jQuery is a huge subject: it’s the topic of many books, but almost everyone agrees that the best documentation is on the jQuery site, at http://jquery.com/.
Go directly to http://docs.jquery.com/ for documentation (though don’t skip that front page above).
Go directly to http://docs.jquery.com/Tutorials for tutorials, though there are many more online.
Wrap your head around jQuery: http://docs.jquery.com/How_jQuery_Works
Nathan Segal provides some good instruction in his article, “jQuery Mobile in Adobe Dreamweaver CS6” at http://www.htmlgoodies.com/html5/mobile/jquery-mobile-in-adobe-dreamweaver-cs6.html.
Enhanced jQuery Mobile Support in Dreamweaver CS6
Using JQuery Mobile Swatches in Dreamweaver CS6 to Easily Skin Mobile Applications
The jQueryUI for non-mobile applications:
Okay, so an Electromagnetic Pulse (EMP) weapon, or more accurately a High-Powered Microwave (HPM) weapon works. It takes out electronics, permanently, without killing (most) people. The US, and probably other nations, are working on these weapons, and in the case of the US, successfully testing them in missile trials.
“This technology marks a new era in modern-day warfare. … In the near future, this technology may be used to render an enemy’s electronic and data systems useless even before the first troops or aircraft arrive.”
Recently the Air Force, Boeing and Raytheon proved that they can make an HPM weapon, mount it to a missile, deliver it to a target and take that target out – so effectively, in fact, that the pulse also killed the cameras set up to observe the results.
This sounds like a nice, humanitarian weapon. (If you’re on a medical device, though, bye bye.) Defensive equipment goes down; invading boots hit the ground; things turn to Syria really fast.
So how many of your records are digitized? Do you have paper backups or originals for things like your mortgage and car title? What about those pictures and movies? And ultimately, does this mean it’s time to look for EMP-proof safes for electronic backups?
(And oh yes thanks once again to one of my best contributors, Herbbie.)
It’s a nasty little feature called ID For Advertisers: IDFA or IFA. You’ll notice it’s not “ID For You,” or even “ID looking out for your interests.” Quite the reverse:
In iOS 6, however, tracking is most definitely back on, and it’s more effective than ever, multiple mobile advertising executives familiar with IFA tell us. (Note that Apple doesn’t mention IFA in its iOS 6 launch page).
So you say you want to disable that feature? Be sure and read the article: You have to choose “On” rather than “Off” to get the correct setting, for instance.
Yeah, don’t be evil. Oh yeah. That was that other company.
Do you know what trolling is? It’s the most degrading, demeaning sort of bullying, and lives on Reddit groups named “mysogyny,” “chokeabitch” and “niggerjailbait” – all run by Michael Brutsch, hiding behind the screen name ViolentAcrez:
Department of Saw This Coming: TidyRead.com reports:
In June, many Google users were surprised to see an unusual greeting at the top of their Gmail inbox, Google home page or Chrome browser. “Warning: We believe state-sponsored attackers may be attempting to compromise your account or computer.”
Ohkaaaaay. Just to be clear, we are all participants in the rising cyber war. If you’re using Google Anything, you are a more attractive target. But don’t take it from me.
So, you have a smart phone? It does GSM or CDMA or LTE “cellular” wireless, but it probably does 802.11 wi-fi too, right?
You would not believe how eager your device is to spill its guts to anyone. As always, don’t take it from me. Here’s the NakedSecurity article:
Department of Don’t Take It From Me:
The ever-entertaining NakedSecuity.Sophos.com fulfilled its daily promise by making my neck prickle. So: Telvent, prominent maker of the SCADA industrial systems control software, got penetrated, got slurped for important product information and got pwned with malware left behind.
So good. Now we can’t trust executables from Telvent until all Chinese malware is certifiably gone, and how are they going to prove that?
The criminals were identified by their fingerprints, typical comments in code that’s led to the group being called the Comment Group. And they’re part of the biggest transfer of intellectual property in human history, in which Chinese of various affiliations including political, military and criminal have hacked their way into, face it, ALL American companies.
What the general public hears about — stolen credit card numbers, somebody hacked LinkedIn (LNKD) — that’s the tip of the iceberg, the unclassified stuff. … I’ve been circling the iceberg in a submarine. This is the biggest vacuuming up of U.S. proprietary data that we’ve ever seen. It’s a machine.
Evidence indicates that at least 20 organizations have been harvested for data, many of whose secrets could give China a leg up on its path to becoming the world’s largest economy.
By all means proceed for further depressing details:
|Course/Class Number: 58111/46065
|Class Title: 58111 (X)HTML: Beginning
<!– Hide this script from js-challenged browsers —
var name = “glenn”;
var domain = “gnorman.org”;
var first = “email Glenn”;
var last = “Norman”;
document.write(‘<a href=\”mailto:’ + name + ‘@’ + domain + ‘\”>’);
document.write(first + ‘ ‘ + last + ‘</a>’);
// Done Hiding –>