References to all the changes between version 5.x and 7 of PHP

PHP7: Guide and References to all the changes between version 5.x and 7 of PHP

PHP 7 was released on December 3rd, 2015. It comes with a number of new features, changes, and backwards compatibility breakages that are outlined below. Performance Features Combined Comparison Operator Null Coalesce Operator Scalar Type Declarations Return Type Declarations Anonymous Classes Unicode Codepoint Escape Syntax Closure call() Method Filtered unserialize() IntlChar Class Expectations Group use Declarations Generator Return Expressions Generator Delegation Integer Division with intdiv() session_start() Options preg_replace_callback_array() Function CSPRNG Functions Support…

Category : Php   27-12-2015   by Janeth Kent

Guide: Install Free SSL Certificate On Your Website with Let's Encrypt

Guide: Install Free SSL Certificate On Your Website with Let's Encrypt

Let's Encrypt – an initiative run by the Internet Security Research Group (ISRG) – is a new, free, and open certificate authority recognized by all major browsers, including Google's Chrome, Mozilla's Firefox and Microsoft's Internet Explorer. The Free SSL Certification Authority is now in public beta after testing a trial among…

Category : Networking   09-05-2020   by Janeth Kent

10 Useful PHP Image Manipulation Libraries

10 Useful PHP Image Manipulation Libraries

In this article, we listed 10 PHP Image Manipulation Libraries which help developers making their tasks simpler.   1. Imagine   Imagine is a OOP library for image manipulation built in PHP 5.3 using the latest best practices and thoughtful design that should allow for decoupled and unit-testable code. In order to produce RGB code…

Category : Php   09-06-2014   by Janeth Kent

Tutorial: Introduction to PHP:PDO

Tutorial: Introduction to PHP:PDO

Many PHP programmers learned how to access databases by using either the MySQL or MySQLi extensions. As of PHP 5.1, there’s a better way. PHP Data Objects (PDO) provide methods for prepared statements and working with objects that will make you far more productive!   PDO Introduction “PDO – PHP Data Objects…

Category : Databases   15-10-2013   by Janeth Kent

Weekly Fresh Resources for Designers and Developers: JavaScript, HTML & CSS – Week of August 12, 2013

Weekly Fresh Resources for Designers and Developers: JavaScript, HTML & CSS – Week of August 12, 2013

This is our weekly design news column where we share our favorite design related articles, resources and cool freebies from the past week. Enjoy :) Tutorials Raymond Camden shares a very cool proof of concept for drawing a shape on a map and getting back map data from Google Maps. Using Drawing Tools…

Category : Web design   21-08-2013   by Janeth Kent

13 jQuery Plugins and Tutorials for e-commerce website

13 jQuery Plugins and Tutorials for e-commerce website

E-Commerce websites are making shopping easy for customers. The number of ecommerce websites are growing with every day. Shopping Cart is the most important aspect of an E-Commerce website. We all know that jQuery plugins helps us to add difficult things to our websites very easily. Below you’ll find 13 jQuery shopping cart plugin and…

Category : Javascript   02-08-2013   by Janeth Kent

We use our own and third-party cookies to improve our services, compile statistical information and analyze your browsing habits. This allows us to personalize the content we offer and to show you advertisements related to your preferences. By clicking "Accept all" you agree to the storage of cookies on your device to improve website navigation, analyse traffic and assist our marketing activities. You can also select "System Cookies Only" to accept only the cookies required for the website to function, or you can select the cookies you wish to activate by clicking on "settings".

Accept All Only sistem cookies Configuration
q=operation