326 results for: service
Transitioning from a Home Office to a Virtual Office
The traditional concept of the office has undergone a substantial transformation in recent years. With advancements in technology and changes in work culture, more professionals are embracing remote work options, including the transition from home offices to virtual offices. While working from home has its advantages, such as flexibility and comfort,…
Category : Web marketing 08-03-2024 by Janeth Kent
The best and most amazing Alexa Hacks you should know about
The best and most amazing Alexa Hacks you should know about Alexa, Amazon's talking Artificial Intelligence contained in the Echo, can entertain you and your family if you know the right words. Alexa is a versatile assistant, but Alexa's fun tricks can be the best form of entertainment at home. From playing…
Category : Operating systems 30-06-2023 by Janeth Kent
How to trim a video without downloading programs
You recently experienced one of the most epic concerts in recent years and now you're in the process of showing the videos you recorded to friends and family who, unfortunately, were unable to attend. However, in reviewing the recorded video, you've noticed that some scenes aren't quite right, so you're…
Category : Software 27-06-2023 by Janeth Kent
Why businesses need to be familiar with APIs
APIs serve as intermediaries between software, allowing them to communicate with each other and perform various functions like data sharing or processing. APIs provide the protocols, definitions, tools, and other components essential for communication between apps. Not knowing how to use APIs is not necessarily going to result in the…
Category : Web marketing 13-12-2023 by Janeth Kent
Google Play Games on PC: Transforming Your Gaming Experience
Do you want to play your favorite Android games directly on your computer? If your answer is yes, you've come to the right place! In today's guide, I will explain how to install Google Play Games on PC, so you can move your gaming experience from mobile to a larger…
Category : Videogames 06-06-2023 by Janeth Kent
Top best AI Image Generators: unlocking creativity with Artificial Intelligence
Artificial intelligence (AI) is revolutionizing not just business and healthcare, but also the creative industries by introducing a new era of AI-generated art. The accessibility of AI technologies and tools has paved the way for a whole new generation of artists. Contrary to the common misconception that AI will replace human…
Category : Technology 05-06-2023 by Janeth Kent
Android Hidden Codes: unveiling custom dialer codes and their functionality
In the world of Android smartphones, there exist numerous hidden codes that can unlock a treasure trove of functionalities and features. These codes, known as custom dialer codes, provide access to various settings, diagnostics, and information that are not readily available through regular menus. In this article, we will explore…
Category : Mobile 02-06-2023 by Janeth Kent
The Impact of automation and Robots on human jobs: exploring controversies and opportunities
Automation and technological advancements have raised concerns in some sectors about the possibility of robots taking away human jobs. While it is true that robots and artificial intelligence can perform certain tasks more efficiently and accurately than humans, the idea that robots will completely replace human workers is a controversial…
Category : News and events 02-06-2023 by Silvia Mazzetta
Marketing Trends in Technology 2023: Spotlight on Inflation
Inflation, the general rise in prices of goods and services, is a significant economic concern that impacts various industries, including technology. As we delve into 2023, marketing professionals in the technology sector are facing unique challenges and opportunities due to the rising inflationary pressures. This article aims to shed light…
Category : Web marketing 01-06-2023 by Janeth Kent
How do you stop JavaScript execution for a while: sleep()
A sleep()function is a function that allows you to stop the execution of code for a certain amount of time. Using a function similar to this can be interesting for many reasons: from waiting for some condition to be met before continuing with the code, to simulating during development an…
Category : Javascript 31-05-2023 by Janeth Kent
Hidden Gmail codes to find a lost e-mail
If you have a lot of emails in Gmail, there are a few codes that will help you find what you need faster and more accurately than if you do it by hand. We'll tell you about them right now. To say that Gmail is one of the most important email…
Category : Technology 16-05-2023 by Janeth Kent
How to download an email in PDF format in Gmail for Android
You will see how easy it is to save an email you have received or sent yourself from Gmail in PDF format, all with your Android smartphone. Here's how it's done. Gmail is one of the most used email applications in the world, not only for its good design, good organization…
Category : Technology 16-05-2023 by Janeth Kent
The Impact of Social Media Engagement on SEO Maximising Results with Link Building Agency
Our daily lives now include social media, and businesses have realised its potential for engaging and interacting with the target audiences. Social media not only makes it easier to communicate with clients, but it also has substantial SEO (search engine optimisation) benefits. Businesses can increase their online visibility and rise…
Category : Social networks 16-05-2023 by Janeth Kent
A Step-by-Step Process to Using Artificial Intelligence as a Startup
Unsurprisingly, artificial intelligence is an industry buzzword that continues to grow in popularity as the months go by. The reason is there´s always an advancement in AI that company owners can use to elevate their business endeavors. One of the fantastic things about AI is its exponential growth, where each…
Category : Technology 14-03-2023 by Janeth Kent
How to fix excessive MySQL CPU usage
What happens if we realise that a series of databases that we thought were optimised through the use of indexes, have begun to consume CPU usage time of a server to unsuspected limits? Even users have stopped being able to access the server when it had a certain number of visits…
Category : Development 21-12-2022 by Janeth Kent
Benefits of Corporate Social Responsibility to Business
Corporate social responsibility or CSR is a company's conscious effort and commitment to positively impact various aspects of society, including the environment and community. There are different types of social responsibility, and you can commit to only some or all of them. So, let's go through each of them. Ethical responsibility. This…
Category : Web marketing 06-12-2022 by Janeth Kent
The AI Revolution: How Are Small Businesses Beginning To Implement AI?
As the technological world moves forward with new advancements, so too does the business world evolve and adapt to integrate those advancements to optimise their operations. Artificial Intelligence has been around for a couple of decades, but only in the last few years has it developed to a point where…
Category : Technology 17-10-2022 by Janeth Kent
AI predicts crimes in the US like Minority Report
As in Spielberg's film based on Philip K. Dick's novel, an AI model was able to predict crimes in some American cities before they happened. However, it also revealed the racism that exists in the police. Once again, a science fiction bestseller has (almost) anticipated the future: in 1956, Philp K.…
Category : Technology 19-09-2022 by Janeth Kent
China dives into deep learning
China plans to diversify the application areas of deep learning. Moreover, this system, which allows computers to be trained to perform tasks like those performed by humans, such as speech recognition, image identification or the formulation of predictions, will be driven by open-source platforms. Similarly, the forecast is that, in…
Category : News and events 18-07-2022 by Janeth Kent
Misinformation also attacks Wikipedia
Wikipedia contains over 55 million articles in more than 300 languages spoken worldwide. In just 21 years, Wikipedia has become a global phenomenon, a reference point on all human knowledge, with 18 billion hits per month and the fourth most visited site on the planet. It is therefore not surprising that…
Category : News and events 13-07-2022 by Janeth Kent
8 benefits of having a website for your business
At this moment, the Internet is a phenomenon that is sweeping the world. It has been able to interconnect millions of users all over the planet. People have made the Internet an indispensable part of their lives. If they want to find out where to eat, they look on their…
Category : Web marketing 03-06-2022 by Nadal Vicens
How to create a .onion domain for your website
The dark web, a hidden network accessed through the Tor browser, offers enhanced privacy and anonymity for websites. To establish a presence on the dark web, you can create a .onion domain for your website. A .onion domain is an address that can only be accessed through the Tor network.…
Category : Networking 06-06-2023 by Janeth Kent
How to Start a Web Design Agency in 2022
If the last two years have shown us anything, it’s that a good online presence is paramount to success in the modern world of business. Once they have a robust web-based reputation in place, companies have the capacity to disrupt their sectors in an engaging, intuitive, and ultimately profitable fashion.…
Category : Web marketing 25-01-2022 by Janeth Kent
Node.js and npm: introductory tutorial
In this tutorial we will see how to install and use both Node.js and the npm package manager. In addition, we will also create a small sample application. If you have ever used or thought about using a JavaScript-based development tool, you have probably noticed that you need to install…
Category : Javascript 05-11-2021 by Silvia Mazzetta
How to set up your own free web server with XAMPP
Nowadays anyone can create their own website easily and free of charge. Whether through a CMS (such as WordPress) or by hand with HTML, CSS and JavaScript, in a few minutes we can have a more or less functional website up and running. However, in order to test that everything…
Category : Servers 25-10-2021 by Silvia Mazzetta
Secret iPhone codes to unlock hidden features
We love that our devices have hidden features. It's fun to learn something new about the technology we use every day, to discover those little features that aren't advertised by the manufacturer. And unless you spend a lot of time playing around in the Phone app, you probably don't know, until…
Category : Security 22-10-2021 by Silvia Mazzetta
Why E-Commerce Businesses Should be Using Cloud Computing
Cloud computing is the on-demand delivery of computer system resources via the internet. The resources offered in a cloud computing solution include data storage applications, servers, databases, software, and networking tools. Cloud computing seems like it’s been created specifically for businesses like e-commerce stores, as it offers increased flexibility and…
Category : Web marketing 01-06-2021 by Silvia Mazzetta
Are you being floCed by Google?
No panic! Don't be alarmed, because it may sound worse than it is. But since Google doesn't seem to have any intention of communicating it properly, it's up to the rest of us to do so. We're talking about the new secure tracking system with which the Internet giant wants…
Category : News and events 21-05-2021 by Janeth Kent
The ultimate cybersecurity checklist for programmers
In today's digital age, cybersecurity has become an essential concern for programmers. With cyber threats on the rise, it is crucial for programmers to adopt robust security practices to protect their code, data, and systems from malicious attacks. To assist programmers in this endeavor, we have compiled the ultimate cybersecurity…
Category : Security 02-06-2023 by Silvia Mazzetta
Top JavaScript libraries and frameworks part 1
JavaScript libraries and frameworks make it easy to develop websites and applications with a wide variety of features and functionality, all with dynamic, flexible and engaging features. According to a 2020 StackOverflow survey, JavaScript remains the most widely used programming language (for the eighth year), with 67.7% of respondents using it. Its…
Category : Javascript 06-05-2021 by Janeth Kent
Network attacks and how to avoid them
Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We bring you the most common ones according to the network attack databases, so that we can keep up to date…
Category : Security 03-05-2021 by Silvia Mazzetta
How to set up your Android phone: learn how to get your new phone up and running
If you've just bought a great new Android phone, you'll want to start using it as soon as possible. You'll see that it's not hard to get the initial set-up and configuration to get it ready to use, and we'll guide you every step of the way. From connecting your Google account,…
Category : Mobile 28-04-2021 by Janeth Kent
5 Terrific iOS-Friendly Canva Alternatives to Upgrade Your Marketing Visuals
Sometimes you want to use your iPhone to create compelling, engaging marketing visuals, and as awesome as Canva is, many of us are interested in seeing what other options are out there. As all marketers know, consistent branding is a must for any company (or even individual) who wants to stand…
Category : Web marketing 05-05-2021 by Janeth Kent
How to improve customer experience through speech recognition
Voice of the Customer (VoC) is essential to a successful customer experience (CX) programme. However, VoC data is often disparate, making it difficult to use. Service organisations looking to make more informed decisions about customer experience (CX) investments and improvements should implement a consistent voice of the user (VoC) strategy,…
Category : Technology 27-04-2021 by Janeth Kent
How To Use Varnish As A Highly Available Load Balancer On Ubuntu 20.04 With SSL
Load balancing with high availability can be tough to set up. Fortunately, Varnish HTTP Cache server provides a dead simple highly available load balancer that will also work as a caching server. The modern use of SSL/TLS for all traffic has made this a little harder as Vanish has to handle…
Category : Servers 25-04-2021 by Janeth Kent
The best free tools to Transcribe audio to text
With this article we bring you a list of the best tools for transcribing audio to text, offering you some that simply do it with dictated audio, but also others capable of loading audio files. The collection is varied, and we have mobile applications, web pages, and computer programs capable…
Category : Software 15-04-2021 by Janeth Kent
Top Graphic Design e-Books & How to Get them on Your iDevice
Ma-no.org may include links to commercial websites. A commercial website is defined as a business site designed to generate income through the provision of services and products. Where links to commercial sites are included on ma-no.org, this does not indicate or imply any affiliation or endorsement between that commercial entity…
Category : Ui/ux design 03-03-2021 by Luigi Nori
htaccess Rules to Help Protect from SQL Injections and XSS
This list of rules by no means is a sure bet to secure your web services, but it will help in preventing script-kiddings from doing some basic browsing around. MySQL injection attempts are one of the most common hacking attacks against PHP websites. If your website is hosted on a dedicated…
Category : Security 01-03-2021 by Janeth Kent
Cybersecurity and Data Privacy: Why It Is So Important
The internet has made it very easy for people all across the world to stay connected with one another. Access to information, services, and people is possible for pretty much anyone with an internet connection today. But while this has brought many positive changes to how people live and connect,…
Category : Security 26-02-2021 by Janeth Kent
Top 7 Potential Tools for Automation Testing
Today's digital economy has significantly changed how organizations deliver products and services. Many organizations are gravitating towards smart methodologies and automated tools to spark customer interest in their products and increase revenue to ensure quality and speedy deliveries. These testing tools help organizations to determine the expected and actual product delivery…
Category : Web marketing 12-02-2021 by Janeth Kent
Graphic design and its impact on Web Development
In today's article we will explain the concept of graphic design, its fundamentals and what it brings into web development. Graphic design is applied to everything visual, believe or not, it can aid in selling a product or idea, it's applied company identity as logos, colors, typography of the company…
Category : Web design 05-04-2021 by
Top Whatsapp alternatives in 2021
From the communication platform WhatsApp leaves more and more users for different reasons. If you're one of them, there are a lot of possibilities on how to replace it with something better. We will show you what are the 5 free alternatives to WhatsApp to have a text or audio-video conversation…
Category : Software 26-01-2021 by
Understanding LCP, CLS, FID. All about Core Web Vitals in Google Search Console
A few months ago we talked about certain Google metrics that were displayed in Search Console. The reason for writing another post on this topic is that Google has changed this again, giving priority to other metrics. Interestingly, we thought in that previous study that the FCP and FID were not…
Category : Seo & sem 14-01-2021 by Laura Celis Ballesta
7 Astonishing New Uses of Machine Learning
Recently a strange video published on YouTube caused a controversy – it was a funny take on Queen Elizabeth’s traditional Christmas message created by Channel 4, a British public-service television broadcaster. They used AI to produce a fake video of the Queen making it look very realistic and if the message itself…
Category : Technology 31-12-2020 by Iveta Karailievova
What is DNS Blockchain and how to use it
To be able to navigate the Internet, to enter a website and have it show us all the content we want and search for, certain functions and characteristics are necessary. One of these key points is the DNS. It is what translates domain names into IP addresses, which prevents us…
Category : Security 28-12-2020 by Janeth Kent
Read comics online: best websites and apps to download and read digital comics
Comic book lovers (like us), today we're going to give you a special tribute: a small collection of websites and applications to download and read digital comics, both on your computer and on your mobile devices. You'll be able to access a wide collection of free and paid digital comics, and…
Category : News and events 26-05-2023 by Silvia Mazzetta
Django vs. Laravel: Market Share Comparison
There are two leading frameworks in the web development segment: Django and Laravel. In this article, we prepared a Django and Laravel comparison focusing on their market share so that you can figure out which framework is better for your project. Selecting the appropriate framework is crucial for coping with…
Category : Programming 23-12-2020 by Janeth Kent
How to get paid in Bitcoin: CoinBase, CoinGate
After explaining how bitcoins work and how to pay using this cryptocurrency, we will see how to get paid in bitcoin. Below you will find explained in detail how to do it. Many people find the concept of BitCoin virtual currency confusing. We could simply explain that BitCoin is a peer-to-peer financial…
Category : Technology 23-12-2020 by Silvia Mazzetta
Dark Web: the creepy side of the Internet is not as dark as believed
People who surf the Dark Web are not necessarily looking for something illegal. Most people want to protect their privacy. And according to a recent study, 93 percent only use websites that are freely accessible. It is almost impossible not to leave traces on the Internet and therefore reveal a lot…
Category : Security 17-05-2023 by Silvia Mazzetta
Some Neat Ways to Improve Your Internet Browsing Experience?
Not everyone has the best time when they are surfing the net. There are multiple reasons why an internet browser struggles, but that does not mean the situation is out of your hands. Relying on the internet is inevitable these days. We use it for work, entertainment, and socializing with friends…
Category : News and events 21-12-2020 by Janeth Kent
How to pay in Bitcoin: Hype and Coinbase
Once the wallet is created, let's see how to pay in Bitcoin to buy various products and services. If you have opened a Bitcoin wallet with HYPE, you can send payments using this cryptocurrency very easily. All you need to do is go to the Menu section of the HYPE app, press…
Category : Technology 10-12-2020 by Silvia Mazzetta
How to Use Bitcoin: mining, wallets, payments
You have certainly heard of Bitcoin, the virtual currency that periodically makes people talk about itself because of its innovative and particular nature. In this case, you have probably also wondered how it is possible to get and subsequently spend Bitcoins, and if it is something useful, as well as…
Category : Technology 10-12-2020 by Silvia Mazzetta
Security of Internet providers: can we trust it?
This year has been a time of many changes. Now, more people are connected to the Internet through their home routers for teleworking, shopping, or leisure. This is where the security of Internet operators becomes more important. The question is whether the ISP's security is good enough to be the only…
Category : Security 29-05-2023 by Janeth Kent
Website Traffic Getting Low? 4 Immediate Action to Take
If you have created a website, I am sure your end objective is to create a strong brand presence, boost engagement, and multiply revenue. An interesting statistic showed that there were 22.31 million internet users at the start of the year, in Australia. This means that there are ample opportunities to…
Category : Web marketing 04-12-2020 by Luigi Nori
Google everywhere: anatomy of a massive giant
The alarm clock is going off. A hand floats over the bedside table groping for the source of the sound: probably a cell phone and maybe one of the more than 2.5 billion Android devices in the world. Alphabet's operating system (Google's matrix) concentrates 74.6% of the market and together with…
Category : Technology 03-12-2020 by Silvia Mazzetta
5 Tips to Bring More Traffic to Your Blog
Publishing a blog on your business website is an effective marketing tool for several reasons. Blog posts are the ideal place to share information about your company, products, services, and showcase your expertise or comment on industry trends. Blog posts also give you a space to express more personality, a sense…
Category : Seo & sem 03-12-2020 by Janeth Kent
Brief History of Biometric Authentication
These days, biometric authentication seems to be part of every little gadget or device we use. You’ve no doubt used it when logging onto your laptop, your tablet, or your cell phone, alongside more ‘old school’ methods like a password or PIN. Governments often use biometric authentication for security access and…
Category : Security 30-11-2020 by Janeth Kent
Making AJAX requests to a REST API using vanilla JavaScript and XHR
Imagine you just build your first static web page and you would like to add some functionality to make it more attractive and generally more usable. Perhaps you would like to entertain your web page visitor with randomly generated cat facts, jokes, or, (preferably not randomly generated) weather forecasts or…
Category : Javascript 25-11-2020 by Iveta Karailievova
A beginner’s guide to software vulnerabilities
What are software vulnerabilities The number of devices connected to the Internet is growing every day. And among those devices we find not only computers and smartphones, but also an ever-rising number of cameras, smoke detectors, motion sensors, smart door locks, and let’s not forget that even plant pots. Many households…
Category : Security 17-11-2020 by Iveta Karailievova
The BleedingTooth vulnerability and other Bluetooth security risks
Have you ever heard of BleedingTooth? And we do not mean the really disturbing looking mushroom which goes by this name and is totally real (we double checked) but one of the lately discovered vulnerabilities in Linux systems. It had hit the tech news recently, when Andy Nguyen, a Google security…
Category : Security 10-11-2020 by Iveta Karailievova
Why You Should Hire Node.js Developer for Your Backend Development
When developers are building a new website, they mainly focus on both frontend and backend development. The frontend code helps create the interfaces through which the app interacts with the users while the back-end code interacts with the server to deliver data or content that is displayed to the website…
Category : Javascript 27-10-2020 by Luigi Nori
What's the Difference between Google TV and Android TV?
At the end of September, Google launched the renewal of its classic dongle. The new Google Chromecast didn't arrive alone, but added two very important innovations compared to the devices of previous generations that have been turning normal televisions into smart TVs since 2013. The first of these novelties is the…
Category : Software 27-10-2020 by Silvia Mazzetta
How to watch deleted or private Youtube videos
Today we are going to talk about the technique which you permit to be able to recover videos from Youtube that was deleted, made private or simply blocked by Youtube itself. With this trick you most of the time would do just that. How is this possible we will explain…
Category : Social networks 05-04-2021 by
How to Deal with Unnatural Inbound Links
A website that has a good rank on search engines, especially Google is a big task. Backlinks or Inbound links are one of the best ways to achieve this ranking. Sometimes in a haste to achieve this goal, websites indulge in underhanded behaviour like unnatural inbound links. These are considered…
Category : Seo & sem 25-10-2020 by Janeth Kent
Network and port scanning with Zenmap
This article goes out to all the computer nerds who are, when it comes to networking, more on the noob-side of the crowd. It does not have to be complicated and everyone with patience and eagerness to learn something new can relatively quickly gain the knowledge necessary to feel more…
Category : Security 08-10-2020 by Iveta Karailievova
A Dev compile and install Windows XP and Server 2003 from filtered source code
One of the events in the IT field this year was the massive leak of the source code of Windows XP and other large systems such as Windows Server 2003. Although Microsoft has not yet pronounced on the veracity of the code, researchers say it seems real, and those who…
Category : Operating systems 08-10-2020 by Luigi Nori
SEO in Google News: How to appear in Google News
Google News is a tool, from Google, that spreads current, reliable and truthful content from different websites or portals dedicated exclusively to news. The sites that appear in Google News have a great opportunity to increase traffic to your website and consequently the opportunity to increase your sales through it. If you…
Category : Seo & sem 26-06-2023 by Luigi Nori
Google Dorks: How to find interesting data and search like hacker
Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…
Category : Security 03-12-2021 by
Double VPN: what it is and how it works
Privacy on the web is a very important factor for users and there are more and more tools to help us maintain it. Without a doubt VPN services have had a very important increase in recent times and represent an option to preserve our data when we browse. However, in…
Category : Security 28-09-2020 by Silvia Mazzetta
Data Scraping and Data Crawling, what are they for?
Right now we are in an era where big data has become very important. At this very moment, data is being collected from millions of individual users and companies. In this tutorial we will briefly explain big data, as well as talk in detail about web crawling and web scraping…
Category : Web marketing 25-09-2020 by Silvia Mazzetta
How to write our own Privacy Policy
In this article we will talk about Privacy Policy statements, how you can write one and implement it on your page. Why did it pop up? These days when we browse on any new page, or when we visit the site for the first time, most of the time we have to…
Category : Development 13-12-2023 by
How to securely access the Dark Web in 15 steps. Second part
Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from number 6. 6. Changes the security level in the Tor browser It is also possible to increase the security level of the…
Category : Security 08-03-2024 by Janeth Kent
Suggestions to Improve the Efficiency of a Small Business
If you have a small business, it means that every resource matters. You have less room for error due to a lack of manpower as well as other aspects. So focusing on efficiency is something that ought to be your priority. Of course, inefficient experience is a big hindrance. You may…
Category : Web marketing 25-01-2022 by Janeth Kent
How to securely access the Dark Web in 15 steps. First part
The dark web can be a pretty dangerous place if you don't take the right precautions. You can stay relatively safe with a good antivirus and a decent VPN. However, if you want to be completely anonymous and protect your device, you'll need a little more than that. Here there are…
Category : Security 08-03-2024 by Silvia Mazzetta
How to Browse the Internet Anonymously: 6 tips
Most of the actions you take online are not as private as you might imagine. Nowadays, countless people and groups try to follow our online behaviour as closely as possible. Our ISPs, our network administrators, our browsers, search engines, the applications we have installed, social networks, governments, hackers and even the…
Category : Security 16-09-2020 by Silvia Mazzetta
How to run Android apps in Windows 10
Forget about having to constantly pick up your phone to see notifications or answer messages, Your Phone in Windows 10 is what you need and here we tell you how to use it. Apple users can't stop remarking how well their iPhone, iPad and Mac work together. And for a long…
Category : Technology 15-09-2020 by Silvia Mazzetta
What is a Cryptophone and how it works
The so-called cryptophones, are anti-interception smartphones as they use encryption methods to protect all communication systems. Here are all the details and the truth about these "unassailable" phones. The recent Encrochat affair, recently investigated for illegal activities, has brought to light the so-called cryptophones. They are smartphones - legal in themselves -…
Category : Security 11-09-2020 by Silvia Mazzetta
Free Netflix: everything you can see without subscribing
To view the contents of an audiovisual streaming platform such as Netflix, it is necessary to pay a monthly connection fee. However, the company has enabled a series of contents that can be viewed "for free", without having to pay for them. To view Netflix's free contents it is not necessary…
Category : News and events 09-09-2020 by Luigi Nori
How to comply with Google's quality guidelines in 2020
Google provides a set of guidelines on what your website's content should look like in order to appear in search results. There are several categories within the Google guidelines: Webmaster Guidelines. General guidelines. Content-specific guidelines. Quality guidelines. In this article we will focus on the Quality guidelines. Quality guidelines, describe techniques whose use is prohibited and which,…
Category : Seo & sem 09-09-2020 by Silvia Mazzetta
How to install a Linux partition on a Windows 10 PC
In spite of a past we could say almost confronted, the approach between Windows and Linux is accelerating more and more, drawing a story closer to love than to hate. So much so that Windows 10 already offers support for Linux natively. Creating a subsystem is no longer penalized. A…
Category : Operating systems 06-09-2020 by Luigi Nori
How to setup an Android TV with androidtv.com/setup or the Google application
Android TVs and players are a good investment if you want to have all the entertainment at your fingertips. However, they require an installation that, although simple, has several ways to run. We show you how to set up your Android TV without complications and in less than five minutes. Android…
Category : Operating systems 26-10-2020 by Janeth Kent
5 Remote Careers You Can Start Online in 2020
In 2020, life has moved indoors. School, shopping, entertainment, and work have all moved online to keep up with the fight against COVID-19. And with it came an enormous demand for remote careers. If you are looking to start a new career that you can excel in without leaving the…
Category : News and events 25-08-2020 by Silvia Mazzetta
Matrix. An open network for secure and decentralized communication that you can install in your Ubuntu server
Imagine to have an open platform that is as independent, vibrant and evolving as the Web itself, but for communication. As of June 2019, Matrix is out of beta, and the protocol is fully suitable for production usage. But, what is Matrix? Matrix is an open standard for real-time, interoperable and decentralized communication over…
Category : Networking 25-08-2020 by Luigi Nori
Browse safely and privately from your mobile phone using a VPN
Every day our smartphones suffer attacks, viruses, malware and information theft. In this article you will be able to deduce if you need a VPN in your mobile phone to safely surf the Internet, to avoid possible attacks on public Wi-Fi networks and also to filter out advertising and malware…
Category : Security 25-08-2020 by Janeth Kent
Small and medium enterprises can now earn money by holding online events on Facebook
Facebook has launched a new feature that allows small and medium enterprises, large companies, content creators, educators, media... to earn money by holding online events on the social network. Corporate Page owners can now create an online event, set its price, promote it, charge it and organize it from Facebook…
Category : Web marketing 19-08-2020 by Luigi Nori
The package managers npm and yarn: main differences
Npm and yarn are package managers that help to manage a project’s dependencies. A dependency is, as it sounds, something that a project depends on, a piece of code that is required to make the project work properly. In the past we had only npm but it had so many issues…
Category : Javascript 19-08-2020 by Luigi Nori
How to configure Tor to browse the deep web safely
Today we explain how to set up Tor to browse safely, and we'll share some links to safe sites on the deep web to get you started. Many already know that not everything on the Internet appears in Google, Yahoo, Bing or other search engines, and that accessing much of this…
Category : Security 12-08-2020 by Silvia Mazzetta
What is the origin of the word SPAM?
It is 40 years since the first spam e-mail was sent. Surely most of the readers of this blog had not yet been born, as well as annoying mail with which we are bombarded in our emails, social networks, or mobiles already existed long before our existence. Have you ever wondered what the origin of the…
Category : Web marketing 03-08-2020 by Janeth Kent
Why is Website Performance Important for Online Businesses?
Your web is the site where most individuals will connect with your business. Your digital marketing processes will most probably send customers to your website. It might be to get information concerning your products and services, obtain contact information, or make purchases. Website performance, also known as web optimization, is a…
Category : Web marketing 24-07-2020 by Janeth Kent
Popular DNS Attacks and how to prevent them
DNS services are essential for web browsing. However, it is one of the most vulnerable to attacks. This guide will detail the most dangerous DNS attacks and some actions that will protect the network infrastructure. One of the reasons why DNS services have some susceptibility to attack is the UDP transport…
Category : Security 20-07-2020 by Silvia Mazzetta
Smishing: risks, examples and how to avoid it
Do you know what smishing is, what risks it involves and how you can avoid it? The cyber-criminals are betting on the technique known as Smishing when it comes to defrauding users through text messages (SMS). The objective of Smishing is the same as that of other types of scams…
Category : Security 16-07-2020 by Silvia Mazzetta
A collection of interesting networks and technology aiming at re-decentralizing the Internet
The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…
Category : Networking 27-08-2020 by Janeth Kent
Facebook, three questions to recognize fake news (and not share it)
Where's it coming from? What's missing? How do you feel? These are the three questions that Facebook recommends to all users to ask themselves before sharing news. The initiative is part of the fight against fake news undertaken by Mark Zuckerberg's popular social network which - during the pandemic -…
Category : Social networks 02-07-2020 by Janeth Kent
Parenting, pandemic and UX: Learning from design of experiences
After the quarantine, many of us have had to adapt our work and personal routines to the new remote paradigm. As a mother, I decided to share some things I've learned. We've been in total quarantine for weeks. Weeks in which we close the office and live and work in the 4…
Category : Ui/ux design 17-06-2020 by Silvia Mazzetta
Is JavaScript good for machine learning?
One of the things you always hear when you are talking to someone related to the M.L. world is that, one must learn Python because the vast majority of the major libraries are in that technology. You're probably right, but I chose JavaScript as the metal of my sword and…
Category : Javascript 16-06-2020 by Silvia Mazzetta
What is Machine Learning ?
Artificial Intelligence or AI is a trend in technology and has been the main topic of many philosophical debates as to where this field will lead us as humanity. This time I'm going to focus on a subfield of Artificial Intelligence that is Machine Learning, which I am currently very passionate…
Category : Technology 16-06-2020 by Silvia Mazzetta
Dark Web: how to access, risks and contents
You've probably heard of the Dark Web before, but do you really know what the Dark Web is, or what it consists of? Do you know its risks? Which users use the Dark Web? What content is published? Would you know how to access the Dark Web safely? If you are reading…
Category : Security 13-06-2020 by Silvia Mazzetta
SEO Mistakes that Need to Be Avoided
In today's digital age, search engine optimization (SEO) plays a critical role in determining the success of any online business. However, implementing SEO strategies can be complex, and mistakes are common. To ensure your website achieves optimal performance and ranks well on search engine result pages (SERPs), it is essential…
Category : Seo & sem 15-06-2023 by Janeth Kent
Onion Search Engine: How to browse the Deep Web without Tor
The general recommendation does not change: Anyone interested in entering the Deep Web will get a more complete and secure experience by downloading a copy of the Tor Browser, and modifying various browsing habits. However, the desire to "take a look" is always present, and for those cases there is…
Category : Security 25-05-2020 by Janeth Kent
Step by Step Guide to Successful Social Media Marketing
The most popular social media platforms boast of having hundreds of millions of active users every month. The number itself is more than enough to attract brands in trying to establish themselves as niche authorities on as many different social media websites as they can. If you are still relatively new…
Category : Web marketing 16-05-2023 by Silvia Mazzetta