Svg as foreboding
Generally speaking, the hype around Scalable Vector Graphics (SVG) began almost immediately after the W3C assembled the SVG Working Group, led by Chris Lilley, and announced the standard. This happened…

Continue reading →

Hosting and its types
Currently, every self-respecting company or private entrepreneur consider it a duty to have a personal website. In order to start a site you need to register a domain name yourself,…

Continue reading →

The whole truth about the & nb p; Network
In no country in the world is a well-known software maker reconciled with the emergence of domains, including its name or trademarks belonging to it. This was the case with…

Continue reading →

as well as links

Setting up equipment for Stream

The article by Peter Didenko “Connecting and saving”, published on the pages of our publication, told about how to save money when connecting to the Stream channel. In today’s article we will talk about what types of equipment are used for various connection options to Stream, and also consider in detail exactly how this equipment should be configured. Continue reading

Svg as foreboding

Generally speaking, the hype around Scalable Vector Graphics (SVG) began almost immediately after the W3C assembled the SVG Working Group, led by Chris Lilley, and announced the standard. This happened back in 1998. By the way, this event did not happen spontaneously: it was preceded by two more announcements.

The first is the Vector Markup Language (VML) format, which was introduced in the same 1998 to the W3C by a number of companies, among which Microsoft was listed along with Macromedia. Continue reading

Adobe for web developers

Adobe has no need for a special presentation – it is very well known among almost all users who have ever dealt with graphics processing. Of course, we are talking about the program Adobe Photoshop, which is used both for the preparation of professional images for printing, and for working with images for web pages. Continue reading

Hacking sites and CC
It's no secret that there are quite a few hackers on the modern Internet. Some of them are really high-class specialists, well versed in many technologies. Others, on the contrary,…

...

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

...

We build a browser-independent site
The last point requires further explanation. Why is displaying information in a text browser so important? I will answer in monosyllables - if your website is an educational institution or…

...

Web Services & nb p; 2.0: Flickr
Every day, Web 2.0 services are becoming more and more. There are even those who have achieved amazing results, and their value is expressed in millions of dollars. The leader…

...