|
|
|
|
I'm almost done with the AJAX scrolling code. |
|
|
|
There are no conversations. |
|
|
|
|
Andrew Card |
The Oval Office symbolizes... the Constitution, the hopes and dreams, and I'm going to say democracy. And when you have a dress code in the Supreme Court and a dress code on the floor of the Senate, floor of the House, I think it's appropriate to have an expectation that there will be a dress code that respects the office of the President. |
Mike Ferguson |
Very few pilots even know how to read Morse code anymore. But if a pilot could read Morse code, he could tell which beacon he was approaching by the code that was flashing from it. |
Jesse James Garrett |
At Adaptive Path, we've been doing our own work with Ajax over the last several months, and we're realizing we've only scratched the surface of the rich interaction and responsiveness that Ajax applications can provide. |
Herman Cain |
The 9-9-9 plan would resuscitate this economy because it replaces the outdated tax code that allows politicians to pick winners and losers, and to provide favors in the form of tax breaks, special exemptions and loopholes. It simplifies the code dramatically: 9% business flat tax, 9% personal flat tax, 9% sales tax. |
Mitchell Baker |
Many people think that open source projects are sort of chaotic and and anarchistic. They think that developers randomly throw code at the code base and see what sticks. |
Jesse James Garrett |
Ajax is an important development for Web applications, and its importance is only going to grow. |
Jesse James Garrett |
Ajax isn't a technology. It's really several technologies, each flourishing in its own right, coming together in powerful new ways. |
Jesse James Garrett |
Google is making a huge investment in developing the Ajax approach. |
Aaron Eckhart |
I think they are very important because westerns have a code and a symbolism. |
Annie Jacobsen |
Back in the 1950s, there was a top-secret program code-named SUNTAN being conducted at a top-secret facility called Skunk Works. Its objective? To develop a liquid-hydrogen-powered spy plane. Because liquid hydrogen is incredibly volatile, early experiments were conducted inside a bomb shelter with eight-foot-thick walls. |
|
|
Notes to self: add code to prevent double posts, add support for special characters, and make AJAX feeds update to show posts that are new since the original load without displaying duplicates.
|
|
|
|
scrolling today
|
|
|
|
not the AJAX
This post is a comment.
|
|
|
|
Where dat ajax at?
|
|
|
|
they dont have to know how the code works, but if their the ones picking the language they should understand how it works because theyre imposing it on people who DO understand it. it would be like if i told you to code a youtube video creator and uploader but I found this REALLY AWESOME software that is VERY flexible and its so AWESOME, its called PHP. Now can you please code a program that works with cmd ffmpeg and automagically uploads videos
This post is a comment.
|
|
|
|
Can you make image links ajax into the post when you click a button.
This post is a comment.
|
|
|
|
Note to self: if the session dies don't Ajax a login screen into the page.
|
|
|
|
I feel like I used to use music-induced mania to write code. That doesn't sound like a real thing but there were for sure kinds of music that were new to me that helped me code. All my music feels old and predictable now. It does not give the same effect.
|
|
|
|
It kind of works... won't show you more than ten notifications though! Need to fix a part of the query and add AJAX loading so you can see the entire notification history.
This post is a comment.
|
|
|
|
Researchers Use Machine-Learning Techniques To De-Anonymize Coders
At the DefCon hacking conference on Friday, Rachel Greenstadt, an associate professor of computer science at Drexel University, and Aylin Caliskan, Greenstadt's former PhD student and now an assistant professor at George Washington University, presented a number of studies they've conducted using machine learning techniques to de-anonymize the authors of code samples. "Their work could be useful in a plagiarism dispute, for instance, but it could also have privacy implications, especially for the thousands of developers who contribute open source code to the world," reports Wired. From the report: First, the algorithm they...
|
|