ARTICLES

All Articles

A collection of my thoughts, tutorials, and insights on web development.28 articles published.

01
React.jsLinkedin

DESTRUCTURING ARRAYS AND OBJECTS

Working with React framework can be very exciting and challenging at the same time. The complexities of the approach and the methods used make it difficult to grasp. It's even more difficult for one with just a basic javascript idea

Jul 29, 2022
8 min read
READ ARTICLE
02
React.jsLinkedin

REACT COMPONENTS LIFE CYCLE I

Each component in React undergoes a lifecycle period starting from the period of initialization(mounting), changes(updating and error handling), and termination(unmounting). These lifecycles can be manipulated according to the demands of the project. Therefore, there is no strict adherence or implementation of a particular integration of these lifecycle methods

Aug 2, 2022
6 min read
READ ARTICLE
03
React.jsLinkedin

REACT COMPONENTS LIFE CYCLE II

Earlier, we focused on understanding how React component lifecycles work in a general view and we had only concentrated on one of the lifecycles which is the Mounting method, and the various phases therein. We shall explore yet another of these lifecycle methods, which is the Updating method and its different phases

Aug 3, 2022
5 min read
READ ARTICLE
04
CareerLinkedin

THE THIN LINE BETWEEN GOD-COMPLEX VERSUS IMPOSTER SYNDROME

Imposter syndrome and god-complex are two sides of a coin, they are two extremes, they are equal and opposites and they don't affect us solely, but also our relationships at all levels

Jul 23, 2022
7 min read
READ ARTICLE
05
NetworkingMedium

WIRELESS NETWORKING PART I

In place of a physical set of wires running between network nodes, wireless networks use either radio waves or beams of infrared light to communicate with each other

Jul 31, 2023
10 min read
READ ARTICLE
06
NetworkingMedium

WIRELESS NETWORKING PART II

Most wireless networks use radio frequency (RF) technologies, particularly the 802.11 (Wi-Fi) standards. Other standards, such as infrared, Bluetooth, and cellular, are much smaller in today’s market. Radiofrequency is the part of the electromagnetic spectrum used for radio communication.

Aug 1, 2023
9 min read
READ ARTICLE
07
InternetMedium

THE INTERNET PART I

The internet is millions and millions of computers all joined together to form the largest network on earth. To keep everything running smoothly, the internet is broken down into groups called tiers.

Aug 2, 2023
8 min read
READ ARTICLE
08
InternetMedium

THE INTERNET PART II

Connecting a single computer to the internet is easy, if you’re using wireless, connect to the wireless box using the provided information, if you are using wired, run a cable from whatever type of box provided to the computer

Aug 3, 2023
6 min read
READ ARTICLE
09
VirtualizationMedium

VIRTUALIZATION PART I

This is a process where a single host computer running specialized software can create environments (saved in separate files) that replicate other computers. These environments are called Virtual Machines (VMs) or guests.

Aug 4, 2023
5 min read
READ ARTICLE
10
VirtualizationMedium

VIRTUALIZATION PART II

Once the new guest virtual machine is created, the installation of a guest operating system follows. You need to install an operating system on that virtual machine.

Aug 7, 2023
7 min read
READ ARTICLE
11
Mobile DevicesMedium

MOBILE DEVICES PART I

Most modern mobile devices fall into one of a few categories including smartphones tablets and wearable technology which all have similar features and capabilities.

Aug 8, 2023
10 min read
READ ARTICLE
12
Mobile DevicesMedium

MOBILE DEVICES PART II

Most mobile devices as we saw earlier, run either Apple iOS or Google Android. We shall discuss their development and implementation models as well as some of their major features, and how their app stores work.

Aug 9, 2023
9 min read
READ ARTICLE
13
Mobile DevicesMedium

TROUBLESHOOTING MOBILE DEVICE ISSUES PART I

Modern mobile operating systems (OSs) have tons of configurable settings as do many of the apps installed on them. Be attentive to problems that point to configuration issues.

Aug 10, 2023
8 min read
READ ARTICLE
14
Mobile DevicesMedium

TROUBLESHOOTING MOBILE DEVICE ISSUES PART II

Device makers originally designed mobile devices to be flexible by nature because they are more useful that way. But network attacks can exploit such openness.

Aug 11, 2023
6 min read
READ ARTICLE
15
SecurityMedium

SECURING COMPUTERS PART I

Securing computers requires both strategy and proper tactics. Strategic reasons mean understanding the threat from unauthorized access to local machines as well as threats posed

Aug 14, 2023
5 min read
READ ARTICLE
16
SecurityMedium

SECURING COMPUTERS PART II

There are four concepts and technology areas to cover: Access control, Data classification and compliance, Licensing, and Incident Response.

Aug 15, 2023
7 min read
READ ARTICLE
17
SecurityMedium

SECURING COMPUTERS PART III

These are devices or software that protect an internal network from unauthorized access to and from the internet at large. They use a number of methods to protect networks like hiding IP addresses and blocking TCP/IP ports.

Aug 16, 2023
4 min read
READ ARTICLE
18
OperationsMedium

OPERATIONAL PROCEDURES

This encompasses a lot for any organization, ranging from best practices for safety to dealing with environmental factors, from company policies for handling prohibited contents or activities to proper communication techniques and professionalism.

Aug 17, 2023
9 min read
READ ARTICLE
19
NetworkingMedium

PURPOSE OF COMPUTER NETWORKS

The reason for linking computers in a network is as important as the reason why people network. People networks are necessary to accomplish tasks that might be so burdensome to be completed by a single individual. This also applies to computers.

Aug 18, 2023
5 min read
READ ARTICLE
20
NetworkingMedium

OSI REFERENCE MODEL

The International Organization for Standardization (ISO) defined the Open Systems Interconnection (OSI) reference model to standardize the networking of devices from different vendors.

Aug 21, 2023
4 min read
READ ARTICLE
21
NetworkingMedium

TCP/IP PROTOCOL SUITE

TCP/IP is the most widely used protocol suite for computer networks. It is the foundation of the internet and is used for communication between devices on a network. TCP/IP stands for Transmission Control Protocol/Internet Protocol.

Aug 22, 2023
8 min read
READ ARTICLE
22
NetworkingMedium

DATA ENCAPSULATION

Network models, TCP/IP inclusive, use encapsulation and very clearly defined interfaces to achieve independence of layer functionalities. The independence of layer functionality is crucial as it

Aug 23, 2023
2 min read
READ ARTICLE
23
NetworkingMedium

BINARY, HEXADECIMAL, AND DECIMAL NUMBERING SYSTEMS

Several networking features and protocols rely on binary and hexadecimal numbers to code bit maps, subnet masks, and network addresses. So understanding numbering systems is vital because they affect many networking features and protocols.

Aug 24, 2023
2 min read
READ ARTICLE
24
NetworkingMedium

LOCAL AREA NETWORKS (LANs)

LANs interconnect host devices over short distances. They can support high speed and a fairly large bandwidth. LAN traffic can be controlled with bridges and switches. Hubs also interconnect hosts in LAN. Switches are preferable over hubs in LANs as switches limit collision domains.

Aug 25, 2023
8 min read
READ ARTICLE
25
SecurityMedium

SAFEGUARDING YOUR ONLINE IDENTITY: WORTH IT?

In the digital age, safeguarding your online identity is crucial. With the increasing amount of personal information shared online, it's essential to take steps to protect yourself from identity theft, cyberbullying, and other online threats. But is it worth it? Let's explore the importance of safeguarding your online identity and the benefits it can bring.

Aug 27, 2023
4 min read
READ ARTICLE
26
SecurityMedium

SECURE YOUR WHATSAPP, FACEBOOK AND INSTAGRAM ACCOUNTS WITH MFA

Multi-factor authentication (MFA) is a security measure that requires users to provide multiple forms of verification before gaining access to their accounts. This can include something they know (like a password), something they have (like a phone), or something they are (like a fingerprint). Enabling MFA on your WhatsApp, Facebook, and Instagram accounts can significantly enhance the security of your online presence and protect you from unauthorized access.

Aug 27, 2023
2 min read
READ ARTICLE
27
NetworkingMedium

WIDE-AREA NETWORKS (WANs)

Wide-area networks span long distances and interconnect MANs, CANs, and LANs. Telecommunication companies build and maintain WANs. Telecom companies lease bandwidth, or dedicated connections to other companies that need to interconnect their LANs over long distances. Telecom companies that provide shared bandwidth or dedicated connections over their WANs are called Service Providers.

Aug 28, 2023
4 min read
READ ARTICLE
28
NetworkingMedium

WIRELESS NETWORKS

Wireless networks are short or medium-range networks that connect host devices using airwaves (radio) instead of cables. Wireless connections exist in a large variety of applications both for LAN and WAN.

Aug 29, 2023
5 min read
READ ARTICLE
28 / 28 ARTICLES