358 results for: word
The best and most amazing Alexa Hacks you should know about
The best and most amazing Alexa Hacks you should know about Alexa, Amazon's talking Artificial Intelligence contained in the Echo, can entertain you and your family if you know the right words. Alexa is a versatile assistant, but Alexa's fun tricks can be the best form of entertainment at home. From playing…
Category : Operating systems 30-06-2023 by Janeth Kent
How to trim a video without downloading programs
You recently experienced one of the most epic concerts in recent years and now you're in the process of showing the videos you recorded to friends and family who, unfortunately, were unable to attend. However, in reviewing the recorded video, you've noticed that some scenes aren't quite right, so you're…
Category : Software 27-06-2023 by Janeth Kent
Google Play Games on PC: Transforming Your Gaming Experience
Do you want to play your favorite Android games directly on your computer? If your answer is yes, you've come to the right place! In today's guide, I will explain how to install Google Play Games on PC, so you can move your gaming experience from mobile to a larger…
Category : Videogames 06-06-2023 by Janeth Kent
The Payment Request API: Revolutionizing Online Payments (Part 2)
In the first part of this series, we explored the fundamentals of the Payment Request API and how it simplifies the payment experience. Now, let's delve deeper into advanced features and best practices to further optimize the integration of this powerful API. We start by making a modification of supportedMethods by…
Category : Javascript 08-06-2023 by Silvia Mazzetta
Marketing Trends in Technology 2023: Spotlight on Inflation
Inflation, the general rise in prices of goods and services, is a significant economic concern that impacts various industries, including technology. As we delve into 2023, marketing professionals in the technology sector are facing unique challenges and opportunities due to the rising inflationary pressures. This article aims to shed light…
Category : Web marketing 01-06-2023 by Janeth Kent
How do you stop JavaScript execution for a while: sleep()
A sleep()function is a function that allows you to stop the execution of code for a certain amount of time. Using a function similar to this can be interesting for many reasons: from waiting for some condition to be met before continuing with the code, to simulating during development an…
Category : Javascript 31-05-2023 by Janeth Kent
Mastering array sorting in JavaScript: a guide to the sort() function
In this article, I will explain the usage and potential of the sort() function in JavaScript. What does the sort() function do? The sort() function allows you to sort the elements of an array object. It can sort the elements in either the default ascending order or according to a custom sorting…
Category : Javascript 29-05-2023 by Janeth Kent
Optimizing the Robots.txt file for Google
The Robots.txt file serves to give information to Googlebot and other robots that crawl the Internet about the pages and files that should be indexed on our website. Although it is not essential, the Robots.txt file is of great help to Google and other crawling robots when indexing our page,…
Category : Programming 22-05-2023 by Janeth Kent
How to generate an SSH key and add it to GitHub
In this short tutorial we are going to see how you can generate a new SSH key and add it to GitHub, so you can access your private repositories and manage them locally or from your server, running the commands git pull, git push and any other that has restrictions. This…
Category : Programming 22-05-2023 by Janeth Kent
Is AI sexist? A gender perspective in Robotics and Artificial Intelligence
In her article, Maria Antonia Huertas Sánchez of the UOC - Universitat Oberta de Catalunya, provides an explanation of why we should incorporate a gender vision in robotics and artificial intelligence by combining the concept of epistemology with the definition of artificial intelligence. Epistemology refers to the "theory of the foundations…
Category : News and events 22-05-2023 by Silvia Mazzetta
Hidden Gmail codes to find a lost e-mail
If you have a lot of emails in Gmail, there are a few codes that will help you find what you need faster and more accurately than if you do it by hand. We'll tell you about them right now. To say that Gmail is one of the most important email…
Category : Technology 16-05-2023 by Janeth Kent
How to download any video from any website
If you have ever seen a video that you really liked and you would have liked to have it on your computer, but you didn't know how, from now on you will know it, since we are going to see which are the tools that allow us to do this…
Category : Technology 16-05-2023 by Janeth Kent
Infinite scrolling with native JavaScript using the Fetch API
I have long wanted to talk about how infinite scroll functionality can be implemented in a list of items that might be on any Web page. Infinite scroll is a technique that allows the user to interact with the mouse by scrolling down to load new dynamic content. In this way, the…
Category : Javascript 15-05-2023 by Janeth Kent
What is a JWT token and how does it work?
JWT tokens are a standard used to create application access tokens, enabling user authentication in web applications. Specifically, it follows the RFC 7519 standard. What is a JWT token A JWT token is a token that gives the user access to an application by certifying their identity. This token is returned to…
Category : Programming 10-05-2023 by Janeth Kent
A Step-by-Step Process to Using Artificial Intelligence as a Startup
Unsurprisingly, artificial intelligence is an industry buzzword that continues to grow in popularity as the months go by. The reason is there´s always an advancement in AI that company owners can use to elevate their business endeavors. One of the fantastic things about AI is its exponential growth, where each…
Category : Technology 14-03-2023 by Janeth Kent
How to fix excessive MySQL CPU usage
What happens if we realise that a series of databases that we thought were optimised through the use of indexes, have begun to consume CPU usage time of a server to unsuspected limits? Even users have stopped being able to access the server when it had a certain number of visits…
Category : Development 21-12-2022 by Janeth Kent
Benefits of Corporate Social Responsibility to Business
Corporate social responsibility or CSR is a company's conscious effort and commitment to positively impact various aspects of society, including the environment and community. There are different types of social responsibility, and you can commit to only some or all of them. So, let's go through each of them. Ethical responsibility. This…
Category : Web marketing 06-12-2022 by Janeth Kent
How to create PDF with JavaScript and jsPDF
Creating dynamic PDF files directly in the browser is possible thanks to the jsPDF JavaScript library. In the last part of this article we have prepared a practical tutorial where I show you how to implement the library. Below you can see the completed exercise. The client side is gaining ground over…
Category : Javascript 04-12-2022 by Janeth Kent
How to recognise cyber-violence
Cyber-violence, i.e. the digital dimension of violence that mainly affects women and is closely linked to the violence that occurs in the 'real world', is a growing phenomenon that is often neither recognised nor addressed. While it is true that several institutions have started to deal with it specifically, it is…
Category : News and events 04-12-2022 by Janeth Kent
How artificial intelligence design the world
The image you see above was drawn especially for this article, but did not require any artistic skills or vein from its author. It was created by DALL-E, an artificial intelligence that can be asked to draw anything. To visually illustrate the point, the author of this article's lack of…
Category : Technology 17-05-2023 by Janeth Kent
8 benefits of having a website for your business
At this moment, the Internet is a phenomenon that is sweeping the world. It has been able to interconnect millions of users all over the planet. People have made the Internet an indispensable part of their lives. If they want to find out where to eat, they look on their…
Category : Web marketing 03-06-2022 by Nadal Vicens
How to connect to MySQL with Node.js
Let's see how you can connect to a MySQL database using Node.js, the popular JavaScript runtime environment. Before we start, it is important to note that you must have Node.js installed on your system. Likewise, you must create a MySQL database. Create a MySQL database If you haven't already done so, you can…
Category : Javascript 04-11-2021 by Silvia Mazzetta
JavaScript Programming Styles: Best Practices
When programming with JavaScript there are certain conventions that you should apply, especially when working in a team environment. In fact, it is common to have meetings to discuss standards to follow. The reason is that code is much more readable when certain standards are followed. We have already seen…
Category : Javascript 28-10-2021 by Janeth Kent
How to set up your own free web server with XAMPP
Nowadays anyone can create their own website easily and free of charge. Whether through a CMS (such as WordPress) or by hand with HTML, CSS and JavaScript, in a few minutes we can have a more or less functional website up and running. However, in order to test that everything…
Category : Servers 25-10-2021 by Silvia Mazzetta
Difference between arrow and normal functions in JavaScript
In this tutorial we are going to see how arrow functions differ from normal JavaScript functions. We will also see when you should use one and when you should use the other. Normal functions JavaScript's standard functions, those we call normal or standard functions, have been included in JavaScript since its inception.…
Category : Javascript 30-08-2021 by Janeth Kent
JavaScript Arrow functions: What they are and how to use them
In this article we are going to see what they are and how to use JavaScript Arrow Functions, a new feature introduced with the ES6 standard (ECMAScript 6). What are Arrow Functions Arrow Functions are a new syntax for defining anonymous functions in JavaScript in a more concise way. Being an abbreviated…
Category : Javascript 30-08-2021 by Janeth Kent
What is the difference between primitives types and objects in JavaScript?
In this short tutorial we are going to look at the differences between primitive types and objects in JavaScript. To start with, we're going to look at what primitive types are. Then we will see what objects are and how they differ. Introduction The primitive types in JavaScript are as follows: Boolean: 'boolean String:…
Category : Javascript 26-05-2023 by Silvia Mazzetta
Request data with prompt in JavaScript
After having published several articles about how to manipulate arrays and dates, today I will publish a post that some of you will find too basic and others will find it useful to get you started in the world of JavaScript programming. So, let them be read to the taste…
Category : Javascript 01-06-2021 by Janeth Kent
Are you being floCed by Google?
No panic! Don't be alarmed, because it may sound worse than it is. But since Google doesn't seem to have any intention of communicating it properly, it's up to the rest of us to do so. We're talking about the new secure tracking system with which the Internet giant wants…
Category : News and events 21-05-2021 by Janeth Kent
The ultimate cybersecurity checklist for programmers
In today's digital age, cybersecurity has become an essential concern for programmers. With cyber threats on the rise, it is crucial for programmers to adopt robust security practices to protect their code, data, and systems from malicious attacks. To assist programmers in this endeavor, we have compiled the ultimate cybersecurity…
Category : Security 02-06-2023 by Silvia Mazzetta
Advanced Android tutorial: discover all your phone's secrets
It is highly probable that you are not taking advantage of even half of the potential that your Android device has to offer. These small pocket computers, which we call smartphones, have increasingly advanced and powerful hardware that, together with the possibilities offered by an operating system as flexible as…
Category : Mobile 06-05-2021 by Janeth Kent
How to Send Email from an HTML Contact Form
In today’s article we will write about how to make a working form that upon hitting that submit button will be functional and send the email (to you as a web creator and to the user or customer as well). If you’re a PHP developer, there's a high probability that you…
Category : Programming 10-05-2021 by
Network attacks and how to avoid them
Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We bring you the most common ones according to the network attack databases, so that we can keep up to date…
Category : Security 03-05-2021 by Silvia Mazzetta
Use the SRCSET attribute to improve your SEO
There is a new standard HTML attribute that can be used in conjunction with IMG called SRCSET. It is new and important as it allows webmasters to display different images based on the size of the device, and without using javascript or other special code. This means we can serve…
Category : Web design 30-04-2021 by Silvia Mazzetta
How to set up your Android phone: learn how to get your new phone up and running
If you've just bought a great new Android phone, you'll want to start using it as soon as possible. You'll see that it's not hard to get the initial set-up and configuration to get it ready to use, and we'll guide you every step of the way. From connecting your Google account,…
Category : Mobile 28-04-2021 by Janeth Kent
5 Terrific iOS-Friendly Canva Alternatives to Upgrade Your Marketing Visuals
Sometimes you want to use your iPhone to create compelling, engaging marketing visuals, and as awesome as Canva is, many of us are interested in seeing what other options are out there. As all marketers know, consistent branding is a must for any company (or even individual) who wants to stand…
Category : Web marketing 05-05-2021 by Janeth Kent
6 Best Alternative Privacy Focused Browsers in 2021
In today's article we take a look at free private browsers which are relevant in 2021. We will compare their advantages and disadvantages, specs, etc. Let's get into it. What are alternative browsers? Alternative browsers are mostly trying to increase browser security, by various methods, such as browser hardening, sandboxing, encryption forcing, etc. When…
Category : Software 22-04-2021 by
SEO: How to choose the best Anchor Text
Anchor Text are the words used to insert a link within a piece of content. This text can be anything from "click here" to the name of a brand or even a series of keywords or phrases. When choosing the best anchor text, always put the user experience first. Since the launch…
Category : Seo & sem 15-03-2021 by Janeth Kent
Elon Musk To Found Starbase, A City In Texas To House His Companies And Projects
Elon Musk's initiatives hardly go unnoticed, either because of how curious, innovative and/or eccentric they can be. Recently, SpaceX's CEO confirmed that it is getting into a new business: building cities. An announcement of few words that generated a lot of buzz. Lately, Elon Musk has opted for terse messages on Twitter, playing…
Category : Technology 05-03-2021 by Janeth Kent
Cybersecurity and Data Privacy: Why It Is So Important
The internet has made it very easy for people all across the world to stay connected with one another. Access to information, services, and people is possible for pretty much anyone with an internet connection today. But while this has brought many positive changes to how people live and connect,…
Category : Security 26-02-2021 by Janeth Kent
Interesting and Helpful Google Search Features You’ll Want to Start Using
Google – THE search engine for many internet users. It has been with us since its launch back in 1998 and thanks to its simplicity of use and genius algorithms, it grew so popular, that most of us cannot imagine our day-to-day life without it. Many petty arguments between friends…
Category : Software 31-01-2021 by Iveta Karailievova
Graphic design and its impact on Web Development
In today's article we will explain the concept of graphic design, its fundamentals and what it brings into web development. Graphic design is applied to everything visual, believe or not, it can aid in selling a product or idea, it's applied company identity as logos, colors, typography of the company…
Category : Web design 05-04-2021 by
Deepfakes Detection – An Emerging Technological Challenge
It is highly probable that while browsing the Internet, everyone of us has at some point stumbled upon a deepfake video. Deepfakes usually depict well-known people doing really improbable things – like the queen of England dancing on her table or Ron Swanson from Parks and Recreations starring as every…
Category : Technology 27-01-2021 by Iveta Karailievova
Google Maps updates and now shows gas prices at gas stations
Any help, no matter how small, that can make our daily life easier is welcome; for example, Google Maps has allowed us to move from one corner to another is practically a piece of cake and, currently, it is the map application par excellence. And if we tell you that…
Category : Software 21-01-2021 by Luigi Nori
7 Astonishing New Uses of Machine Learning
Recently a strange video published on YouTube caused a controversy – it was a funny take on Queen Elizabeth’s traditional Christmas message created by Channel 4, a British public-service television broadcaster. They used AI to produce a fake video of the Queen making it look very realistic and if the message itself…
Category : Technology 31-12-2020 by Iveta Karailievova
Validating HTML forms using BULMA and vanilla JavaScript
Today we are going to write about contact forms and how to validate them using JavaScript. The contact form seems to be one of the top features of every basic home page. It is a great way to encourage your visitors to make contact with you, by adding a form which…
Category : Javascript 31-12-2020 by
The State of PHP 8: new features and changes
PHP 8.0 has been released last November 26: let's discover together the main innovations that the new version introduces in this language. PHP is one of the most popular programming languages in the world. Precisely its wide diffusion, has led many programmers to use it, especially for the development of server-side…
Category : Php 29-12-2020 by Janeth Kent
The best free tools for linkbuilding
Linkbuilding is one of the main factors in improving the SEO positioning of a page. Having a profile of inbound links from pages with great authority can mean the difference between appearing at the top of the search engine or not. However, practicing linkbuilding, both in text and images, is one…
Category : Seo & sem 23-12-2020 by Janeth Kent
How to get paid in Bitcoin: CoinBase, CoinGate
After explaining how bitcoins work and how to pay using this cryptocurrency, we will see how to get paid in bitcoin. Below you will find explained in detail how to do it. Many people find the concept of BitCoin virtual currency confusing. We could simply explain that BitCoin is a peer-to-peer financial…
Category : Technology 23-12-2020 by Silvia Mazzetta
Some Neat Ways to Improve Your Internet Browsing Experience?
Not everyone has the best time when they are surfing the net. There are multiple reasons why an internet browser struggles, but that does not mean the situation is out of your hands. Relying on the internet is inevitable these days. We use it for work, entertainment, and socializing with friends…
Category : News and events 21-12-2020 by Janeth Kent
How to pay in Bitcoin: Hype and Coinbase
Once the wallet is created, let's see how to pay in Bitcoin to buy various products and services. If you have opened a Bitcoin wallet with HYPE, you can send payments using this cryptocurrency very easily. All you need to do is go to the Menu section of the HYPE app, press…
Category : Technology 10-12-2020 by Silvia Mazzetta
Install MacOS on PC - the Ultimate Guide (Hackintosh)
There has always been a belief that the Apple MacOS Operating System could only be installed on computers sold directly by Apple. But on the Internet there is a large community dedicated to Hackintosh. And in this guide we are going to show you today all you need to know…
Category : Operating systems 10-12-2020 by
How to Use Bitcoin: mining, wallets, payments
You have certainly heard of Bitcoin, the virtual currency that periodically makes people talk about itself because of its innovative and particular nature. In this case, you have probably also wondered how it is possible to get and subsequently spend Bitcoins, and if it is something useful, as well as…
Category : Technology 10-12-2020 by Silvia Mazzetta
Website Traffic Getting Low? 4 Immediate Action to Take
If you have created a website, I am sure your end objective is to create a strong brand presence, boost engagement, and multiply revenue. An interesting statistic showed that there were 22.31 million internet users at the start of the year, in Australia. This means that there are ample opportunities to…
Category : Web marketing 04-12-2020 by Luigi Nori
Google everywhere: anatomy of a massive giant
The alarm clock is going off. A hand floats over the bedside table groping for the source of the sound: probably a cell phone and maybe one of the more than 2.5 billion Android devices in the world. Alphabet's operating system (Google's matrix) concentrates 74.6% of the market and together with…
Category : Technology 03-12-2020 by Silvia Mazzetta
5 Tips to Bring More Traffic to Your Blog
Publishing a blog on your business website is an effective marketing tool for several reasons. Blog posts are the ideal place to share information about your company, products, services, and showcase your expertise or comment on industry trends. Blog posts also give you a space to express more personality, a sense…
Category : Seo & sem 03-12-2020 by Janeth Kent
Brief History of Biometric Authentication
These days, biometric authentication seems to be part of every little gadget or device we use. You’ve no doubt used it when logging onto your laptop, your tablet, or your cell phone, alongside more ‘old school’ methods like a password or PIN. Governments often use biometric authentication for security access and…
Category : Security 30-11-2020 by Janeth Kent
A beginner’s guide to software vulnerabilities
What are software vulnerabilities The number of devices connected to the Internet is growing every day. And among those devices we find not only computers and smartphones, but also an ever-rising number of cameras, smoke detectors, motion sensors, smart door locks, and let’s not forget that even plant pots. Many households…
Category : Security 17-11-2020 by Iveta Karailievova
The best tricks and features to master your Android Smart TV
We bring you a collection of the best tricks to squeeze Android TV, the Google operating system designed for televisions. You can find it on smart televisions of some brands, but also on devices that you will connect to the TV. With all of them, you can use different types…
Category : Networking 05-11-2020 by Luigi Nori
How to Deal with Unnatural Inbound Links
A website that has a good rank on search engines, especially Google is a big task. Backlinks or Inbound links are one of the best ways to achieve this ranking. Sometimes in a haste to achieve this goal, websites indulge in underhanded behaviour like unnatural inbound links. These are considered…
Category : Seo & sem 25-10-2020 by Janeth Kent
Hashmap: hashing, collisions and first functions
Today we are going to study some concepts closely related to hashmaps. The concepts we are going to see are hashing and collisions. Hashing The idea of hashing with chaining is to create a sort of array of lists, into which the elements are somehow inserted. We need to map the keys to…
Category : C language 28-06-2020 by Alessio Mungelli
Introduction to REGEX - Regular Expression
Today we are going to write about Regular Expressions known as regex or shortened regexp, a very useful concept of using search patterns. Surely you were in a situation when you need to replace some word for another or character for some else. This and more you can handle with Regular…
Category : Programming 23-10-2020 by
The new features coming to the Google search engine in autumn 2020
Google has included important improvements in its search engine, applying Artificial Intelligence, to make it easier for users to find what they are looking for. It has also announced new features in Google Lens and other search tools. The main novelties are the following: Many of the announced improvements involve the…
Category : Seo & sem 18-10-2020 by Luigi Nori
HTTP Cookies: how they work and how to use them
Today we are going to write about the way to store data in a browser, why websites use cookies and how they work in detail. Continue reading to find out how to implement and manage them - if you're looking for code! Understanding HTTP COOKIES - What are they? Cookies and other types…
Category : Programming 27-11-2020 by
SEO in Google News: How to appear in Google News
Google News is a tool, from Google, that spreads current, reliable and truthful content from different websites or portals dedicated exclusively to news. The sites that appear in Google News have a great opportunity to increase traffic to your website and consequently the opportunity to increase your sales through it. If you…
Category : Seo & sem 26-06-2023 by Luigi Nori
Google Dorks: How to find interesting data and search like hacker
Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…
Category : Security 03-12-2021 by
How to block any website with a password from your browser
We are going to explain how to block any website with a password from your browser, and for this purpose we are going to use an extension called Block Site. This is an extension that has native versions to download in Chrome, Firefox, Microsoft Edge and Opera, although it can…
Category : News and events 30-09-2020 by Silvia Mazzetta
Jennifer in Paradise: story of the first photo ever edited in Photoshop
A photograph with more than 30 years of history has become an icon in popular culture, or at least it remains in the memory of those who have ever used Adobe Photoshop, the well-known tool for photo retouching. Behind software like Photoshop there are dozens of stories. One of them…
Category : News and events 25-09-2020 by Silvia Mazzetta
How to write our own Privacy Policy
In this article we will talk about Privacy Policy statements, how you can write one and implement it on your page. Why did it pop up? These days when we browse on any new page, or when we visit the site for the first time, most of the time we have to…
Category : Development 22-10-2020 by
How to securely access the Dark Web in 15 steps. Second part
Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from number 6. 6. Changes the security level in the Tor browser It is also possible to increase the security level of the…
Category : Security 19-09-2020 by Janeth Kent
How to securely access the Dark Web in 15 steps. First part
The dark web can be a pretty dangerous place if you don't take the right precautions. You can stay relatively safe with a good antivirus and a decent VPN. However, if you want to be completely anonymous and protect your device, you'll need a little more than that. Here there are…
Category : Security 15-06-2023 by Silvia Mazzetta
How to Browse the Internet Anonymously: 6 tips
Most of the actions you take online are not as private as you might imagine. Nowadays, countless people and groups try to follow our online behaviour as closely as possible. Our ISPs, our network administrators, our browsers, search engines, the applications we have installed, social networks, governments, hackers and even the…
Category : Security 16-09-2020 by Silvia Mazzetta
What is a Cryptophone and how it works
The so-called cryptophones, are anti-interception smartphones as they use encryption methods to protect all communication systems. Here are all the details and the truth about these "unassailable" phones. The recent Encrochat affair, recently investigated for illegal activities, has brought to light the so-called cryptophones. They are smartphones - legal in themselves -…
Category : Security 11-09-2020 by Silvia Mazzetta
How to comply with Google's quality guidelines in 2020
Google provides a set of guidelines on what your website's content should look like in order to appear in search results. There are several categories within the Google guidelines: Webmaster Guidelines. General guidelines. Content-specific guidelines. Quality guidelines. In this article we will focus on the Quality guidelines. Quality guidelines, describe techniques whose use is prohibited and which,…
Category : Seo & sem 09-09-2020 by Silvia Mazzetta
How are businesses using artificial intelligence?
The term Artificial Intelligence (AI), "the intelligence of the machines", unifies two words that, a priori, could not be associated, since the term intelligence is attributed to the faculty of the mind to learn, to understand, to reason, to take decisions and to form a determined idea of the reality. How…
Category : News and events 21-06-2023 by Silvia Mazzetta
What cybersecurity professionals have learned from the lockdown experience
The COVID-19 pandemic has radically changed the rules of the game for most companies and individuals in a very short time; it has also changed the international computing universe. Sudden changes in people's habits as well as in business operations have altered some of the elements that characterize cyber-risk. And…
Category : Security 26-08-2020 by Silvia Mazzetta
5 Remote Careers You Can Start Online in 2020
In 2020, life has moved indoors. School, shopping, entertainment, and work have all moved online to keep up with the fight against COVID-19. And with it came an enormous demand for remote careers. If you are looking to start a new career that you can excel in without leaving the…
Category : News and events 25-08-2020 by Silvia Mazzetta
Browse safely and privately from your mobile phone using a VPN
Every day our smartphones suffer attacks, viruses, malware and information theft. In this article you will be able to deduce if you need a VPN in your mobile phone to safely surf the Internet, to avoid possible attacks on public Wi-Fi networks and also to filter out advertising and malware…
Category : Security 25-08-2020 by Janeth Kent
Get ready for the future: What Does The Future Of SEO Look Like?
How will SEO change in 2030? There are various positions and assumptions that we can make about this so that you can think about the strategies to take when the future catches up with us. Anyone who works in SEO knows the great challenge of positioning a site on the web…
Category : Seo 19-08-2020 by Silvia Mazzetta
How to create the perfect hacker-proof password
We have not learned and we still use passwords that are extremely easy to hack and vulnerable to cyber attacks. If you don't want your credentials to end up in the hands of criminals or traded on the dark digital shelves of the Deep Web, we bring you a simple…
Category : Security 11-08-2020 by Silvia Mazzetta
What is the origin of the word SPAM?
It is 40 years since the first spam e-mail was sent. Surely most of the readers of this blog had not yet been born, as well as annoying mail with which we are bombarded in our emails, social networks, or mobiles already existed long before our existence. Have you ever wondered what the origin of the…
Category : Web marketing 03-08-2020 by Janeth Kent
Introduction to Network Theory
Modern network theory was introduced at the end of the nineties by the PhD student Reka Albert and then monopolized by her tutor L.A. Barabasi, who made an empire out of it. The idea was not new, network theory is based on graph theory and graph theory had been already introduced…
Category : Networking 03-08-2020 by
Why is Website Performance Important for Online Businesses?
Your web is the site where most individuals will connect with your business. Your digital marketing processes will most probably send customers to your website. It might be to get information concerning your products and services, obtain contact information, or make purchases. Website performance, also known as web optimization, is a…
Category : Web marketing 24-07-2020 by Janeth Kent
Popular DNS Attacks and how to prevent them
DNS services are essential for web browsing. However, it is one of the most vulnerable to attacks. This guide will detail the most dangerous DNS attacks and some actions that will protect the network infrastructure. One of the reasons why DNS services have some susceptibility to attack is the UDP transport…
Category : Security 20-07-2020 by Silvia Mazzetta
How to recover an Instagram hacked account
You can't access your Instagram account. The cybercriminal who probably hacked your profile changed your password. Now what? What to do now? First try to stay calm: unfortunately these things can happen, but there is a solution to everything, and today we will explain how to solve this specific problem. In this…
Category : Social networks 16-07-2020 by Janeth Kent
How Learning Accents Connects Us To The World At Large
Accents are something we often only see in terms of region or a way of speaking. We don’t connect the ways in which they reflect on the cultures they serve or the people who speak them. In reality, where one lives, dictates how they speak and the words they use more than just about…
Category : Web marketing 16-07-2020 by Janeth Kent
Smishing: risks, examples and how to avoid it
Do you know what smishing is, what risks it involves and how you can avoid it? The cyber-criminals are betting on the technique known as Smishing when it comes to defrauding users through text messages (SMS). The objective of Smishing is the same as that of other types of scams…
Category : Security 16-07-2020 by Silvia Mazzetta
A collection of interesting networks and technology aiming at re-decentralizing the Internet
The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…
Category : Networking 27-08-2020 by Janeth Kent
MySQL 8.0 is now fully supported in PHP 7.4
MySQL and PHP is a love story that started long time ago. However the love story with MySQL 8.0 was a bit slower to start… but don’t worry it rules now ! The support of MySQL 8.0’s new default authentication method in PHP took some time and was added in PHP…
Category : Databases 27-10-2020 by Janeth Kent
Neumorphism (aka neomorphism) : new trend in UI design
This area, which arises from a basic human need, such as the urge to communicate, is constantly changing thanks to the advances of the technological era. Today, we invite you to reflect on the origin of this discipline and its future challenges. Graphic language has always been present throughout our lives…
Category : Ui/ux design 17-06-2020 by Silvia Mazzetta
Is JavaScript good for machine learning?
One of the things you always hear when you are talking to someone related to the M.L. world is that, one must learn Python because the vast majority of the major libraries are in that technology. You're probably right, but I chose JavaScript as the metal of my sword and…
Category : Javascript 16-06-2020 by Silvia Mazzetta
Dark Web: how to access, risks and contents
You've probably heard of the Dark Web before, but do you really know what the Dark Web is, or what it consists of? Do you know its risks? Which users use the Dark Web? What content is published? Would you know how to access the Dark Web safely? If you are reading…
Category : Security 13-06-2020 by Silvia Mazzetta
SEO Mistakes that Need to Be Avoided
In today's digital age, search engine optimization (SEO) plays a critical role in determining the success of any online business. However, implementing SEO strategies can be complex, and mistakes are common. To ensure your website achieves optimal performance and ranks well on search engine result pages (SERPs), it is essential…
Category : Seo & sem 15-06-2023 by Janeth Kent
How to Take Your Small Ecommerce Business to the Next Level
Running an ecommerce business can be both exciting and financially rewarding. However, as you increase your customer base, it might seem difficult to successfully scale your operations. If your site is growing in popularity, or you want to attract more customers to your online venture, read the below top tips on…
Category : Web marketing 25-01-2022 by Janeth Kent
WhatsApp: How to View Deleted Messages
Words are carried away by the wind, as long as they are not written on WhatsApp. Sending it was like getting a tattoo, something you'll always like, or yet it'll be there for years to remind you of a mistake. Then came the option to delete sent messages, a white card…
Category : News and events 25-05-2020 by Janeth Kent
Onion Search Engine: How to browse the Deep Web without Tor
The general recommendation does not change: Anyone interested in entering the Deep Web will get a more complete and secure experience by downloading a copy of the Tor Browser, and modifying various browsing habits. However, the desire to "take a look" is always present, and for those cases there is…
Category : Security 25-05-2020 by Janeth Kent
Step by Step Guide to Successful Social Media Marketing
The most popular social media platforms boast of having hundreds of millions of active users every month. The number itself is more than enough to attract brands in trying to establish themselves as niche authorities on as many different social media websites as they can. If you are still relatively new…
Category : Web marketing 16-05-2023 by Silvia Mazzetta
Introduction to BEM (Block Element Modifier)
Problems with naming CSS classes I think I might not be the only one with this experience: after finally grasping all the important concepts regarding CSS I wanted to start giving what I thought would be beautiful yet simple style to my HTML code. But suddenly I ended up with class…
Category : Css 23-05-2020 by Iveta Karailievova
Seo: How Search Behavior Has Changed During COVID-19 Pandemic
Google positioning is experiencing a before and after with the coronavirus crisis. The way we search in Google has changed; The way Google the search engine gives us the results has changed ; The tools that webmasters have at their disposal have changed. Google claims that it has never registered as many searches for…
Category : Seo & sem 08-05-2020 by Silvia Mazzetta
First steps into JavaScript – a practical guide 3
After we learned the basic ofaccessing DOM elementsandhow to modify them,we are ready for the more exciting parts – handling DOM events. This allows us to make our web way more interactive, and finally we can put our JS knowledge into practice. User input such as keyboard actions or mouse clicks…
Category : Javascript 07-05-2020 by Iveta Karailievova