Promise - Ma-No Tech News & Analysis, Javascript, Angular, React, Vue, Php

64 results for: promise

The Payment Request API: Revolutionizing Online Payments (Part 1)

The Payment Request API has emerged as the new standard for online payments, transforming the way transactions are conducted on the internet. In this two-part series, we will delve into the intricacies of this powerful API and explore how it simplifies the payment experience for both users and merchants. Part 1:…

Category : Javascript   12-06-2023   by Silvia Mazzetta

How do you stop JavaScript execution for a while: sleep()

A sleep()function is a function that allows you to stop the execution of code for a certain amount of time. Using a function similar to this can be interesting for many reasons: from waiting for some condition to be met before continuing with the code, to simulating during development an…

Category : Javascript   31-05-2023   by Janeth Kent

Artificial Intelligence (AI) and the Existential Threat to Humanity: Expert Perspectives

Artificial Intelligence (AI) has become an increasingly prevalent force in our modern world, revolutionizing industries and enhancing numerous aspects of our lives. However, alongside the promises and potential benefits, concerns have emerged about the potential risks associated with advanced AI systems. One of the most alarming worries is the possibility…

Category : Technology   31-05-2023   by Silvia Mazzetta

Callbacks in JavaScript

Callback functions are the same old JavaScript functions. They have no special syntax, as they are simply functions that are passed as an argument to another function. The function that receives the callback as an argument is called a higher-order function. Any function can be used as a callback, since it is…

Category : Javascript   22-05-2023   by Janeth Kent

JavaScript Arrow functions: What they are and how to use them

In this article we are going to see what they are and how to use JavaScript Arrow Functions, a new feature introduced with the ES6 standard (ECMAScript 6). What are Arrow Functions Arrow Functions are a new syntax for defining anonymous functions in JavaScript in a more concise way. Being an abbreviated…

Category : Javascript   30-08-2021   by Janeth Kent

The ultimate cybersecurity checklist for programmers

In today's digital age, cybersecurity has become an essential concern for programmers. With cyber threats on the rise, it is crucial for programmers to adopt robust security practices to protect their code, data, and systems from malicious attacks. To assist programmers in this endeavor, we have compiled the ultimate cybersecurity…

Category : Security   02-06-2023   by Silvia Mazzetta

Top JavaScript libraries and frameworks part 1

JavaScript libraries and frameworks make it easy to develop websites and applications with a wide variety of features and functionality, all with dynamic, flexible and engaging features. According to a 2020 StackOverflow survey, JavaScript remains the most widely used programming language (for the eighth year), with 67.7% of respondents using it. Its…

Category : Javascript   06-05-2021   by Janeth Kent

Creating simple CSS spinner-loader

In today's article we will show you how to animate a basic loader that spins when some predefined action is defined, such as loading an image. That can be used on a website for example when there is a request running and the result is not yet retrieved. What are they? Loading…

Category : Css   05-04-2021   by

A FULFILLED PROMISE - Using the FETCH API to make AJAX calls

In this article we talked about what AJAX calls are and how to use them in a traditional way, by using the XMLHttpRequest (XHR) object. In short, thanks to AJAX calls a web page can be partially updated without having to reload the whole content. This leads to better loading…

Category : Javascript   26-12-2020   by Iveta Karailievova

Google everywhere: anatomy of a massive giant

The alarm clock is going off. A hand floats over the bedside table groping for the source of the sound: probably a cell phone and maybe one of the more than 2.5 billion Android devices in the world. Alphabet's operating system (Google's matrix) concentrates 74.6% of the market and together with…

Category : Technology   03-12-2020   by Silvia Mazzetta

Making AJAX requests to a REST API using vanilla JavaScript and XHR

Imagine you just build your first static web page and you would like to add some functionality to make it more attractive and generally more usable. Perhaps you would like to entertain your web page visitor with randomly generated cat facts, jokes, or, (preferably not randomly generated) weather forecasts or…

Category : Javascript   25-11-2020   by Iveta Karailievova

The BleedingTooth vulnerability and other Bluetooth security risks

Have you ever heard of BleedingTooth? And we do not mean the really disturbing looking mushroom which goes by this name and is totally real (we double checked) but one of the lately discovered vulnerabilities in Linux systems. It had hit the tech news recently, when Andy Nguyen, a Google security…

Category : Security   10-11-2020   by Iveta Karailievova

What's the Difference between Google TV and Android TV?

At the end of September, Google launched the renewal of its classic dongle. The new Google Chromecast didn't arrive alone, but added two very important innovations compared to the devices of previous generations that have been turning normal televisions into smart TVs since 2013. The first of these novelties is the…

Category : Software   27-10-2020   by Silvia Mazzetta

How to securely access the Dark Web in 15 steps. Second part

Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from number 6.   6. Changes the security level in the Tor browser It is also possible to increase the security level of the…

Category : Security   08-03-2024   by Janeth Kent

How to securely access the Dark Web in 15 steps. First part

The dark web can be a pretty dangerous place if you don't take the right precautions. You can stay relatively safe with a good antivirus and a decent VPN. However, if you want to be completely anonymous and protect your device, you'll need a little more than that. Here there are…

Category : Security   08-03-2024   by Silvia Mazzetta

How to Browse the Internet Anonymously: 6 tips

Most of the actions you take online are not as private as you might imagine. Nowadays, countless people and groups try to follow our online behaviour as closely as possible. Our ISPs, our network administrators, our browsers, search engines, the applications we have installed, social networks, governments, hackers and even the…

Category : Security   16-09-2020   by Silvia Mazzetta

How to configure Tor to browse the deep web safely

Today we explain how to set up Tor to browse safely, and we'll share some links to safe sites on the deep web to get you started. Many already know that not everything on the Internet appears in Google, Yahoo, Bing or other search engines, and that accessing much of this…

Category : Security   12-08-2020   by Silvia Mazzetta

TypeScript: The evolution of JavaScript

When you're involved in the development of a large project, programming languages like JavaScript don't seem to be the best solution. Their lack of elements such as Language Aids has created the need for code-friendly alternatives. Here we tell you about one of these options. TypeScript, is a project developed and…

Category : Javascript   18-07-2020   by Janeth Kent

How to recover an Instagram hacked account

You can't access your Instagram account. The cybercriminal who probably hacked your profile changed your password. Now what? What to do now? First try to stay calm: unfortunately these things can happen, but there is a solution to everything, and today we will explain how to solve this specific problem. In this…

Category : Social networks   16-07-2020   by Janeth Kent

How to Change Your DNS Server (And Why You Should)

It's so easy to connect to the internet that you don't think much about how it actually works. You've likely heard about things like IP address, ethernet, DNS servers, or similar terms. They often come up when you try to diagnose internet problems on your home network. Though, this time…

Category : Networking   09-05-2020   by Luigi Nori

JavaScript: Promises explained with simple real life examples

Handling asynchronous data flows is complex, who hasn't faced codes like this one?: checkWeather('palma de mallorca', (error, weather) => { if (error) throw error; if (weather === 'well') { return checkFlights('palma de mallorca', (err, flights) => { if (err) throw err; buyTicket(flights, (e, ticket) => { if (e) throw e; console.log('ticket nº…

Category : Javascript   06-05-2020   by Janeth Kent

Web shells as a security thread for web applications

Over the past two decades, web applications as an alternative to traditional desktop application have been on to rise. As their name suggests, they are installed on web servers and accessed via a web browser. This gives web apps a rather long list of advantages: multi-platform cross-compatibility, no installation required for…

Category : Security   04-05-2020   by Iveta Karailievova

JavaScript. What's new in ES2020?

As we discussed in our article about the ES2019 features you should try, ECMAScript's proposals will continue to grow and give rise to new implementations. Therefore, you can already access the new ECMAScript features summarized in ES2020. So, in order not to miss the train, it is worth to be informed…

Category : Javascript   05-04-2020   by Silvia Mazzetta

How to find everything you need on the Deep Web and the Dark Web

How to find everything you need on the Deep Web and the Dark Web Best links, sites, markets what you can find on the Deep Web The Deep Web is also known as the Deep Internet is a sort of layer of content that is not indexed by the search engines…

Category : Security   10-05-2021   by Silvia Mazzetta

How to Stay Safe When Shopping Online

It can seem that not a day goes by when we don’t hear of some new hacking case or people who have had their sensitive date compromised via the internet. It’s true that cybercriminals are always coming up with new strategies to attempt to steal either money or information, but…

Category : News and events   08-01-2020   by Silvia Mazzetta

10 SEO trends for 2020

In "Ma-No" we have tried to make some predictions with our digital crystal ball and (knowing that we will be wrong about many things) about what will happen in SEO in the next months. These are the ten trends that could mark the evolution of web positioning in 2020. 1. More…

Category : Seo & sem   01-01-2020   by Silvia Mazzetta

How to Pique Customer Interest

If your target audience aren’t interested in your brand, your marketing campaigns, or the service that you provide, why would they feel compelled to bring you their business? If you’re to attract a steady stream of new customers, you’re going to have to find a way to make your business…

Category : Web marketing   06-12-2019   by Silvia Mazzetta

How They Can Hack You While Navigating: Protecting Your Digital Security

As technology continues to advance, navigation systems have become an integral part of our daily lives. From GPS-enabled smartphones to in-car navigation systems, we rely on these tools to guide us to our destinations efficiently. However, with the rise in cyber threats, it's important to understand the potential risks associated…

Category : Security   23-06-2023   by Silvia Mazzetta

DevOps, Agile Operations, and Continuous Delivery

  Source: Pixabay   Companies and enterprises across the globe have successfully implemented the Agile methodology of developing software and witnessed many benefits regarding smaller development times. Agile also helped to streamline the processes in various multilevel software development teams. The methodology creates feedback loops all while driving the peace that goes with…

Category : Programming   26-09-2019   by Silvia Mazzetta

Wi-Fi 6

  In the second quarter of 2019, Wi-Fi Alliance decided to release the new version of Wi-Fi protocol, innovative already from the name. In fact, if the previous standards had incomprehensible names like IEEE 802.11a, IEEE802.11n and so on, the new protocol is called Wi-Fi 6. This standard introduces some new features.…

Category : Technology   12-09-2019   by Alessio Mungelli

10 libraries for machine learning in JavaScript

JavaScript is currently one of the most popular programming languages. Its main application is in web applications, used to give functionality to dynamic web pages. Another field in which it is gaining strength is for the creation of mobile applications. Being the language used in different hybrid development platforms such…

Category : Javascript   16-06-2020   by Luigi Nori

Vanilla JavaScript equivalent commands to JQuery

JQuery is still a useful and pragmatic library, but chances are increasingly that you’re not dependent on using it in your projects to accomplish basic tasks like selecting elements, styling them, animating them, and fetching data—things that jQuery was great at. With broad browser support of ES6 (over 96% at…

Category : Javascript   29-08-2019   by Luigi Nori

Now you can download the new Windows terminal: new, modern, fast, efficient, and powerful.

Microsoft has announced its new Windows Terminal, which will bring together PowerShell, CMD and WSL, includes a real Linux kernel that allows you to run more Linux software on Windows and with better performance than WSL 1 in one place to end the diversification that currently has the operating system…

Category : Software   26-06-2019   by Janeth Kent

Understanding the JavaScript language (guidelines for beginners)

What began in 1995 as a modest 10-day project is now one of the world's most commonly used programming languages. JavaScript is actually everywhere, thanks to more advanced JavaScript engines and the introduction of frameworks like Node, Apache Cordova, Ionic, and Electron that took the language beyond the simple web…

Category : Javascript   18-06-2019   by Janeth Kent

RCS: Everything you need to know about the successor to the SMS

What is RCS? What is it for? Discover everything about this system that Google has been promoting for some time and the future it could have. Messaging in the handset market has changed dramatically over time. For many years SMS was the way most people used to be in contact with…

Category : Mobile   18-06-2019   by Janeth Kent

The Steps to Take if You're  the Victim of a Cyber Hack

The Steps to Take if You're the Victim of a Cyber Hack

According to statistics, the fight on cyber-hacks and crimes has never been more heated. Last year marked a six-year high when it came to cybercrimes in the United States as there were more than 300,000 people in the country that found themselves a victim. Even more alarming was the fact…

Category : News and events   27-03-2019   by Janeth Kent

Is JavaScript imperative for Cross-Platform Development?

Is JavaScript imperative for Cross-Platform Development?

The digital age of mobile and web cross-platform development tends to support the paradigm of "learning once and writing anywhere." In brief: invent your application once and deploy it anywhere. Although we have not yet reached this magical junction of app and web development technology, we have made some great…

Category : Programming   09-03-2019   by Janeth Kent

Core features overview of JavaScript syntax (ES6)

Several changes to JavaScript were introduced by ECMAScript 2015, also well-known as ES6. Here is a summary of a number of the foremost common options and syntactic variations, where applicable, with comparisons to ES5. Variables and constant comparison In the following table, we provide a brief overview of the concepts of scope…

Category : Javascript   11-05-2020   by Janeth Kent

Level Up Your JavaScript Skills: 12 basic notions

If you are a developer at any level, understanding its basic concepts is crucial. This article highlights 12 basic concepts that are critical to understanding by any JS developer, but do not represent the full range of what a JS developer should know. 1. Value vs. Reference Variable Assignment To coding bug-free JavaScript,…

Category : Javascript   23-05-2020   by Janeth Kent

Async/Await how they really work: an example

Async/Await how they really work: an example

Promises give us an easier way to deal sequentially with asynchrony in our code. This is a welcome addition, given that our brains are not designed to deal efficiently with asynchronicity. Async / await functions, help us to write completely synchronous code while performing asynchronous tasks in the background. The functionality…

Category : Javascript   22-02-2019   by Janeth Kent

Best 5 Frontend Development Topics in 2019

Best 5 Frontend Development Topics in 2019

Ah, a new year. A time of positivity, a time to restart. For new objectives and proposals. And in the world of developers, to look at the scenery and decide what we need to learn to keep up. Because let's face it-web development is always changing, and we're falling behind…

Category : Programming   18-02-2019   by Janeth Kent

Best Javascript front-end hacking cheatsheets

Best Javascript front-end hacking cheatsheets

JavaScript has a extremely high potential to build cutting-edge web applications. But it's really hard to memorize it by heart. The JavaScript cheat sheets therefore act perfectly as a reminder and a comprehensive reference for developers. All popular and special purpose cheat sheets have been discussed above. You now have…

Category : Javascript   06-05-2020   by Janeth Kent

Tips for JavaScript Developers

Another year is over and JavaScript is constantly changing. However, there are some tips that can help you write in 2019 clean and efficient code that scales. Below is a list of 9 pragmatic suggestions.   async / await   Are you still trapped in callback hell? Don't use callbacks unless it's completely necessary, such…

Category : Javascript   08-06-2020   by Janeth Kent

Working with JSON in JavaScript

JSON is short for JavaScript Object Notation and an easy - to - access way to store information. In short, it gives us a collection of human - readable data that we can access in a very logical way. In addition to RSS feeds, any sites now share data using JSON,…

Category : Javascript   08-04-2020   by Janeth Kent

Vuejs and GDPR : how to be compliant with new EU regulations

Vuejs and GDPR : how to be compliant with new EU regulations

Dear Vue's users, we know you're battling with GDPR compliance: but it can be quite simple if you use vue-analytics, on the grounds that there are two or three highlights here that can enable you to deal with the European Union's General Data Protection Regulation prerequisites. Suppose we have this situation…

Category : Javascript   21-09-2018   by Janeth Kent

Top JavaScript Libraries in 2018

Top JavaScript Libraries in 2018

As Javascript remains the most popular and widely used programming language in 2018, so grows the ecosystem around it. JavaScript has gained immense popularity over the span of a few years. Developers preferred it over other languages because it allows them to design and modify web pages in various ways and…

Category : Javascript   23-08-2018   by Janeth Kent

Tips To Choose the Right PMP Certification

Tips To Choose the Right PMP Certification

Are you planning to have a career in management? While the final goal seems to be handling various types of projects, you need to have the desired skills and expertise. Well, now that many courses have been designed at the professional level, helping you make a successful career. This type,…

Category : Web marketing   01-08-2017   by Janeth Kent

Fetch API, an amazing replacement of XMLHttpRequest AJAX

Fetch API, an amazing replacement of XMLHttpRequest AJAX

When AJAX came to the modern web, it changed the definition of how web works. We all are using ajax for a long time but not with Fetch API. To load a new content in a web page, we do not need a full page reload. Using AJAX, we can…

Category : Programming   19-02-2017   by Janeth Kent

Setup FTP server with VSFTPD in Ubuntu 16.04

Setup FTP server with VSFTPD in Ubuntu 16.04

Introduction FTP, short for File Transfer Protocol, is a network protocol that was once widely used for moving files between a client and server. It has since been replaced by faster, more secure, and more convenient ways of delivering files. Many casual Internet users expect to download directly from their web…

Category : Servers   14-02-2017   by Janeth Kent

Ubuntu servers security: 25 security tools to armor your system

Ubuntu servers security: 25 security tools to armor your system

The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc.   1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…

Category : Servers   14-09-2016   by Janeth Kent

PHP:How To Upgrade to PHP 7 on Ubuntu 14.04

PHP:How To Upgrade to PHP 7 on Ubuntu 14.04

Introduction PHP 7, which was released on December 3, 2015, promises substantial speed improvements over previous versions of the language, along with new features like scalar type hinting.This guide explains how to quickly upgrade an Apache or Nginx web server running PHP 5.x (any release) to PHP 7. Warning: As with…

Category : Operating systems   13-03-2016   by Janeth Kent

Best tools for creating infographics

Best tools for creating infographics

Creating infographics using online tools has never been easier. In the last few years some tools have emerged that allow anyone to create great visual content. Whether you are working on a project for work, personal use, or social media, each new project will starts with a visual template. In this article, we…

Category : Web marketing   04-05-2021   by Janeth Kent

Guide: Install Free SSL Certificate On Your Website with Let's Encrypt

Guide: Install Free SSL Certificate On Your Website with Let's Encrypt

Let's Encrypt – an initiative run by the Internet Security Research Group (ISRG) – is a new, free, and open certificate authority recognized by all major browsers, including Google's Chrome, Mozilla's Firefox and Microsoft's Internet Explorer. The Free SSL Certification Authority is now in public beta after testing a trial among…

Category : Networking   09-05-2020   by Janeth Kent

Mozilla introduces Firefox 29

Mozilla introduces Firefox 29

Firefox 29 was released on April 29, 2014. The new version looks significantly more like Chrome than the old Firefox. It features the same three-bar menu on the right and rounded tabs, for example. At the same time, though, it keeps the separate search form — something most other browsers have…

Category : Software   29-04-2014   by Janeth Kent

How to detect r57 and c99 Shells in your server

How to detect r57 and c99 Shells in your server

When malicious intruders compromise a web server, there's an excellent chance a famous Russian PHP script, r57shell, will follow. The r57 and C99 shell PHP script gives the intruder a number of capabilities, including, but not limited to: downloading files, uploading files, creating backdoors, setting up a spam relay, forging…

Category : Security   26-07-2013   by Janeth Kent

The Future of Web Browsing: Liberating Content from the Confines of Space

  Since its inception, the World Wide Web has revolutionized the way we access and interact with information. However, with the rapid advancements in technology and the emergence of new paradigms, the future of web browsing is poised to undergo a radical transformation. In this article, we explore an intriguing possibility…

Category : News and events   28-06-2023   by Janeth Kent

Top 15 Free Hacking Tools for Ethical Hackers

Intrusion tests, known as "Penetration Analysis" or "Ethical Hacking", are now a common practice to know the level of security a website has. These tests assess the type and extent of system and network vulnerabilities in terms of confidentiality and integrity. They check the security of the network and empirically verify…

Category : Security   19-06-2020   by Silvia Mazzetta

Top Alternatives to Google Adsense (ideal for small publishers)

It's a fact: Google dominates the Internet and is the undisputed leader in the search engine market in such a way that it is frankly difficult to avoid the Mountain View giant, not only from a SEO perspective in terms of where the traffic comes from, but also in terms…

Category : Web marketing   15-06-2020   by Silvia Mazzetta

Mastering JavaScript: Top Resources to Propel Your Learning Journey

Learning JavaScript is a valuable decision if you're interested in coding and pursuing a career in the tech industry. JavaScript holds the top spot as the most popular programming language on GitHub and is widely used by professional developers, as indicated by the Stack Overflow Developer Survey. It's worth noting that…

Category : Javascript   23-06-2023   by Janeth Kent

The HTML5 Full-Screen API

The Fullscreen API allows a DOM element (and its descendants) to be represented in full screen. What it allows is to visualize the page by removing any element of the browser (menus, tabs,...). With this we can put from the document itself to full screen, video elements, images,... Fullscreen API methods The…

Category : Programming   03-05-2020   by Silvia Mazzetta

Streamline your business with the top Invoicing Software Solutions

Top Invoicing Software for Freelancers Freelancers have to juggle multiple aspects of their business, including finding clients, maintaining a client base, invoicing, and following up on payments. Despite the challenges, it's crucial to stay organized and efficient, especially when it comes to invoicing. In this article, we will explore the best invoicing…

Category : Web marketing   14-06-2023   by Janeth Kent

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

One of the most sophisticated web server backdoors ever seen has spread fast and is now sitting on hundreds of webservers running some of the most popular websites in the world, researchers have warned. One expert told TechWeekEurope the Cdorked backdoor, brought to light in April, is almost as smart as Stuxnet, the malware which disrupted…

Category : Security   09-05-2013   by Janeth Kent

WARNING: New Malware Threat in Twitter's Topics

WARNING: New Malware Threat in Twitter's Topics

Twitter is one of the most popular social networks for spreading ideas. It has revolutionized the way millions of people consume news. With 288 million active users, Twitter is the world's fourth-largest social network. So it’s no surprise that Twitter is also being used for spreading malware. Trusteer researcher Tanya Shafir…

Category : News and events   23-04-2013   by Janeth Kent

20 Best Wireframing Tools for Web Designers and Developers

20 Best Wireframing Tools for Web Designers and Developers

A website wireframe also known as a page schematic or screen blueprint, is a visual guide that represents the skeletal framework of a website. Wireframes are created by User Experience professionals called Interaction Designers. The interaction designers who have broad backgrounds in visual design, information architecture and user research, create…

Category : Web design   11-04-2013   by Janeth Kent

q=promise Clicky