<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Akeem omosanya</title>
    <description>The latest articles on DEV Community by Akeem omosanya (@akeemomosanyaa).</description>
    <link>https://dev.to/akeemomosanyaa</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1147086%2Fe86fae14-98ec-42f5-a217-f754f4196151.png</url>
      <title>DEV Community: Akeem omosanya</title>
      <link>https://dev.to/akeemomosanyaa</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/akeemomosanyaa"/>
    <language>en</language>
    <item>
      <title>Understanding Cross - Origin Resource Sharing (CORS)</title>
      <dc:creator>Akeem omosanya</dc:creator>
      <pubDate>Sun, 25 Jan 2026 22:34:35 +0000</pubDate>
      <link>https://dev.to/akeemomosanyaa/understanding-cross-origin-resource-sharing-cors-2emj</link>
      <guid>https://dev.to/akeemomosanyaa/understanding-cross-origin-resource-sharing-cors-2emj</guid>
      <description>&lt;div class="crayons-card c-embed text-styles text-styles--secondary"&gt;
    &lt;div class="c-embed__content"&gt;
        &lt;div class="c-embed__cover"&gt;
          &lt;a href="https://dev.to/akeemomosanyaa/understanding-cross-origin-resource-sharing-cors-55mc" class="c-link align-middle" rel="noopener noreferrer"&gt;
            &lt;img alt="" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpw72xtuhxz52yc12127l.png" height="350" class="m-0" width="800"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="c-embed__body"&gt;
        &lt;h2 class="fs-xl lh-tight"&gt;
          &lt;a href="https://dev.to/akeemomosanyaa/understanding-cross-origin-resource-sharing-cors-55mc" rel="noopener noreferrer" class="c-link"&gt;
            Understanding Cross-Origin Resource Sharing (CORS) - DEV Community
          &lt;/a&gt;
        &lt;/h2&gt;
          &lt;p class="truncate-at-3"&gt;
            When building modern web applications, you’ll almost certainly run into CORS errors. They can be...
          &lt;/p&gt;
        &lt;div class="color-secondary fs-s flex items-center"&gt;
            &lt;img alt="favicon" class="c-embed__favicon m-0 mr-2 radius-0" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8j7kvp660rqzt99zui8e.png" width="300" height="299"&gt;
          dev.to
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;


</description>
      <category>programming</category>
      <category>javascript</category>
      <category>webdev</category>
      <category>git</category>
    </item>
    <item>
      <title>Understanding Cross-Origin Resource Sharing (CORS)</title>
      <dc:creator>Akeem omosanya</dc:creator>
      <pubDate>Sun, 25 Jan 2026 22:33:11 +0000</pubDate>
      <link>https://dev.to/akeemomosanyaa/understanding-cross-origin-resource-sharing-cors-55mc</link>
      <guid>https://dev.to/akeemomosanyaa/understanding-cross-origin-resource-sharing-cors-55mc</guid>
      <description>&lt;p&gt;When building modern web applications, you’ll almost certainly run into CORS errors. They can be confusing at first, especially when your frontend and backend live on different domains.&lt;/p&gt;

&lt;p&gt;In this post, I’ll explain what CORS is, why it exists, and how it works, with clear examples you can relate to.&lt;/p&gt;

&lt;h1&gt;
  
  
  What Is CORS?
&lt;/h1&gt;

&lt;p&gt;Cross-Origin Resource Sharing (CORS) is a security mechanism based on HTTP headers that allows a server to specify which origins (domain, scheme, or port) are permitted to access its resources from a browser.&lt;/p&gt;

&lt;p&gt;By default, browsers enforce the Same-Origin Policy, which prevents JavaScript running on one origin from accessing resources on another origin. CORS provides a controlled way to relax that restriction.&lt;/p&gt;

&lt;h2&gt;
  
  
  Example of a Cross-Origin Request
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;&lt;br&gt;
Frontend: https://domain-a.com&lt;br&gt;
Backend API: https://domain-b.com/data.json&lt;br&gt;
&lt;/code&gt;&lt;br&gt;
If JavaScript from domain-a.com tries to fetch data from domain-b.com, the browser will only allow it if the server responds with the correct CORS headers.&lt;/p&gt;
&lt;h2&gt;
  
  
  Why Browsers Enforce CORS
&lt;/h2&gt;

&lt;p&gt;CORS exists to protect users from malicious websites stealing sensitive data such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Cookies.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Authentication tokens.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Private user information.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;APIs like fetch() and XMLHttpRequest automatically follow CORS rules to reduce these risks.&lt;/p&gt;
&lt;h2&gt;
  
  
  What Requests Use CORS?
&lt;/h2&gt;

&lt;p&gt;CORS applies to many browser features, including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;fetch() and XMLHttpRequest&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Web fonts loaded via @font-face&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;WebGL textures&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Images or videos drawn to a canvas&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;CSS shapes that use external images&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;
  
  
  How CORS Works
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;The browser sends a request with an Origin header.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The server responds with CORS headers (or none).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The browser decides whether to allow JavaScript access to the response.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;For some requests, the browser sends a preflight request first to ask the server for permission.&lt;/p&gt;
&lt;h2&gt;
  
  
  Simple Requests (No Preflight)
&lt;/h2&gt;

&lt;p&gt;Some requests are considered simple and do not require a preflight.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conditions for a Simple Request&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Method is GET, HEAD, or POST&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Only safe headers are used (e.g. Accept, Content-Type)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Content-Type is one of:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;application/x-www-form-urlencoded&lt;/li&gt;
&lt;li&gt;multipart/form-data&lt;/li&gt;
&lt;li&gt;text/plain&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Example&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;fetch("https://bar.other/data.json")
  .then(res =&amp;gt; res.json())
  .then(data =&amp;gt; console.log(data));
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Request Sent by Browser&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Origin: https://foo.example
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Server Response&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Access-Control-Allow-Origin: *
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The browser allows the response to be read by JavaScript.&lt;/p&gt;

&lt;p&gt;If the server wants to restrict access:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Access-Control-Allow-Origin: https://foo.example
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Preflighted Requests (OPTIONS)
&lt;/h2&gt;

&lt;p&gt;Requests that can modify server data or use custom headers require a preflight.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Triggers a Preflight?&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;HTTP methods like PUT, DELETE, or PATCH&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Custom headers (e.g. Authorization, X-Custom-Header)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Non-simple Content-Type (e.g. application/json, text/xml)&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Example Request
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;fetch("https://bar.other/doc", {
  method: "POST",
  headers: {
    "Content-Type": "text/xml",
    "X-PINGOTHER": "pingpong",
  },
  body: "&amp;lt;person&amp;gt;&amp;lt;name&amp;gt;Arun&amp;lt;/name&amp;gt;&amp;lt;/person&amp;gt;",
});
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Preflight Request (Sent Automatically)&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;OPTIONS /doc
Origin: https://foo.example
Access-Control-Request-Method: POST
Access-Control-Request-Headers: content-type, x-pingother
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Server Response&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Access-Control-Allow-Origin: https://foo.example
Access-Control-Allow-Methods: POST, GET, OPTIONS
Access-Control-Allow-Headers: X-PINGOTHER, Content-Type
Access-Control-Max-Age: 86400
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If approved, the browser sends the actual request.&lt;/p&gt;

&lt;h2&gt;
  
  
  Credentialed Requests (Cookies &amp;amp; Auth)
&lt;/h2&gt;

&lt;p&gt;By default, browsers do not send cookies in cross-origin requests.&lt;/p&gt;

&lt;p&gt;To include credentials:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;fetch(url, {
  credentials: "include"
});
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Required Server Headers&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Access-Control-Allow-Origin: https://foo.example
Access-Control-Allow-Credentials: true
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Important rules:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Access-Control-Allow-Origin cannot be *&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Credentials + wildcard = blocked by browser&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Common CORS Headers
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Response Headers&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Access-Control-Allow-Origin : Who can access the resource&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Access-Control-Allow-Methods : Allowed HTTP methods&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Access-Control-Allow-Headers : Allowed custom headers&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Access-Control-Allow-Credentials : Allow cookies/auth&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Access-Control-Max-Age : Cache preflight result duration&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Access-Control-Expose-Headers : Headers visible to JS&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Request Headers (Browser-Set)&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Origin&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Access-Control-Request-Method&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Access-Control-Request-Headers&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>programming</category>
      <category>javascript</category>
      <category>webdev</category>
      <category>git</category>
    </item>
    <item>
      <title>Understanding JWT (JSON Web Tokens) for Secure Authentication and Authorization.</title>
      <dc:creator>Akeem omosanya</dc:creator>
      <pubDate>Wed, 09 Oct 2024 01:46:58 +0000</pubDate>
      <link>https://dev.to/akeemomosanyaa/understanding-jwt-json-web-tokens-for-secure-authentication-and-authorization-4a8k</link>
      <guid>https://dev.to/akeemomosanyaa/understanding-jwt-json-web-tokens-for-secure-authentication-and-authorization-4a8k</guid>
      <description>&lt;p&gt;JSON Web Token(JWT) is a self-contained way to securely transmit data and information between two parties using a JSON object. In this article, we'll dive into the structure of JWTs and how they work.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;WHAT IS JWT?&lt;/strong&gt;&lt;br&gt;
JWT(JSON Web Token) is a compact, URL-safe token that is used to securely transmit information between two parties.JWT can be signed and verified, ensuring that the information is authentic and hasn't been altered.&lt;/p&gt;

&lt;p&gt;However, JWT should be used mainly for authorization rather than authentication.In other words,JWT helps manage permissions for users who are already authenticated.Once a user logs in,the server generates a JWT containing information about the user,and the client uses this token in  requests.Each time the client sends a request,the server validates the JWT to authorize the user.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;JSON Web Token Structure&lt;/strong&gt;&lt;br&gt;
A JWT has a standard structure that consists of three parts,separated by dots(.).This structure can be broken down as: &lt;code&gt;&lt;br&gt;
      aaaaaaa.bbbbbbb.ccccccc&lt;/code&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Header(a)&lt;/li&gt;
&lt;li&gt;Payload(b)&lt;/li&gt;
&lt;li&gt;Signature(C)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Therefore, a Json web token being sent between the client and the server may look like the above illustration but instead of A's , B's and C's those will be unique characters for that specific client.&lt;/p&gt;
&lt;h2&gt;
  
  
  JWT Header
&lt;/h2&gt;

&lt;p&gt;The header is the first part of a JWT. It contains two key pieces of information:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The algorithm used for signing (e.g., HS256, RS256)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The type of token (JWT)&lt;br&gt;
A typical JWT header looks like this:&lt;br&gt;
&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;{
  "alg": "HS256",
  "typ": "JWT"
}

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;The header is then Base64Url encoded to create the first part of the JWT(a).&lt;/p&gt;
&lt;h2&gt;
  
  
  JWT PAYLOAD
&lt;/h2&gt;

&lt;p&gt;A JWT Payload consist of a data. The Payloads data contains claims,and there are three different types of claims.&lt;br&gt;
     1. Registered&lt;br&gt;
     2. Public&lt;br&gt;
     3. Private&lt;br&gt;
An example of a JWT payload could be:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;{
  "sub": "1234567890",
  "name": "Eric Charles",
  "given_name": "Eric",
  "family_name": "Charrles",
  "email": "Ericcharles@gmail.com",
  "admin": true
}

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The payload is also Base64Url encoded to create the second part of the JWT.&lt;/p&gt;

&lt;h2&gt;
  
  
  JWT Signature
&lt;/h2&gt;

&lt;p&gt;A JWT Signature is created by using the algorithm in the header to hash out the encoded header, encoded payload with a secret.&lt;br&gt;
The secret can be anything, but is saved somewhere on the server that the client does not have access to&lt;br&gt;
The signature is the third and final part of a JWT (c).&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;HMACSHA256(
  base64UrlEncode(header) + "." + base64UrlEncode(payload),
  secret
)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This results in the third part of the JWT.&lt;/p&gt;

&lt;h2&gt;
  
  
  How JWT Works in Practice
&lt;/h2&gt;

&lt;p&gt;Here’s how JWT-based authorization typically works:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;User Logs In: The user provides their credentials, which are verified by the server.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;JWT Issued: Upon successful authentication, the server generates a JWT and sends it back to the client. This token contains all the information needed to identify the user and their permissions.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Client Stores JWT: The client stores the JWT (usually in local storage or cookies).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Client Makes Requests: For future requests, the client sends the JWT in the Authorization header like this:&lt;br&gt;
&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Authorization: Bearer &amp;lt;JWT_TOKEN&amp;gt;

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;Server Verifies JWT: The server verifies the JWT using the secret key. If the token is valid and hasn't expired, the server processes the request; otherwise, it rejects it.&lt;/li&gt;
&lt;/ul&gt;

</description>
    </item>
    <item>
      <title>MASTERING MYSQL</title>
      <dc:creator>Akeem omosanya</dc:creator>
      <pubDate>Sat, 04 Nov 2023 21:15:58 +0000</pubDate>
      <link>https://dev.to/akeemomosanyaa/mastering-mysql-12bn</link>
      <guid>https://dev.to/akeemomosanyaa/mastering-mysql-12bn</guid>
      <description>&lt;h2&gt;
  
  
  &lt;strong&gt;WHAT IS MYSQL?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The SQL part of MySQL stands for Structured Query Language. MySQL is a relational database management system, Databases are the essential data storage for all software applications. For example, whenever someone conducts a web search, logs in to an account, or completes a transaction, a database system stores the information so it can be accessed in the future, a relational database stores data in separate tables rather than putting all the data in one table.  SQL is the most common standardized language used to access databases. &lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;KEY FEATURES OF MYSQL&lt;/strong&gt;
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Open Source&lt;br&gt;
MySQL is open source means it is available and possible for anyone to use and modify the software, This makes it an attractive choice for businesses and developers looking to manage their data without incurring substantial licensing costs.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;High Performance&lt;br&gt;
MySQL is known for its speed and efficiency. It can handle large datasets and complex queries with ease, making it a reliable choice for high-traffic websites and data-intensive applications.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Cross-Platform Compatibility&lt;br&gt;
MySQL is designed to be platform-independent, which means it can run on various operating systems, including Windows, Linux, macOS, and more. This cross-platform compatibility allows you to make use of your database in the environment that best suits your needs.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;MySQL uses Structured Query Language (SQL) for interacting with the database. Here are some essential SQL commands:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;SELECT: Retrieve data from one or more tables using the SELECT statement.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;INSERT: Add new records to a table.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;UPDATE: Modify existing records.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;DELETE: Remove records from a table.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;JOIN: Combine data from multiple tables based on a related column.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;MYSQL BENEFITS&lt;/strong&gt;
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Web Applications: MySQL is a popular choice for building web applications, including content management systems, e-commerce platforms, and social media sites.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Reliability: MySQL is one of the most mature and widely used databases. It has been tested in a wide variety of scenarios many times and was confirmed reliable.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Data Warehousing: It can be used as a data warehouse to store and analyze large volumes of data for business intelligence and reporting.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;CONCLUSION&lt;/strong&gt;&lt;br&gt;
MySQL's versatility and reliability have made it a great choice for developers and organizations. Whether you're building a small-scale web application or managing huge data warehouses, MySQL provides the tools and features necessary to meet your data storage and retrieval needs.&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>learning</category>
      <category>sql</category>
      <category>computerscience</category>
    </item>
    <item>
      <title>HOW DOES THE INTERNET WORK</title>
      <dc:creator>Akeem omosanya</dc:creator>
      <pubDate>Sat, 30 Sep 2023 09:21:25 +0000</pubDate>
      <link>https://dev.to/akeemomosanyaa/how-does-the-internet-work-4c7o</link>
      <guid>https://dev.to/akeemomosanyaa/how-does-the-internet-work-4c7o</guid>
      <description>&lt;p&gt;It is important to have a solid understanding of what the internet is and how it works. The Internet has become such a large part of our lives, that a good understanding is needed to use it effectively.&lt;br&gt;
Firstly, we need to know what a network is, A Network is a group of computers or other devices that are connected&lt;br&gt;
When all networks are connected they form the Internet. The Internet is a network of networks&lt;br&gt;
The Internet is a global network of computers connected to each other that communicate through standardized protocols.&lt;br&gt;
When data is sent over the internet, it is broken up into small packets(A small unit of data transmitted over the internet.) sent from your device to a router(A device that directs packets of data between different networks.).&lt;br&gt;
The router examines the packet and forwards it to the next router in the path towards its destination.&lt;br&gt;
This process continues until the packet reaches its final destination. To ensure that packets are sent and received correctly, the internet uses different protocols.&lt;br&gt;
A protocol is a set of rules and standards that define how information is exchanged between devices and systems, these protocols include the Internet Protocol (IP) and the Transmission Control Protocol (TCP).&lt;br&gt;
The Internet Protocol (IP) is responsible for routing packets to their correct destination, while the transmission control protocol (TCP) ensures that packets are transmitted reliably and in the correct order.&lt;br&gt;
IP addresses and domain names are both important concepts to understand when working with the internet.&lt;/p&gt;

&lt;p&gt;An IP address is a unique identifier assigned to each device on a network. It’s used to route data to the correct destination, ensuring that information is sent to the intended recipient. IP addresses are typically represented as a series of four numbers separated by periods, such as “194.167.1.1”.Domain names on the other hand, are human-readable names used to identify websites and other internet resources. They’re composed of two or more parts, separated by periods. For example, “google.com” is a domain name. Domain names are translated into IP addresses using the Domain Name System (DNS).&lt;br&gt;
HTTP is the protocol used to transfer data between a client (such as a web browser) and a server (such as a website). When you visit a website, your web browser sends an HTTP request to the server, asking for the webpage or other resource you’ve requested, the server then sends an HTTP response back to the client, containing the requested data.&lt;br&gt;
TCP/IP (Transmission Control Protocol/Internet Protocol) is the underlying communication protocol used by most Internet-based applications and services. It provides a reliable, ordered, and error-checked delivery of data between applications running on different devices.&lt;/p&gt;

&lt;p&gt;HTTPS is a more secure version of HTTP, which encrypts the data being transmitted between the client and server using SSL/TLS (Secure Sockets Layer/Transport Layer Security) encryption. This provides an additional layer of security, helping to protect sensitive information. &lt;/p&gt;

</description>
      <category>programming</category>
      <category>codenewbie</category>
      <category>learning</category>
      <category>webdev</category>
    </item>
    <item>
      <title>PYTHON DICTIONARIES</title>
      <dc:creator>Akeem omosanya</dc:creator>
      <pubDate>Thu, 14 Sep 2023 15:47:11 +0000</pubDate>
      <link>https://dev.to/akeemomosanyaa/python-dictionaries-273a</link>
      <guid>https://dev.to/akeemomosanyaa/python-dictionaries-273a</guid>
      <description>&lt;p&gt;PYTHON DICTIONARIES &lt;br&gt;
          The dictionaries are like a little in-memory database, Dictionaries are Python’s most powerful data collection. It lets us do fast database-like operations on Python. Dictionaries have different names for different languages &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;PHP - Associative arrays&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Java - property or  hash map&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Property bag - C#&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So the idea of the dictionary is putting more than one thing in it and has ways of indexing it. We index the thing we put in the dictionary with a look-up tag. Dictionaries are enclosed in curly braces &lt;code&gt;{}&lt;/code&gt; and consist of one or more key-value pairs separated by colons. For example&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;my_dict&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;name&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;John&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;age&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="mi"&gt;30&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;City&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;New York&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;In this dictionary, name, age, and city are keys while John, 30, and New York are their values respectively.&lt;br&gt;
You can also make an empty dictionary using empty curly braces&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;my_dict&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="p"&gt;{}&lt;/span&gt;
&lt;span class="nf"&gt;print &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;my_dict&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="p"&gt;{}&lt;/span&gt;

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You can change  the values, for example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;my_dict&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;age&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;31&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;One use of dictionaries is counting how often we see something. You can use dictionaries to count the frequency of elements in a list or string. For example&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;counts&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;dict&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
&lt;span class="nf"&gt;print &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="err"&gt;‘&lt;/span&gt;&lt;span class="n"&gt;Enter&lt;/span&gt; &lt;span class="n"&gt;a&lt;/span&gt; &lt;span class="n"&gt;line&lt;/span&gt; &lt;span class="n"&gt;of&lt;/span&gt; &lt;span class="n"&gt;text&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="err"&gt;‘&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="n"&gt;line&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;input &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="err"&gt;‘&lt;/span&gt; &lt;span class="err"&gt;’&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="n"&gt;words&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;line&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;split&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
&lt;span class="nf"&gt;print &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="err"&gt;‘&lt;/span&gt;&lt;span class="n"&gt;words&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="err"&gt;’&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;words&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="n"&gt;For&lt;/span&gt; &lt;span class="n"&gt;word&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="n"&gt;words&lt;/span&gt; &lt;span class="p"&gt;:&lt;/span&gt;
&lt;span class="n"&gt;count&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="n"&gt;word&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;counts&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;word&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;1&lt;/span&gt;
&lt;span class="nf"&gt;print &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="err"&gt;‘&lt;/span&gt;&lt;span class="n"&gt;count&lt;/span&gt;&lt;span class="err"&gt;’&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;counts&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Also when working with API, dictionaries are often used to display JSON responses.&lt;br&gt;
A list is a collection that is in an organized order while a dictionary is a lot of values each with its own label.  &lt;/p&gt;

</description>
      <category>python</category>
      <category>github</category>
      <category>opensource</category>
      <category>codenewbie</category>
    </item>
    <item>
      <title>WHY DO WE PROGRAM</title>
      <dc:creator>Akeem omosanya</dc:creator>
      <pubDate>Thu, 31 Aug 2023 20:16:28 +0000</pubDate>
      <link>https://dev.to/akeemomosanyaa/why-do-we-program-57pa</link>
      <guid>https://dev.to/akeemomosanyaa/why-do-we-program-57pa</guid>
      <description>&lt;p&gt;WHY DO WE PROGRAM?&lt;br&gt;
          In the world we are today, programming has become an integral part of our lives. If you are reading this, it’s as a result of countless lines of code. Have you ever wondered why we program? What makes humans dedicate their time to crafting codes to make machines do specific tasks? Computers have languages which we as programmers use to communicate with them, they are programming languages. The first computer programming language was created in 1883 when a woman named Ada Lovelace worked with Charles Babbage on his very early mechanical computer, the Analytical Engine. While Babbage was concerned with simply computing numbers, Lovelace saw that the numbers the computer worked with could represent something other than just amounts of things. She wrote an algorithm for the Analytical Engine that was the first of its kind. Because of her contribution, Lovelace is credited with creating the first computer programming language. As different needs have arisen and new devices have been created, many more languages have followed like Assembly language, FORTRAN, COBOL, BASIC, HTML, C++,  JavaScript, Python, and so on. Computer programming languages allow us to tell machines what to do. Machines and humans think very differently, so programming languages are necessary to bridge that gap.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Problem solving&lt;br&gt;
Programming is a tool for solving various problems. Programming helps users solve their problems in different ways, optimizing supply chains, stimulating climate change scenarios, and enabling communication over a wide range of distance.&lt;br&gt;
Programming is a means by which we convert our ideas into solutions to problems.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Global Connectivity&lt;br&gt;
           In this world, programming links the geographical gaps. It enables global communications through social networks, and e-commerce websites, and allows people to communicate with each other to share ideas and carry out other activities globally.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Personal Fulfillment&lt;br&gt;
           For many programmers, the act of writing codes is very satisfying, and creating projects which could go worldwide and bring about jobs and can be immensely gratifying. It makes programmers motivated.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Impact on Society&lt;br&gt;
           Programming has a very great impact on the society. It enables the society to interact with various technology which makes life easy for users and ease stress.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Career Opportunities&lt;br&gt;
           Programming is a career opportunity for many, there is a growing demand for tech talents to develop new and more technologies. It is a stable and well paid profession.  Many people are drawn into programming due to it’s financial benefits and career advancement.&lt;br&gt;
         In conclusion, programming is driven by a lot of motivation. As a programme, you move from a user perspective to a programmer's perspective which means thinking widely into the creation of new technologies for advancement. &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>programming</category>
      <category>career</category>
      <category>softwaredevelopment</category>
      <category>beginners</category>
    </item>
  </channel>
</rss>
