Mobile Applications: Using jQuery Mobile

jQuery is a huge subject: it’s the topic of many books, but almost everyone agrees that the best documentation is on the jQuery site, at

Go directly to for documentation (though don’t skip that front page above).

Go directly to for tutorials, though there are many more online.

Wrap your head around jQuery:


Nathan Segal provides some good instruction in his article, “jQuery Mobile in Adobe Dreamweaver CS6” at


Enhanced jQuery Mobile Support in Dreamweaver CS6


Using JQuery Mobile Swatches in Dreamweaver CS6 to Easily Skin Mobile Applications


The jQueryUI for non-mobile applications:

Mobile Applications: Syllabus

Mobile Application Development Using Dreamweaver CS6 and PhoneGap

Day 1

Setting up the development environment

Using PhoneGap


Day 2

Setting up and understanding the Phonegap-start sample app: the document.ready event

Setting up and understanding the Meridian sample app: geolocation


Day 3

Setting up and understanding the Employee Directory sample app: the local data store

Targeting platforms and sideloading your app


Day 4

Custom application project


As time allows

Using GitHub

PhoneGap in Xcode and PhoneGap in Eclipse

Using jQuery Mobile

Why you just might want to keep a paper backup: EMP drones that destroy electronics

Okay, so an Electromagnetic Pulse (EMP) weapon, or more accurately a High-Powered Microwave (HPM) weapon works. It takes out electronics, permanently, without killing (most) people. The US, and probably other nations, are working on these weapons, and in the case of the US, successfully testing them in missile trials.

“This technology marks a new era in modern-day warfare. … In the near future, this technology may be used to render an enemy’s electronic and data systems useless even before the first troops or aircraft arrive.”

Recently the Air Force, Boeing and Raytheon proved that they can make an HPM weapon, mount it to a missile, deliver it to a target and take that target out – so effectively, in fact, that the pulse also killed the cameras set up to observe the results.

This sounds like a nice, humanitarian weapon. (If you’re on a medical device, though, bye bye.) Defensive equipment goes down; invading boots hit the ground; things turn to Syria really fast.

So how many of your records are digitized? Do you have paper backups or originals for things like your mortgage and car title? What about those pictures and movies? And ultimately, does this mean it’s time to look for EMP-proof safes for electronic backups?

(And oh yes thanks once again to one of my best contributors, Herbbie.)

Got a new iPhone? You’re being tracked again.

It’s a nasty little feature called ID For Advertisers: IDFA or IFA. You’ll notice it’s not “ID For You,” or even “ID looking out for your interests.” Quite the reverse:

In iOS 6, however, tracking is most definitely back on, and it’s more effective than ever, multiple mobile advertising executives familiar with IFA tell us. (Note that Apple doesn’t mention IFA in its iOS 6 launch page).

So you say you want to disable that feature? Be sure and read the article: You have to choose “On” rather than “Off” to get the correct setting, for instance.

Yeah, don’t be evil. Oh yeah. That was that other company.

Mobile Applications: Setting Up the Development Environment

 To Do:

Get Dreamweaver  CS 6

Get a Phonegap Build account:

Get a GitHub account:

or an Adobe ID:

For Android get the Android SDK:

And install it:

(For iOS pay $99, get a developer account, and get xCode:


“You Could Be at Risk of State Sponsored Attacks” – Google

Department of Saw This Coming: reports:

In June, many Google users were surprised to see an unusual greeting at the top of their Gmail inbox, Google home page or Chrome browser. “Warning: We believe state-sponsored attackers may be attempting to compromise your account or computer.”

Ohkaaaaay. Just to be clear, we are all participants in the rising cyber war. If you’re using Google Anything, you are a more attractive target. But don’t take it from me.



Gee: “Chinese hackers linked to breach of control systems used in electric grids”

Department of Don’t Take It From Me:

The ever-entertaining fulfilled its daily promise by making my neck prickle. So: Telvent, prominent maker of the SCADA industrial systems control software, got penetrated, got slurped for important product information and got pwned with malware left behind.

So good. Now we can’t trust executables from Telvent until all Chinese malware is certifiably gone, and how are they going to prove that?

The criminals were identified by their fingerprints, typical comments in code that’s led to the group being called the Comment Group. And they’re part of the biggest transfer of intellectual property in human history, in which Chinese of various affiliations including political, military and criminal have hacked their way into, face it, ALL American companies.

What the general public hears about — stolen credit card numbers, somebody hacked LinkedIn (LNKD) — that’s the tip of the iceberg, the unclassified stuff. … I’ve been circling the iceberg in a submarine. This is the biggest vacuuming up of U.S. proprietary data that we’ve ever seen. It’s a machine.

Evidence indicates that at least 20 organizations have been harvested for data, many of whose secrets could give China a leg up on its path to becoming the world’s largest economy.

By all means proceed for further depressing details:

Beginning (X)HTML: Bonus Javascript

Course/Class Number: 58111/46065
Class Title: 58111 (X)HTML: Beginning



<script language=”JavaScript” class=”normal”>
<!– Hide this script from js-challenged browsers —

var name = “glenn”;
var domain = “”;
var first = “email Glenn”;
var last = “Norman”;

document.write(‘<a href=\”mailto:’ + name + ‘@’ + domain + ‘\”>’);
document.write(first + ‘ ‘ + last + ‘</a>’);

// Done Hiding –>