View allAll Photos Tagged Javascript,
Om nom nom... My site is complete! Tell me what you think.
***iOS users sorry that the site looks like shit on your puny browsers, love Apple***
www.patthepcwizard.com/?page=home
Coded by yours truly.
Generated and rendered in Structure Synth using javascript Math functions to generate the more flowing features.
This is a neat little program, "the son of defdb and pngthermal," posted on encode.ru, a forum about compression algorithms. The program is available for Mac, Windows and Linux. The author explains the colours here. For example, red is "expansion" (>= 8 bits), with "midnight blue" being "strictly less than a bit."
Interestingly, the author makes the argument that if you really want to shave bytes, write your HTML5 <!DOCTYPE> in lower-case; it compresses better that way. (2 bytes, he says.)
The program can export varying widths and sizes, and also has a color-blind mode.
This is a cropped screenshot of the soundmanager2.js file, which actually compresses very well overall (there is much more blue further down the image.) To make these sorts of images, gzip whatever.js and then run gzthermal on the resulting .js.gz output.
I also need to thank a co-worker, probably Bert Saw, for sharing this. I've had that forum post open in a tab for a few days now, and have completely forgotten where I found it.
A little more customizable, colours and size can be changed. (I couldn't be arsed to make scaled-up versions of the play/pause buttons, but those should be larger as well.)
Also, this UI can be used to scrub through video - though I'm not sure it's appropriate given the simple, standard behaviour of scrubbing linearly across the width of the video, but the idea here is to experiment.
This was inspired by Apple's UI for the preview feature in the iTunes app on the iPhone, and other circular things. This is a demo which will be included as part of a pending SoundManager 2 release.
As a kid, I used to print program source code and would make edits while on family road trips during summer vacation. When I got back home, I'd type in the edits.
In taking a road trip I hadn't done in perhaps 15 years, it felt appropriate to revisit some old habits - this time, with about 45 pages of JavaScript.
Despite software's "virtual" nature, I think it's good to occasionally print and work on a physical copy of your ideas. Even if you don't work all of your notes back into the code, you still benefit from the mental exercise of thinking through and editing your work.
playing more with javascript and canvas. this is a brush to be controlled by mouse, though i could apply my epicycle engine to it as well.
This is an app that I built using Flickr's API. It shows a slideshow in your browser of anyone's photostream, or a search for photos with particular tags. Or just interesting photos! It's less polished than Flickr's own one, but at the time I wrote it, Flickr's own slideshow was sorely lacking (no fullscreen).
This is the original photo.
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
A new era in Structure Synth (at least for me) - generating all the rules via javascript!!!!
I knew you could use javascript but I never went further than to use it for some animations - bad mistake!!
Turns out you can write complete rule sets using javascript and you have access to math functions and variables this way.
I have written a short tutorial over at DA which should be accessible by the public
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware
Impressions from Skills Matter's FullStack Conference 2014.
MISSED THE CONFERENCE?
All talks have been recorded as SkillsCasts (film/code/slides) and are available to watch by Skills Matter's Community here: skillsmatter.com/conferences/6361-fullstack-node-and-java...
Joining the Skills Matter community is free, and it only takes a few minutes to sign up.
FULLSTACK 2015 - LONDON, JUNE 25-26TH
We are proud to announce FullStack 2015 – the conference on Node, JavaScript and hackable electronics. This year, we will bring the world's top innovators, hackers and experts together with our amazing developer community in London to learn and share skills, gain insights and drive innovation. Join to experience three days jam-packed with talks, demos, and coding.
Join us at FullStack 2015 in London on June 25-26th!
The FullStack 2015 will kick off with two days of talks and discussions over 4 tracks each day covering JavaScript, Node, hackable electronics and other topics you may tell us you wish to see.
Each track will feature talks by some of the world's top hackers and makers who are helping evolve technologies and practices in the exciting world of web, mobile, servers, drones and robots. In addition, each track will feature a Park Bench Panel discussion and 5 lightning talks by some of the great engineering teams in our community who use FullStack technologies and practices daily and will demo their projects.
Following two days of talks, we'll continue with a Saturday featuring hands-on Tutorials, so that you can gain some hands-on experience and practical skills to implement new ideas from the talks you attended and the people you met during the first 2 days!
Like the sound of that? Find out more here: skillsmatter.com/conferences/6612-fullstack-the-conferenc...
CALL FOR THOUGHTS NOW OPEN - SHARE YOUR IDEAS!
Skills Matter's community conferences are made possible thanks to our passionate community - who constantly feed us with their ideas. Who are the experts you would like to learn and share skills with next year? What topics would you like to see covered? How can we improve on 2014's conference? Help us create a great 3 days by submitting your thoughts, ideas, dreams and requirements through our Call For Thoughts Program (www.surveymonkey.com/s/VFGCDQ9) - and we'll start working on these straight away!
Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.
Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.
When the ransomware software is running it will encrypt all files that match particular extensions.
After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
Read more: en.wikipedia.org/wiki/Ransomware