The document is about a lighting talk given at the Titanium 2.0 Launch Event in Tokyo. It discusses Titanium 2.0 compatibility updates being made to Sample.Todo, issues with repeated WARN messages that have been fixed, improvements made to the TableViewRow component in 2.0, and lingering errors in the iOS version despite fixes in earlier versions. Code samples and a link to the updated Sample.Todo project on GitHub are also included.
Your Perimeter Sucks and People Keep clicking Shitjadedsecurity
This document provides instructions for a 3 step process involving a card and includes a countdown from 8 to 1. It also lists contact information for someone named Boris Sverdlik at Jadedsecurity and their email address.
How do you know if your web site is accessible? Can automated testing tools help? Glenda Sims will share gems from her 10+ years of experience testing sites for accessibility. Equip yourself with free and powerful testing tools. Learn how to turn it up a notch when you need to monitor accessibility across a vast enterprise. See some of the very latest testing tools that will help you evaluate color contrast, dynamic content and WAI-ARIA compliance
The document discusses a Titanium Mobile Study Meeting presentation about an open source Titanium mobile application called Zirconium. The presentation provides information on where to find Titanium news and community resources, notes that the Zirconium code is fully open source on GitHub, and requests help in developing an Android version of the app.
La carrera de biología marina dura 5 años y prepara a los aspirantes para campos como la investigación, la conservación y la educación ambiental, trabajando en universidades, centros de investigación o agencias gubernamentales relacionadas con el medio marino.
This document provides tips for hacking the interview process by Boris Sverdlik of Jaded Security Consulting. It suggests being outgoing and social during interviews to make a strong first impression. Interviewers should research the company beforehand and come prepared with questions to show initiative and interest in the role. Interpersonal skills are as important to focus on as technical abilities during the interview.
Your Perimeter Sucks and People Keep clicking Shitjadedsecurity
This document provides instructions for a 3 step process involving a card and includes a countdown from 8 to 1. It also lists contact information for someone named Boris Sverdlik at Jadedsecurity and their email address.
How do you know if your web site is accessible? Can automated testing tools help? Glenda Sims will share gems from her 10+ years of experience testing sites for accessibility. Equip yourself with free and powerful testing tools. Learn how to turn it up a notch when you need to monitor accessibility across a vast enterprise. See some of the very latest testing tools that will help you evaluate color contrast, dynamic content and WAI-ARIA compliance
The document discusses a Titanium Mobile Study Meeting presentation about an open source Titanium mobile application called Zirconium. The presentation provides information on where to find Titanium news and community resources, notes that the Zirconium code is fully open source on GitHub, and requests help in developing an Android version of the app.
La carrera de biología marina dura 5 años y prepara a los aspirantes para campos como la investigación, la conservación y la educación ambiental, trabajando en universidades, centros de investigación o agencias gubernamentales relacionadas con el medio marino.
This document provides tips for hacking the interview process by Boris Sverdlik of Jaded Security Consulting. It suggests being outgoing and social during interviews to make a strong first impression. Interviewers should research the company beforehand and come prepared with questions to show initiative and interest in the role. Interpersonal skills are as important to focus on as technical abilities during the interview.
The document discusses how air pollution from cars causes negative impacts and discusses the need to reduce greenhouse gas emissions to address climate change. It notes that the UK is one of the top 20 countries for car usage and that citizens in other countries are suffering from the effects. Failure to act will have huge social, environmental and economic costs and make the future difficult if climate change is not addressed.
You Can’t Buy Security
Building an Open Source Information Security Program
The document provides guidance on building an open source information security program through focusing on people, process, and technology. It emphasizes understanding the business first before implementing any security controls. The key steps outlined are:
1) Perform an information classification to understand what needs to be protected without using arbitrary values.
2) Draft security policies and procedures that are short, concise and relevant to the business.
3) Implement basic security controls like access controls, application security, network security, and operational controls using open source tools rather than purchasing products.
The presentation provides practical advice on building a security program from the ground up with an emphasis
Find out how we were able to adopt Extreme Programming (XP) in out distributed team! We are doing remote pair programming and remote meetings on a daily basis.
In this presentation, we showed some of the obstacles we faced and how we managed to resolve them!
This document provides an overview of captioning and accessibility. It defines captioning as synchronized text transcripts of multimedia content. It discusses how captioning is required by laws like the Americans with Disabilities Act and Section 508 to provide accessibility. The benefits of captioning include legal compliance, universal access, improved comprehension, and enhanced findability of content. Case studies show how captioning can improve learning retention for both disabled and non-disabled users.
Honey bees collect nectar from flowers in their proboscis, storing some in their main stomach for energy and transporting the rest to a second stomach to process into honey. They carry the honey back to the hive where humans later collect it. Honey is one of the oldest natural sweeteners and provides a variety of vitamins, minerals, antioxidants, and amino acids. It has been used in beauty regimes for centuries to exfoliate, hydrate, and treat acne due to its antibacterial properties.
The document discusses streaming media and how it allows for real-time delivery of audio and video over the internet. Streaming avoids the need to download entire files before viewing or listening by allowing content to be played as it is delivered. However, steady and fast internet connection speeds are required to maintain uninterrupted playback of streamed content.
The document discusses how air pollution from cars causes negative impacts and discusses the need to reduce greenhouse gas emissions to address climate change. It notes that the UK is one of the top 20 countries for car usage and that citizens in other countries are suffering from the effects. Failure to act will have huge social, environmental and economic costs and make the future difficult if climate change is not addressed.
You Can’t Buy Security
Building an Open Source Information Security Program
The document provides guidance on building an open source information security program through focusing on people, process, and technology. It emphasizes understanding the business first before implementing any security controls. The key steps outlined are:
1) Perform an information classification to understand what needs to be protected without using arbitrary values.
2) Draft security policies and procedures that are short, concise and relevant to the business.
3) Implement basic security controls like access controls, application security, network security, and operational controls using open source tools rather than purchasing products.
The presentation provides practical advice on building a security program from the ground up with an emphasis
Find out how we were able to adopt Extreme Programming (XP) in out distributed team! We are doing remote pair programming and remote meetings on a daily basis.
In this presentation, we showed some of the obstacles we faced and how we managed to resolve them!
This document provides an overview of captioning and accessibility. It defines captioning as synchronized text transcripts of multimedia content. It discusses how captioning is required by laws like the Americans with Disabilities Act and Section 508 to provide accessibility. The benefits of captioning include legal compliance, universal access, improved comprehension, and enhanced findability of content. Case studies show how captioning can improve learning retention for both disabled and non-disabled users.
Honey bees collect nectar from flowers in their proboscis, storing some in their main stomach for energy and transporting the rest to a second stomach to process into honey. They carry the honey back to the hive where humans later collect it. Honey is one of the oldest natural sweeteners and provides a variety of vitamins, minerals, antioxidants, and amino acids. It has been used in beauty regimes for centuries to exfoliate, hydrate, and treat acne due to its antibacterial properties.
The document discusses streaming media and how it allows for real-time delivery of audio and video over the internet. Streaming avoids the need to download entire files before viewing or listening by allowing content to be played as it is delivered. However, steady and fast internet connection speeds are required to maintain uninterrupted playback of streamed content.
21. Titanium 2.0 Launch Event in Tokyo - Lighting Talk!
直してみました。
iOS 版だけです。でも 1.8.2 で直ったはずのエラーが…。動くけど !
[ERROR] Adding an event listener to a proxy that isn't already in the context…