Word -

298 results for: word

How to Deal with Unnatural Inbound Links

A website that has a good rank on search engines, especially Google is a big task. Backlinks or Inbound links are one of the best ways to achieve this ranking. Sometimes in a haste to achieve this goal, websites indulge in underhanded behaviour like unnatural inbound links. These are considered…

Category : Seo & sem   25-10-2020   by Janeth Kent

Hashmap: hashing, collisions and first functions

Today we are going to study some concepts closely related to hashmaps. The concepts we are going to see are hashing and collisions. Hashing The idea of hashing with chaining is to create a sort of array of lists, into which the elements are somehow inserted. We need to map the keys to…

Category : C language   28-06-2020   by Alessio Mungelli

Introduction to REGEX - Regular Expression

Today we are going to write about Regular Expressions known as regex or shortened  regexp, a very useful concept of using search patterns. Surely you were in a situation when you need to replace some word for another or character for some else. This and more you can handle with Regular…

Category : Programming   23-10-2020   by Tibor Kopca

The new features coming to the Google search engine in autumn 2020

Google has included important improvements in its search engine, applying Artificial Intelligence, to make it easier for users to find what they are looking for. It has also announced new features in Google Lens and other search tools. The main novelties are the following: Many of the announced improvements involve the…

Category : Seo & sem   18-10-2020   by Luigi Nori

HTTP Cookies: how they work and how to use them

Today we are going to write about the way to store data in a browser, why websites use cookies and how they work in detail. Continue reading to find out how to implement and manage them - if you're looking for code! Understanding HTTP COOKIES - What are they? Cookies and other types…

Category : Development   22-10-2020   by Tibor Kopca

SEO in Google News: How to appear in Google News

Google News is a tool, from Google, that spreads current, reliable and truthful content from different websites or portals dedicated exclusively to news. The sites that appear in Google News have a great opportunity to increase traffic to your website and consequently the opportunity to increase your sales through it. If…

Category : Seo & sem   04-10-2020   by Luigi Nori

Google Dorks: How to find interesting data and search like hacker

Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…

Category : Security   22-10-2020   by Tibor Kopca

How to block any website with a password from your browser

We are going to explain how to block any website with a password from your browser, and for this purpose we are going to use an extension called Block Site. This is an extension that has native versions to download in Chrome, Firefox, Microsoft Edge and Opera, although it can…

Category : News and events   30-09-2020   by Silvia Mazzetta

Jennifer in Paradise: story of the first photo ever edited in Photoshop

A photograph with more than 30 years of history has become an icon in popular culture, or at least it remains in the memory of those who have ever used Adobe Photoshop, the well-known tool for photo retouching. Behind software like Photoshop there are dozens of stories. One of them…

Category : News and events   25-09-2020   by Silvia Mazzetta

How to write our own Privacy Policy

In this article we will talk about Privacy Policy statements, how you can write one and implement it on your page. Why did it pop up? These days when we browse on any new page, or when we visit the site for the first time, most of the time we have to…

Category : Development   22-10-2020   by Tibor Kopca

How to securely access the Dark Web in 15 steps. Second part

Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from number 6.   6. Changes the security level in the Tor browser   It is also possible to increase the security level of the…

Category : Security   19-09-2020   by Janeth Kent

How to securely access the Dark Web in 15 steps. First part

The dark web can be a pretty dangerous place if you don't take the right precautions. You can stay relatively safe with a good antivirus and a decent VPN. However, if you want to be completely anonymous and protect your device, you'll need a little more than that. Here there are…

Category : Security   19-09-2020   by Silvia Mazzetta

How to Browse the Internet Anonymously: 6 tips

Most of the actions you take online are not as private as you might imagine. Nowadays, countless people and groups try to follow our online behaviour as closely as possible. Our ISPs, our network administrators, our browsers, search engines, the applications we have installed, social networks, governments, hackers and even the…

Category : Security   16-09-2020   by Silvia Mazzetta

What is a Cryptophone and how it works

The so-called cryptophones, are anti-interception smartphones as they use encryption methods to protect all communication systems. Here are all the details and the truth about these "unassailable" phones. The recent Encrochat affair, recently investigated for illegal activities, has brought to light the so-called cryptophones. They are smartphones - legal in themselves -…

Category : Security   11-09-2020   by Silvia Mazzetta

How to comply with Google's quality guidelines in 2020

Google provides a set of guidelines on what your website's content should look like in order to appear in search results. There are several categories within the Google guidelines: Webmaster Guidelines. General guidelines. Content-specific guidelines. Quality guidelines. In this article we will focus on the Quality guidelines. Quality guidelines, describe techniques whose use is prohibited and which,…

Category : Seo & sem   09-09-2020   by Silvia Mazzetta

How are businesses using artificial intelligence?

The term Artificial Intelligence (AI), "the intelligence of the machines", unifies two words that, a priori, could not be associated, since the term intelligence is attributed to the faculty of the mind to learn, to understand, to reason, to take decisions and to form a determined idea of the reality. How…

Category : News and events   02-09-2020   by Silvia Mazzetta

What cybersecurity professionals have learned from the lockdown experience

The COVID-19 pandemic has radically changed the rules of the game for most companies and individuals in a very short time; it has also changed the international computing universe. Sudden changes in people's habits as well as in business operations have altered some of the elements that characterize cyber-risk. And…

Category : Security   26-08-2020   by Silvia Mazzetta

5 Remote Careers You Can Start Online in 2020

In 2020, life has moved indoors. School, shopping, entertainment, and work have all moved online to keep up with the fight against COVID-19. And with it came an enormous demand for remote careers. If you are looking to start a new career that you can excel in without leaving the…

Category : News and events   25-08-2020   by Silvia Mazzetta

Browse safely and privately from your mobile phone using a VPN

Every day our smartphones suffer attacks, viruses, malware and information theft. In this article you will be able to deduce if you need a VPN in your mobile phone to safely surf the Internet, to avoid possible attacks on public Wi-Fi networks and also to filter out advertising and malware…

Category : Security   25-08-2020   by Janeth Kent

Get ready for the future: What Does The Future Of SEO Look Like?

How will SEO change in 2030? There are various positions and assumptions that we can make about this so that you can think about the strategies to take when the future catches up with us. Anyone who works in SEO knows the great challenge of positioning a site on the web…

Category : Seo   19-08-2020   by Silvia Mazzetta

How to create the perfect hacker-proof password

We have not learned and we still use passwords that are extremely easy to hack and vulnerable to cyber attacks. If you don't want your credentials to end up in the hands of criminals or traded on the dark digital shelves of the Deep Web, we bring you a simple…

Category : Security   11-08-2020   by Silvia Mazzetta

What is the origin of the word SPAM?

It is 40 years since the first spam e-mail was sent. Surely most of the readers of this blog had not yet been born, as well as annoying mail with which we are bombarded in our emails, social networks, or mobiles already existed long before our existence. Have you ever wondered what the origin of the…

Category : Web marketing   03-08-2020   by Janeth Kent

Introduction to Network Theory

Modern network theory was introduced at the end of the nineties by the PhD student Reka Albert and then monopolized by her tutor L.A. Barabasi, who made an empire out of it. The idea was not new, network theory is based on graph theory and graph theory had been already introduced…

Category : Networking   03-08-2020   by Paolo Masucci

Why is Website Performance Important for Online Businesses?

Your web is the site where most individuals will connect with your business. Your digital marketing processes will most probably send customers to your website. It might be to get information concerning your products and services, obtain contact information, or make purchases. Website performance, also known as web optimization, is a…

Category : Web marketing   24-07-2020   by Janeth Kent

Popular DNS Attacks and how to prevent them

DNS services are essential for web browsing. However, it is one of the most vulnerable to attacks. This guide will detail the most dangerous DNS attacks and some actions that will protect the network infrastructure. One of the reasons why DNS services have some susceptibility to attack is the UDP transport…

Category : Security   20-07-2020   by Silvia Mazzetta

How to recover an Instagram hacked account

You can't access your Instagram account. The cybercriminal who probably hacked your profile changed your password. Now what? What to do now? First try to stay calm: unfortunately these things can happen, but there is a solution to everything, and today we will explain how to solve this specific problem. In this…

Category : Social networks   16-07-2020   by Janeth Kent

How Learning Accents Connects Us To The World At Large

Accents are something we often only see in terms of region or a way of speaking. We don’t connect the ways in which they reflect on the cultures they serve or the people who speak them. In reality, where one lives, dictates how they speak and the words they use more than just about…

Category : Web marketing   16-07-2020   by Janeth Kent

Smishing: risks, examples and how to avoid it

Do you know what smishing is, what risks it involves and how you can avoid it? The cyber-criminals are betting on the technique known as Smishing when it comes to defrauding users through text messages (SMS). The objective of Smishing is the same as that of other types of scams…

Category : Security   16-07-2020   by Silvia Mazzetta

A collection of interesting networks and technology aiming at re-decentralizing the Internet

The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…

Category : Networking   27-08-2020   by Janeth Kent

MySQL 8.0 is now fully supported in PHP 7.4

MySQL and PHP is a love story that started long time ago. However the love story with MySQL 8.0 was a bit slower to start… but don’t worry it rules now ! The support of MySQL 8.0’s new default authentication method in PHP took some time and was added in PHP…

Category : Databases   27-10-2020   by Janeth Kent

Neumorphism (aka neomorphism) : new trend in UI design

This area, which arises from a basic human need, such as the urge to communicate, is constantly changing thanks to the advances of the technological era. Today, we invite you to reflect on the origin of this discipline and its future challenges. Graphic language has always been present throughout our lives…

Category : Ui/ux design   17-06-2020   by Silvia Mazzetta

Is JavaScript good for machine learning?

One of the things you always hear when you are talking to someone related to the M.L. world is that, one must learn Python because the vast majority of the major libraries are in that technology. You're probably right, but I chose JavaScript as the metal of my sword and…

Category : Javascript   16-06-2020   by Silvia Mazzetta

Dark Web: how to access, risks and contents

You've probably heard of the Dark Web before, but do you really know what the Dark Web is, or what it consists of? Do you know its risks? Which users use the Dark Web? What content is published? Would you know how to access the Dark Web safely? If you are reading…

Category : Security   13-06-2020   by Silvia Mazzetta

SEO Mistakes that Need to Be Avoided

Search Engine Optimization is the need of the hour, especially for people who have businesses and want to make something big out of it. You need to put in your share of efforts in the domain of SEO to see to it that your business is moving in the right…

Category : Seo & sem   11-06-2020   by Janeth Kent

How to Take Your Small Ecommerce Business to the Next Level

Running an ecommerce business can be both exciting and financially rewarding. However, as you increase your customer base, it might seem difficult to successfully scale your operations. If your site is growing in popularity, or you want to attract more customers to your online venture, read the below top tips on…

Category : Web marketing   01-06-2020   by Janeth Kent

WhatsApp: How to View Deleted Messages

Words are carried away by the wind, as long as they are not written on WhatsApp. Sending it was like getting a tattoo, something you'll always like, or yet it'll be there for years to remind you of a mistake. Then came the option to delete sent messages, a white card…

Category : News and events   25-05-2020   by Janeth Kent

Onion Search Engine: How to browse the Deep Web without Tor

The general recommendation does not change: Anyone interested in entering the Deep Web will get a more complete and secure experience by downloading a copy of the Tor Browser, and modifying various browsing habits. However, the desire to "take a look" is always present, and for those cases there is…

Category : Security   25-05-2020   by Janeth Kent

Step by Step Guide to Successful Social Media Marketing

The most popular social media platforms boast of having hundreds of millions of active users every month. The number itself is more than enough to attract brands in trying to establish themselves as niche authorities on as many different social media websites as they can.   If you are still relatively new…

Category : Web marketing   18-05-2020   by Silvia Mazzetta

Introduction to BEM (Block Element Modifier)

Problems with naming CSS classes I think I might not be the only one with this experience: after finally grasping all the important concepts regarding CSS I wanted to start giving what I thought would be beautiful yet simple style to my HTML code. But suddenly I ended up with class…

Category : Css   23-05-2020   by Iveta Karailievova

Seo: How Search Behavior Has Changed During COVID-19 Pandemic

Google positioning is experiencing a before and after with the coronavirus crisis. The way we search in Google has changed; The way Google the search engine gives us the results has changed ; The tools that webmasters have at their disposal have changed. Google claims that it has never registered as many searches for…

Category : Seo & sem   08-05-2020   by Silvia Mazzetta

First steps into JavaScript – a practical guide 3

After we learned the basic ofaccessing DOM elementsandhow to modify them,we are ready for the more exciting parts – handling DOM events. This allows us to make our web way more interactive, and finally we can put our JS knowledge into practice. User input such as keyboard actions or mouse clicks…

Category : Javascript   07-05-2020   by Iveta Karailievova

First steps into JavaScript – a practical guide

For those who are new to web development, surely the amount of new terminology can sometimes be discouraging. But when it comes to learning JS, some of the first new concepts you definitively should wrap your head around is the Document Object Model and what it implies. To keep it simple…

Category : Javascript   05-05-2020   by Iveta Karailievova

Web shells as a security thread for web applications

Over the past two decades, web applications as an alternative to traditional desktop application have been on to rise. As their name suggests, they are installed on web servers and accessed via a web browser. This gives web apps a rather long list of advantages: multi-platform cross-compatibility, no installation required for…

Category : Security   04-05-2020   by Iveta Karailievova

What is Google My Business and how does it help my local business?

Google My Business is increasingly present in the digital marketing strategies of companies, and this Google tool provides us with various options to better position our business in the search engine.  Through the creation of a business file we can work on the SEO of our brand. Google My Business mixes the…

Category : Web marketing   02-05-2020   by Luigi Nori

Online Marketing Strategies for your Ecommerce

The impetus and desire we have to launch our online store can be counterproductive if we have not defined a pre-launch strategy. If we are determined to launch our ecommerce without having stopped to think if we are doing it right, there is a good chance that we will fail. That…

Category : Web marketing   02-05-2020   by Silvia Mazzetta

Linux For Dummies: Permissions

In the previous articles I made a short introduction to the Unix world and in the following article I have dealt with the basic commands for the file system management. Today we are going to talk about permissions. We are going to take Ubuntu as an example, but in the other distros the working mechanism…

Category : Operating systems   14-03-2020   by Alessio Mungelli

How To Effectively Learn Coding For Website Development

Building a website can be pretty expensive, especially if you decide to engage a professional. That’s why sometimes, it’s best to take matters into your own hands and develop your own website. You might start by visiting those quick online sites that let you design your web page and learn…

Category : Programming   21-04-2020   by Luigi Nori

import one JS file into another in the plain JS

Until some years ago, it was not possible to import one js file or block of code from one file into another but since 2015, ES6 has introduced useful ES6 modules. With the module standard, we can use import and export keyword and syntax given to include and export the…

Category : Javascript   16-04-2020   by Luigi Nori

Building a Home for Your Home Finders

As a real estate agent, one of the most important aspects of your job is outreach. No one will know about your services if you have no way of letting them know. Billboards and commercials are a great way to reach your clients along with online advertising, but if you…

Category : Web marketing   14-04-2020   by Luigi Nori

How to check if the GPS works

Have you tried to share your location with some friends but couldn't because the GPS on your smartphone looks dead? Don't jump to conclusions - your phone may not be having hardware problems. In fact, GPS malfunctions are often caused by temporary problems due to poor signal reception or poor…

Category : News and events   10-04-2020   by Silvia Mazzetta

Coronavirus: Citizen Science projects to help research from home

The term "citizen science" is used to define the involvement and active and conscious participation of people of different ages, education and social backgrounds in scientific research activities: students, simple enthusiasts, retired people and amateur scientists, not included in academic structures. In other words, everyone is invited to contribute. No specific…

Category : News and events   02-04-2020   by Silvia Mazzetta

5 Fool-Proof Ideas For Location-Based Apps

Like it or not, geolocation is a part of our everyday lives. In fact, you’ll find the technology pre-installed on 90% of the apps currently living on your smartphone. Location-based apps are here to stay, which makes them a lucrative option for mobile app developers looking to take advantage of…

Category : Software   01-04-2020   by Luigi Nori

How to find everything you need on the Deep Web and the Dark Web

The Deep Web is also known as the Deep Internet is a sort of layer of content that is not indexed by the search engines we usually use. It will not appear in Google, Bing or Yahoo but these search engines will only show you results from the superficial part…

Category : Security   29-03-2020   by Silvia Mazzetta

How to Improve Your Website to Attract Local Customers

If you run a small business, make no mistake: local search is imperative for your success. You might have lofty dreams of attracting the world to your website, but it’s those local visitors who will make the difference. This is because 80% of people will try and find local information with…

Category : Web marketing   18-03-2020   by Maguire Haigh

How to enable DoH in Chrome, Firefox, and Edge to prevent your ISP from knowing which sites you visit

Maybe you haven't heard of DoH, the new security standard in Firefox, Chrome and other browsers that prevents your Internet provider from spying on the sites you visit. Let's see what DoH is, and how you can activate it in Firefox, Edge or Chrome. Everyone accesses the Internet through the servers…

Category : Security   02-03-2020   by Silvia Mazzetta

Linux for Dummies: Ubuntu Terminal

I introduced in the previous article, available here, the basic concepts concerning the Linux world. Today we are going to have a look to some basic operations that we can perform using the terminal in an Ubuntu-like operating system. What is the command line? Shell, terminal and command line are words that commonly stand for a…

Category : Operating systems   27-02-2020   by Alessio Mungelli

Linux for Dummies: Introduction

If you have thought about migrating from Windows to a Unix operating system, or Linux specifically there are things you should know. The goal is to give essential information (and not) to take the first steps in the world of the "penguin". What is Linux? With the word Linux we commonly refer…

Category : Operating systems   21-08-2020   by Alessio Mungelli

Cross-Origin Resource Sharing (CORS) and examples of XSS and CSRF

Cross-Origin Resource Sharing (CORS) enables web clients to make HTTP requests to servers hosted on different origins. CORS is a unique web technology in that it has both a server-side and a client-side component. The server-side component configures which types of cross-origin requests are allowed, while the client-side component controls…

Category : Javascript   30-01-2020   by Luigi Nori

How to Write an Amazon Listing That Converts

If you are one of the 2.5 million sellers on Amazon, you’ll know that the platform has incredible potential for profits. However you’ll also know the competition is fierce and you need to be on your A-game to sell your product. There is no doubt that ranking on Amazon is critical, and Amazon SEO is the number…

Category : Networking   28-01-2020   by Luigi Nori

Tips to Maximize Your ROI with Google AdWords

The marketing method you use is not important. What you want is the best possible ROI. The money spent should come back to you tenfold. Well, that might be a bit of an exaggeration, but you get the idea. If you were to try pay per click and Google AdWords in…

Category : Seo & sem   22-01-2020   by Silvia Mazzetta

7 Step Guide to Writing for SEO

SEO optimization is constantly evolving, and it doesn’t include only writing and SEO-friendly blog post. Some of the requirements are a mobile-friendly website, fast loading time, and support for Google crawlers. Let’s say you’ve got that covered. Then It’s time to turn to SEO writing was in the last couple of…

Category : Seo & sem   06-04-2020   by Silvia Mazzetta

How to Stay Safe When Shopping Online

It can seem that not a day goes by when we don’t hear of some new hacking case or people who have had their sensitive date compromised via the internet. It’s true that cybercriminals are always coming up with new strategies to attempt to steal either money or information, but…

Category : News and events   08-01-2020   by Silvia Mazzetta

Is Old School RuneScape Still Popular?

Since the launch of RuneScape 3 there are two versions of RuneScape running simultaneously: RuneScape 3 and Old School RuneScape. At first glance it seems that having two iterations of the same game might cannibalize player population. But is this first impression correct? That’s what we’re going to look into…

Category : Videogames   08-01-2020   by Silvia Mazzetta

10 SEO trends for 2020

In "Ma-No" we have tried to make some predictions with our digital crystal ball and (knowing that we will be wrong about many things) about what will happen in SEO in the next months. These are the ten trends that could mark the evolution of web positioning in 2020. 1. More…

Category : Seo & sem   01-01-2020   by Silvia Mazzetta

The worst 50 passwords of 2019

Despite all the security flaws, data leaks or privacy risks, the vast majority of people still use things like "123456" for their password. Darlings, it's time to take security a little seriously. The security company SplashData has published its ninth annual list of the year's worst passwords, assessing over 5 million passwords…

Category : News and events   31-12-2019   by Silvia Mazzetta

Is It Risky to Share Data While Surfing Online?

The internet is a fantastic place to learn, engage, and connect with people across the globe. From browsing social media to performing critical work tasks, the internet has become a regular, important part of our everyday lives. The average person spends almost 7 hours a day online. That's around half…

Category : Security   30-12-2019   by Janeth Kent

Java Sorting Algorithm: Selection Sort

Today we are going to analyze a sorting algorithm that is not very efficient but often used in various fields. We are talking abou the Selection Sort. Let's have a look. Intuition The idea behind it is to divide the array to sort into two sub-arrays: the first that contains the sorted data…

Category : Java   22-12-2019   by Alessio Mungelli

What Are The Best Methods to Make Money Online

More and more individuals are moving from a regular job they have to work on the internet. This trend continues to grow at quite a rapid speed, and since we depend on the internet a lot these days, it is natural that there is so much money to be made…

Category : Web marketing   12-06-2020   by Silvia Mazzetta

The best Internet search engines used by hackers

Today, many users wonder what tools hackers use to look for different vulnerabilities on devices that are connected to the Internet. Normally, everyone uses specific tools, but there are search engines that are specifically designed for security researchers. Although many users think that a hacker is a hacker, the reality is…

Category : News and events   08-12-2019   by Silvia Mazzetta

How they can hack you while navigating

When we connect to the Internet we can be victims of many types of attacks. It is a reality that there are many threats in the form of malware that affect all types of systems and devices. However, it is at the time of using the browser where more problems…

Category : Security   02-12-2019   by Silvia Mazzetta

How to Gain an Edge and Improve Your Engagement Rate on Instagram

Image source: Unsplash.com   Instagram has more than one billion active profiles every month and the platform continues to grow at a rapid speed. This is no surprise given just how popular it has become in recent times.    Given the number of active users, it is no surprise that so many businesses and…

Category : Social networks   20-11-2019   by Silvia Mazzetta

How to Secure Remote Access Using VPN

Using a VPN to get remote access allows users to connect to aSecure server via the internet. Rather than logging into the same server directly, uses instead first login to a VPN which allows them to connect to the server more securely. This goes a long way to protecting the…

Category : Networking   24-04-2020   by Luigi Nori

Java 12, finally less verbose?

We all know Java for its characteristics thanks to which, despite more than 20 years have passed since the first version, it is still one of the most studied and most used languages, despite the growing diffusion of Python. However, one of the biggest flaws is the fact that it is…

Category : Java   10-10-2019   by Alessio Mungelli

Angular vs React vs Vue: Which is the Best Choice?

With the growing popularity of Vue, Angular and React as frameworks and libraries for the web and app development, a constant doubt is which of these 3 we should learn, in which we should invest our time, which has a greater future or simply which is the best. First I want…

Category : Javascript   11-06-2020   by Silvia Mazzetta

How to Find Trending Topics for Your Blog?

One of the huge determinants of a blog’s success is the content. Trending blogs with useful contents are always amazing. On the other hand, a blog with content that does not change or improve lives is useless. One of the key responsibilities of any blogger is to create content that…

Category : Seo & sem   19-08-2019   by Robert Everett

5 Ways to Effectively Market Your Online Business

Creating any business is hard enough. Having people notice your business is a completely new challenge. Similar to Michael Scott’s “declaration” of bankruptcy in The Office doesn’t make it so. Creating a business doesn’t guarantee that people will be lining up the streets or parked in front with tents waiting for…

Category : Web marketing   22-04-2020   by Janeth Kent

Deep web: 5 curious facts you didn't know about

The 'deep web' is an Internet space where the content that does not appear in conventional search engines is hosted, due to various factors that do not have to respond to illegality. However, there is also the 'dark web', which is a small part of the 'deep web', whose contents…

Category : Networking   05-08-2019   by Janeth Kent

Google Search hacks to Use Google More Efficiently

Modern folks have grown up with having all the world's data at their fingertips with super mobile phones glued to our palms. Or it's what we've always believed. Sometimes the incredible amount of information in a Google search result can actually stop us from finding out what we need. We…

Category : Software   24-07-2019   by Janeth Kent

The strategic advantages of Open Source

Being a good web designer also means getting the right tools (and skills) to accomplish the task. Fortunately, there are an incredible number of resources available to those of us who work in this area. Here's the thing: most of them are free.   A smart and cheap start   There are some costs involved…

Category : Programming   11-07-2019   by Janeth Kent

How to use to Chrome Lighthouse

How would you like to perform a fast SEO audit with a Chrome browser-based instrument? With the Lighthouse extension, you can do that. If you're not acquainted with Lighthouse, it's an open-source tool used by experts to verify their website's health. It analyzes everything from best practices to performance to accessibility. As…

Category : Seo & sem   14-06-2019   by Janeth Kent

7 Useful tricks for writing more concise and performant JavaScript

When we started writing about JavaScript, we created a list of every time-saving trick we discovered in the code of other people, on websites, and anywhere other than the tutorials we used. Since then, we've been contributing to this list and now we are going to share 11 triks  that strike us as particularly smart or helpful.…

Category : Javascript   04-06-2019   by Janeth Kent

10 Collaborative Coding Tools for Remote Pair Programming

The days of lonesome coding are long gone since the development of pair programming. It is a technique where two software developers share a keyboard and collaboratively work together. The two developers take turns and continually switch roles in writing code: one being the Driver, whose job is to write…

Category : Development   02-03-2020   by Janeth Kent

Rare earths: here is the 'endgame' threat of China that led to the immediate freezing of the U.S. ban in Huawei

The US move to put Huaweion its so-called Entity List — requiring American companies to obtain a government licence to sell to it — is a pivotal moment for the global technology industry. The action against the Chinese telecoms flagship has made global noise, monopolizing not only the political or economic news but…

Category : Technology   23-05-2019   by Janeth Kent

Nofollow and dofollow links, How and when to use?

Within any website the links are an element that brings dynamism to the experience of navigating through the different sections that make it up allowing us to go from one content to another quickly. However, it is necessary to take into account that Google, as well as other search engines will…

Category : Seo & sem   19-05-2019   by Janeth Kent

Advantages of Progressive Web Applications

The unstoppable increase in the use of mobile devices to connect to the Internet has resulted in the fact that it is no longer enough to have only one web page to have an online presence.  Right now, any company that wants to stand out and build customer loyalty must also…

Category : Javascript   08-05-2019   by Janeth Kent

The Steps to Take if You're  the Victim of a Cyber Hack

The Steps to Take if You're the Victim of a Cyber Hack

According to statistics, the fight on cyber-hacks and crimes has never been more heated. Last year marked a six-year high when it came to cybercrimes in the United States as there were more than 300,000 people in the country that found themselves a victim. Even more alarming was the fact…

Category : News and events   27-03-2019   by Janeth Kent

How to  Successfully Promote Your Healthcare Business

How to Successfully Promote Your Healthcare Business

When it comes to running a healthcare business, you have to find a way of making it stand out from the crowd if you want it to be successful. People often choose to go with recommendations when it comes to choosing a healthcare professional. However, more typically, they turn to…

Category : Web marketing   20-03-2019   by Janeth Kent

Core features overview of JavaScript syntax (ES6)

Several changes to JavaScript were introduced by ECMAScript 2015, also well-known as ES6. Here is a summary of a number of the foremost common options and syntactic variations, where applicable, with comparisons to ES5. Variables and constant comparison In the following table, we provide a brief overview of the concepts of scope…

Category : Javascript   11-05-2020   by Janeth Kent

Highlights from the JavaScript Style Guide of Google

Highlights from the JavaScript Style Guide of Google

For anyone who is not already acquainted with it, Google provides a style guide for writing JavaScript that gives the best stylistic practices for writing clean, understandable code (what Google believes to be). The guide does not present difficult rules for writing valid JavaScript, but only tips to keep the source…

Category : Javascript   27-02-2019   by Janeth Kent

CSS in JavaScript (CSS-in-JS) Vs CSS in CSS

CSS in JavaScript (CSS-in-JS) Vs CSS in CSS

What actually is CSS-in-JS? You've certainly heard or read words like CSS-in-JS, Styled Components, Radium, Aphrodite and you're and you're stuck in limbo there, "why is it? I'm completely happy about CSS - in - CSS!" We are here to explain these new concepts and clarify them. That said -feel free to use…

Category : Javascript   26-02-2019   by Janeth Kent

Level Up Your JavaScript Skills: 12 basic notions

If you are a developer at any level, understanding its basic concepts is crucial. This article highlights 12 basic concepts that are critical to understanding by any JS developer, but do not represent the full range of what a JS developer should know. 1. Value vs. Reference Variable Assignment To coding bug-free JavaScript,…

Category : Javascript   23-05-2020   by Janeth Kent

What You Need to Know When Sending a Press Release to Newswire

What You Need to Know When Sending a Press Release to Newswire

A newswire or a press release distribution service helps businesses in improving their online visibility and web presence. If you haven’t used it before, there are many things you need to know prior to using any platform. What is a newswire? Newswire or wire services syndicate your story across different sites and…

Category : News and events   25-02-2019   by Janeth Kent

Is jQuery going to die in 2019?

For a while, JQuery's relevance has been a topic of debate among web developers. We were curious as web developers interested in Javascript to know what others have to say about it. So we browsed through Javascript's history along with some interesting discussions on several developer forums and a bunch of…

Category : Javascript   22-02-2019   by Janeth Kent

Javascript: Introduction to ES6 classes

Javascript: Introduction to ES6 classes

An exciting new construct that was introduced in the ES6 specification is the ES6 classes. If you're a Javascript developer, you will be aware that Javascript follows prototypal inheritance and sometimes it can get a little messy, with ES6 classes the syntax is simpler and much more intuitive. However, contrary to…

Category : Javascript   26-02-2019   by Janeth Kent

Top free JavaScript User Authentication Libraries

We are keen on security: authentication is an important issue when creating a dynamic web application Authentication is for identifying users and provide different access rights and content depending on their id. Since new tutorials appear on the web and more people try to understand the cost-benefit equation for implementing their…

Category : Javascript   29-01-2020   by Janeth Kent

Async/Await how they really work: an example

Async/Await how they really work: an example

Promises give us an easier way to deal sequentially with asynchrony in our code. This is a welcome addition, given that our brains are not designed to deal efficiently with asynchronicity. Async / await functions, help us to write completely synchronous code while performing asynchronous tasks in the background. The functionality…

Category : Javascript   22-02-2019   by Janeth Kent

ES2019 JavaScript and its new features

ES2019 JavaScript and its new features

ECMAScript 2019 has finished and rolled out new exciting features for developers. The proposals which have been accepted and reached stage 4 by the TC39 committee would be included in the specification of that year and the others - are postponed to the next year. What that’s mentioned above is a…

Category : Javascript   18-02-2019   by Janeth Kent

Vue.js: a quick start guide for beginners. Part 2

Vue.js: a quick start guide for beginners. Part 2

In the previous article, we discovered out how to add Vue to our index.html with a regular < script > tag and we were able to add our first reactive property to the page. Today, we will learn how to change this property through the user input field. Our code should be…

Category : Javascript   25-02-2019   by Janeth Kent

JavaScript: Variables & Scope. A Visual Guide.

JavaScript: Variables & Scope. A Visual Guide.

We often speak of discrepancies between var, let and const But more often than not, we still see developers struggling to fully grasp the idea of how everything works. That's because concepts are rarely visualized. Let's catch a glimpse. Not all scopes are identical. Do not memorize scope rules for each type of scope. Try…

Category : Javascript   13-05-2019   by Janeth Kent

Best Javascript front-end hacking cheatsheets

Best Javascript front-end hacking cheatsheets

JavaScript has a extremely high potential to build cutting-edge web applications. But it's really hard to memorize it by heart. The JavaScript cheat sheets therefore act perfectly as a reminder and a comprehensive reference for developers. All popular and special purpose cheat sheets have been discussed above. You now have…

Category : Javascript   06-05-2020   by Janeth Kent