136 private links
Before you make the decision to set a date in 2022 to take another look at HTML5, I ask that you read the rest of this article. My goal this month is to give you practical strategies for how you can adopt HTML5 technologies today without ending up with the kind of graceless degradation illustrated in Figure 2. In this article, I’ll cover:
Feature detection versus user agent (UA) sniffing
Polyfilling with JavaScript
Graceful degradation
The jQuery Board, in conjunction with Software Freedom Conservancy, is proud to announce the formation of the jQuery Foundation, Inc., an independent organization that will manage jQuery, the Internet’s number one JavaScript library, and its constituent projects.
The jQuery Board previously administered jQuery under the aegis of the Conservancy, a public charity that acts as a non-profit home for free software projects.
The new jQuery Foundation is a non-profit trade association dedicated to supporting development of the jQuery Core, UI, and Mobile projects; providing jQuery documentation and support; and fostering the jQuery community.
Speaking at QCon London 2012 today, Mozilla Research Fellow Allen Wirfs-Brock laid out what he believes will be the future of the ECMAScript specification. Among the technical details, he included some broader thoughts about the role of JavaScript, predicting that the language will be “the canonical programming language for the next 20+ years.”
Wirfs-Brock began with a familiar division of recent computing history into three stages: the ‘business computing’ era, dominated by mainframe systems from firms such as IBM; the ‘personal computing’ era, which was spearheaded by the grand Wintel alliance; and the ‘ambient computing’ era, a brave new browser-based world that has arisen over the past five-to-ten years. He emphasised the crucial foothold that JavaScript already has, and cited Richard Gabriel’s ‘worse is better’ maxim to explain why any young pretender to JS’s client-side crown (cough-Google Dart-cough) is unlikely to succeed.
"Some examples of these unofficial data flows are USB sticks or other portable data storage devices, MSN Messenger or other online messaging software, Gmail or other online e-mail services, Google Docs or other online document sharing and Skype or other online VOIP software, and also other less straightforward products self-developed Access databases and self-developed Excel spreadsheets and macros."
Are you kidding? Someone using Skype or developing Excel macros is considered Shadow IT!? People have been doing that for years and 99% of them were never considered IT folk..Shadow IT is more sophisticated than a user running a desktop app.
It's more like signing up for cloud services and running what could be considered enterprise software like a database or just about any app you'd find operating entirely inside the enterprise walls
This video is here to demonstrate that the TSA’s insistence that the nude body scanner program is effective and necessary is nothing but a fraud, just like their claims that the program is safe (radiation what?) and non-invasive (nude pictures who?). The scanners are now effectively worthless, as anyone can beat them with virtually no effort. The TSA has been provided this video in advance of it being made public to give them an opportunity to turn off the scanners and revert to the metal detectors. I personally believe they now have no choice but to turn them off.
Die Nutzung von Kunst- und Kulturgütern durch eine tendenziell unendlich große Anzahl von Konsument_innen zu gegen Null tendierenden zusätzlichen Stückkosten wird durch technische Entwicklungen – vom Buchdruck bis zum Internet – ständig einfacher. Die Gratisnutzung solcher Güter und Leistungen ist daher nur durch staatliche Eingriffe zu verhindern, die notwendigerweise immer aufwändiger werden und immer tiefer in Persönlichkeitsrechte eingreifen. Auf diese Art wird unter Einsatz erheblicher öffentlicher Mittel ein Markt simuliert, der – wie die meisten Märkte – in erster Linie den größten Playern zugute kommt. Steuergeld wird also zum Schutz der Interessen von Konzernen verwendet; der Nutzen für individuelle Künstler_innen ist gering.
Albert Steinhauser » Wie Michael R. unschuldig in die staatliche Überwachungsmaschinerie geraten ist
Michael R. ist ein Selbstständiger in der IT-Branche. Er interessiert sich für netzpolitische Themen und ist auf Twitter, Facebook und google+ aktiv. Diese Merkmale treffen vermutlich auf einige in Österreich zu.
Am 14.10.2011 macht im Chatforum von AnonAustria der Chat-Teilnehmer „The_Dude“ Äußerungen, die möglicher Weise gegen das Verbotsgesetz verstoßen. Die Einträge können ernst oder – wie SzenekennerInnen erklären – ironisch gemeint sein.
Jetzt beginnt das Bundesamt für Verfassungsschutz und Terrorismusbekämpfung (BVT) nach dem Verbotsgesetz zu ermitteln. Der Zusammenhang mit AnonAustria dürfte das Engagement gegen Rechtsextremismus beflügeln. In geradezu halsbrecherischer Argumentation wird in einem Anlassbericht vom 23.12.2011 der Polizei an die Staatsanwaltschaft – offensichtlich nach Anwendung von Überwachungsmaßnahmen – behauptet, der Selbständige Michael R. wäre mit „The_Dude“ ident.
NEWS: Justizministerin Beatrix Karl will Redaktionsgeheimnis aushebeln | Verlagsgruppe News | ots.at
Das Nachrichtenmagazin NEWS berichtet in seiner am
Donnerstag erscheinenden Ausgabe von einer geplanten Änderung der
Strafprozessordnung mit der das Redaktionsgeheimnis einfach
ausgehebelt werden kann. Betroffen von der Novelle sind auch Anwälte,
Notare, Steuerberater, psychosoziale Dienste und Ärzte.
Wird eine Person aus einer dieser Berufsgruppen künftig als
Beschuldigter deklariert, kann er der Sicherstellung von ihm
vorliegenden Aufzeichnungen oder Daten nicht mehr widersprechen. Die
Sicherheitsbehörden kommen somit in den Besitz des gesamten Akten-
oder Datenbestands einer Redaktion oder Anwaltskanzlei. Anstelle
eines unabhängigen Richters soll künftig der Staatsanwalt selbst
darüber entscheiden, welche Teile dieses Materials zum Akt genommen
werden. Zur Sichtung darf der Staatsanwalt auch "Hilfskräfte" somit
auch ermittelnde Polizeibeamte einsetzen.
Für .at-Domains ist DNSSEC seit dem 29.02.2012 öffentlich aktiviert. Zuvor konnten Registrare in einer umfassenden Testphase das System prüfen und Erfahrungen damit sammeln. Gleichzeitig wurden bei nic.at umfangreiche Tests durchgeführt und Sicherheitsvorkehrungen getroffen, um die Einführung vorzubereiten. Denn bei anderen Registries hatte es beim DNSSEC-Start immer wieder Probleme gegeben.
The world of audits is a reality that more financial companies are learning to live with. One of the things being audited are the texts sent to social media sites like Twitter, LinkedIn and Facebook. This tutorial will guide you through how to do Twitter searches from RPG on IBM i and record the results into a DB2 table.
The optimizer of IBM® DB2® for Linux®, UNIX®, and Windows® relies on a cost-based design. Using an SQL statement input by a user or application, the optimizer selects an execution plan with the lowest cost to achieve the best performance. If the performance still doesn't meet requirements after you have used all the best practices for tuning the SQL statement, you can use an optimization profile to guide DB2 to create the execution plan that the user expects. This article explains how to use optimization profiles within DB2 stored procedures.
Apache Pig is a high-level procedural language for querying large semi-structured data sets using Hadoop and the MapReduce Platform. Pig simplifies the use of Hadoop by allowing SQL-like queries to a distributed dataset. Explore the language behind Pig and discover its use in a simple Hadoop cluster.
Meine Frage wäre nun: Wozu verpflichtet "geistiges Eigentum"? Ich glaube, es ist bedeutend einfacher, diese Frage zu beantworten, als die Energien in eine Abschaffung des Begriffs "geistiges Eigentum" zu stecken.
Whether this post is going to be good or not, is up to you but I’ll try to outline what jQuery is, and how you can start working with it.
For most of you, this will just be a re-cap and probably not provide much new information but can perhaps serve as a reference post if you ever need one. I will expect some basic knowledge about JavaScript but you do not have to be an expert, heck, you don’t even need to have used jQuery before—but you should know terms like object literals, anonymous functions, and what DOM and CSS are.
THE spat between Google and Microsoft is shaping up to be at least as entertaining as Apple’s battle with the beige behemoth a decade ago.
Television is going the way of the dinosaur, and the deadly comet is called BitTorrent Live. Today, Bram Cohen, the author of the BitTorrent peer-to-peer sharing protocol, demoed his latest creation at the SF MusicTech Summit.
BitTorrent Live lets any content owner or publisher stream video to millions of people at good quality and with just a few seconds of latency…for free or cheap. Sports, news events, simulcast TV shows, education, video conferencing, or uncensored war zone broadcasts — this technology will power the future of video.
We grew up with the Internet and on the Internet. This is what makes us different; this is what makes the crucial, although surprising from your point of view, difference: we do not ‘surf’ and the internet to us is not a ‘place’ or ‘virtual space’. The Internet to us is not something external to reality but a part of it: an invisible yet constantly present layer intertwined with the physical environment. We do not use the Internet, we live on the Internet and along it. If we were to tell our bildnungsroman to you, the analog, we could say there was a natural Internet aspect to every single experience that has shaped us. We made friends and enemies online, we prepared cribs for tests online, we planned parties and studying sessions online, we fell in love and broke up online. The Web to us is not a technology which we had to learn and which we managed to get a grip of. The Web is a process, happening continuously and continuously transforming before our eyes; with us and through us.
"Offensive and insulting words are part of the robust democratic process, which is essential to a free country."
IBM says it has made a significant advance towards creating mind-bendingly powerful quantum computers with it superconducting 3D qubit device.
With experts hoping to construct a full working quantum computer in the next decade or so, the ability by IBM boffins to reduce errors in quantum processing and withhold information has made this even more likely.
Qubits, or quantum bits, are the basic units of information used to process information in a quantum computer. Unlike ‘bits’ used in regular computers, which can switch between 0 and 1, quantum bits can be either 0 or 1. Rather more perplexingly, the weird world of quantum mechanics means that they can also be both at the same time.
It is this ability to exist in multiple states that opens up potential for massively increased computing power.
Alan Turing, born a century ago this year, is best known for his wartime code-breaking and for inventing the 'Turing machine' – the concept at the heart of every computer today. But his legacy extends much further: he founded the field of artificial intelligence, proposed a theory of biological pattern formation and speculated about the limits of computation in physics. In this collection of features and opinion pieces, Nature celebrates the mind that, in a handful of papers over a tragically short lifetime, shaped many of the hottest fields in science today.