View allAll Photos Tagged javascript

Yeah, that seems about right.

i wonder where that beloved piece of paper is..

Generated using javascript/canvas and HTML5

Generated using javascript, HTML5 and canvas

I have created an Instagram page for the game Classic Space Adventure. You can follow it here if you are intrested.

 

Classic Space Adventure is a free fanmade webgame I have created that you play in your browser (Chrome or Firefox) using your keyboard, It is inspired by the Classic Space theme by LEGO®, so you will notice many of these sets in the game, recreated in a pixelated style.

 

Play the game here, or check out the webpage for the game here.

 

There is also a Facebook page for this game that you can follow.

Generated and rendered in Structure Synth using javascript Math functions to generate the more flowing features.

FullStack 2016 - the conference on JavaScript, Node & Internet of Things, Wednesday, 13th - Friday, 15th July at CodeNode, London. Images Copyright www.edtelling.com. skillsmatter.com/conferences/7278-fullstack-2016-the-conf...

This is a neat little program, "the son of defdb and pngthermal," posted on encode.ru, a forum about compression algorithms. The program is available for Mac, Windows and Linux. The author explains the colours here. For example, red is "expansion" (>= 8 bits), with "midnight blue" being "strictly less than a bit."

 

Interestingly, the author makes the argument that if you really want to shave bytes, write your HTML5 <!DOCTYPE> in lower-case; it compresses better that way. (2 bytes, he says.)

 

The program can export varying widths and sizes, and also has a color-blind mode.

 

This is a cropped screenshot of the soundmanager2.js file, which actually compresses very well overall (there is much more blue further down the image.) To make these sorts of images, gzip whatever.js and then run gzthermal on the resulting .js.gz output.

 

I also need to thank a co-worker, probably Bert Saw, for sharing this. I've had that forum post open in a tab for a few days now, and have completely forgotten where I found it.

JavaScript generated animation. It's so much fun to play with it :)

It looks even cooler while it's drawing.

 

Go to Silkbrush

A little more customizable, colours and size can be changed. (I couldn't be arsed to make scaled-up versions of the play/pause buttons, but those should be larger as well.)

 

Also, this UI can be used to scrub through video - though I'm not sure it's appropriate given the simple, standard behaviour of scrubbing linearly across the width of the video, but the idea here is to experiment.

 

This was inspired by Apple's UI for the preview feature in the iTunes app on the iPhone, and other circular things. This is a demo which will be included as part of a pending SoundManager 2 release.

As a kid, I used to print program source code and would make edits while on family road trips during summer vacation. When I got back home, I'd type in the edits.

 

In taking a road trip I hadn't done in perhaps 15 years, it felt appropriate to revisit some old habits - this time, with about 45 pages of JavaScript.

 

Despite software's "virtual" nature, I think it's good to occasionally print and work on a physical copy of your ideas. Even if you don't work all of your notes back into the code, you still benefit from the mental exercise of thinking through and editing your work.

playing more with javascript and canvas. this is a brush to be controlled by mouse, though i could apply my epicycle engine to it as well.

(Or, "Programmer/nerd humour") .. A little friday-afternoon fun on my dev environment.

Book for learning Javascript

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

this book learn you javascript

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Best viewed large

Made with HTML5 and JavaScript

 

See more photos and abstract drawings in my gallery on DeviantArt:

www.deviantart.com/ciokkolata

Thank you!

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Impressions from Skills Matter's FullStack Conference 2014.

 

MISSED THE CONFERENCE?

 

All talks have been recorded as SkillsCasts (film/code/slides) and are available to watch by Skills Matter's Community here: skillsmatter.com/conferences/6361-fullstack-node-and-java...

 

Joining the Skills Matter community is free, and it only takes a few minutes to sign up.

 

FULLSTACK 2015 - LONDON, JUNE 25-26TH

We are proud to announce FullStack 2015 – the conference on Node, JavaScript and hackable electronics. This year, we will bring the world's top innovators, hackers and experts together with our amazing developer community in London to learn and share skills, gain insights and drive innovation. Join to experience three days jam-packed with talks, demos, and coding.

 

Join us at FullStack 2015 in London on June 25-26th!

The FullStack 2015 will kick off with two days of talks and discussions over 4 tracks each day covering JavaScript, Node, hackable electronics and other topics you may tell us you wish to see.

 

Each track will feature talks by some of the world's top hackers and makers who are helping evolve technologies and practices in the exciting world of web, mobile, servers, drones and robots. In addition, each track will feature a Park Bench Panel discussion and 5 lightning talks by some of the great engineering teams in our community who use FullStack technologies and practices daily and will demo their projects.

 

Following two days of talks, we'll continue with a Saturday featuring hands-on Tutorials, so that you can gain some hands-on experience and practical skills to implement new ideas from the talks you attended and the people you met during the first 2 days!

 

Like the sound of that? Find out more here: skillsmatter.com/conferences/6612-fullstack-the-conferenc...

 

CALL FOR THOUGHTS NOW OPEN - SHARE YOUR IDEAS!

Skills Matter's community conferences are made possible thanks to our passionate community - who constantly feed us with their ideas. Who are the experts you would like to learn and share skills with next year? What topics would you like to see covered? How can we improve on 2014's conference? Help us create a great 3 days by submitting your thoughts, ideas, dreams and requirements through our Call For Thoughts Program (www.surveymonkey.com/s/VFGCDQ9) - and we'll start working on these straight away!

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Impressions from Skills Matter's FullStack Conference 2014.

 

MISSED THE CONFERENCE?

 

All talks have been recorded as SkillsCasts (film/code/slides) and are available to watch by Skills Matter's Community here: skillsmatter.com/conferences/6361-fullstack-node-and-java...

 

Joining the Skills Matter community is free, and it only takes a few minutes to sign up.

 

FULLSTACK 2015 - LONDON, JUNE 25-26TH

We are proud to announce FullStack 2015 – the conference on Node, JavaScript and hackable electronics. This year, we will bring the world's top innovators, hackers and experts together with our amazing developer community in London to learn and share skills, gain insights and drive innovation. Join to experience three days jam-packed with talks, demos, and coding.

 

Join us at FullStack 2015 in London on June 25-26th!

The FullStack 2015 will kick off with two days of talks and discussions over 4 tracks each day covering JavaScript, Node, hackable electronics and other topics you may tell us you wish to see.

 

Each track will feature talks by some of the world's top hackers and makers who are helping evolve technologies and practices in the exciting world of web, mobile, servers, drones and robots. In addition, each track will feature a Park Bench Panel discussion and 5 lightning talks by some of the great engineering teams in our community who use FullStack technologies and practices daily and will demo their projects.

 

Following two days of talks, we'll continue with a Saturday featuring hands-on Tutorials, so that you can gain some hands-on experience and practical skills to implement new ideas from the talks you attended and the people you met during the first 2 days!

 

Like the sound of that? Find out more here: skillsmatter.com/conferences/6612-fullstack-the-conferenc...

 

CALL FOR THOUGHTS NOW OPEN - SHARE YOUR IDEAS!

Skills Matter's community conferences are made possible thanks to our passionate community - who constantly feed us with their ideas. Who are the experts you would like to learn and share skills with next year? What topics would you like to see covered? How can we improve on 2014's conference? Help us create a great 3 days by submitting your thoughts, ideas, dreams and requirements through our Call For Thoughts Program (www.surveymonkey.com/s/VFGCDQ9) - and we'll start working on these straight away!

Impressions from Skills Matter's FullStack Conference 2014.

 

MISSED THE CONFERENCE?

 

All talks have been recorded as SkillsCasts (film/code/slides) and are available to watch by Skills Matter's Community here: skillsmatter.com/conferences/6361-fullstack-node-and-java...

 

Joining the Skills Matter community is free, and it only takes a few minutes to sign up.

 

FULLSTACK 2015 - LONDON, JUNE 25-26TH

We are proud to announce FullStack 2015 – the conference on Node, JavaScript and hackable electronics. This year, we will bring the world's top innovators, hackers and experts together with our amazing developer community in London to learn and share skills, gain insights and drive innovation. Join to experience three days jam-packed with talks, demos, and coding.

 

Join us at FullStack 2015 in London on June 25-26th!

The FullStack 2015 will kick off with two days of talks and discussions over 4 tracks each day covering JavaScript, Node, hackable electronics and other topics you may tell us you wish to see.

 

Each track will feature talks by some of the world's top hackers and makers who are helping evolve technologies and practices in the exciting world of web, mobile, servers, drones and robots. In addition, each track will feature a Park Bench Panel discussion and 5 lightning talks by some of the great engineering teams in our community who use FullStack technologies and practices daily and will demo their projects.

 

Following two days of talks, we'll continue with a Saturday featuring hands-on Tutorials, so that you can gain some hands-on experience and practical skills to implement new ideas from the talks you attended and the people you met during the first 2 days!

 

Like the sound of that? Find out more here: skillsmatter.com/conferences/6612-fullstack-the-conferenc...

 

CALL FOR THOUGHTS NOW OPEN - SHARE YOUR IDEAS!

Skills Matter's community conferences are made possible thanks to our passionate community - who constantly feed us with their ideas. Who are the experts you would like to learn and share skills with next year? What topics would you like to see covered? How can we improve on 2014's conference? Help us create a great 3 days by submitting your thoughts, ideas, dreams and requirements through our Call For Thoughts Program (www.surveymonkey.com/s/VFGCDQ9) - and we'll start working on these straight away!

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

1 3 4 5 6 7 ••• 79 80